Main title 24pt Arial - Barking and Dagenham London

Download Report

Transcript Main title 24pt Arial - Barking and Dagenham London

How to stay safe online
A guide for staff and students
Introduction
Being eSafe relies on selecting appropriate privacy levels,
knowing how to behave online and understanding the risks of
using the Internet and mobile technologies: having the tools
and the knowledge to be able to work safely.
Introduction
In this session we will be looking at 5 main areas of
eSafety:
 Social Networking
 Email
 Chatrooms and IM
 Cyberbullying
 Mobile phones
Introduction
Social Networking areas are basically websites with
applications which help connect friends using different tools
like blogs, profiles, internal email systems and photos.
Social networking
Be careful what information you give out on your profile.
Remember that you don’t know who your friend’s friends are…
or your friend’s friends’ friends!
Social networking
And you don’t know what they’ll do with your picture or your phone
number if you give it out by mistake. Once your picture is out
there, it’s out there forever and you won’t be able to get it back.
Click the green triangle to play youtube video “The Real Facebook”
Social networking
Be aware that information on your profile could potentially be
viewed by anyone. So if you wouldn’t be comfortable printing it off
and handing it out on the street, maybe it shouldn’t be on your
profile.
Social networking
Click the green triangle to play video “How to set privacy on facebook”
E mail
“Phishing” emails are bad emails that try to get private and
personal information from you. Other bad emails can deliver
viruses and damaging files to your computer.
Phishing email
Phishing email
This email address is a genuine email
address of HMRC but it does NOT mean it
was from them… this is a clever disguise
This is the biggest danger of this email… the attached
webpage will ask for your personal details and will submit
them to someone other than the real HMRC
Did you even make a tax
return recently? I didn’t
when I received this email.
If you’re not sure – ring
them.
http://www.hmrc.gov.uk/security/examples.htm
Another bogus email..
Another bogus email..
You can hover your mouse
over the web link to see what
is hiding underneath.
The scam artists may place a
link in them that appears to
go to the legitimate Web site
(1), but actually takes you to
a phony scam site (2) or
possibly a pop-up window
that looks exactly like the
official site.
Another bogus email..
Another bogus email..
The Megafortune
Lottery-International
scam email shown here
claims that the recipient
has won money in an
international lottery. The
email is an attempt to
initiate a dialogue with
potential victims and
subsequently trick them
into sending money to
the scammers
responsible.
There is no
"Megafortune LotteryInternational" and no
prize money
Email
General rules
Legitimate banks and businesses will NEVER ask
for your password or personal details by email or
from a link to a website in an email.
If it seems too good to be true….IT IS!!! You have
not magically won the lottery that you never entered!
If you weren’t expecting an attachment from
someone…be suspicious – their computer may be
compromised and has sent you a virus – contact
them to ask if they did actually send you something
BEFORE opening it!
You do NOT have a long lost uncle in Nigeria that
has left you £100,000,000
Email
General rules
If the email is from someone you don’t know and
contains an attachment – do NOT open it – just
delete it.
If you are not sure the email is genuine….call the
bank/business/person that emailed you to confirm
that it was them that sent it.
Chatrooms and Instant Messaging (IM)
Chatrooms and Instant Messaging (IM
Even if you’ve been chatting to the same person for
ages and you feel like you know them, remember it’s very
easy to lie on the internet and there is no way of knowing
if someone is telling the truth.
Chatrooms and Instant Messaging (IM)
“…Attorney General Tom
Corbett said that MacGregor, a
retired construction worker,
allegedly used an Internet chat
room to approach an
undercover agent from the
Child Predator Unit who was
using the online profile of a 13year old girl. During their initial
chat, Macgregor allegedly
asked the “girl” about sexual
activity, encouraged her to
masturbate and sent adult
pornography to her
computer…”
The Pike County Press & Port Jervis News, Oct 19th 2009
Chatrooms and instant messaging
Be careful not to share too much information with other
people in chat rooms. You don’t know who could be listening in
or what they might do with that information.
If you wouldn’t be comfortable yelling it out in a crowded
room, its best not to write it in a chat room.
Chatrooms and instant messaging
There are some adults who will try to get in
touch with young people and children because they
have bad intentions. Bear this in mind whilst you use
chat areas. (Thinkyouknow.com)
Click the green triangle to play youtube video
“Grooming”
Chatrooms and IM
It’s a good idea to learn how to save
conversations. This way, if anything weird or dodgy
happens, you have evidence of it and you can show it
to an adult you trust or copy and paste it into a
reporting form.
NOTE: Someone telling you NOT to save
conversations is a classic indication of something not
being right
Cyberbullying
What is cyberbullying?
What’s different about it than
normal bullying?
Cyberbullying
What is it?
Cyber bullying is when
someone uses the
internet or mobiles to
deliberately upset
someone else.
What is different about it?
By using technology like
mobiles or the internet,
this type of bullying can
affect someone not just
at college, but at home
as well.
It has a 24/7 nature and
can make someone feel
upset or threatened in
their own home
(Thinkyouknow.com)
Cyberbullying
What to do?
1. Tell someone
2. Save evidence
3. Block the bully (on IM, social networking sites,
etc.)
4. Don’t reply or retaliate to things they say or do
5. Contact your mobile service provider (if
bothered by txts, etc)
Mobile phones
Who knows your mobile
number?
You should only give your
mobile number to friends you
know in the real world.
You should not put your
mobile number on your social
networking profiles (facebook,
myspace, bebo, etc)
Camera phones
Be careful if you share
your photos with others.
Pictures can be changed
or shared around, so
think about what the
image is and who you
are sending it to, before
you press send.
Once it’s out there it’s
out there forever!
(Thinkyouknow.co
m)
Bluetoothing
Bluetoothing is a quick way
of sharing stuff like photos,
files and music. Unless you
lock your Bluetooth, anyone in
the area can access things in
your phone, like your contacts.
If you don’t want to share
this information with strangers
(and why would you?!) then
make sure you lock your
Bluetooth.
(Thinkyouknow.com)
GPS
GPS can pinpoint your
exact location.
Some apps and some
phones have built in
GPS.
Global Positioning System
The worrying thing about
using GPS technology, is that
your contacts will be on a
map, showing exactly where
they are. If you can see them,
your contacts can also see
where you are too. Quite scary
if you have contacts on your
profile that you don’t know or
don’t trust.
(Thinkyouknow.com)
Further information
www.thinkuknow.co.uk
www.ceop.gov.uk
Visit Cybermentors
Thanks to:
The resources in this pack were developed by staff
and students at:
•Chesterfield College – E- Safety
•South Birmingham college – Staying safe outside
college
•Northampton College – Staying safe in college
•All three tutorials were trialled with staff and students
Thank you