Think B4U Booklet

Transcription

Think B4U Booklet
www.kscb.org.uk
www.thinkuknow.co.uk
safe online
online
Be
Be safe
Contents
Introduction
5
Supporting Information for Adults
● Child Protection and Disclosures
● Reporting a Problem to CEOP
● Suspected Illegal Content
● Other Sources of Support
● Safety Considerations
● Further Training
6
6
6
6
6
7
7
Resources
● Starter Discussion Questions
● Suggested Activities
● Think B4U ... Poster
● Be Safe Poster
● Word Diagrams
● Word Banks
● Guidance on Cyberbullying
● Information for Parents/Carers
● Technical Tips for Parents/Carers
8
8
9
11
12
13
19
33
35
36
List of Useful Contacts
37
Glossary
39
Acknowledgements
42
Produced by the Kent Safeguarding Children Board.
Disclaimer
Kent County Council (KCC) makes every effort to
ensure that the information in this document is
accurate and up-to-date. If errors are brought to our
attention, we will correct them as soon as practicable.
Nevertheless, KCC and its employees cannot accept
responsibility for any loss, damage or inconvenience
caused as a result of reliance on any content in this
publication.
The copyright of Kent materials is held by Kent
Safeguarding Children Board. However agencies that
work with Children and Young People are granted
permission to use all or part of the materials for not
for profit use, providing the KSCB copyright is
acknowledged and we are informed of its use.
3
Be safe online
An e-Safety Education Pack for Children,
Young People, Professionals
and Parents/Carers
e-Safety – an introduction
e-Safety is an essential element of safeguarding children and young people (and indeed adults) in the
online environment and when using technology such as computers, mobile phones or games consoles.
It is not about restricting children and young people or banning access as this often causes more
problems; e-Safety is about focusing on education and raising awareness of the risks and building our
resilience so that we can all be confident and safer online.
The internet offers immensely exciting benefits and opportunities for everyone but it can also expose us
to inappropriate and criminal behaviour. It’s important that we are all are aware of the risks and know
how to deal with these issues. It’s also important that all users of the internet are aware of the
consequences of their online actions, both good and bad!
Taking care, being safe and responsible online and offline are an important part of child development
and it is essential that all adults are aware and able to discuss this with children and young people as
soon as they are online.
Adults can sometimes be intimidated by children and young people’s confidence and
knowledge about technology and the internet, but
resources and support are available.
The “Think B4U…” Pack
behaviour .
“The “Think B4U…” pack is a resource for
professionals working with children,
young people and their families to help
them consider the impact of their online
The resources can be used in a variety of ways according
to the needs, ages and abilities of the group, as well as the
situation.
The pack focuses on actions and consequences of a variety
of common online situations in the form of word maps and
word banks. Why not use them to start discussions and
debates about online safety? Blank word maps are also
provided so that professionals can guide their audience
towards more wide-ranging discussions about related topics.
Please look at the supporting activities for further inspiration!
Safer Internet Day
The “Think B4U…” pack is being launched to coincide with Safer Internet Day 2011.
Safer Internet Day is organised annually by INSAFE (www.saferinternet.org) in February to promote
safer and more responsible use of online technology and mobile phones, especially amongst children
and young people across the world. Each year hundreds of events are organised to raise awareness
about online safety issues.
For more details visit www.saferinternet.org.uk
5
Be safe online
Supporting
Information
for Adults
Professionals and adults should be encouraged
and supported in helping children and young
people become safe online. However some
preparation is required to ensure all participants
are kept safe
Child Protection and Disclosures
Professionals and adults must be aware that
using these resources could lead to a disclosure
from young people or other adults. Prior to using
these materials the professional should ensure
they are aware of their agency/ setting child
protection procedures and that they know how to
make a direct referral to police and social
services should the need arise. They should
ensure they know who is the lead within the
agency/setting for e-Safety and/or child protection
before using these materials and aware of
suitable places to signpost such as useful
websites or contacts.
There should be at least one member of staff
available who can support children, young people
or adults who wish to discuss anything further.
That member of staff should be familiar with the
child protection process and know how to make a
child protection or police referral if necessary.”
It is essential to remind people in the session that
they will be supported if they require further help
or information and that someone will be available
to talk to them in private. They should be told that
it is not appropriate to talk about their own or
others’ abusive experiences within the group.
Contact details and procedures can be found in
the Kent Safeguarding Children Boards
Procedures Book (Purple Book) and information
can be found in this workbook.
Reporting a Problem to CEOP
The Child Exploitation and Online Protection
Centre (CEOP) www.ceop.police.uk delivers a
multi-agency service dedicated to tackling the
abuse and exploitation of children in the real and
the “e” world. A key focus of CEOP is the Think U
Know website and education strategy to teach
6
young people, teachers, professionals and
parents/carers about e-Safety. The Think U Know
Website www.thinkuknow.co.uk is suitable for
children aged 5-16 and has a section for
parents/carers full of advice and information.
CEOP also works as part of the Virtual Global
Taskforce (VGT) which made up of law
enforcement agencies from around the world
such as Australia, Canada, Italy, America, etc.
www.virtualglobaltaskforce.com
The report abuse button can be used to report
inappropriate or potentially illegal activity towards
a child as well as to seek advice on issues such
as cyberbullying, hacking, viruses and mobile
phone safety. It can be found in many websites,
chatrooms and instant messaging services. The
button can be found at www.thinkuknow.co.uk
and on a variety of websites. You can also install
the “Report Abuse” tab into your web browser
www.ceop.police.uk/Browser-Safety Please
note that if you or someone you know is in
immediate danger or want urgent dial 999.
