Think B4U Booklet
Transcription
Think B4U Booklet
www.kscb.org.uk www.thinkuknow.co.uk safe online online Be Be safe Contents Introduction 5 Supporting Information for Adults ● Child Protection and Disclosures ● Reporting a Problem to CEOP ● Suspected Illegal Content ● Other Sources of Support ● Safety Considerations ● Further Training 6 6 6 6 6 7 7 Resources ● Starter Discussion Questions ● Suggested Activities ● Think B4U ... Poster ● Be Safe Poster ● Word Diagrams ● Word Banks ● Guidance on Cyberbullying ● Information for Parents/Carers ● Technical Tips for Parents/Carers 8 8 9 11 12 13 19 33 35 36 List of Useful Contacts 37 Glossary 39 Acknowledgements 42 Produced by the Kent Safeguarding Children Board. Disclaimer Kent County Council (KCC) makes every effort to ensure that the information in this document is accurate and up-to-date. If errors are brought to our attention, we will correct them as soon as practicable. Nevertheless, KCC and its employees cannot accept responsibility for any loss, damage or inconvenience caused as a result of reliance on any content in this publication. The copyright of Kent materials is held by Kent Safeguarding Children Board. However agencies that work with Children and Young People are granted permission to use all or part of the materials for not for profit use, providing the KSCB copyright is acknowledged and we are informed of its use. 3 Be safe online An e-Safety Education Pack for Children, Young People, Professionals and Parents/Carers e-Safety – an introduction e-Safety is an essential element of safeguarding children and young people (and indeed adults) in the online environment and when using technology such as computers, mobile phones or games consoles. It is not about restricting children and young people or banning access as this often causes more problems; e-Safety is about focusing on education and raising awareness of the risks and building our resilience so that we can all be confident and safer online. The internet offers immensely exciting benefits and opportunities for everyone but it can also expose us to inappropriate and criminal behaviour. It’s important that we are all are aware of the risks and know how to deal with these issues. It’s also important that all users of the internet are aware of the consequences of their online actions, both good and bad! Taking care, being safe and responsible online and offline are an important part of child development and it is essential that all adults are aware and able to discuss this with children and young people as soon as they are online. Adults can sometimes be intimidated by children and young people’s confidence and knowledge about technology and the internet, but resources and support are available. The “Think B4U…” Pack behaviour . “The “Think B4U…” pack is a resource for professionals working with children, young people and their families to help them consider the impact of their online The resources can be used in a variety of ways according to the needs, ages and abilities of the group, as well as the situation. The pack focuses on actions and consequences of a variety of common online situations in the form of word maps and word banks. Why not use them to start discussions and debates about online safety? Blank word maps are also provided so that professionals can guide their audience towards more wide-ranging discussions about related topics. Please look at the supporting activities for further inspiration! Safer Internet Day The “Think B4U…” pack is being launched to coincide with Safer Internet Day 2011. Safer Internet Day is organised annually by INSAFE (www.saferinternet.org) in February to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world. Each year hundreds of events are organised to raise awareness about online safety issues. For more details visit www.saferinternet.org.uk 5 Be safe online Supporting Information for Adults Professionals and adults should be encouraged and supported in helping children and young people become safe online. However some preparation is required to ensure all participants are kept safe Child Protection and Disclosures Professionals and adults must be aware that using these resources could lead to a disclosure from young people or other adults. Prior to using these materials the professional should ensure they are aware of their agency/ setting child protection procedures and that they know how to make a direct referral to police and social services should the need arise. They should ensure they know who is the lead within the agency/setting for e-Safety and/or child protection before using these materials and aware of suitable places to signpost such as useful websites or contacts. There should be at least one member of staff available who can support children, young people or adults who wish to discuss anything further. That member of staff should be familiar with the child protection process and know how to make a child protection or police referral if necessary.” It is essential to remind people in the session that they will be supported if they require further help or information and that someone will be available to talk to them in private. They should be told that it is not appropriate to talk about their own or others’ abusive experiences within the group. Contact details and procedures can be found in the Kent Safeguarding Children Boards Procedures Book (Purple Book) and information can be found in this workbook. Reporting a Problem to CEOP The Child Exploitation and Online Protection Centre (CEOP) www.ceop.police.uk delivers a multi-agency service dedicated to tackling the abuse and exploitation of children in the real and the “e” world. A key focus of CEOP is the Think U Know website and education strategy to teach 6 young people, teachers, professionals and parents/carers about e-Safety. The Think U Know Website www.thinkuknow.co.uk is suitable for children aged 5-16 and has a section for parents/carers full of advice and information. CEOP also works as part of