2014 EyePAT Training Guide v 4.0

Transcription

2014 EyePAT Training Guide v 4.0
150
Table of Contents
Introduction ....................................................................................................... 11
About this Guide .............................................................................................. 11
About EyePAT .................................................................................................. 11
Public speaking: ............................................................................................... 12
TV and Radio ................................................................................................... 12
Contact Us ...................................................................................................... 12
The Internet - an introduction ............................................................................... 13
Online Terminology ............................................................................................. 15
Digital footprint? .............................................................................................. 15
Shredding ....................................................................................................... 15
Ratting ........................................................................................................... 15
Photobombing ................................................................................................. 16
Photoshopping ................................................................................................. 16
Selfies ............................................................................................................ 16
Why do we need to learn online safety? ................................................................. 17
Putting things in perspective.............................................................................. 17
YoungMinds results: ...................................................................................... 17
BBC Learning results: .................................................................................... 17
The internet is a wonderful tool .......................................................................... 17
Unsuitable Sites ............................................................................................ 18
Sexting ........................................................................................................ 18
Bullying ....................................................................................................... 18
Trolling ........................................................................................................ 18
Grooming ..................................................................................................... 19
Violent Gaming ............................................................................................. 19
Identity theft ................................................................................................ 19
Mobiles (Smartphones) and Tablets ................................................................. 19
How can the internet affect your children?.............................................................. 20
How does a child’s brain work ............................................................................ 21
What to do at what age? ................................................................................... 22
Internet Addiction ............................................................................................ 24
Inappropriate Sites .............................................................................................. 26
Porn Sites ....................................................................................................... 26
Viewing Inappropriate Images on Mobiles ........................................................ 26
© Eye PAT Ltd.
Version 4.0 2014
3
[email protected]
www.eyepat.org
Using the Internet Safely
Parents fear porn on children's mobiles ............................................................ 26
Suicide Sites.................................................................................................... 27
Eating Disorder Sites ........................................................................................ 27
Drug Sites ....................................................................................................... 28
Terrorist Sites .................................................................................................. 28
Snuff Movies.................................................................................................... 28
Blogging ............................................................................................................ 29
Tumblr............................................................................................................ 29
WordPress ....................................................................................................... 29
Apps .................................................................................................................. 30
StaySafe ......................................................................................................... 30
Social Networking ............................................................................................... 33
Picture Messaging ............................................................................................ 33
Instant messaging............................................................................................ 33
Chat Rooms..................................................................................................... 34
Video Messaging .............................................................................................. 34
Discussion groups ............................................................................................ 34
Messaging .......................................................................................................... 35
Top 15 Social Networking Sites .......................................................................... 35
Other Apps/Social Networks used by Young People............................................... 36
WhatsApp Messenger .................................................................................... 36
KikMessenger ............................................................................................... 37
Messenger WithYou ....................................................................................... 37
Bump .......................................................................................................... 37
Ping ............................................................................................................ 37
Touch .......................................................................................................... 38
BBM ............................................................................................................ 38
Snapchat ..................................................................................................... 38
Faceparty ..................................................................................................... 39
Friendster .................................................................................................... 39
MSN Messenger ............................................................................................ 40
Video Messaging ................................................................................................. 41
Facetime (Apple).............................................................................................. 41
Google Chat .................................................................................................... 41
Facebook ........................................................................................................ 41
Skype ............................................................................................................. 43
Chatroulette.com and Pinkroutlette.com.............................................................. 43
© EyePAT Community Interest Company
Version 4.0 2014
4
www.eyepat.org
[email protected]
Using the Internet Safely
Tinychat.com ................................................................................................... 44
Stickam .......................................................................................................... 44
