410 likes | 910 Views
Staying safe in a digital world. Why we are here & why I do this job. Outcomes. To know the “Key Words” in e-safety. Reporting inappropriate use on the internet, mobile phones games consoles, etc. To examine what e-safety in the home is. But above all…… TO BE EMPOWERED. Grooming
E N D
Outcomes • To know the “Key Words” in e-safety. • Reporting inappropriate use on the internet, mobile phones games consoles, etc. • To examine what e-safety in the home is. • But above all…… TO BE EMPOWERED
Grooming • Cyberbullying • Sexting • Trolling • Hacking • Cyber-sniping • Grunging • ….e-safety vocabulary changes rapidly. • (Glossary of e-safety terms) It’s all in a word – or rather, several
POS • WMM • ASL?? • WC? • TTO • Language changes – what was once perfectly harmless now yields surprises. It’s all in a word – things they type
Aggression. • Unexplained behavioural changes • Disturbed sleep pattern. • Secrecy • Sexualised behaviour/language • Change in dress sense • Signs of addiction – won’t leave the PC alone • The most telling EWS of all – YOU feeling that something isn’t quite right. Signs and Symptoms.
The Good News! • Far more benefits to working, learning and playing online than risks. • WE can be in control! • You will only ever hear the “Dark Side Of The Force” in the media…BUT this can be useful! • EVERYONE who wants to abuse on the internet relies on the fact that it is usually embarrassing to talk about it. • The more we talk about e-safety the better!
Where do I start? • First, identify WHAT you have and WHERE it is. (you might want to think about portable/mobile devices.) • Next, WHO uses it (mainly), and for what PURPOSE? • You may be surprised at just how much connectible equipment you have in your home. DON’T FORGET THE “MAN DRAWER”
Where do I start? • Next up is YOUR OWN PERSONAL E-SAFETY. • Do you have online shopping accounts? • Do you have Social Networking accounts? • Do any of the above share a password? • Do you have any general interest accounts? • (Accounts where NO personal information exists and no financial transactions take place are low-level in terms of security)
Where do I start? • Does anyone else in your home know your passwords/PIN numbers/Secret Word(s)? • Do you know anyone else’s? (It’s OK to know your child’s) • Have you ever encouraged your child to “log on as you?” • Fact:- in 145 Primary school visits, at least 40% of Y5s know mum or dad’s PIN number. • Fact:- 92% of year 10s say they know and have used Mum/Dad’s username, password or PIN number.
Then what? • Once you know what you have, where it is, what it does, who uses it and what for, you are in a good place to have a family discussion… • WHAT IS IT OK TO DO WITH CONNECTED TECHNOLOGY AT HOME? • Make a list of do’s and don’ts • This becomes your home “Acceptable Use Policy, or “Trust Agreement”.
The Home Acceptable Use Policy? • The school has one • Colleges and Universities have one • All workplaces have one. • Agreed – worded in their language.
Here’s mine. • This is MY phone. I paid for it, and I am lending it to you. • To help you use it safely, this phone must not be used:- i) To send nasty messages ii) To take or download any image you would not want me to see …..etc…etc….
Here’s mine. • 10) Finally, if you mess up, and you will mess up, we will talk about it, and there will be a consequence. That consequence will be less if you tell me about it rather than let me find out about it.
Filtering • A logon with appropriate age-related settings, plus the activation of parental controls is a start…….. • Children WILL, eventually, see material that you would rather they didn’t. • Make it “OK TO TELL.” • http://www.NetNanny.com • NO filter is 100% effective – especially with regard to images. • NOTHING replaces vigilance.
Filtering • A logon with appropriate age-related settings, plus the activation of parental controls is a start…….. • Children WILL, eventually, see material that you would rather they didn’t. • Make it “OK TO TELL.” • http://www.NetNanny.com
Filtering • NO SYSTEM CAN 100% guarantee that your child will never come across anything inappropriate – beware the “security blanket”. • NOTHING beats regular discussions • Use the News.
Now the first “Tough one” • Let’s talk about monitoring. • Do you feel the need to? • How would you go about it? • When does caring overseeing become spying? • What about the old “I need my privacy” argument?
How To Take A look” • Internet History can be deleted. • Temporary files can be deleted. • Most young people will think they can hide files by putting files within folders within folders. • You CAN search a computer for images and videos.
How To Take A look” • Start|Search • *.jpg (pulls up ALL photographs stored) • *.avi (pulls up most videos) • *.wmv (pulls up a different format of video)
If you do monitor a PC or phone…. PLEASE REMEMBER…. Images found on computers may NOT have been put there deliberately. They may even PRE-DATE your ownership of the computer. It may be perfectly OK, but you DO need to know what is on your machine. Killing spouses/children/ is usually frowned upon!!!
A few facts of connected life… • In general terms – there is no such thing as privacy – every electronic contact leaves a trace. • Once an image is posted online, you loose control of it – forever. • Young people find hacking highly attractive. • Young children can and do experiment sexually online.
To Block, or Not To Block….. • Your rules, and your comfort are important! • Some parents/carers block, others do not. • If you ban without discussion, it drives the activity underground. • Youngsters need to understand why something is not good. • You need a “non-verbal” means of them telling you they have had a problem.
Reporting Abuse • If your child is being affected by any kind of online abuse, your child’s teacher will want to know.
Reporting Abuse • 99% of SN suppliers offer some kind of reporting tools.
Reporting Abuse • 99% of SN suppliers offer some kind of reporting tools.
Hardware Essentials…. • A good, all round anti-virus, anti-spyware, anti-malware package installed and regularly updated. • A WPA2 secured wireless network…(If you use one) • Windows Update configured to download and apply updates regularly. • A plan for how old equipment will be disposed off – including destroying information stored on it. (Old Mobile Phone Companies!)
The Future (the other “F” word. • Faster, better, more, technology AND pace of change. • A good idea not to be the first in the queue. • Let new technology settle into the market – even release candidates have been found to have serious bugs. • NOTHING IS FREE – THERE IS ALWAYS A COST – EVEN IF IT IS ONLY YOUR EMAIL ACCOUNT NAME.
Over To You…. Q & A