ONLINE SAFETY. Messaging, , Vlogging and Sexting

Similar documents
Introduction to

(electronic mail) is the exchange of computer-stored messages by telecommunication.

EADS up. stop think connect

Student E-Safety Induction

Glossary

Anti-Cyber Bullying Policy.

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Staff AUP (Acceptable Use Policy)

The Table Privacy Policy Last revised on August 22, 2012

Using web-based

Your security on click Jobs

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

Cyber Security Guide for NHSmail

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom.

Social Media E-Safety Guide. For more help and advice visit:

Optimized Communications Optimized Security Optimized Expressions Optimized Performance Optimized for Your Family...

Top 5 Tips To Take A Stand Against Telephone Scams

Cyber Safety Awareness in Schools. A Delhi Police Initiative

2 User Guide. Contents

Communication using

Topic Course Activities

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Some jobs are listed in local classified ads, like the ones found in the newspaper.

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Introduction to

Key Stage 1: Computing

Social Media and Cyber Safety

McAfee Family Protection The Easiest, Most Complete Way to Keep Your Children Safe Online

It pays to stop and think

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

HOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS

Online Scams. Ready to get started? Click on the green button to continue.

INTERNET SAFETY IS IMPORTANT

SAFEGUARDING YOUR LAPTOP/PC FOR FOSTER CARERS Part One Messaging

The ICT4me Curriculum

The ICT4me Curriculum

Cyber Smarts Using Social Media Wisely

Session Booklet Social Media & Facebook

Discussion Ppt To work on completing questions you need your book and exercise copies

Computer Foundation Skills. Internet Webmail

ATTACHMENTS, INSERTS, AND LINKS...

2013 edition (version 1.1)

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your . Your inbox contains all the s that have

Lambton Primary School

Train employees to avoid inadvertent cyber security breaches

Chapter 6 Network and Internet Security and Privacy

Octopus Online Service Safety Guide

Organising . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising-

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Mobile Security for Android devices

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Introduction To The New University Service. Bob Booth November 2010 AP- 2

What is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment

August 12. Tips for Gmail. Tips to save time and increase your productivity. Gmail Training

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

So, you re child wants to sign up for Myspace...

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Social Media. The infinite abilities of a smart phone

Manual Assembled By. Eng. Shaikha Al-Ali

Sky Social Media Guidelines for Contributors

Focused on locking down and monitoring a child s computer/cell phone use. Created for use by Canal Computer Services

Introduction to

In this class, we'll talk about some of the features and advantages of Gmail, and study the Gmail window.

Course Outline (version 2)

Netiquette. IT Engineering II Instructor: Ali B. Hashemi

Family Technology Boundaries:

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

The smarter, faster guide to Microsoft Outlook

Spam Protection Guide

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Your message is sent from your computer to a server (like the post office) where the

INTRODUCTION TO Part 3

Using Gmail. Created by the Columbia Basin Alliance for Literacy. Margaret Sutherland

KIK s GUIDE FOR LAW ENFORCEMENT

BEST PRACTICES FOR PERSONAL Security

Security Awareness. Presented by OSU Institute of Technology

FAQ. Usually appear to be sent from official address

NORTON WI-FI RISK REPORT: U.S. Results

Creating and Using an Account

Technology Safety Quick Tips

INTERNET SECURITY STAYING SAFE ONLINE

Why was an extra step of choosing a Security Image added to the sign-in process?

Social Media Reputation Management

Norton Online Reputation Report: Why Millennials should manage their online footprint

The 12 scams of Christmas

Compliance & HIPAA Annual Education

A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS

Computing skills per term ( ) (for full breakdown of computing skills see the computing curriculum in the teacher s shared area)

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

Safety and Security. April 2015

High-Speed Internet. Connection Guide

Facebook Guide. How many Facebook friends should I have?

Using BBC Raw

Electronic mail, or is a quick way of sending messages to people using the internet.

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

Chapter 4 Network and Internet Security

Financial scams. What to look for and how to avoid them.

Transcription:

ONLINE SAFETY Messaging, email, Vlogging and Sexting www.eitts.co.uk

Contents WhatsApp & Messaging Email Vlogging Sexting

THE RISKS People online are not necessarily who they say they are or seem to be. Somebody persuading you to download and run a virus-infected piece of software. Eavesdropping on your conversations. There is no guarantee of privacy as conversations are not encrypted and can be saved for use offline. IM software may be vulnerable to virus or other attack. Online chat rooms accessible through instant messaging can be undesirable places.

HOW TO USE IM SAFELY Never give out passwords, credit card information or other private data. Block strangers. If your software allows it, set up the system so that only people on your allow list can contact you. Be very wary of disclosing any private information to a stranger you meet via instant messaging. Even apparently innocent information like the name of your employer can be used against you by fraudsters. Never click on links that you receive through instant messaging from people that you do not know and trust, and that you have never met in real life. Leave your online profile blank, or where you have to enter data to use the system, enter fictitious data. Do not use your system or email password to log on to an IM system. IM is not encrypted, so do not use it to transmit information such as credit card numbers or other sensitive information. Disable automatic downloads. Verify information you receive on IM elsewhere. In particular, check any security advice you get. Keep your IM software up to date. Do not let children use instant messaging chat rooms unsupervised.