Geo-Social Apps - Hook Up Apps ........................................................................... 46
Full Circle ........................................................................................................ 46
Tango ............................................................................................................. 46
Pickloc ............................................................................................................ 47
WEKHO ........................................................................................................... 47
Anonymous social networking ............................................................................... 48
Honesty Box .................................................................................................... 48
Formspring...................................................................................................... 48
Little Gossip .................................................................................................... 48
Spillit .............................................................................................................. 49
Social Networking - Privacy and Parental Settings ................................................... 51
Friends, Contacts or Strangers ........................................................................ 51
Dictionary of Social Networking Terms: ............................................................ 52
1. Facebook..................................................................................................... 52
To access your account settings ...................................................................... 52
Changing your Privacy Settings....................................................................... 53
Who can see my Stuff? .................................................................................. 53
Who Can Contact Me ..................................................................................... 54
Receiving Messages ....................................................................................... 55
Block Someone - quick method ....................................................................... 55
Categorising, Reporting, Blocking, Unfriending Friends ....................................... 56
More Privacy Settings .................................................................................... 56
Timeline and Tagging Settings ........................................................................ 57
Blocking ....................................................................................................... 57
Photo Albums ............................................................................................... 59
Changing your Account Settings...................................................................... 60
Is someone logging onto your Facebook account without you knowing? ............... 60
Stopping someone from logging onto your Page ................................................ 60
Password - Changing your Facebook password ................................................. 61
Blocking Facebook ......................................................................................... 62
2. Twitter ........................................................................................................ 62
3. LinkedIn ...................................................................................................... 63
4. Google+ ...................................................................................................... 64
5. PinInterest .................................................................................................. 64
To report a pin.............................................................................................. 65
© EyePAT Community Interest Company
Version 4.0 2014
5
www.eyepat.org
[email protected]
Using the Internet Safely
To report a person ........................................................................................ 65
To report a comment. .................................................................................... 65
6. Tumblr ........................................................................................................ 65
What parents need to know ............................................................................ 65
How To Report People On Tumblr .................................................................... 66
7. Flickr .......................................................................................................... 67
What if I don't want everyone to see my photos? .............................................. 67
Setting privacy levels on my photos? ............................................................... 67
Privacy Uploading by Email............................................................................. 67
Can anyone leave a comment? ....................................................................... 67
I've uploaded photos and made them public. Where do they show up? ................ 68
Can I make a public photo private again? ......................................................... 68
8. VK .............................................................................................................. 68
9. Instagram ................................................................................................... 69
How do I report something for abuse or spam? ................................................. 69
How do I block or unblock someone? ............................................................... 69
What can I do if someone is impersonating me on Instagram? ............................ 69
10. MySpace.................................................................................................... 70
MSN Messenger ............................................................................................... 71
Changing your MSN Password ......................................................................... 71
Skype ............................................................................................................. 71
Profile Settings ............................................................................................. 71
Privacy Settings ............................................................................................ 72
To change the password ................................................................................ 73
Internet & DVD Gaming ....................................................................................... 75
The good......................................................................................................... 75
The bad .......................................................................................................... 75
Gaming classifications....................................................................................... 76
Available Games .............................................................................................. 77
Older Online Games ......................................................................................... 77
Violent Games ................................................................................................. 78
Games/Social Networking for Younger Children ....................................................... 79
Habbo............................................................................................................. 79
Club Penguin ................................................................................................... 79
Jacqueline Wilson ............................................................................................. 79
Moshi Monsters ................................................................................................ 80
Disney Superbia ............................................................................................... 80
© EyePAT Community Interest Company
Version 4.0 2014
6
www.eyepat.org
[email protected]
Using the Internet Safely
SmileyTalk ...................................................................................................... 80
Yoursphere ...................................................................................................... 80
Stardolls ......................................................................................................... 80
Child/Parent Contracts on Internet Use .................................................................. 81
Example Contracts ........................................................................................... 82