the Virtual Global Taskforce (VGT) which made up of law enforcement agencies from around the world such as Australia, Canada, Italy, America, etc. www.virtualglobaltaskforce.com The report abuse button can be used to report inappropriate or potentially illegal activity towards a child as well as to seek advice on issues such as cyberbullying, hacking, viruses and mobile phone safety. It can be found in many websites, chatrooms and instant messaging services. The button can be found at www.thinkuknow.co.uk and on a variety of websites. You can also install the “Report Abuse” tab into your web browser www.ceop.police.uk/Browser-Safety Please note that if you or someone you know is in immediate danger or want urgent dial 999. Suspected Illegal Content The Internet Watch Foundation (IWF) www.iwf.org.uk is the UK hotline for reporting illegal online content – this may inlcude child abuse images, or material considered to be criminally obscene or inciting hatred. A link for reporting illegal content appears on the IWF homepage. Other Sources of Support ChildLine: 0800 1111 www.childline.org.uk Stop It Now!: An organisation that helps tackle child sexual abuse, targeting adults to act responsibly 0808 1000 900 www.stopitnow.org.uk The Samaritans: Confidential, non-judgemental support 24 hours a day 0845 790 9090 www.samaritans.org The Virtual Global Taskforce: www.virtualglobaltaskforce.co.uk Crimestoppers: 0800 555111 www.crimestoppers-uk.org Cybermentors: Online advice by young people for young people www.cybermentors.org.uk Be safe online Safety Considerations ● ● ● ● ● ● Professionals using these tools will need to be adequately briefed and prepared and should where possible undertake the relevant training to use these resources appropriately (see further training). Carefully consider the group you are working with and decide which tools, activities and language are most suitable, prior to using the materials. Always ensure that the materials are delivered with adequate planning and support (this is especially important should a disclosure occur). If you will be using online materials with the group then ensure you risk assess beforehand and consider age limits, suitability and potential risks etc. Only use age appropriate sites with young people and consider parental consents and other requirements prior to use. Ensure you are aware of and familiar with your agency’s staff electronic communication policy. Further Training Local Training Local training can be accessed via the Kent Safeguarding Children Board www.kscb.org.uk and is delivered by the e-Safety Officer and the training and development team. The training offered is a variety of half-day courses which cover basic e-Safety awareness, delivering to children and young people (Thinkuknow training) and delivering to parent/carers. It also offers a full day advanced course focusing on child protection and new technology which is aimed at professionals managing e-Safety risks. applications young people are using in the online and mobile environment. The course covers many issues that children and young people face online and signposts to initiatives and organisations for help and support. (NB this training is also offered via KSCB). www.thinkuknow.co.uk/Teachers/Training/ freetrainingDetails CEOP Ambassador Training Course CEOP's Ambassador Course is a full day's training aimed at all professionals who work with children and young people. Through the course you will get an in-depth look not only at how young people use the internet and mobile technology, but also how offenders use the online environment to groom young people. This training will give both a law enforcement and education perspective, broadening your understanding of this emerging area. Once you have completed this course, you will be able to cascade CEOP's Thinkuknow half day training to your colleagues, and will receive an official certificate. Please note that you will only be able to sign up to the Ambassador training after completing the free half day CEOP Thinkuknow training. The Ambassador course costs £199.00. www.thinkuknow.co.uk/Teachers/Training/ paidtrainingdetails National Training from CEOP Half day CEOP Thinkuknow Training Course All CEOP's Thinkuknow resources are free for professionals to download and use, subject to validation. However, to access and deliver the 1116 programme, you are required to undertake the free half day CEOP Thinkuknow training course. We also recommend that professionals using CEOP resources at any Key Stage attend this course. The CEOP Thinkuknow training course is free and enables professionals who work with young people to directly deliver CEOP's Thinkuknow Programme… (TUK) to Key Stage 3/4 children (ages 11-16). In addition to teaching delegates how to deliver TUK products to young people, the training will also increase their understanding of many of the most popular 7 Be safe online Starter Discussion Questions Here is a selection of discussion questions to use alongside the posters and resources. They will vary according to your audience. ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 8 What do you think are the benefits of the internet and technology? What do you think are the risks of the internet and technology? Are there specific risks to children and young people related to the internet and technology? What would you add to the Think B4U… resources? What is your favourite way to access the internet? How do you keep yourself safe online? What should you do to keep safe online? Do you think that you need to be more careful or less careful when you use the internet outside school? What do you think is the biggest risk/benefit from being online? To children and young people? To adults? What qualities make a good friend? What qualities make a good online friend? How is an online friend different to a real life friend? Who would/could you go to if you wanted help about something online? Why would you pick them? How can you trust who you see online? How can you