1 / 35

How to stay safe online A guide for staff and students September 2010

How to stay safe online A guide for staff and students September 2010. Introduction.

neo
Télécharger la présentation

How to stay safe online A guide for staff and students September 2010

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How to stay safe online A guide for staff and students September 2010

  2. Introduction Being eSafe relies on selecting appropriate privacy levels, knowing how to behave online and understanding the risks of using the Internet and mobile technologies: having the tools and the knowledge to be able to work safely.

  3. Introduction In this session we will be looking at 5 main areas of eSafety: • Social Networking • Email • Chatrooms and IM • Cyberbullying • Mobile phones

  4. Social Networking Social Networking areas are basically websites with applications which help connect friends using different tools like blogs, profiles, internal email systems and photos.

  5. Social Networking Be careful what information you give out on your profile. Remember that you don’t know who your friend’s friends are… or your friend’s friends’ friends!

  6. Social Networking And you don’t know what they’ll do with your picture or your phone number if you give it out by mistake. Once your picture is out there, it’s out there forever and you won’t be able to get it back. Click the green triangle to play youtube video “The Real Facebook”

  7. Social Networking Be aware that information on your profile could potentially be viewed by anyone. So if you wouldn’t be comfortable printing it off and handing it out on the street, maybe it shouldn’t be on your profile. Click the green triangle to play youtube video “Sarah”

  8. Social Networking Click the green triangle to play video “How to set privacy on facebook”

  9. Email “Phishing” emails are bad emails that try to get private and personal information from you. Other bad emails can deliver viruses and damaging files to your computer. Email game here >

  10. Email

  11. Email This email address is a genuine email address of HMRC but it does NOT mean it was from them… this is a clever disguise This is the biggest danger of this email… the attached webpage will ask for your personal details and will submit them to someone other than the real HMRC Did you even make a tax return recently? I didn’t when I received this email. If you’re not sure – ring them. Click the weblink to see the proof >>>> http://www.hmrc.gov.uk/security/examples.htm

  12. Email

  13. Email You can hover your mouse over the web link to see what is hiding underneath. The scam artists may place a link in them that appears to go to the legitimate Web site (1), but actually takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like the official site.

  14. Email

  15. The Megafortune Lottery-International scam email shown here claims that the recipient has won money in an international lottery. The email is an attempt to initiate a dialogue with potential victims and subsequently trick them into sending money to the scammers responsible. There is no "Megafortune Lottery-International" and no prize money Email

  16. Email General Rules • Legitimate banks and businesses will NEVER ask for your password or personal details by email or from a link to a website in an email. • If it seems too good to be true….IT IS!!! You have not magically won the lottery that you never entered!

  17. Email General Rules • If you weren’t expecting an attachment from someone…be suspicious – their computer may be compromised and has sent you a virus – contact them to ask if they did actually send you something BEFOREopening it! • You do NOT have a long lost uncle in Nigeria that has left you £100,000,000.

  18. Email General Rules • If the email is from someone you don’t know and contains an attachment – do NOT open it – just delete it. • If you are not sure the email is genuine….call the bank/business/person that emailed you to confirm that it was them that sent it.

  19. Chatrooms and IM Chat rooms or chat areas on websites are a great way to stay in touch and meet people. However, there are some bad things that you should be aware of.

  20. Chatrooms and IM Even if you’ve been chatting to the same person for ages and you feel like you know them, remember it’s very easy to lie on the internet and there is no way of knowing if someone is telling the truth. Chatroom game here >

  21. Chatrooms and IM Even if someone shows you a photo of themselves, this could be a picture of someone else or could be faked. This applies to webcam or video footage too; seeing a person in a video, does not mean it’s them. “…Attorney General Tom Corbett said that MacGregor, a retired construction worker, allegedly used an Internet chat room to approach an undercover agent from the Child Predator Unit who was using the online profile of a 13-year old girl.  During their initial chat, MacGregor allegedly asked the “girl” about sexual activity, encouraged her to masturbate and sent adult pornography to her computer…” The Pike County Press & Port Jervis News, Oct 19th 2009

  22. Chatrooms and IM

  23. Chatrooms and IM Be careful not to share too much information with other people in chat rooms. You don’t know who could be listening in or what they might do with that information. If you wouldn’t be comfortable yelling it out in a crowded room, its best not to write it in a chat room. (Thinkyouknow.com)

  24. Chatrooms and IM There are some adults who will try to get in touch with young people and children because they have bad intentions. Bear this in mind whilst you use chat areas. (Thinkyouknow.com) Click the green triangle to play youtube video “Grooming” IM game here >

  25. Chatrooms and IM It’s a good idea to learn how to save conversations. This way, if anything weird or dodgy happens, you have evidence of it and you can show it to an adult you trust or copy and paste it into a reporting form. NOTE: Someone telling you NOT to save conversations is a classic indication of something not being right

  26. Cyberbullying What is cyberbullying? What’s different about it than normal bullying?

  27. Cyberbullying Cyber bullying is when someone uses the internet or mobiles to deliberately upset someone else.

  28. Cyberbullying By using technology like mobiles or the internet, this type of bullying can affect someone not just at college, but at home as well. It has a 24/7 nature and can make someone feel upset or threatened in their own home. (Thinkyouknow.com)

  29. Cyberbullying What to do • Tell someone • Save evidence • Block the bully (on IM, social networking sites, etc.) • Don’t reply or retaliate to things they say or do • Contact your mobile service provider (if bothered by txts, etc)

  30. Mobile Phones Who knows your mobile number? You should only give your mobile number to friends you know in the real world. You should not put your mobile number on your social networking profiles (facebook, myspace, bebo, etc)

  31. Mobile Phones Camera Phones Be careful if you share your photos with others. Pictures can be changed or shared around, so think about what the image is and who you are sending it to, before you press send. (Thinkyouknow.com) Once it’s out there it’s out there forever!

  32. Mobile Phones Bluetoothing Bluetoothing is a quick way of sharing stuff like photos, files and music. Unless you lock your Bluetooth, anyone in the area can access things in your phone, like your contacts. If you don’t want to share this information with strangers (and why would you?!) then make sure you lock your Bluetooth. (Thinkyouknow.com)

  33. Mobile Phones GPS GPS can pinpoint your exact location. Some apps and some phones have built in GPS.

  34. Mobile Phones GPS The worrying thing about using GPS technology, is that your contacts will be on a map, showing exactly where they are. If you can see them, your contacts can also see where you are too. Quite scary if you have contacts on your profile that you don’t know or don’t trust. (Thinkyouknow.com)

  35. Further information • eSafety course on Moodle • www.thinkuknow.co.uk • www.ceop.gov.uk

More Related