Mobiles .............................................................................................................. 84
Mobile parental controls .................................................................................... 84
Sexting .............................................................................................................. 85
Advice for Schools and Professionals who care for young people ............................ 86
Bullying ............................................................................................................. 87
Happy People Don’t Bully .................................................................................. 87
Happy Kid’s Don’t Bully ..................................................................................... 87
Cyber Bullying ................................................................................................. 88
Instant Messaging/Text Messaging/e-mail harassment....................................... 88
Web Sites and Social Networking Sites ............................................................ 89
Sending Pictures through E-mail and Mobile Phones .......................................... 89
Impersonation .............................................................................................. 89
Sending Malicious Code.................................................................................. 89
Sending Porn and Other Junk E-Mail and IMs .................................................... 89
Blogs ........................................................................................................... 89
Stealing Passwords........................................................................................ 90
Internet Polling ............................................................................................. 90
Trolling ........................................................................................................ 90
How would you know if your child is being bullied ............................................. 90
I am an adult and I am bullying what can I do? ................................................ 91
I am a child and I am bullying what can I do? ................................................... 91
How would you know if your child was a bully ................................................... 92
Why should I do something ............................................................................ 92
How can you prevent or stop bullying .............................................................. 92
Grooming and online child abuse? ......................................................................... 94
Why child sex abusers like to use the internet to contact children? ......................... 94
What are children at risk of? .............................................................................. 94
Children at specific risk ..................................................................................... 95
Tips to keep your children safe on the internet..................................................... 96
What to do when abuse takes place? .................................................................. 97
Parental Controls and Privacy Settings ................................................................... 99
Communication - It’s an essential part of the process ........................................... 99
© EyePAT Community Interest Company
Version 4.0 2014
7
www.eyepat.org
[email protected]
Using the Internet Safely
For filtering to Work ......................................................................................... 99
Overblocking ................................................................................................. 100
Technology.................................................................................................... 100
The 5 levels of filtering. .................................................................................. 100
Whitelist filters............................................................................................... 101
Blacklist filters ............................................................................................... 101
Webcams ...................................................................................................... 101
Filters - ISP [Internet Service Providers] .............................................................. 102
Filters - Routers ................................................................................................ 103
Netgear ........................................................................................................ 104
BT Homehub.................................................................................................. 105
Web blocking .............................................................................................. 105
Instant messaging....................................................................................... 105
Time limits ................................................................................................. 105
Email blocking ............................................................................................ 105
Social networking........................................................................................ 105
Program blocking ........................................................................................ 106
Usage reporting .......................................................................................... 106
Instant alerts.............................................................................................. 106
DrayTek ........................................................................................................ 106
Staff Internet Abuse - A real cost to your business ............................................. 106
Top 5 Personal Internet Uses for Employees ................................................... 107
DrayTek Web Content Filtering ..................................................................... 107
Filters - Device - Operating Systems .................................................................... 108
Windows 7 .................................................................................................... 108
To turn on Parental Controls for a standard user account ................................. 109
Setting up Windows Life Family Safety .............................................................. 111
Windows 8 .................................................................................................... 113
Apple Mac ..................................................................................................... 115
To create a user account:- ........................................................................... 115
Managed with Parental controls Accounts ....................................................... 115
Filters - Device - Commercial Software ................................................................ 116
Parental Control Software................................................................................ 116
The Utility Warehouse Packages ....................................................................... 117
My Secure PC from Utility Warehouse ............................................................... 118
Filters - Device - Tablet ..................................................................................... 120
iPAD Applying Safety Controls.......................................................................... 120
© EyePAT Community Interest Company
Version 4.0 2014
8
www.eyepat.org
[email protected]
Using the Internet Safely
Disabling In-App Purchases on iOS and Android Devices ..................................... 123
Disabling In-App Purchases on Android Devices ................................................. 124
Filters - Device - Mobile ..................................................................................... 125
Mobile Phone Operators Parental Controls ......................................................... 125
iPhone Controls .............................................................................................. 129
Filters - iPod ..................................................................................................... 130
Filters - Device - Gaming.................................................................................... 132
XBox 360 - Parental Controls ........................................................................... 132
