staying safe in a digital world.. why we are here & why i do this job

Download Staying safe in a digital world.. Why we are here & why I do this job

Post on 14-Dec-2015

212 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • Slide 1

Staying safe in a digital world. Slide 2 Why we are here & why I do this job. Slide 3 Outcomes To know the Key Words in e-safety. Reporting inappropriate use on the internet, mobile phones games consoles, etc. To examine what e-safety in the home is. But above all TO BE EMPOWERED Slide 4 Its all in a word or rather, several Grooming Cyberbullying Sexting Trolling Hacking Cyber-sniping Grunging .e-safety vocabulary changes rapidly. (Glossary of e-safety terms) Slide 5 Its all in a word things they type POS WMM ASL?? WC? TTO Language changes what was once perfectly harmless now yields surprises. Slide 6 Signs and Symptoms. Aggression. Unexplained behavioural changes Disturbed sleep pattern. Secrecy Sexualised behaviour/language Change in dress sense Signs of addiction wont leave the PC alone The most telling EWS of all YOU feeling that something isnt quite right. Slide 7 The Good News! Far more benefits to working, learning and playing online than risks. WE can be in control! You will only ever hear the Dark Side Of The Force in the mediaBUT this can be useful! EVERYONE who wants to abuse on the internet relies on the fact that it is usually embarrassing to talk about it. The more we talk about e-safety the better! Slide 8 Where do I start? First, identify WHAT you have and WHERE it is. (you might want to think about portable/mobile devices.) Next, WHO uses it (mainly), and for what PURPOSE? You may be surprised at just how much connectible equipment you have in your home. DONT FORGET THE MAN DRAWER Slide 9 Where do I start? Next up is YOUR OWN PERSONAL E- SAFETY. Do you have online shopping accounts? Do you have Social Networking accounts? Do any of the above share a password? Do you have any general interest accounts? (Accounts where NO personal information exists and no financial transactions take place are low-level in terms of security) Slide 10 Where do I start? Does anyone else in your home know your passwords/PIN numbers/Secret Word(s)? Do you know anyone elses? (Its OK to know your childs) Have you ever encouraged your child to log on as you? Fact:- in 145 Primary school visits, at least 40% of Y5s know mum or dads PIN number. Fact:- 92% of year 10s say they know and have used Mum/Dads username, password or PIN number. Slide 11 Then what? Once you know what you have, where it is, what it does, who uses it and what for, you are in a good place to have a family discussion WHAT IS IT OK TO DO WITH CONNECTED TECHNOLOGY AT HOME? Make a list of dos and donts This becomes your home Acceptable Use Policy, or Trust Agreement. Slide 12 The Home Acceptable Use Policy? The school has one Colleges and Universities have one All workplaces have one. Agreed worded in their language. Slide 13 Heres mine. 1)This is MY phone. I paid for it, and I am lending it to you. 2)To help you use it safely, this phone must not be used:- i) To send nasty messages ii) To take or download any image you would not want me to see ..etcetc. Slide 14 Heres mine. 10) Finally, if you mess up, and you will mess up, we will talk about it, and there will be a consequence. That consequence will be less if you tell me about it rather than let me find out about it. Slide 15 Filtering A logon with appropriate age-related settings, plus the activation of parental controls is a start.. Children WILL, eventually, see material that you would rather they didnt. Make it OK TO TELL. http://www.NetNanny.com NO filter is 100% effective especially with regard to images. NOTHING replaces vigilance. Slide 16 Filtering Slide 17 A logon with appropriate age-related settings, plus the activation of parental controls is a start.. Children WILL, eventually, see material that you would rather they didnt. Make it OK TO TELL. http://www.NetNanny.com Slide 18 Filtering NO SYSTEM CAN 100% guarantee that your child will never come across anything inappropriate beware the security blanket. NOTHING beats regular discussions Use the News. Slide 19 Now the first Tough one Lets talk about monitoring. Do you feel the need to? How would you go about it? When does caring overseeing become spying? What about the old I need my privacy argument? Slide 20 How To Take A look Internet History can be deleted. Temporary files can be deleted. Most young people will think they can hide files by putting files within folders within folders. You CAN search a computer for images and videos. Slide 21 How To Take A look Start|Search *.jpg (pulls up ALL photographs stored) *.avi (pulls up most videos) *.wmv (pulls up a different format of video) Slide 22 If you do monitor a PC or phone. PLEASE REMEMBER. Images found on computers may NOT have been put there deliberately. They may even PRE-DATE your ownership of the computer. It may be perfectly OK, but you DO need to know what is on your machine. Killing spouses/children/ is usually frowned upon!!! Slide 23 A few facts of connected life In general terms there is no such thing as privacy every electronic contact leaves a trace. Once an image is posted online, you loose control of it forever. Young people find hacking highly attractive. Young children can and do experiment sexually online. Slide 24 Blu-jacking Slide 25 To Block, or Not To Block.. Your rules, and your comfort are important! Some parents/carers block, others do not. If you ban without discussion, it drives the activity underground. Youngsters need to understand why something is not good. You need a non-verbal means of them telling you they have had a problem. Slide 26 Reporting Abuse If your child is being affected by any kind of online abuse, your childs teacher will want to know. Slide 27 Reporting Abuse 99% of SN suppliers offer some kind of reporting tools. Slide 28 Reporting Abuse 99% of SN suppliers offer some kind of reporting tools. Slide 29 Reasons to be cheerful. Schools, Colleges, WorkIn the home Have individual logonsIndividual logons are easy to set up and manage especially with Windows 7 or 8. Have an acceptable use policyWhat is OK what is not OK MonitorHow might you know? Restrict access according to needLater versions of Windows make this easy there are other methods. Do not share passwordsNo matter HOW tempting Review regularlyNeeds change your rules need to People who abuse on the internet do not want you to talk about it, and they do not want their activities discussed or shared. The more you talk about it, use the news, the safer your family becomes. There are many myths on the internet and to do with technology in general. Slide 30 Hardware Essentials. A good, all round anti-virus, anti-spyware, anti- malware package installed and regularly updated. A WPA2 secured wireless network(If you use one) Windows Update configured to download and apply updates regularly. A plan for how old equipment will be disposed off including destroying information stored on it. (Old Mobile Phone Companies!) Slide 31 The Future (the other F word. Faster, better, more, technology AND pace of change. A good idea not to be the first in the queue. Let new technology settle into the market even release candidates have been found to have serious bugs. NOTHING IS FREE THERE IS ALWAYS A COST EVEN IF IT IS ONLY YOUR EMAIL ACCOUNT NAME. Slide 32 Over To You. Q & A