Presentation is loading. Please wait.

Presentation is loading. Please wait.

Staying safe in a digital world.. Why we are here & why I do this job.

Similar presentations

Presentation on theme: "Staying safe in a digital world.. Why we are here & why I do this job."— Presentation transcript:

1 Staying safe in a digital world.

2 Why we are here & why I do this job.

3 Outcomes To know the “Key Words” in e-safety. Reporting inappropriate use on the internet, mobile phones games consoles, etc. To examine what e-safety in the home is. But above all…… TO BE EMPOWERED

4 It’s all in a word – or rather, several  Grooming  Cyberbullying  Sexting  Trolling  Hacking  Cyber-sniping  Grunging ….e-safety vocabulary changes rapidly. (Glossary of e-safety terms)

5 It’s all in a word – things they type  POS  WMM  ASL??  WC?  TTO Language changes – what was once perfectly harmless now yields surprises.

6 Signs and Symptoms.  Aggression.  Unexplained behavioural changes  Disturbed sleep pattern.  Secrecy  Sexualised behaviour/language  Change in dress sense  Signs of addiction – won’t leave the PC alone The most telling EWS of all – YOU feeling that something isn’t quite right.

7 The Good News! Far more benefits to working, learning and playing online than risks. WE can be in control! You will only ever hear the “Dark Side Of The Force” in the media…BUT this can be useful! EVERYONE who wants to abuse on the internet relies on the fact that it is usually embarrassing to talk about it. The more we talk about e-safety the better!

8 Where do I start? First, identify WHAT you have and WHERE it is. (you might want to think about portable/mobile devices.) Next, WHO uses it (mainly), and for what PURPOSE? You may be surprised at just how much connectible equipment you have in your home. DON’T FORGET THE “MAN DRAWER”

9 Where do I start? Next up is YOUR OWN PERSONAL E- SAFETY. Do you have online shopping accounts? Do you have Social Networking accounts? Do any of the above share a password? Do you have any general interest accounts? (Accounts where NO personal information exists and no financial transactions take place are low-level in terms of security)

10 Where do I start? Does anyone else in your home know your passwords/PIN numbers/Secret Word(s)? Do you know anyone else’s? (It’s OK to know your child’s) Have you ever encouraged your child to “log on as you?” Fact:- in 145 Primary school visits, at least 40% of Y5s know mum or dad’s PIN number. Fact:- 92% of year 10s say they know and have used Mum/Dad’s username, password or PIN number.

11 Then what? Once you know what you have, where it is, what it does, who uses it and what for, you are in a good place to have a family discussion… WHAT IS IT OK TO DO WITH CONNECTED TECHNOLOGY AT HOME? Make a list of do’s and don’ts This becomes your home “Acceptable Use Policy, or “Trust Agreement”.

12 The Home Acceptable Use Policy? The school has one Colleges and Universities have one All workplaces have one. Agreed – worded in their language.

13 Here’s mine. 1)This is MY phone. I paid for it, and I am lending it to you. 2)To help you use it safely, this phone must not be used:- i) To send nasty messages ii) To take or download any image you would not want me to see …..etc…etc….

14 Here’s mine. 10) Finally, if you mess up, and you will mess up, we will talk about it, and there will be a consequence. That consequence will be less if you tell me about it rather than let me find out about it.

15 Filtering A logon with appropriate age-related settings, plus the activation of parental controls is a start…….. Children WILL, eventually, see material that you would rather they didn’t. Make it “OK TO TELL.” NO filter is 100% effective – especially with regard to images. NOTHING replaces vigilance.

16 Filtering

17 A logon with appropriate age-related settings, plus the activation of parental controls is a start…….. Children WILL, eventually, see material that you would rather they didn’t. Make it “OK TO TELL.”

18 Filtering NO SYSTEM CAN 100% guarantee that your child will never come across anything inappropriate – beware the “security blanket”. NOTHING beats regular discussions Use the News.

19 Now the first “Tough one” Let’s talk about monitoring. Do you feel the need to? How would you go about it? When does caring overseeing become spying? What about the old “I need my privacy” argument?

20 How To Take A look” Internet History can be deleted. Temporary files can be deleted. Most young people will think they can hide files by putting files within folders within folders. You CAN search a computer for images and videos.

21 How To Take A look” Start|Search *.jpg (pulls up ALL photographs stored) *.avi (pulls up most videos) *.wmv (pulls up a different format of video)

22 If you do monitor a PC or phone…. PLEASE REMEMBER…. Images found on computers may NOT have been put there deliberately. They may even PRE-DATE your ownership of the computer. It may be perfectly OK, but you DO need to know what is on your machine. Killing spouses/children/ is usually frowned upon!!!

23 A few facts of connected life… In general terms – there is no such thing as privacy – every electronic contact leaves a trace. Once an image is posted online, you loose control of it – forever. Young people find hacking highly attractive. Young children can and do experiment sexually online.

24 Blu-jacking

25 To Block, or Not To Block….. Your rules, and your comfort are important! Some parents/carers block, others do not. If you ban without discussion, it drives the activity underground. Youngsters need to understand why something is not good. You need a “non-verbal” means of them telling you they have had a problem.

26 Reporting Abuse If your child is being affected by any kind of online abuse, your child’s teacher will want to know.

27 Reporting Abuse 99% of SN suppliers offer some kind of reporting tools.

28 Reporting Abuse 99% of SN suppliers offer some kind of reporting tools.

29 Reasons to be cheerful…. Schools, Colleges, WorkIn the home Have individual logonsIndividual logons are easy to set up and manage – especially with Windows 7 or 8. Have an acceptable use policyWhat is “OK” what is not “OK” MonitorHow might you know? Restrict access according to needLater versions of Windows make this easy – there are other methods. Do not share passwordsNo matter HOW tempting Review regularlyNeeds change – your rules need to People who abuse on the internet do not want you to talk about it, and they do not want their activities discussed or shared. The more you talk about it, use the news, the safer your family becomes. There are many “myths” on the internet and to do with technology in general.

30 Hardware Essentials…. A good, all round anti-virus, anti-spyware, anti- malware package installed and regularly updated. A WPA2 secured wireless network…(If you use one) Windows Update configured to download and apply updates regularly. A plan for how old equipment will be disposed off – including destroying information stored on it. (Old Mobile Phone Companies!)

31 The Future (the other “F” word. Faster, better, more, technology AND pace of change. A good idea not to be the first in the queue. Let new technology settle into the market – even release candidates have been found to have serious bugs. NOTHING IS FREE – THERE IS ALWAYS A COST – EVEN IF IT IS ONLY YOUR EMAIL ACCOUNT NAME.

32 Over To You…. Q & A

Download ppt "Staying safe in a digital world.. Why we are here & why I do this job."

Similar presentations

Ads by Google