Suspected Illegal Content
The Internet Watch Foundation (IWF)
www.iwf.org.uk is the UK hotline for reporting
illegal online content – this may inlcude child abuse
images, or material considered to be criminally
obscene or inciting hatred. A link for reporting illegal
content appears on the IWF homepage.
Other Sources of Support
ChildLine:
0800 1111
www.childline.org.uk
Stop It Now!:
An organisation that helps tackle child sexual
abuse, targeting adults to act responsibly
0808 1000 900
www.stopitnow.org.uk
The Samaritans:
Confidential, non-judgemental support 24 hours a
day
0845 790 9090
www.samaritans.org
The Virtual Global Taskforce:
www.virtualglobaltaskforce.co.uk
Crimestoppers:
0800 555111
www.crimestoppers-uk.org
Cybermentors:
Online advice by young people for young people
www.cybermentors.org.uk
Be safe online
Safety Considerations
●
●
●
●
●
●
Professionals using these tools will need to be
adequately briefed and prepared and should
where possible undertake the relevant training
to use these resources appropriately (see
further training).
Carefully consider the group you are working
with and decide which tools, activities and
language are most suitable, prior to using
the materials.
Always ensure that the materials are delivered
with adequate planning and support (this is
especially important should a disclosure occur).
If you will be using online materials with the
group then ensure you risk assess beforehand
and consider age limits, suitability and
potential risks etc.
Only use age appropriate sites with young
people and consider parental consents and
other requirements prior to use.
Ensure you are aware of and familiar with your
agency’s staff electronic communication policy.
Further Training
Local Training
Local training can be accessed via the Kent
Safeguarding Children Board www.kscb.org.uk
and is delivered by the e-Safety Officer and the
training and development team. The training
offered is a variety of half-day courses which
cover basic e-Safety awareness, delivering to
children and young people (Thinkuknow training)
and delivering to parent/carers. It also offers a full
day advanced course focusing on child protection
and new technology which is aimed at
professionals managing e-Safety risks.
applications young people are using in the online
and mobile environment. The course covers
many issues that children and young people face
online and signposts to initiatives and
organisations for help and support. (NB this
training is also offered via KSCB).
www.thinkuknow.co.uk/Teachers/Training/
freetrainingDetails
CEOP Ambassador Training Course
CEOP's Ambassador Course is a full day's
training aimed at all professionals who work with
children and young people. Through the course
you will get an in-depth look not only at how
young people use the internet and mobile
technology, but also how offenders use the online
environment to groom young people. This
training will give both a law enforcement and
education perspective, broadening your
understanding of this emerging area. Once you
have completed this course, you will be able to
cascade CEOP's Thinkuknow half day training to
your colleagues, and will receive an official
certificate. Please note that you will only be able
to sign up to the Ambassador training after
completing the free half day CEOP Thinkuknow
training. The Ambassador course costs £199.00.
www.thinkuknow.co.uk/Teachers/Training/
paidtrainingdetails
National Training from CEOP
Half day CEOP Thinkuknow Training Course
All CEOP's Thinkuknow resources are free for
professionals to download and use, subject to
validation. However, to access and deliver the 1116 programme, you are required to undertake the
free half day CEOP Thinkuknow training course.
We also recommend that professionals using
CEOP resources at any Key Stage attend this
course. The CEOP Thinkuknow training course is
free and enables professionals who work with
young people to directly deliver CEOP's
Thinkuknow Programme… (TUK) to Key Stage
3/4 children (ages 11-16). In addition to teaching
delegates how to deliver TUK products to young
people, the training will also increase their
understanding of many of the most popular
7
Be safe online
Starter
Discussion
Questions
Here is a selection of discussion questions to use alongside the posters and resources.
They will vary according to your audience.
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
8
What do you think are the benefits of the internet and technology?
What do you think are the risks of the internet and technology?
Are there specific risks to children and young people related to the internet and technology?
What would you add to the Think B4U… resources?
What is your favourite way to access the internet?
How do you keep yourself safe online?
What should you do to keep safe online?
Do you think that you need to be more careful or less careful when you use the internet outside
school?
What do you think is the biggest risk/benefit from being online? To children and young people? To
adults?
What qualities make a good friend?
What qualities make a good online friend?
How is an online friend different to a real life friend?
Who would/could you go to if you wanted help about something online? Why would you pick them?
How can you trust who you see online?
How can you trust who you meet online?
What is “personal information”?
What advice would you give to a child about keeping safe online?
What advice would you give to a young person about keeping safe online?
What advice would you give to an adult about keeping safe online?
What is appropriate behaviour online?
Who should you report (possibly) illegal content to?
What is Cyberbullying?
What terms do you understand?
What terms do you need to understand?
Be safe online
Suggested
Group Work
Activities
The follow activities could be used for group
work across a variety of age ranges and settings.
They could be used with children and young
people, parents/carers or as part of staff
development or training.
Word discussions
●
●
●
●
●
Use the blank spider diagrams to discuss what
words the group think could be used
Compare their answers with the completed
diagrams
Are there any words they disagree with? Are
there any words they don’t understand?
