Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lifelong Learning Service Monday 30 th or Tuesday 31 st March 2009 1:30pm Safe use of the Internet.

Similar presentations

Presentation on theme: "Lifelong Learning Service Monday 30 th or Tuesday 31 st March 2009 1:30pm Safe use of the Internet."— Presentation transcript:

1 Lifelong Learning Service Monday 30 th or Tuesday 31 st March 2009 1:30pm Safe use of the Internet

2 Introductions Trainer: Ian Christopher Jones

3 Acceptable Use Policies (AUPs)

4 “Improper use of these systems could expose both the Council and the user to potential legal liability” “Primary use of the Internet during working hours is as a business tool used for work purposes” The following extracts are taken from the Swansea Councils ‘Acceptable Use Policy’. If you work for another organisation you should ask about their AUPs, and obtain a copy if you haven’t already got one.

5 The Internet and e-mail facility should not be used for transmitting or receiving material which is:  Illegal, obscene, offensive, fraudulent etc.  Discriminatory (on the grounds of race, gender, nationality, culture, religion, sexual orientation, age, disability or personal characteristics)  Defamatory – including libellous and slanderous comments  An intrusion into other people's privacy, or which may be construed as harassing them

6  Confidential information  In contravention of the Data Protection Act (using personal data for unauthorised purpose)  Furthermore, Copyright in material exists automatically, and no statement to this effect is required).  In breach of Copyright (NOTE: it is illegal to download or copy material without prior permission of the owner;

7 Do not use the Internet or e-mail facility for:  Chain letters  Private business use or personal advertisements  Chat lines or playing games  On-line betting or gambling  Newsgroups, Bulletin Boards, Mailing Lists other than for work purposes, unless in agreement with your Manager – any Manager giving permission for this will need to keep a record of such subscriptions. These are areas where names and addresses are made available to a wider audience and as such could result in junk mail (SPAM) causing overloading of mailboxes and wasted time.

8  Downloading/streaming of video/audio programs as this can cause network congestion – it should only be done with the authorisation of your line manager and outside general office time when necessary.  Purchasing on-line, other than for work purposes, and then only in accordance with the Council's e-commerce and general procurement policy.  Downloading files, Shareware or Freeware – you may not be aware of the correct licensing issues; in addition, you could introduce viruses into the organisation – it is important that you stick to safe sites. Council staff are reminded that all software must be installed by Technical Support.

9  Pictures, jokes, 'amusing stories' or inappropriate language – these could be interpreted by somebody as discriminatory, and another person's perception may not be the same as yours. Be aware that any such items could be potentially offensive and may lead to legal action if construed as defamatory or amounting to harassment.  E-mail is not private – it can be copied, forwarded. You may delete it, but it could still reside somewhere and may be later accessed and read.  Computer Security – it is your responsibility to ensure security. You must keep your password confidential, do not allow unauthorised use of your PC – you will be held responsible for all mail items using your ID or for any work carried out using your password; do not access other people's mailboxes without permission. When investigating misuse of the e-mail and internet facilities, special consideration will be given to employees who use a shared facility.

10  E-mail – Any correspondence entered into can be classed as a Contract and could be used in any legal action against you or the Council  Attachments – could contain a virus, therefore take care when opening from an unknown source.  Think when submitting personal/company details – it could result in unwanted junk mail, or possibly facilitate fraud against you or the Council

11  DO NOT access e-mail of any other employee unless specifically authorised.  DO NOT send e-mails from another employee's computer unless specifically authorised.  Should you personally receive any material which falls into the categories discussed above, or accidentally visit a site that would be deemed unsuitable, contact your line manager who will take the necessary action.  All employees should report possible misuse to their line manager.

12 Acceptable Use Policies (AUPs) Staff Internet And Email Use Policy Page 47 – 50 of the Staff Quality Handbook – Personnel & Training Available From: Or Or http://swannet/personnel/Policies/staffemailpol.htm Or http://staffnet/index.cfm?articleid=8431 – Staffnet (Intranet)

13 Using this machine confirms that I agree by the Code of Conduct School ICT Code Of Conduct

14 Appropriate Online Behaviour

15 Emailing Always think before you press the Send button. Using CAPITAL Letters for your words is the equivalent of shouting online (Netiquette) Make sure that you do not use inappropriate language (Profanity, Slang words, Disparaging remarks) Make sure that what you have written makes sense and is correct Make sure that you are sending the email to the correct recipient/s Keep/ archive all emails you send and receive this can be used as possible written proof of what has been said If you are going to add a CC (Carbon Copy), you might consider adding a BCC (Blind Carbon Copy) instead this will prevent the mass emailing of addresses, which could be a potential security risk IF IN DOUBT LEAVE IT OUT