trust who you meet online? What is “personal information”? What advice would you give to a child about keeping safe online? What advice would you give to a young person about keeping safe online? What advice would you give to an adult about keeping safe online? What is appropriate behaviour online? Who should you report (possibly) illegal content to? What is Cyberbullying? What terms do you understand? What terms do you need to understand? Be safe online Suggested Group Work Activities The follow activities could be used for group work across a variety of age ranges and settings. They could be used with children and young people, parents/carers or as part of staff development or training. Word discussions ● ● ● ● ● Use the blank spider diagrams to discuss what words the group think could be used Compare their answers with the completed diagrams Are there any words they disagree with? Are there any words they don’t understand? To ensure this is suitable for your age group, carefully select the appropriate words for them prior to the activity Ask the group to create their own spider diagram using one of the words from the word bank as a starting point Role play/Discussions Give the group (or if a large group, break them down into smaller groups) a scenario and ask them to role play a scenario based on the information you have given them. Once they have done this ask them to think about what may happen next. Next, give them a second piece of information and ask them how this will change their scenario. What would the possible consequences be? What could the characters do to change the situation for the better or worse? Select the scenarios based on age and ability of your group (some groups may prefer to discuss the scenarios rather than role play the situations). You could also make up your own situations or ask your groups to do this for you. Scenarios 1) a. Amy is 13. She is receiving threatening text messages and phone calls from an anonymous number. She is also getting horrible messages sent to her Instant Messaging account. It all started after she fell out with a group of girls in her class at school. She asks her friends for help. b. One of her friends says she knows who is behind the messages and suggests setting up a hate group on a social networking site to target the girls back. 2) a. James is 11. All his friends are using a social networking site and talk about it all the time. His parents have said he is too young and won’t let him use the site at home as the age limit for the site is 13. One of his friends’ offers to set him up a profile on the site when he goes round to his house for tea. b. James sets up the account and loves being part of the crowd. He starts getting strangers talking to him and asking him where he lives and where he goes to school. James feels frightened but is too scared to ask his parents in case he gets into trouble. 3) a. Alisha is 16. Her boyfriend Chris is also 16 and they have been together 3 months. Chris has started to ask Alisha to text topless photos of herself to him to show how much she loves him. He promises he won’t show anyone else. b. Alisha texts Chris topless photos, but whilst at school one day Chris’s phone is stolen from his bag. The next day Alisha’s photos appear on a social networking site and have been emailed to students in the school. Please note: the Sexual Offence Act 2003 states “It is an offence to take, permit to be taken, make, possess, show, distribute or advertise indecent images of children in the United Kingdom. A child for these purposes is anyone under the age of 18.” This means both Alisha and Chris could potentially be convicted under this law for taking and distributing indecent images of children. The age of criminal responsibility is 10. 4) a. Max is 7. He wants to play on a gaming site like his big brother Adam, who is 14. The boys share a room and have a computer and games console in their bedroom. Adam loves computers and has set up the family’s internet and computers at home. b. Adam tells Max he is too young for some of the games and offers to help him with games that are suitable for his age. Adam asks his parents to help set up parental controls on the games console for Max. 9 Be safe online 5) a. Tracy notices one of her colleagues, Mandy, is friends with clients/pupils on a social networking service. Mandy’s profile includes photos of her drinking and using racist and offensive language. b. Tracy mentions her concerns to her line manager, who is confused as he doesn’t use social networking sites and doesn’t understand Tracy’s concerns. 6) a. Mark is at work and overhears a group of teenage boys talking and laughing. They are discussing a girl who one of them has met online a few weeks ago and is now arranging to meet. They say her “photos are well fit”. b. The boy is going alone that night to meet the girl at her house. He thinks it’ll be fine as “weirdos only try to meet girls online”. 7) a. Mia is 10. Her parents have helped her set up an account on a social networking site even though it is only supposed to be used by people over 13. Mia uses it to chat to her friends and play games. b. Mia likes to write lots of information on her profile such as her school, email address and where she lives. She also loves posting photos of herself in her school uniform and of her friends. She doesn’t know how to make her profile safe and hasn’t thought whether only her friends can see what she writes. Personal Information Ask the group what they think is personal information (anything private or personal about yourself such as phone numbers, address etc) and write down their ideas. ● Ask the group who it’s ok to share this information with in the real world (friends, family, people you trust)? Is this the same for the online world? What information would you be happy to share with friends? family? strangers? teachers? employers? Create posters to highlight what information is ok to share online and what information should be private. ● You could also extend