To ensure this is suitable for your age group,
carefully select the appropriate words for them
prior to the activity
Ask the group to create their own spider
diagram using one of the words from the word
bank as a starting point
Role play/Discussions
Give the group (or if a large group, break them down
into smaller groups) a scenario and ask them to role
play a scenario based on the information you have
given them. Once they have done this ask them to
think about what may happen next. Next, give them
a second piece of information and ask them how this
will change their scenario. What would the possible
consequences be? What could the characters do to
change the situation for the better or worse?
Select the scenarios based on age and ability of
your group (some groups may prefer to discuss
the scenarios rather than role play the situations).
You could also make up your own situations or
ask your groups to do this for you.
Scenarios
1) a. Amy is 13. She is receiving threatening text
messages and phone calls from an
anonymous number. She is also getting
horrible messages sent to her Instant
Messaging account. It all started after she
fell out with a group of girls in her class at
school. She asks her friends for help.
b. One of her friends says she knows who is
behind the messages and suggests setting up
a hate group on a social networking site to
target the girls back.
2) a. James is 11. All his friends are using a social
networking site and talk about it all the time. His
parents have said he is too young and won’t let
him use the site at home as the age limit for the
site is 13. One of his friends’ offers to set him up
a profile on the site when he goes round to his
house for tea.
b. James sets up the account and loves being
part of the crowd. He starts getting strangers
talking to him and asking him where he lives
and where he goes to school. James feels
frightened but is too scared to ask his
parents in case he gets into trouble.
3) a. Alisha is 16. Her boyfriend Chris is also 16
and they have been together 3 months.
Chris has started to ask Alisha to text
topless photos of herself to him to show how
much she loves him. He promises he won’t
show anyone else.
b. Alisha texts Chris topless photos, but whilst
at school one day Chris’s phone is stolen
from his bag. The next day Alisha’s photos
appear on a social networking site and have
been emailed to students in the school.
Please note: the Sexual Offence Act 2003 states
“It is an offence to take, permit to be taken, make,
possess, show, distribute or advertise indecent
images of children in the United Kingdom. A child
for these purposes is anyone under the age of
18.” This means both Alisha and Chris could
potentially be convicted under this law for taking
and distributing indecent images of children. The
age of criminal responsibility is 10.
4) a. Max is 7. He wants to play on a gaming site
like his big brother Adam, who is 14. The
boys share a room and have a computer
and games console in their bedroom. Adam
loves computers and has set up the family’s
internet and computers at home.
b. Adam tells Max he is too young for some of
the games and offers to help him with
games that are suitable for his age. Adam
asks his parents to help set up parental
controls on the games console for Max.
9
Be safe online
5) a. Tracy notices one of her colleagues, Mandy,
is friends with clients/pupils on a social
networking service. Mandy’s profile includes
photos of her drinking and using racist and
offensive language.
b. Tracy mentions her concerns to her line
manager, who is confused as he doesn’t use
social networking sites and doesn’t
understand Tracy’s concerns.
6) a. Mark is at work and overhears a group of
teenage boys talking and laughing. They
are discussing a girl who one of them has
met online a few weeks ago and is now
arranging to meet. They say her “photos
are well fit”.
b. The boy is going alone that night to meet the
girl at her house. He thinks it’ll be fine as
“weirdos only try to meet girls online”.
7) a. Mia is 10. Her parents have helped her set
up an account on a social networking site
even though it is only supposed to be used
by people over 13. Mia uses it to chat to her
friends and play games.
b. Mia likes to write lots of information on her
profile such as her school, email address
and where she lives. She also loves
posting photos of herself in her school
uniform and of her friends. She doesn’t
know how to make her profile safe and
hasn’t thought whether only her friends can
see what she writes.
Personal Information
Ask the group what they think is personal
information (anything private or personal about
yourself such as phone numbers, address etc)
and write down their ideas.
● Ask the group who it’s ok to share this
information with in the real world (friends, family,
people you trust)? Is this the same for the online
world? What information would you be happy to
share with friends? family? strangers?
teachers? employers? Create posters to
highlight what information is ok to share online
and what information should be private.
● You could also extend the personal information
activity further by giving the group a variety of
key words e.g. name, age, relationship status
etc. Now ask them whether this information
should be made public or kept private for a) a
child b) a young person c) an adult. What
would you be happy to share? What do you
think should be kept private and why?
●
10
Online friends
●
●
Discuss what makes someone a “friend” and
what qualities they might have. How do you
know you can trust somebody in the real
world? How does this differ between real world
and online friends?
Draw posters to show the difference (or
similarities) between online and offline friends.
“What does it do?”
Ask the group to put together a list of
technologies or websites they have heard of or
that they use.
● Ask them to suggest/discuss or write down the
following:
▲ Who do they think the technology is suitable
for (age ranges etc) and see if they can
confirm this.
▲ How they think it works.
▲ Why someone might use it.
▲ What are the benefits/positives of the
technology?
▲ What are the possible risks or dangers a) for
children and young people b) for adults
▲ What could they do to make that technology
or website as safe as possible?
If you have any other ideas for activities then
please contact the e-Safety Officer
([email protected]) to offer them for
future editions.