16 Example of the BCC option in Microsoft Outlook (This option is also available in all Email programs)

17 Example of the BCC option in Yahoo Classic Mail (This option is also available in all Web based Email)

18 Delete any emails that are suspicious. For example if they are from anyone that you do not know Do Not open any attachments that you think may contain harmful content. For example viruses. An example of a SPAM email, that may or may not contain a suspicious attachment

19 Contents of a suspicious ‘SPAM’ email can look something like this

20 Contents of a suspicious ‘Phishing’ email can look something like this

21 Contents of a suspicious fake bank ‘Phishing’ email

22 Internet If you see something on screen you don’t like cover it up and get some help – do this discreetly if you can Filter/ Monitor not just what users Download, but also what users Upload (The content issue has swung from download to upload – but both are still equally as important) Commercial/ Advertising – differentiating between true content and what is actually advertising (Phishing Links) Not everything you read online is true – can people tell the difference (Even the BBC and other news agencies can get News facts wrong) Scams – Emails from unknown people in foreign countries or submitting details to unsecure or fake websites can lead to monetary and Identity theft If it looks too good to be true it generally is Offensive websites - talk to your managers

23 Internet Safety is not just the role of the ICT professionals, but everyone who uses ICT Young professionals and teachers need to be careful what they do and how they behave online Make sure there are clear policies – what you are or are not allowed to do when you are using the network (Acceptable Use Policies) If you are using ICT with users within your groups (including children), you must ensure that they have knowledge and understanding of the risks that go with it An awareness of copyright issues – illegal music downloads peer to peer websites, file sharing software, more open to viruses and malware and worst scenario being sued and fined by a media company for copyright violations Make sure that you completely logout of Emails, Internet, PC, at the end of a session, or if you leave the PC unattended for a while. Take Removable Media – Portable Hard Drives, Digital cameras, USB Memory Sticks - with you as well

24 The 4 C’s Content – Commerce – Contact – Conduct/ Culture – Scams, identity theft, commercialism Uploaded and downloaded Grooming: sexual and race hatred Cyberbullying and social networking

25 Social Networking The social networking phenomenon has grown vastly over the last 4 – 5 years, with the arrival of Web 2.0 technologies (User led/ generated content and Interactivity- Web 2.0 Read/ Write Web). Websites like MySpace, Facebook, Friends Reunited and Bebo for the under 16’s There are others but these are probably the 4 best well known. However there are specific online video and photo sharing sites. The best known of these are YouTube (Videos) and Flickr (Photos).

26 Privacy Anything that you post up onto a website, you be should be confident enough to shout across a room Think before adding people to your friends list (All social networks require you to confirm the addition of a friend once a request has been made If you are unsure decline the request and research who they are) If another user is bombarding you with unwanted messages, may need to block that individual. Place limits on who can see your profile (Facebook has a Privacy section where you can restrict access, MySpace offers a similar option to set your profile to Private Other Social Networking Sites offer similar options) Do not post too much personal information (this includes email addresses, home addresses and phone number, but also less obvious things such as specifics, like places you visit regularly)

27 Spam Filter – some websites offer Spam (unsolicited messages) filtering options, which can help detect fake accounts that could lead to Phishing (Fake/ Scam) websites MySpace has an option where you can select the ‘Require CAPTCHA’ feature – this will eliminate messages created by automated tools rather than real people See example below: Arranging to meet someone – care should taken by everyone, if someone suggests you meet, the request should be met with caution. Unless you are absolutely certain who you are talking to, you should decline the invitation. If a meeting is arranged, be sure to go with someone else, and meet in a public place.

28 The account you have created with your chosen social network will be password protected. However a weak password will mean that it will be possible for someone to log into your account. Take a look at the next slide about choosing a secure password: Social networks like instant messaging appeals greatly to children and teenagers. However it is this group who are particularly at risk from online threats. Younger children should not be allowed on such sites, and there are a number of filtering tools available. In the case of older children, it is important that parents or guardians know what they are doing online. Physical Monitoring of activity in addition to careful advice should be implemented. Look at a site’s help pages for more specific details.

29 Passwords Passwords can be made more secure by substituting certain letters for numbers or symbols, and mixing upper and lower case letters. For instance an insecure password like ‘serious’ can become a secure password when written as ‘s£Ri0u5’. t£4cH£r Other examples: = Education €DuC4t|0n p4sSw0rD 7uT0r = Password = Teacher = Tutor Do not use birth dates or information that can be easily guessed, or researched

30 Activity - 1 There is little or no danger to the young person - Low/No risk the activity is one they may continue with Escalate High Risk - to the service provider! - report abuse! -involve LA support services Encourage safe behaviour – Medium to low risk the young person should be supported to stop the activity, or take no further action

31 Daphne’s friend offers to share their Instant Messenger (like MSN) contacts. Daphne is very pleased because she now has 150 ‘friends’.