the personal information activity further by giving the group a variety of key words e.g. name, age, relationship status etc. Now ask them whether this information should be made public or kept private for a) a child b) a young person c) an adult. What would you be happy to share? What do you think should be kept private and why? ● 10 Online friends ● ● Discuss what makes someone a “friend” and what qualities they might have. How do you know you can trust somebody in the real world? How does this differ between real world and online friends? Draw posters to show the difference (or similarities) between online and offline friends. “What does it do?” Ask the group to put together a list of technologies or websites they have heard of or that they use. ● Ask them to suggest/discuss or write down the following: ▲ Who do they think the technology is suitable for (age ranges etc) and see if they can confirm this. ▲ How they think it works. ▲ Why someone might use it. ▲ What are the benefits/positives of the technology? ▲ What are the possible risks or dangers a) for children and young people b) for adults ▲ What could they do to make that technology or website as safe as possible? If you have any other ideas for activities then please contact the e-Safety Officer ([email protected]) to offer them for future editions. ● www.kscb.org.uk www.thinkuknow.co.uk Parents and Carers Children and Young People Police Education Staff Filtering and Parental Controls Safeguardin g Board Service Providers and Companies Childline Youth Workers Internet Watch Foundation t u o Find and e r o m help get ... m o r f Connexions CEOP and Think U Know Charities and Organisations Family Friends Teachers Useful Links Health Cybermentors Useful Local Contacts Be safe online Meet Strangers Grooming Dating Location Online Public Offline Alone t e e M Abuse Instant Messenger Gaming Chat Safety Honest Friend Tell 13 Be safe online Trust Virus and Scams Self-generated Lies Strangers What? Why? Wiki’s Bias t s u r T Web Cam Age Limits and Recommendations Identity Honest Urban Legends Crime 14 Reliability Be safe online Buy and Use Crime Money Secure Banking File Sharing Software Virus Downloading Phishin d n a Buy se U Save Scams Permission Legal Honest Identity Shopping Spam Copyright 15 Be safe online Post and Share The Law Personal Information Social Networking Bullying Permission Sexting Privacy d n a t s o P e r a Sh Digital Footprint Consequences Peer Pressure Reputation Hate and Violence Chain Messages 16 GPS and Location Be safe online Watch and Play File Sharing Self-generated Inappropriate Illegal Mobile Phone Videos Games Console Music h c t Wa lay P d an Web Cam Age Limits and Recommendations Peer Pressure Fun Reality Reliability Hate and Violence 17 Be safe online 18 Be safe online TV Photo Film Video Internet Online Age Limit Age Recommendations Reality Fun 19 Be safe online 20 Save Police Post Share Send Sexting Abuse Bullying Grooming Cyberbullying Be safe online Websites Illegal Legal Sharing File Sharing Webcam Why? What? Where? When? 21 Be safe online 22 Wiki Lie Honesty Trust Stranger Friends Crime Scam Bias Identity Be safe online Downloading Permission Shopping Buy Sell Copyright Theft Law Save Phishing 23 Be safe online 24 Virus Spyware Malware Software Secure Banking Money Privacy Hate Violence Be safe online Reputation Professional Behaviour Appropriate Inappropriate Social Networking Social Media Search Engines Blogging Chatrooms 25 Be safe online 26 Instant Messaging Gaming Games Consoles Permission Sexting Chain Messages Personal Information GPS Location Geo-tagging Be safe online Dating Public Private Privacy Tell Safety Security Anti-virus Filtering Parental Controls 27 Be safe online 28 Supervision CEOP Think U Know Cybermentors Internet Watch Foundation (IWF) Connexions Parents/Carers Family Education Teachers Be safe online Adult Pornography Sexualisation Sex Offender Danger Health Service Providers Charities and Organisations Children and Young People Youth Workers 29 Be safe online 30 Safeguarding Board School Adult you trust Record Click Watch Meet Buy Play Forward Be safe online 31 Be safe online 32 Be safe online Guidance on Cyberbullying “Cyberbullying is the use of Information Communication Technology (ICT) particularly mobile phones and the internet, to deliberately upset someone.” DCSF 2007 ● ● ● Cyberbullying can take place 24/7 and is not restricted by location; it can occur on a vast scale and can be very hard to control. Bullies often attempt to be anonymous and can feel “distanced” from the incident. “Bystanders” can easily become perpetrators and Cyberbullying can occur unintentionally, often due to a lack of awareness of consequences and empathy by children and adults over the internet. Cyberbullying can occur in many forms: mobile phones (texting/videos/photos), social networking sites, websites, chatrooms, Instant messaging (IM) etc. Advice for schools/agencies in dealing with Cyberbullying: The key is to educate children and young people, staff and families about Cyberbullying. ● Cyberbullying should be dealt with using an holistic approach. ● Schools/agencies should have a co-ordinated response to Cyberbullying and e-Safety. ● ● ● ● ● ● Cyberbullying is potentially a criminal offence under several laws, depending upon the content and severity of the incident. NB: Cyberbullying incidents can be used as evidence – ensure this content is saved and that children/adults do not reply or retaliate (this can make the situation worse and harder to resolve) ● Responding to Cyberbullying: Schools/agencies MUST include Cyberbullying in their behaviour/bullying/safeguarding policies if they are going to deal with the issue. ● Teach young people how to keep themselves safe and how to report abuse or problems online. ● Encourage children to speak up and report Cyberbullying. Supporting the target: ▲ Reassure them that they have done the right thing by telling someone. ▲ Use existing pastoral systems to support the young person and