●
www.kscb.org.uk
www.thinkuknow.co.uk
Parents and
Carers
Children and
Young People
Police
Education Staff
Filtering and
Parental
Controls
Safeguardin
g Board
Service
Providers and
Companies
Childline
Youth Workers
Internet Watch
Foundation
t
u
o
Find and
e
r
o
m help
get ...
m
o
r
f
Connexions
CEOP and
Think U Know
Charities and
Organisations
Family
Friends
Teachers
Useful Links
Health
Cybermentors
Useful Local Contacts
Be safe online
Meet
Strangers
Grooming
Dating
Location
Online
Public
Offline
Alone
t
e
e
M
Abuse
Instant
Messenger
Gaming
Chat
Safety
Honest
Friend
Tell
13
Be safe online
Trust
Virus and
Scams
Self-generated
Lies
Strangers
What?
Why?
Wiki’s
Bias
t
s
u
r
T
Web Cam
Age Limits and
Recommendations
Identity
Honest
Urban
Legends
Crime
14
Reliability
Be safe online
Buy and Use
Crime
Money
Secure
Banking
File Sharing
Software
Virus
Downloading
Phishin
d
n
a
Buy se
U
Save
Scams
Permission
Legal
Honest
Identity
Shopping
Spam
Copyright
15
Be safe online
Post and Share
The Law
Personal
Information
Social
Networking
Bullying
Permission
Sexting
Privacy
d
n
a
t
s
o
P
e
r
a
Sh
Digital
Footprint
Consequences
Peer
Pressure
Reputation
Hate and
Violence
Chain
Messages
16
GPS and
Location
Be safe online
Watch and Play
File Sharing
Self-generated
Inappropriate
Illegal
Mobile
Phone
Videos
Games
Console
Music
h
c
t
Wa lay
P
d
an
Web Cam
Age Limits and
Recommendations
Peer
Pressure
Fun
Reality
Reliability
Hate and
Violence
17
Be safe online
18
Be safe online
TV
Photo
Film
Video
Internet
Online
Age Limit
Age
Recommendations
Reality
Fun
19
Be safe online
20
Save
Police
Post
Share
Send
Sexting
Abuse
Bullying
Grooming
Cyberbullying
Be safe online
Websites
Illegal
Legal
Sharing
File Sharing
Webcam
Why?
What?
Where?
When?
21
Be safe online
22
Wiki
Lie
Honesty
Trust
Stranger
Friends
Crime
Scam
Bias
Identity
Be safe online
Downloading
Permission
Shopping
Buy
Sell
Copyright
Theft
Law
Save
Phishing
23
Be safe online
24
Virus
Spyware
Malware
Software
Secure
Banking
Money
Privacy
Hate
Violence
Be safe online
Reputation
Professional
Behaviour
Appropriate
Inappropriate
Social Networking
Social Media
Search Engines
Blogging
Chatrooms
25
Be safe online
26
Instant Messaging
Gaming
Games Consoles
Permission
Sexting
Chain Messages
Personal Information
GPS
Location
Geo-tagging
Be safe online
Dating
Public
Private
Privacy
Tell
Safety
Security
Anti-virus
Filtering
Parental Controls
27
Be safe online
28
Supervision
CEOP
Think U Know
Cybermentors
Internet Watch
Foundation (IWF)
Connexions
Parents/Carers
Family
Education
Teachers
Be safe online
Adult
Pornography
Sexualisation
Sex Offender
Danger
Health
Service Providers
Charities and
Organisations
Children and
Young People
Youth Workers
29
Be safe online
30
Safeguarding Board
School
Adult you trust
Record
Click
Watch
Meet
Buy
Play
Forward
Be safe online
31
Be safe online
32
Be safe online
Guidance on
Cyberbullying
“Cyberbullying is the use of Information
Communication Technology (ICT) particularly
mobile phones and the internet, to deliberately
upset someone.” DCSF 2007
●
●
●
Cyberbullying can take place 24/7 and is not
restricted by location; it can occur on a vast
scale and can be very hard to control. Bullies
often attempt to be anonymous and can feel
“distanced” from the incident. “Bystanders” can
easily become perpetrators and Cyberbullying
can occur unintentionally, often due to a lack of
awareness of consequences and empathy by
children and adults over the internet.
Cyberbullying can occur in many forms: mobile
phones (texting/videos/photos), social
networking sites, websites, chatrooms, Instant
messaging (IM) etc.
Advice for schools/agencies in dealing
with Cyberbullying:
The key is to educate children and young
people, staff and families about Cyberbullying.
●
Cyberbullying should be dealt with using an
holistic approach.
●
Schools/agencies should have a co-ordinated
response to Cyberbullying and e-Safety.
●
●
●
●
●
●
Cyberbullying is potentially a criminal offence
under several laws, depending upon the
content and severity of the incident.
NB: Cyberbullying incidents can be used as
evidence – ensure this content is saved and that
children/adults do not reply or retaliate (this can
make the situation worse and harder to resolve)
●
Responding to Cyberbullying:
Schools/agencies MUST include Cyberbullying
in their behaviour/bullying/safeguarding
policies if they are going to deal with the issue.
●
Teach young people how to keep themselves
safe and how to report abuse or problems
online.
●
Encourage children to speak up and report
Cyberbullying.
Supporting the target:
▲ Reassure them that they have done the right
thing by telling someone.
▲ Use existing pastoral systems to support the
young person and inform parents etc.