Contents WhatsApp & Messaging Email Vlogging Sexting

WHAT SORT OF EMAIL? Spam (Scam) Don t get hooked by an email scam! Phishing

USING EMAIL SAFELY Do not open emails which you suspect as being scams. Do not forward emails which you suspect as being scams. Do not open attachments from unknown sources. If in doubt, contact the person or organisation the email claims to have been sent by... better safe than sorry. Do not readily click on links in emails from unknown sources. Instead, roll your mouse pointer over the link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is different from what is displayed in the text of the link from the email. Do not respond to emails from unknown sources. Do not make purchases or charity donations in response to spam email. Don t click on remove or reply to unwanted email. Check junk mail folders regularly in case a legitimate email gets through by mistake.

When sending emails to multiple recipients, list their addresses in the 'BCC' (blind copy) box instead of in the 'To' box. In this way, no recipient will see the names of the others, and if their addresses fall into the wrong hands there will be less chance of you or anybody else receiving phishing or spam emails. Similarly, delete all addresses of previous parties in the email string, before forwarding or replying. If you are suspicious of an email, you can check if it is on a list of known spam and scam emails that some internet security vendors such as McAfee and Symantec feature on their websites. Most Microsoft and other email clients come with spam filtering as standard. Ensure yours is switched on. Most spam and junk filters can be set to allow email to be received from trusted sources, and blocked from untrusted sources. When choosing a webmail account such as gmail, Hotmail and Yahoo! Mail, make sure you select one that includes spam filtering and that it remains switched on. Most internet security packages include spam blocking. Ensure that yours is up to date and has this feature switched on.

Contents WhatsApp & Messaging Email Vlogging Sexting

WHAT THE HECK IS V-LOGGING? https://www.youtube.com/user/shaytards

Concerns for Parents If your child is creating a Vlog, anyone with Internet access can see what they have posted. If your child is oversharing overly-personal or otherwise inappropriate content, your child could become a target for online predators, spam, cyberstalking, and identity theft. For older children and teens, Vlogs can become the perfect forum for cyberbullying. How Can I Keep My Child Safe? Talk with your child about the wide audience a blog might have. Discuss safety guidelines your child will follow, such as never posting full names, email addresses, ages, or phone numbers on a blog. Decide if your child will be allowed to post pictures or videos. Once you have agreed upon a set of reasonable rules, be sure to keep tabs on your child by visiting his or her blog often. You may want to consider limiting your child to a "closed" or "whitelisted" blog. This means that you can grant a select group of Internet users access to your blog while keeping the blog's contents hidden from anyone else on the web. Be sure that your child is not saying unkind or derogatory things about others on a blog--even if it is only in joking. Doing so constitutes cyberbullying and can escalate into a serious issue.

Contents WhatsApp & Messaging Email Vlogging Sexting

WHAT ARE THE DANGERS OF SEXTING? It s not Harmless It s illegal No control of images and how they are shared Vulnerable to blackmail, bullying and harm

HOW TO TALK TO YOUR CHILD ABOUT SEXTING Think about the best way of starting the conversation You know your child best and your approach should be based on your child and your parenting style. When you give your child their first mobile phone, outline your expectations and explain the rules of having the phone. Monitor how younger children can use their phone for example, set up controls so that only you can authorise the apps that your child downloads. Ask your child what they feel is acceptable to send to people and then ask if they would be happy for you, a stranger or other children to see that photo. If the answer is 'no', explain that the image or message is probably not appropriate to send. Make sure your child is comfortable saying no, that they know their body is private and that being asked to 'sext' is inappropriate.

HOW TO TALK TO YOUR CHILD ABOUT SEXTING Explain the risks of sexting Tell your child what can happen when things go wrong. Don't accuse your child of 'sexting', but do explain the dangers. You may find it easiest to use real-life examples, such as television programmes or news stories, to help you explain the risks. You can also look at ChildLine's advice about 'sexting' together. Ask them if they would want something private shown to the world. Explain that photos are easy to forward and can be copied. Talk about whether your child thinks that the person who sends a request is likely to be asking other people to do the same. If children are sending images to their friends, they may see it as less of a risk than sending them to strangers. Use examples of when friends or partners have had a falling-out and what might happen to the images if this happens.

HOW TO TALK TO YOUR CHILD ABOUT SEXTING Reassure your child you will be supportive and understanding Let your child know that you are always there for support if they feel pressured by anyone. Tell your child to come to you if someone asks them to sext or if they receive an explicit message. Let them know that you won t be angry with them but just want to make sure they are safe and happy.

THANK YOU FOR WATCHING www.eitts.co.uk