inform parents etc. ▲ Advise them how to deal with Cyberbullying appropriately (not responding, blocking people etc.). ▲ Identify the bully if possible. Remove the content and contact service providers/local authority/police where relevant: http://www.teachtoday.eu/en/Resources/Ad ditionalresources-for-the-UK-andIreland.aspx Be aware of a headteacher’s power to engage and deal with cyberbullying – Headteachers have the power “to such an extent as is reasonable” to regulate the conduct of pupils off site (Education and Inspections Act 2006). School staff are able to confiscate items such as mobile phones etc. when they are being used to cause a disturbance in class or otherwise contravene the school behaviour/ anti-bullying policy (Education and Inspections Act 2006). Request the victim to keep a record of all the incidents for evidence. Keep all messages texts/photos/videos (Save IM conversations, take screen prints etc NB. NOT of illegal images) to show to the child’s school or police if necessary. Key Advice to Young People ● ● ● ● ● ● Always respect others – think about what you say online and what images you send/post. Remember that anything you publish online can be made public very quickly and you will never be sure who may have seen it. Once something is posted you lose control. Treat your password like a toothbrush – never share it with anyone and only give your personal information such as your mobile phone number or email address to trusted friends. Learn how to block or report online bullies or anyone behaving badly. Don’t retaliate or reply. Save the evidence – text messages, online conversation, pictures etc. 33 Be safe online ● ● Always make sure you tell an adult you trust. You could also speak to a charity such as Childline or Cybermentors. Always report the bullying to the service provider (e.g. the website or chatroom or your mobile phone company etc). You could also talk to a member of staff at your school. In some cases you may also need to speak to the police. If you notice someone being cyberbullied, then make sure you support them by reporting it as soon as possible. Key Advice for Parents/Carers ● ● ● ● ● ● ● ● 34 Your child is just as likely to be a bully as to be a target. Be alert to your child being upset after using the internet/phone – they may be secretive or change relationships with friends. If your child is a victim of cyberbullying, remember: it’s not their fault so removing the technology could make them less likely to speak to you in the future. Talk to your child and understand how they are using the internet and their phone. Use safety tools and parental controls – if you need help, contact your service provider. Please note that access tools are not always 100% effective. Remind your child not to retaliate and make sure you role model positive online behaviour. Work with the school to resolve the issue if other pupils are involved. Keep any evidence of cyberbullying ▲ emails, online conversations, texts, screen prints of sites/chat messages – try to include time/date etc. Report the Cyberbullying: ▲ Contact the service provider to report the user and remove content. ▲ Contact the school, library, youth club or setting so they can take action if it involves another young person at the setting ▲ If the cyberbullying is serious and a potential criminal offence has been committed then consider contacting the police. Be safe online Information for Parents/Carers Ideas for Young People: Be SMART! ● Follow the Golden Rules Ground Rules ● ● ● Establish how the internet and technology will be used in your house – know what your child is doing online, as you would offline. Discuss what will be kept private online (information, credit card details, photos etc) and decide rules for meeting online friends (Take a trusted adult, during the day, always use a public place). Use appropriate websites with your children (e.g. age appropriate) and always role model positive online behaviour. ● ● ● Online Safety ● ● ● Install antivirus software, filtering, firewalls and secure your internet connections. Use parental control functions for computers, mobile phones and games consoles – if you’re not sure how then contact the manufacturer or service provider. Always remember that these tools are not always 100% effective and sometimes inappropriate content can get past them. ● Location ● ● Ideally locate the computer/laptop in a family room and don’t allow webcams to be used unless with your consent and under supervision. Consider other devices in your home that allow internet access such as mobile phones and games consoles and ensure you discuss the boundaries for safe use outside the home (at friends’/family houses and at school). ● SAFE – Staying safe means being careful and not giving out person information to people online. This might include information such as your full name, home address, photos, mobile or home phone number, school name or passwords. Use an internet nickname when you are online, make sure you set any social networking sites to private (friends only) and never share your own or your friends or families information without their permission. MEETING – Meeting up with someone you have contacted online can be dangerous as you never know if they are who they say they are. Only do so with your parent's/carer's permission, and when they can be present and always meet in a public place. ACCEPTING e-mails or opening files from people you don't really know or trust can get you into trouble – they may contain viruses or nasty messages. The best thing to do is ignore them or show them to an adult you trust. RELIABLE – Some people online maybe lying about who they really are, and some information you find on the Internet may not always be reliable and true. TELL an adult you trust if someone or something you see online makes you feel uncomfortable or worried. You can report online abuse to the police at www.thinkuknow.co.uk It's never too late to tell someone if something or someone makes you feel uncomfortable. Make sure you know how to block someone online and report a problem to any websites or services you use. Don’t do anything online you wouldn’t do in real life! If you wouldn’t be happy with your parents, your teacher or a police officer seeing it, then don’t post it online. Always remember that once you’ve sent a picture, comment, video or message etc you can’t take it back, so think before you post. Dialogue ● ● ● Talk to your child – Share the experience with them and ask them to show you how they use technologies. Be open and encourage them to talk to you about any concerns or ideas. If your child reports a problem make sure you support them, report it and seek advice. 