▲ Advise them how to deal with Cyberbullying
appropriately (not responding, blocking
people etc.).
▲ Identify the bully if possible.
Remove the content and contact service
providers/local authority/police where relevant:
http://www.teachtoday.eu/en/Resources/Ad
ditionalresources-for-the-UK-andIreland.aspx
Be aware of a headteacher’s power to engage
and deal with cyberbullying – Headteachers
have the power “to such an extent as is
reasonable” to regulate the conduct of pupils
off site (Education and Inspections Act 2006).
School staff are able to confiscate items such
as mobile phones etc. when they are being
used to cause a disturbance in class or
otherwise contravene the school behaviour/
anti-bullying policy (Education and Inspections
Act 2006).
Request the victim to keep a record of all the
incidents for evidence. Keep all messages
texts/photos/videos (Save IM conversations,
take screen prints etc NB. NOT of illegal
images) to show to the child’s school or police
if necessary.
Key Advice to Young People
●
●
●
●
●
●
Always respect others – think about what you
say online and what images you send/post.
Remember that anything you publish online
can be made public very quickly and you will
never be sure who may have seen it. Once
something is posted you lose control.
Treat your password like a toothbrush – never
share it with anyone and only give your
personal information such as your mobile phone
number or email address to trusted friends.
Learn how to block or report online bullies or
anyone behaving badly.
Don’t retaliate or reply.
Save the evidence – text messages, online
conversation, pictures etc.
33
Be safe online
●
●
Always make sure you tell an adult you trust.
You could also speak to a charity such as
Childline or Cybermentors. Always report the
bullying to the service provider (e.g. the
website or chatroom or your mobile phone
company etc). You could also talk to a
member of staff at your school. In some cases
you may also need to speak to the police.
If you notice someone being cyberbullied, then
make sure you support them by reporting it as
soon as possible.
Key Advice for Parents/Carers
●
●
●
●
●
●
●
●
34
Your child is just as likely to be a bully as to be
a target. Be alert to your child being upset after
using the internet/phone – they may be
secretive or change relationships with friends.
If your child is a victim of cyberbullying,
remember: it’s not their fault so removing the
technology could make them less likely to
speak to you in the future.
Talk to your child and understand how they are
using the internet and their phone.
Use safety tools and parental controls – if you
need help, contact your service provider.
Please note that access tools are not always
100% effective.
Remind your child not to retaliate and make
sure you role model positive online behaviour.
Work with the school to resolve the issue if
other pupils are involved.
Keep any evidence of cyberbullying
▲ emails, online conversations, texts, screen
prints of sites/chat messages – try to include
time/date etc.
Report the Cyberbullying:
▲ Contact the service provider to report the
user and remove content.
▲ Contact the school, library, youth club or
setting so they can take action if it involves
another young person at the setting
▲ If the cyberbullying is serious and a potential
criminal offence has been committed then
consider contacting the police.
Be safe online
Information
for
Parents/Carers
Ideas for Young People:
Be SMART!
●
Follow the Golden Rules
Ground Rules
●
●
●
Establish how the internet and technology will
be used in your house – know what your child
is doing online, as you would offline.
Discuss what will be kept private online
(information, credit card details, photos etc)
and decide rules for meeting online friends
(Take a trusted adult, during the day, always
use a public place).
Use appropriate websites with your children
(e.g. age appropriate) and always role model
positive online behaviour.
●
●
●
Online Safety
●
●
●
Install antivirus software, filtering, firewalls and
secure your internet connections.
Use parental control functions for computers,
mobile phones and games consoles – if you’re
not sure how then contact the manufacturer or
service provider.
Always remember that these tools are not
always 100% effective and sometimes
inappropriate content can get past them.
●
Location
●
●
Ideally locate the computer/laptop in a family
room and don’t allow webcams to be used
unless with your consent and under supervision.
Consider other devices in your home that
allow internet access such as mobile phones
and games consoles and ensure you discuss
the boundaries for safe use outside the home
(at friends’/family houses and at school).
●
SAFE – Staying safe means being careful
and not giving out person information to
people online. This might include information
such as your full name, home address,
photos, mobile or home phone number,
school name or passwords. Use an internet
nickname when you are online, make sure
you set any social networking sites to private
(friends only) and never share your own or
your friends or families information without
their permission.
MEETING – Meeting up with someone you
have contacted online can be dangerous as
you never know if they are who they say they
are. Only do so with your parent's/carer's
permission, and when they can be present and
always meet in a public place.
ACCEPTING e-mails or opening files from
people you don't really know or trust can get
you into trouble – they may contain viruses or
nasty messages. The best thing to do is ignore
them or show them to an adult you trust.
RELIABLE – Some people online maybe lying
about who they really are, and some
information you find on the Internet may not
always be reliable and true.
TELL an adult you trust if someone or
something you see online makes you feel
uncomfortable or worried. You can report
online abuse to the police at
www.thinkuknow.co.uk It's never too late to
tell someone if something or someone makes
you feel uncomfortable. Make sure you know
how to block someone online and report a
problem to any websites or services you use.
Don’t do anything online you wouldn’t do in
real life! If you wouldn’t be happy with your
parents, your teacher or a police officer seeing
it, then don’t post it online. Always remember
that once you’ve sent a picture, comment,
video or message etc you can’t take it back, so
think before you post.
Dialogue
●
●
●
Talk to your child – Share the experience with
them and ask them to show you how they use
technologies.
