time 4 us – “e-safety”
DESCRIPTION
Time 4 Us – “E-Safety”. Mr Laing (Head of ICT) Ms Livock (Assistant Head) PC Siobhan Fairclough. Text speech answers…. BTWBy the way BB4NBye bye for now GR8 2 C UGreat to see you LOLLaughing out loud TXT SPK 4 U2?Text speak for you too? WBUWhat about you? - PowerPoint PPT PresentationTRANSCRIPT
Time 4 Us – “E-Safety”Mr Laing (Head of ICT)
Ms Livock (Assistant Head)PC Siobhan Fairclough
Text speech answers…
BTW By the way BB4N Bye bye for now GR8 2 C U Great to see you LOL Laughing out loud TXT SPK 4 U2? Text speak for you
too? WBU What about you? TT4T Talk to you tomorrow
Objectives
1. To understand what social networking is and how to be safe.
2. To understand the various forms of cyber bullying and what can be done to combat it.
3. To gain practical tips for how to support your daughter.
ICT your daughter will use at QE Every student receives an hour of ICT per
week. Throughout their schooling your daughter will:
Learn how to effectively use Office programs (eg Word, Excel, PowerPoint, Publisher etc)
Use the Internet for research, communication (eg email, messaging, discussions etc)
Website creation and multimedia (eg videos, animations, sounds etc)
What is e-safety?
A very broad term covering a variety of aspects of the use of ICT:
Use of mobile phones eg texting, camera/MMS, calling etc
Browsing the Internet
Health & safety
Chat rooms
Cyber bullying
Personal safety
Viruses
E-safety at QEGS
Taught at the start of each year from Y7-11 in ICT lessons.
Project lasting a ½ term in Y7 and Y8 during ICT lessons – esafety bookmark and esafety podcast.
Covered in PSHCE and through tutor time.
Various events throughout the year (eg Safer Internet day in February)
Student Acceptable Use Policy
Details how we expect students to use ICT responsibly and safely, outlining some of the potential risks and measures of protection.
Signed by all students and staff in the school and reviewed annually.
Social Networking
A social network is any online space where people can communicate with others.
Eg Facebook, Bebo, Myspace, Formspring, Twitter etc
How does Social Networking Work? Usually free to create an account
Variety of methods of interaction: Posting messages to an online virtual message board Email Live chat Web conferencing (using web cams) Instant messaging individuals Post images/videos/sound clips
Users usually have to add ‘friends’ before they can communicate with them.
Activity
The piece of paper shows a mock version of a Facebook ‘profile’ page. This is highly similar to what your daughter will have if she uses Facebook.
Circle any areas of risk where the Facebook user has potentially made themselves vulnerable.
Social Networking – Pros & Cons Great for
communicating over geographical distances
Can express yourself using a variety of mediums (eg text, video, sound etc)
Can reach a large number of people very quickly
× Need to actively amend privacy settings and security or else information can be public
× Hard to know who someone actually is in real life
× Easy to divulge too much information
Privacy Settings/Report
Almost all social networks have privacy settings where a user can control who can see which parts of their profile. Some sites (eg Facebook) let you do this for images as well.
We encourage all students to have a private profile and to avoid adding personal images. They should also be careful about who they add as a ‘friend’
A ‘report abuse’ button is available:
Cyber Bullying
“Using the Internet or mobile technologies to bully others.” Childnet International
As many as 1 in 3 children may have been victims of cyber bullying.
Can sometimes be more worrying as children can be reached almost 24/7 and so there is a chance the bullying could be more persistent.
Forms of cyber bullying
Receiving nasty or threatening... Text messages on a mobile phone Instant messages Chatroom messages Emails
Someone posting embarrassing images, videos or messages on a social networking site.
Cyber Bullying Video
http://www.digizen.org/resources/cyberbullying/films/uk/lfit-film.aspx
Tackling Cyber Bullying
QEGS approach
Police approach
What to do...
Always capture evidence either by printing messages out or saving phone messages – never delete them, however unpleasant.
Make use of the ‘report abuse’ facility and encourage your daughter to speak to an adult.
How to support your daughter Try to have your daughter use a computer
in a more public area of the house.
Review privacy settings and site memberships with your daughter. Look at how they are using social networking.
Investigate privacy settings and the features of social networking sites your daughter uses.
Questions/Answers
Any questions for us?