35 Be safe online Technical Tips for Parents/Carers Parental Controls/Filtering ● ● ● ● Please note: we do not endorse any specific products. These are provided as suggestions only and alternatives are available. ● ● ● ● ● ● ● ● ● Visit www.getsafeonline.org for Internet security advice. Know how to remove a programme from your computer: ● Start>control panel>add or remove programmes> Select the programme to remove. Ensure Windows automatic updates are turned on and a firewall is in place. Learn how to check your internet history on your browser. Ensure you use anti-virus and spyware removal software: Update and run regularly (whenever you use the internet if possible) – Windows Security Essentials, MacAfee, Norton etc. Visit www.microsoft.com/ protect/default.mspx for guidance from Microsoft on home security and safety. Secure your home wireless connection. You can find out how to do this by contacting your router manufacturer and/or ISP provider. Visit your Internet Service Provider’s (ISP) website for information from them about internet safety – many offer free parental controls, security software, filtering and parental information. Use Hector Protector’s Safety Button for young children to help them get used to seeking help from an adult. ww.thinkuknow.co.uk/5_7/hectorsworld/saf etybutton.aspx ● ● ● ● ● ● ● ● Web Browsers ● ● ● ● ● ● ● Try using different internet browsers (Mozilla, Chrome, Opera, Internet Explorer 7 or 8) some have built in security features or useful security or parental control add-ons you can use. Use child focused web browsers – There are specific browsers you can use just for kids but these are usually better for under 10s. www.zoodles.com http://pikluk.com www.kidzui.com http://kidrocket.org www.zacbrowser.com Safer Searching: ● ● ● ● ● 36 Use parental controls/filtering (either pre-installed, free or purchased) where possible e.g. Windows 7: www.microsoft.com/windows/windows7/features/parental-controls.aspx Windows Vista: www.microsoft.com/windows/windowsvista/features/parental-controls.aspx Windows XP: Windows Live Family Package https://fss.live.com/Default.aspx Mac: www.apple.com/macosx/features/parentalc ontrols.html www.netnanny.com www.opendns.com/familyshield www1.k9webprotection.com www.chatshield.com www.gomcgruff.com www.google.co.uk/familysafety – Google Family Safety Centre Remember to put parental controls on games consoles, mobile phones and any internet enabled devices (contact your provider or visit company websites for guidance on how to do this). www.bbc.co.uk/cbbc/find – excellent child friendly search engine www.askkids.com http://kids.yahoo.com www.kidsclick.org www.cantufind.com Be safe online Useful e-Safety Contacts and References CEOP (Child Exploitation and Online Protection Centre): www.ceop.police.uk CFE e–Safety Officer, KCC Children Families & Education: Rebecca Avery email: [email protected] Tel: 01622 221469 Childline: www.childline.org.uk Childnet: www.childnet.com Children’s Officer for Training & Development, Child Protection: Mike O’Connell email: [email protected] Tel: 01622 696677 Children’s Safeguards Service: www.kenttrustweb.org.uk?safeguards Click Clever Click Safe Campaign: http://clickcleverclicksafe.direct.gov.uk Cybermentors: www.cybermentors.org.uk Digizen: www.digizen.org.uk EIS – ICT Support for Schools and ICT Security Advice: www.eiskent.co.uk?ictsecurity Internet Watch Foundation: www.iwf.org.uk Kent e–Safety in Schools Guidance: www.kenttrustweb.org.uk?esafety Kent Safeguarding Children Board (KSCB): www.kscb.org.uk Kidsmart: www.kidsmart.org.uk Schools Broadband Team – Help for schools with filtering and network security: www.eiskent.co.uk Tel: 01622 206040 Schools e–Safety Blog: www.kenttrustweb.org.uk?esafetyblog Teach Today: http://en.teachtoday.eu Think U Know website: www1.k9webprotection.com Virtual Global Taskforce — Report Abuse: www1.k9webprotection.com 37 Be safe online Websites for Further Advice, Guidance and Useful Contacts www.ceop.police.uk www.iwf.org.uk www.virtualglobaltaskforce.com Child Exploitation and Online Protection Centre Report illegal content Kent Resources www.kent.gov.uk/esafety www.kscb.org.uk www.kent.police.uk/internetsafety www.kenttrustweb.org.uk?esafety [email protected] Advice for Parents Kent Safeguarding Children Board Kent Police Information Resources for schools and educational settings e-Safety Officer: (01622)221469 Links for Parents/Carers and Young People www.thinkuknow.co.uk www.childnet.com www.childnet.com/KIA Register in the parent/carer or teacher/trainer area for free advice and monthly emails Resources includes factsheets, activities and web links for parents and children and young people Excellent free resource, Know It All for parents – an online interactive guide Portal of resources from BBC Site based on relationships and digital boundaries Security advice Free online computer courses for adults Reviews of websites, games etc by age www.bbc.co.uk/onlinesafety www.thatsnotcool.com www.getsafeonline.org www.myguide.gov.uk www.commonsensemedia.org http://computer.howstuffworks.com www.bbc.co.uk/webwise Learn the online basics from the BBC www.easywhois.com Look up where websites come from www.netlingo.com Common online acronyms and text speak e.g. LOL, POS http://delicious.com/esafetyofficer_Kent The e-Safety Officer’s