Be open and encourage them to talk to you
about any concerns or ideas.
If your child reports a problem make sure you
support them, report it and seek advice.
35
Be safe online
Technical Tips
for
Parents/Carers
Parental Controls/Filtering
●
●
●
●
Please note: we do not endorse any specific
products. These are provided as suggestions only
and alternatives are available.
●
●
●
●
●
●
●
●
●
Visit www.getsafeonline.org for Internet
security advice.
Know how to remove a programme from your
computer:
● Start>control panel>add or remove
programmes> Select the programme to
remove.
Ensure Windows automatic updates are turned
on and a firewall is in place.
Learn how to check your internet history on
your browser.
Ensure you use anti-virus and spyware
removal software: Update and run regularly
(whenever you use the internet if possible) –
Windows Security Essentials, MacAfee,
Norton etc.
Visit www.microsoft.com/
protect/default.mspx for guidance from
Microsoft on home security and safety.
Secure your home wireless connection. You
can find out how to do this by contacting your
router manufacturer and/or ISP provider.
Visit your Internet Service Provider’s (ISP)
website for information from them about
internet safety – many offer free parental
controls, security software, filtering and
parental information.
Use Hector Protector’s Safety Button for
young children to help them get used to
seeking help from an adult.
ww.thinkuknow.co.uk/5_7/hectorsworld/saf
etybutton.aspx
●
●
●
●
●
●
●
●
Web Browsers
●
●
●
●
●
●
●
Try using different internet browsers (Mozilla,
Chrome, Opera, Internet Explorer 7 or 8) some
have built in security features or useful security
or parental control add-ons you can use.
Use child focused web browsers – There are
specific browsers you can use just for kids but
these are usually better for under 10s.
www.zoodles.com
http://pikluk.com
www.kidzui.com
http://kidrocket.org
www.zacbrowser.com
Safer Searching:
●
●
●
●
●
36
Use parental controls/filtering (either
pre-installed, free or purchased) where
possible e.g.
Windows 7:
www.microsoft.com/windows/windows7/features/parental-controls.aspx
Windows Vista:
www.microsoft.com/windows/windowsvista/features/parental-controls.aspx
Windows XP: Windows Live Family Package
https://fss.live.com/Default.aspx
Mac:
www.apple.com/macosx/features/parentalc
ontrols.html
www.netnanny.com
www.opendns.com/familyshield
www1.k9webprotection.com
www.chatshield.com
www.gomcgruff.com
www.google.co.uk/familysafety – Google
Family Safety Centre
Remember to put parental controls on games
consoles, mobile phones and any internet
enabled devices (contact your provider or visit
company websites for guidance on how to do
this).
www.bbc.co.uk/cbbc/find – excellent child
friendly search engine
www.askkids.com
http://kids.yahoo.com
www.kidsclick.org
www.cantufind.com
Be safe online
Useful e-Safety
Contacts
and References
CEOP (Child Exploitation and Online Protection Centre): www.ceop.police.uk
CFE e–Safety Officer, KCC Children Families & Education:
Rebecca Avery email: [email protected] Tel: 01622 221469
Childline: www.childline.org.uk
Childnet: www.childnet.com
Children’s Officer for Training & Development, Child Protection:
Mike O’Connell email: [email protected] Tel: 01622 696677
Children’s Safeguards Service: www.kenttrustweb.org.uk?safeguards
Click Clever Click Safe Campaign: http://clickcleverclicksafe.direct.gov.uk
Cybermentors: www.cybermentors.org.uk
Digizen: www.digizen.org.uk
EIS – ICT Support for Schools and ICT Security Advice: www.eiskent.co.uk?ictsecurity
Internet Watch Foundation: www.iwf.org.uk
Kent e–Safety in Schools Guidance: www.kenttrustweb.org.uk?esafety
Kent Safeguarding Children Board (KSCB): www.kscb.org.uk
Kidsmart: www.kidsmart.org.uk
Schools Broadband Team – Help for schools with filtering and network security:
www.eiskent.co.uk Tel: 01622 206040
Schools e–Safety Blog: www.kenttrustweb.org.uk?esafetyblog
Teach Today: http://en.teachtoday.eu
Think U Know website: www1.k9webprotection.com
Virtual Global Taskforce — Report Abuse: www1.k9webprotection.com
37
Be safe online
Websites for Further
Advice, Guidance
and Useful Contacts
www.ceop.police.uk
www.iwf.org.uk
www.virtualglobaltaskforce.com
Child Exploitation and Online Protection Centre
Report illegal content
Kent Resources
www.kent.gov.uk/esafety
www.kscb.org.uk
www.kent.police.uk/internetsafety
www.kenttrustweb.org.uk?esafety
[email protected]
Advice for Parents
Kent Safeguarding Children Board
Kent Police Information
Resources for schools and educational settings
e-Safety Officer: (01622)221469
Links for Parents/Carers and Young People
www.thinkuknow.co.uk
www.childnet.com
www.childnet.com/KIA
Register in the parent/carer or teacher/trainer area for
free advice and monthly emails
Resources includes factsheets, activities and web links
for parents and children and young people
Excellent free resource, Know It All for parents – an
online interactive guide
Portal of resources from BBC
Site based on relationships and digital boundaries
Security advice
Free online computer courses for adults
Reviews of websites, games etc by age
www.bbc.co.uk/onlinesafety
www.thatsnotcool.com
www.getsafeonline.org
www.myguide.gov.uk
www.commonsensemedia.org
http://computer.howstuffworks.com
www.bbc.co.uk/webwise
Learn the online basics from the BBC
www.easywhois.com
Look up where websites come from
www.netlingo.com
Common online acronyms and text speak e.g. LOL, POS
http://delicious.com/esafetyofficer_Kent
The e-Safety Officer’s useful links
http://sexperienceuk.channel4.com/protect-from-porn (Warning – adult content)
http://clickcleverclicksafe.direct.gov.uk
Click Clever Click Safe Campaign (Zip it, block it, Flag it)
http://safely.yahoo.com
Yahoo safety tips
www.microsoft.com/protect/default.mspx
Microsoft safety
www.vodaphone.com/parents
Excellent guide for parents on digital technologies
www.talktalk.co.uk/brightersparks
Excellent advice from Dr Tanya Byron
Cyberbullying
www.cybermentors.org.uk
www.beatbullying.org
www.bullying.co.uk
38
Online advice and support for young people aged 8 to
25 about cyberbullying as well as other concerns
Be safe online
Glossary
Cookie
A cookie is a small file that is sent to a web
browser by a server and stored on the user’s
computer. It can then be read by the server every
time the user revisits the same website.