32 Daphne’s ‘friends’ have been collected by sharing address books. She only knows about one third of the people in her contact list. She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates. She also has a group for ‘friends of friends’ i.e. internet strangers. She does not give out any personal details to these people. She is happy to chat online with friends of friends, but nothing more. She does not use her web cam when she talks to this group.

33 Short Video 1 ‘Digital Dirt Sticks’

34 Break

35 Recognising Unsuitable Content – Activity 2

36 This website is not what it first appears to be:

37 Short Video 1 Where’s Claus? ‘People online may not be who they say they are’

38 Cyber-bullying Guidelines Cyber-bullying is bullying whether it is online or offline What sort of relationship do you have with your students? (Would you know about potential issues, either with less IT literate or more vulnerable students) Students will sometimes confide in others, and not necessarily with yourself or professional staff “Cyber-bullying is an aggressive, intentional act carried out by a group or individual using electronic forms of contact repeatedly over time against a victim who cannot easily defend him or herself”. (Report to the Anti-Bullying Alliance by Goldsmiths College, University of London) Can be: Constant 24/7, Can be anonymous, Viral, Difficult to escape

39 If someone is being horrible to you in this way, don’t respond or reply to them. If someone says or does something online that makes you feel uncomfortable, you can stop the chat by signing off and talk to your parent or a trusted adult. Advice Try to avoid being alone in places where it is just you and the bully. If you are being bothered when using a social networking site, you can delete them as your friend. If your privacy settings are set so only your friends can view your profile, they will no longer be able to contact you. Cyber Bullying Cyber-bullying is the name used when people use the internet or other technology to send nasty or upsetting messages to other people. Making nasty phone calls, writing horrible things about someone in a text or on a website and making up stories about someone are all types cyber-bullying. Bullies are looking for attention by getting a reaction out of the person they are bullying.

40 Because of it’s nature, cyber-bullying can be evidenced. This means, if you save any nasty texts, emails or conversations this can be used as proof when you tell a trusted adult It is best not to answer texts or calls from this person; this may bore them and stop them from contacting you. If you don’t respond or fight back, the bully will not get the attention they are looking for. Advice - Continued If the bully is contacting you over instant messenger, you can block them. They will not know they have been blocked, as you will just appear offline on their contact list. Once blocked, they will not be able to communicate with you. Most Social Networking websites such as Bebo have a ‘Report Abuse’ button on their pages.

41 Criminal Law Cyber-bullying is not a specific criminal offence, but there are criminal laws that can apply in terms of harassment and threatening and menacing communications. – Protection from Harassment Act 1997 – Malicious Communications 1988 – Telecommunications Act 1984 May be used to combat cyber-bullying, but no prosecutions to date - as of Oct 2008. (However there is a case going through the courts at present). Guidance recommends that schools/ organisations should contact the police if they feel the law has been broken. Section 4 Public Order Act 1986:- “A person will be guilty of threatening behaviour if he or she uses threatening, abusive or insulting words or behaviour or distributes or displays to another person any threatening, abusive or insulting written material, sign or any other “visual representation” to: i) Cause another person to fear immediate violence; or ii) Provoke the immediate use of unlawful violence by another person”.

42 Common Law Duty of Care Individuals from all walks of life have a duty to take reasonable care to avoid causing foreseeable harm. A person who breaches their duty of care may have to pay damages to anyone who suffers harm as a result. The Bolam Test – a duty to exercise the skill and care of a reasonable teacher on the basis of what would have been acceptable to reasonable members of the teaching profession at that time. A person who is found to have breached their duty of care may have to pay damages to anyone who suffers physical or psychological harm or financial loss as a result.

43 In recognition of its own particular difficulties the government has also published specific guidelines, "Tackling Cyber-bullying“ (July 2006) and “Safe to Learn” (September 2007). Provides practical tips on preventing cyber-bullying.

44 SMART Rules Safe Tell Reliable Accepting Meeting

45 Safe Keep safe by being careful not to give out personal information – such as your name, email, phone number, home address, or school name – to people who you don’t trust online.

46 Meeting Meeting someone you have only been in touch with online can be dangerous. Only do so with your parents’ or carers’ permission and even then only when they can be present.

47 Accepting Accepting emails, IM (Instant Messaging) messages, or opening files, Pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages!

48 Reliable Someone online may be lying about who they are, and information you find on the internet may not be reliable.

49 Tell Tell your parent, carer or a trusted adult if someone or something makes you feel uncomfortable or worried. You can report online abuse to the police at:

50 NEN E-Safety Tool The National Education Network

51 Useful Websites: – Report Bullying – Child Exploitation and Online Centre – Report Bullying – How To Report A Bully - Internet Watch Foundation - Lifelong Learning Swansea Tutor Forum (Wise Kids Conference 2008 Videos & Presentations )

52 Thank you for listening and interacting Email:

Download ppt "Lifelong Learning Service Monday 30 th or Tuesday 31 st March 2009 1:30pm Safe use of the Internet."

Similar presentations

Ads by Google