useful links http://sexperienceuk.channel4.com/protect-from-porn (Warning – adult content) http://clickcleverclicksafe.direct.gov.uk Click Clever Click Safe Campaign (Zip it, block it, Flag it) http://safely.yahoo.com Yahoo safety tips www.microsoft.com/protect/default.mspx Microsoft safety www.vodaphone.com/parents Excellent guide for parents on digital technologies www.talktalk.co.uk/brightersparks Excellent advice from Dr Tanya Byron Cyberbullying www.cybermentors.org.uk www.beatbullying.org www.bullying.co.uk 38 Online advice and support for young people aged 8 to 25 about cyberbullying as well as other concerns Be safe online Glossary Cookie A cookie is a small file that is sent to a web browser by a server and stored on the user’s computer. It can then be read by the server every time the user revisits the same website. Cyberbulling The deliberate and repeated use of technology (such as mobile phones and the internet) to harm or upset someone. ADSL Stands for ‘Asymmetric Digital Subscriber Line’. A way of sending computer data over an ordinary phone line. Attachment A file that is sent along with a message, usually via email. It can be any sort of file such as text, graphic, sound or video. Avatar A movable three-dimensional image used to represent a character or person online. Blog An online journal or diary (Short for Web Log) that others can read and respond to. Blogs contain short or frequently updated posts, arranged chronologically with the most recently posted item appearing at the top of the page and can contain photos, images, sound, video, archives and related links. Bluetooth Bluetooth allows mobile phones, computers and PDAs to connect to the Internet using a shortrange wireless connection. Bluejacking Is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or computer. Bookmark (also known as Favourites) The process of storing the address of a website or internet document on your computer, so that you can find it again easily. Browser A piece of software which allows a user onto the world wide web e.g. Internet Explorer, Firefox, Safari and Google Chrome. Chatroom A place where a user can communicate with people more or less instantaneously by typing messages which then appear on your computer screen, and are transmitted across the internet to be read by everyone else participating in the chat at that time. Chat can either be moderated or unmoderated. In the latter case the conversation will be completely unsupervised. It is very easy to fake an identity when participating in a chat so be especially wary. Download Copying or transferring data from another computer or device, usually over the internet. Email Messages, usually text, sent from one person to another via computer. E-mail can also be sent automatically to a large number of addresses. Firewall A network security system used to restrict internal and external traffic. Gaming (Online) Playing games online over the internet either browser based (through computers or laptops e.g. Runescape, World of Warcraft, Miniclip) or on games consoles e.g. X-Box, wii, Playstation 3. Grooming Online grooming occurs when an adult takes deliberate actions to befriend and establish an emotional connection with a child with the intent of later having sexual contact (on or off line). It may include situations where adults pose as children in chat rooms or social networking sites and ‘befriend’ children. Hacking The process of illegally breaking into someone else’s computer system, breaching the computer’s security. IM (Instant Messenging) A form of live chat. Generally a user joins a service (most popular is MSN or windows live messenger) and then whenever they log on to the IM service their name will appear in a register. The user can then be contacted by anyone on the register and added to that person’s contact list, although they will have to agree to accept their call. A user’s email address must be known before they can be added to someone’s list of contacts. Internet Service Provider (ISP) A company providing a connection to the internet and other services, such as browser software, email, a helpline, web space and subscriber-only content. / Continued over – Photo Sharing 39 Be safe online Keylogging Keylogging is the use of either a hardware installed on a keyboard or a software programme (such as spyware or monitoring systems) to record every keystroke (the sequence of keys pushed on your keyboard) on the computer. A keylogger records everything the user types in, including emails, log-in names, key words (such as bullying phrases) or passwords. This can be used for safety purposes such as by monitoring software or for criminal purposes such as for identity theft. Malware Software that damages your computer (viruses), steals your personal information (spyware), displays unwanted adverts (adware) or exposes your computer to hackers (Trojan Horses). Peer to Peer (P2P) or file sharing P2P software (also know as file sharing) allows users to search for files (such as music or videos) in specific folders of other users who are connected to the software online. These files are mostly copyrighted material and so illegal to download unless the user already owns a legally purchased copy. P2P networks possibly may contain problems hidden within the files being shared such as viruses and illegal and inappropriate material. (See also File sharing.) PDA Short for Personal Digital Assistant. A small, handheld computer. Phising The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that may be used for identity theft. Glossary continued Photo Sharing Uploading photos to a photo-sharing website to share with other users. Photo-sharing websites can be public (shared with all users) or private (shared with selected users e.g. friends or family members). Examples include Flickr and Photobucket. Podcast An audio file which can contain music, speaking etc. They can be downloaded from the Internet for playback on portable media players and computers. A “vodcast” is a video version. Pop-ups A new window that opens on top of the active internet browser window. Pop-ups that open without the user’s request usually contain advertisements and may request personal informations or contain malware. 