Cyberbulling
The deliberate and repeated use of technology
(such as mobile phones and the internet) to harm
or upset someone.
ADSL
Stands for ‘Asymmetric Digital Subscriber Line’. A
way of sending computer data over an ordinary
phone line.
Attachment
A file that is sent along with a message, usually
via email. It can be any sort of file such as text,
graphic, sound or video.
Avatar
A movable three-dimensional image used to
represent a character or person online.
Blog
An online journal or diary (Short for Web Log) that
others can read and respond to. Blogs contain
short or frequently updated posts, arranged
chronologically with the most recently posted item
appearing at the top of the page and can contain
photos, images, sound, video, archives and
related links.
Bluetooth
Bluetooth allows mobile phones, computers and
PDAs to connect to the Internet using a shortrange wireless connection.
Bluejacking
Is the sending of unsolicited messages over
Bluetooth to Bluetooth-enabled devices such as
mobile phones, PDAs or computer.
Bookmark (also known as Favourites)
The process of storing the address of a website
or internet document on your computer, so that
you can find it again easily.
Browser
A piece of software which allows a user onto the
world wide web e.g. Internet Explorer, Firefox,
Safari and Google Chrome.
Chatroom
A place where a user can communicate with
people more or less instantaneously by typing
messages which then appear on your computer
screen, and are transmitted across the internet to
be read by everyone else participating in the chat
at that time. Chat can either be moderated or unmoderated. In the latter case the conversation will
be completely unsupervised. It is very easy to
fake an identity when participating in a chat so be
especially wary.
Download
Copying or transferring data from another
computer or device, usually over the internet.
Email
Messages, usually text, sent from one person to
another via computer. E-mail can also be sent
automatically to a large number of addresses.
Firewall
A network security system used to restrict internal
and external traffic.
Gaming (Online)
Playing games online over the internet either
browser based (through computers or laptops
e.g. Runescape, World of Warcraft, Miniclip) or on
games consoles e.g. X-Box, wii, Playstation 3.
Grooming
Online grooming occurs when an adult takes
deliberate actions to befriend and establish an
emotional connection with a child with the intent
of later having sexual contact (on or off line). It
may include situations where adults pose as
children in chat rooms or social networking sites
and ‘befriend’ children.
Hacking
The process of illegally breaking into someone
else’s computer system, breaching the
computer’s security.
IM (Instant Messenging)
A form of live chat. Generally a user joins a
service (most popular is MSN or windows live
messenger) and then whenever they log on to
the IM service their name will appear in a
register. The user can then be contacted by
anyone on the register and added to that
person’s contact list, although they will have to
agree to accept their call. A user’s email address
must be known before they can be added to
someone’s list of contacts.
Internet Service Provider (ISP)
A company providing a connection to the
internet and other services, such as browser
software, email, a helpline, web space and
subscriber-only content.
/ Continued over – Photo Sharing
39
Be safe online
Keylogging
Keylogging is the use of either a hardware
installed on a keyboard or a software programme
(such as spyware or monitoring systems) to
record every keystroke (the sequence of keys
pushed on your keyboard) on the computer. A
keylogger records everything the user types in,
including emails, log-in names, key words (such
as bullying phrases) or passwords. This can be
used for safety purposes such as by monitoring
software or for criminal purposes such as for
identity theft.
Malware
Software that damages your computer (viruses),
steals your personal information (spyware),
displays unwanted adverts (adware) or exposes
your computer to hackers (Trojan Horses).
Peer to Peer (P2P) or file sharing
P2P software (also know as file sharing) allows
users to search for files (such as music or videos)
in specific folders of other users who are
connected to the software online. These files are
mostly copyrighted material and so illegal to
download unless the user already owns a legally
purchased copy. P2P networks possibly may
contain problems hidden within the files being
shared such as viruses and illegal and
inappropriate material.
(See also File sharing.)
PDA
Short for Personal Digital Assistant. A small,
handheld computer.
