St Michael`s E-Safety Evening

Download Report

Transcript St Michael`s E-Safety Evening

Staying safe in a digital world.
Why we are here
& why I do
this job.
Outcomes
• To know the “Key Words” in e-safety.
• Reporting inappropriate use on the internet,
mobile phones games consoles, etc.
• To examine what e-safety in the home is.
• But above all……
TO BE EMPOWERED
It’s all in a word – or rather, several







Grooming
Cyberbullying
Sexting
Trolling
Hacking
Cyber-sniping
Grunging
….e-safety vocabulary changes rapidly.
(Glossary of e-safety terms)
It’s all in a word – things they type
 POS
 WMM
 ASL??
 WC?
 TTO
Language changes – what was once perfectly
harmless now yields surprises.
Signs and Symptoms.







Aggression.
Unexplained behavioural changes
Disturbed sleep pattern.
Secrecy
Sexualised behaviour/language
Change in dress sense
Signs of addiction – won’t leave the PC alone
The most telling EWS of all – YOU feeling that
something isn’t quite right.
The Good News!
•
•
•
•
•
Far more benefits to working, learning and
playing online than risks.
WE can be in control!
You will only ever hear the “Dark Side Of The
Force” in the media…BUT this can be useful!
EVERYONE who wants to abuse on the
internet relies on the fact that it is usually
embarrassing to talk about it.
The more we talk about e-safety the better!
Where do I start?
•
First, identify WHAT you have and WHERE it
is. (you might want to think about
portable/mobile devices.)
•
Next, WHO uses it (mainly), and for what
PURPOSE?
•
You may be surprised at just how much
connectible equipment you have in your home.
DON’T FORGET THE “MAN DRAWER”
Where do I start?
•
•
•
•
•
•
Next up is YOUR OWN PERSONAL ESAFETY.
Do you have online shopping accounts?
Do you have Social Networking accounts?
Do any of the above share a password?
Do you have any general interest accounts?
(Accounts where NO personal information
exists and no financial transactions take place
are low-level in terms of security)
Where do I start?
•
•
•
•
•
Does anyone else in your home know your
passwords/PIN numbers/Secret Word(s)?
Do you know anyone else’s? (It’s OK to
know your child’s)
Have you ever encouraged your child to
“log on as you?”
Fact:- in 145 Primary school visits, at least
40% of Y5s know mum or dad’s PIN
number.
Fact:- 92% of year 10s say they know and
have used Mum/Dad’s username, password
or PIN number.
Then what?
•
Once you know what you have, where it is,
what it does, who uses it and what for, you
are in a good place to have a family
discussion…
•
WHAT IS IT OK TO DO WITH CONNECTED
TECHNOLOGY AT HOME?
•
•
Make a list of do’s and don’ts
This becomes your home “Acceptable Use
Policy, or “Trust Agreement”.
The Home Acceptable Use
Policy?
•
•
•
•
The school has one
Colleges and Universities have one
All workplaces have one.
Agreed – worded in their language.
Here’s mine.
1) This is MY phone. I paid for it, and I am lending
it to you.
2) To help you use it safely, this phone must not
be used:i) To send nasty messages
ii) To take or download any image you would not
want me to see
…..etc…etc….
Here’s mine.
•
10) Finally, if you mess up, and you will mess
up, we will talk about it, and there will be a
consequence. That consequence will be less if
you tell me about it rather than let me find out
about it.
Filtering
•
•
•
•
•
•
A logon with appropriate age-related settings,
plus the activation of parental controls is a
start……..
Children WILL, eventually, see material that
you would rather they didn’t.
Make it “OK TO TELL.”
http://www.NetNanny.com
NO filter is 100% effective – especially with
regard to images.
NOTHING replaces vigilance.
Filtering
Filtering
•
•
•
•
A logon with appropriate age-related
settings, plus the activation of parental
controls is a start……..
Children WILL, eventually, see material that
you would rather they didn’t.
Make it “OK TO TELL.”
http://www.NetNanny.com
Filtering
•
•
•
NO SYSTEM CAN 100% guarantee that
your child will never come across anything
inappropriate – beware the “security
blanket”.
NOTHING beats regular discussions
Use the News.
Now the first “Tough one”
•
•
•
•
•
Let’s talk about monitoring.
Do you feel the need to?
How would you go about it?
When does caring overseeing become
spying?
What about the old “I need my privacy”
argument?
How To Take A look”
•
•
•
•
Internet History can be deleted.
Temporary files can be deleted.
Most young people will think they can hide
files by putting files within folders within
folders.
You CAN search a computer for images
and videos.
How To Take A look”
•
•
•
•
Start|Search
*.jpg (pulls up ALL photographs stored)
*.avi (pulls up most videos)
*.wmv (pulls up a different format of video)
If you do monitor a PC or
phone….
PLEASE REMEMBER….
Images found on computers may NOT have
been put there deliberately.
They may even PRE-DATE your ownership of
the computer.
It may be perfectly OK, but you DO need to
know what is on your machine.
Killing spouses/children/ is usually frowned
upon!!!
A few facts of connected life…
•
•
•
•
In general terms – there is no such thing as
privacy – every electronic contact leaves a
trace.
Once an image is posted online, you loose
control of it – forever.
Young people find hacking highly
attractive.
Young children can and do experiment
sexually online.
Blu-jacking
To Block, or Not To Block…..
•
•
•
•
•
Your rules, and your comfort are important!
Some parents/carers block, others do not.
If you ban without discussion, it drives the
activity underground.
Youngsters need to understand why
something is not good.
You need a “non-verbal” means of them
telling you they have had a problem.
Reporting Abuse
•
If your child is being affected by any kind
of online abuse, your child’s teacher will
want to know.
Reporting Abuse
•
99% of SN suppliers offer some kind of
reporting tools.
Reporting Abuse
•
99% of SN suppliers offer some kind of
reporting tools.
Reasons to be cheerful….
Schools, Colleges, Work
In the home
Have individual logons
Individual logons are easy to set up
and manage – especially with
Windows 7 or 8.
Have an acceptable use policy
What is “OK” what is not “OK”
Monitor
How might you know?
Restrict access according to need
Later versions of Windows make this
easy – there are other methods.
Do not share passwords
No matter HOW tempting
Review regularly
Needs change – your rules need to
People who abuse on the internet do
not want you to talk about it, and they
do not want their activities discussed
or shared.
The more you talk about it, use the
news, the safer your family becomes.
There are many “myths” on the
internet and to do with technology in
general.
Hardware Essentials….
•
•
•
•
A good, all round anti-virus, anti-spyware, antimalware package installed and regularly
updated.
A WPA2 secured wireless network…(If you
use one)
Windows Update configured to download and
apply updates regularly.
A plan for how old equipment will be disposed
off – including destroying information stored
on it. (Old Mobile Phone Companies!)
The Future (the other “F” word.
•
•
•
•
Faster, better, more, technology AND pace
of change.
A good idea not to be the first in the queue.
Let new technology settle into the market –
even release candidates have been found
to have serious bugs.
NOTHING IS FREE – THERE IS ALWAYS A
COST – EVEN IF IT IS ONLY YOUR EMAIL
ACCOUNT NAME.
Over To You….
Q&A