40 Profile Information about a user. A profile may contain details such as the user’s name, address, interests and pictures. Profiles are commonly used on social networking websites or when customising the information received from a website. Any information posted on a profile should be considered carefully. Most profiles enable users to make profiles public (any user can access) or private (select users only). Search Engine A search engine is a website that searches the information available on the internet. Some search engines work by automatically searching the contents of the web and creating a database of the results. Other search engines contain only material manually approved for inclusion in a database and some combine the two approaches. Some of the most popular search engines are Google, Yahoo, Ask and Bing. It is recommended that younger children use child or family friendly search engines or are supervised when searching online. Sexting Sexting is sending sexually explicit messages via mobile phones, webcams or online. SMS Short for ‘short message service’. The proper name for text messages. Social networking Websites such as My Space, Bebo, Facebook which enable users to create an online profile to build online networks of people or friends and share information with their online community. Other users can then search for and ask for permission to add that person/profile to their list of friends. The online profile can include a photo, the user’s age, gender, hometown and a list of their hobbies/favourite things. The user can also post blogs, music, games and video on their page. People on the user’s friend list are allowed to send messages, leave comments or contact the user through instant messaging services. Spam Unsolicited junk email. The term is also used to describe junk text messages received via mobile phones. Spim Receiving unsolicited messages via instant messaging. Spyware Software that is surreptitiously installed on a hard disk without anyone’s knowledge and relays encoded information about their identity to the person who runs it via an Internet connection. This could be used to keep track of which websites they visit or even steal their passwords and login details for ecommerce sites. Be safe online Tagging A tag is a word, or a group of words, assigned to a piece of information, such as a picture, article or video clip, that allows the user to describe the content of the item and to search and crossreference information online. For example, users can ‘tag’ an article they read on a newspaper website with ‘news’, ‘funny’ or ‘car’ or ‘tag’ a photo with a friend’s name. Web-cam A small camera attached your computer/device that allows others to see you in real-time when they are talking to you online. Wiki A web page that allows registered users or anyone to collaboratively create, edit, link, and organize the content of a website e.g. Wikipedia. Torrents This is a form of downloading video and music files. However, instead of connecting straight to another user’s computer a central file is downloaded from a website which then anonymously connects the downloader to all the other people either sharing or downloading the file. This material is illegal unless you own a legal version. Trojan Horses A computer program containing a hidden function that causes damage to other programs while appearing to perform a valid function. Trojan horses have been known to activate webcams, for example, without the knowledge of PC users. URL An abbreviation for uniform resource locator, another way of saying web address. Video hosting site Allows people to post their own videos for others to watch, to give their opinions on the content that is there, and to make links between videos e.g. You tube. Virtual Worlds Virtual worlds are simulated worlds created on the internet that people can visit from their computer. ’Residents’ can create a new identity known as an avatar and interact with other avatars in real-time, in a relatively lifelike social setting. Popular virtual worlds include Second Life, Club Penguin and Habbo. Virus A computer program that enters a computer, often via email, and carries out a malicious act. A virus in a computer can corrupt or wipe all information in the hard drive, including the system software. VOIP VOIP stands for Voice Over Internet Protocol. It is a technology that allows voice communication to be transmitted via the internet in the same way one might use a telephone to make a phone call. Popular use of VOIP technology is through the software Skype. Web-browsing Surfing online e.g. searching on Google, internet shopping, reading news etc. 41 Be safe online Acknowledgements This workbook has been the work of the Kent Safeguarding Children Board e-Safety sub-group, including: Rebecca Avery, CFE; Peter Banbury, ICT Commissioning; Greg Barry, KSCB; Justine Croft, Connexions; Janet Davies, Libraries and Archives; Tracey Gager, Petham Primary School; Rachel Keen, SENICT; Steve Moores, Maidstone Grammar; Mike O’Connell, CFE Child Protection; Godfrey Pain, Kent Police; Lindsey Prestage, Libraries and Archives; Carol Webb, Invicta Grammar; Pam Wemban, Riverview Junior School and Suze Youde, Kent Youth Service. With thanks to material adapted from resources by CEOP (Child Exploitation and Online Protection Centre), SWGfL (South West Grid for Learning) and Childnet International. Please visit www.kscb.org.uk or www.kenttrustweb.org.uk?esafety to download additional copies. Design and artwork by EiS 01622 683708 42
Similar documents
Useful E-Safety information - West Borough Primary School
Inform them that giving out personal information can be dangerous. They need to treat personal information such as the school they go to or their location like their tooth brush and not share it ...
More information