Phising
The act of sending an email to a user falsely
claiming to be an established legitimate
enterprise in an attempt to scam the user into
surrendering private information that may be
used for identity theft.
Glossary continued
Photo Sharing
Uploading photos to a photo-sharing website to
share with other users. Photo-sharing websites
can be public (shared with all users) or private
(shared with selected users e.g. friends or
family members). Examples include Flickr and
Photobucket.
Podcast
An audio file which can contain music, speaking
etc. They can be downloaded from the Internet for
playback on portable media players and
computers. A “vodcast” is a video version.
Pop-ups
A new window that opens on top of the active
internet browser window. Pop-ups that open
without the user’s request usually contain
advertisements and may request personal
informations or contain malware.
40
Profile
Information about a user. A profile may contain
details such as the user’s name, address,
interests and pictures. Profiles are commonly
used on social networking websites or when
customising the information received from a
website. Any information posted on a profile
should be considered carefully. Most profiles
enable users to make profiles public (any user
can access) or private (select users only).
Search Engine
A search engine is a website that searches the
information available on the internet. Some
search engines work by automatically searching
the contents of the web and creating a database
of the results. Other search engines contain only
material manually approved for inclusion in a
database and some combine the two
approaches. Some of the most popular search
engines are Google, Yahoo, Ask and Bing. It is
recommended that younger children use child or
family friendly search engines or are supervised
when searching online.
Sexting
Sexting is sending sexually explicit messages via
mobile phones, webcams or online.
SMS
Short for ‘short message service’. The proper
name for text messages.
Social networking
Websites such as My Space, Bebo, Facebook
which enable users to create an online profile to
build online networks of people or friends and
share information with their online community.
Other users can then search for and ask for
permission to add that person/profile to their list
of friends. The online profile can include a photo,
the user’s age, gender, hometown and a list of
their hobbies/favourite things. The user can also
post blogs, music, games and video on their
page. People on the user’s friend list are allowed
to send messages, leave comments or contact
the user through instant messaging services.
Spam
Unsolicited junk email. The term is also used to
describe junk text messages received via
mobile phones.
Spim
Receiving unsolicited messages via instant
messaging.
Spyware
Software that is surreptitiously installed on a hard
disk without anyone’s knowledge and relays
encoded information about their identity to the
person who runs it via an Internet connection.
This could be used to keep track of which
websites they visit or even steal their passwords
and login details for ecommerce sites.
Be safe online
Tagging
A tag is a word, or a group of words, assigned to
a piece of information, such as a picture, article or
video clip, that allows the user to describe the
content of the item and to search and crossreference information online. For example, users
can ‘tag’ an article they read on a newspaper
website with ‘news’, ‘funny’ or ‘car’ or ‘tag’ a photo
with a friend’s name.
Web-cam
A small camera attached your computer/device
that allows others to see you in real-time when
they are talking to you online.
Wiki
A web page that allows registered users or
anyone to collaboratively create, edit, link, and
organize the content of a website e.g. Wikipedia.
Torrents
This is a form of downloading video and music
files. However, instead of connecting straight to
another user’s computer a central file is
downloaded from a website which then
anonymously connects the downloader to all the
other people either sharing or downloading the
file. This material is illegal unless you own a
legal version.
Trojan Horses
A computer program containing a hidden function
that causes damage to other programs while
appearing to perform a valid function. Trojan
horses have been known to activate webcams,
for example, without the knowledge of PC users.
URL
An abbreviation for uniform resource locator,
another way of saying web address.
Video hosting site
Allows people to post their own videos for others
to watch, to give their opinions on the content that
is there, and to make links between videos e.g.
You tube.
Virtual Worlds
Virtual worlds are simulated worlds created on
the internet that people can visit from their
computer. ’Residents’ can create a new identity
known as an avatar and interact with other
avatars in real-time, in a relatively lifelike social
setting. Popular virtual worlds include Second
Life, Club Penguin and Habbo.
Virus
A computer program that enters a computer, often
via email, and carries out a malicious act. A virus
in a computer can corrupt or wipe all information
in the hard drive, including the system software.
VOIP
VOIP stands for Voice Over Internet Protocol. It is
a technology that allows voice communication to
be transmitted via the internet in the same way
one might use a telephone to make a phone call.
Popular use of VOIP technology is through the
software Skype.
Web-browsing
Surfing online e.g. searching on Google, internet
shopping, reading news etc.
41
Be safe online
Acknowledgements
This workbook has been the work of the Kent
Safeguarding Children Board e-Safety sub-group,
including:
Rebecca Avery, CFE; Peter Banbury, ICT
Commissioning; Greg Barry, KSCB; Justine Croft,
Connexions; Janet Davies, Libraries and
Archives; Tracey Gager, Petham Primary School;
Rachel Keen, SENICT; Steve Moores, Maidstone
Grammar; Mike O’Connell, CFE Child Protection;
Godfrey Pain, Kent Police; Lindsey Prestage,
Libraries and Archives; Carol Webb, Invicta
Grammar; Pam Wemban, Riverview Junior
School and Suze Youde, Kent Youth Service.
With thanks to material adapted from resources
by CEOP (Child Exploitation and Online
Protection Centre), SWGfL (South West Grid for
Learning) and Childnet International.
Please visit www.kscb.org.uk or
www.kenttrustweb.org.uk?esafety to download
additional copies.
Design and artwork by EiS 01622 683708
42