Xbox 360 Netflix ‘Just For Kids’ User Interface ................................................... 135
Wii Parental Controls ...................................................................................... 136
Filtering - Search Engines [Browser] .................................................................... 140
Firefox .......................................................................................................... 140
Firefox Family Safety ................................................................................... 140
Yahoo SafeSearch .......................................................................................... 141
Changing your SafeSearch filter .................................................................... 141
SafeSearch Lock ......................................................................................... 141
Google Chrome Family Safety .......................................................................... 141
Chrome......................................................................................................... 143
Bing Safe Search............................................................................................ 144
Internet Explorer 11 ....................................................................................... 145
Kid Safe Search Engines ................................................................................. 147
Microsoft and CEOP create child-friendly version of IE9 .................................... 147
Ranger Browser – A Safe Browser for a Child’s iPhone, iPad or Android .............. 148
Safari ........................................................................................................... 151
Filters - Applications ......................................................................................... 152
You Tube Safety Mode .................................................................................... 152
Use YouTube Privacy Settings ....................................................................... 153
History............................................................................................................. 154
Internet Explorer History................................................................................. 154
Deleting the History .................................................................................... 154
Google Chrome History ................................................................................... 155
In Private Browsing ........................................................................................... 157
IncognitoGone - overrides InPrivate Browsing .................................................... 158
Google Alerts .................................................................................................... 161
Tracking & Monitoring Software .......................................................................... 162
uKnowKids Software Review ......................................................................... 162
Screen Retriever Review and Installation ....................................................... 165
© EyePAT Community Interest Company
Version 4.0 2014
9
www.eyepat.org
[email protected]
Using the Internet Safely
Facebook Monitoring Solutions for Parents ..................................................... 170
Mamabear Parental Monitoring App Review .................................................... 171
Internet Cookies ............................................................................................... 175
Passwords and Online Security - Top Tips............................................................. 176
Malware and Spyware [Scumware] ................................................................... 176
Malware Software ....................................................................................... 176
Spyware Software ....................................................................................... 176
Anti Virus and Parental Controls ....................................................................... 176
System Cleaners ............................................................................................ 177
WIFI in open space......................................................................................... 177
Passwords ..................................................................................................... 177
Homework Sites ................................................................................................ 178
Text and MSN abbreviations ............................................................................... 182
Dictionary of terms used in chat rooms ................................................................ 185
Dictionary of Sexting terms ................................................................................ 190
Internet Chat and Drug Lingo ............................................................................. 192
Emoticons ........................................................................................................ 193
Evidence - How to Save ..................................................................................... 196
From a laptop or computer .............................................................................. 196
From a Tablet ................................................................................................ 196
Android 4.0 (Ice Cream Sandwich): Hit the Power and Volume Down Button
Simultaneously ........................................................................................... 196
From a Mobile ................................................................................................ 197
Use Your Phone's Built-in Shortcuts ............................................................... 197
Install an App for Screenshots ...................................................................... 197
Use the Android SDK ................................................................................... 197
Samsung Mini Phone ................................................................................... 197
© EyePAT Community Interest Company
Version 4.0 2014
10
www.eyepat.org
[email protected]
Using the Internet Safely
Introduction
About this Guide
This Information Guide can be used as a stand alone book. However it has primarily
been designed to work alongside the internet safety sessions EyePAT run. It contains
information on how to use the internet safely.
This guide is not definitive as things change very quickly on a regular basis. If you can
think of any topics which are not covered, or have any ideas for inclusion please contact
us by email on [email protected].
About EyePAT
EyePAT is a Not for Profit (CIC) Community Interest Company dedicated to keeping
children, young people, vulnerable adults and adults safe online and free from bullying.
All our profits go back into EyePAT in order to help us develop and deliver the online
safety and anti-bullying training. Funds permitting we provide free workshops for specific
groups.
We have a team of unpaid Directors and Members see www.eyepat/aboutus. This
team is made up of Head Teachers, Teachers, from primary, secondary, state and
private schools. Members of the Police Force, Health Services, Financial and Marketing
experts, all of whom provide their time and expertise free. Our current Chair is Mr Derek
Thomas, Head Teacher, Murch Junior School. Penny Steinhauer is the Operations and
Training Director and can be contacted on [email protected].
Eye PAT provide training for:





Teachers and School Staff
Care & Health Workers (Foster Carers, Social & Youth Workers, Nursery Workers
and Childminders)
Parents [Adopted and birth]
Pupils
Businesses and organisations
We teach internet awareness of:







Sexting
Cyber bullying and Trolling
Unsuitable content
Violent Gaming
Grooming
Identity Theft
Business and personal reputation
We run anti-bullying workshops for Adults and Young People called:


Happy People Don’t Bully [bullying in the Workplace]
Happy Kids Don’t Bully [bullying in Education]
We provide:

This extensive Online Safety Guide
© EyePAT Community Interest Company
Version 4.0 2014
11
www.eyepat.org
[email protected]
Using the Internet Safely



Instructor Led Sessions
Courses and materials to purchase and run yourselves
Bespoke workshops
Public speaking:
We are happy to speak at events, conferences etc. online safety or bullying and normally
only charge our travelling costs.
TV and Radio
Penny has appeared on a number of Radio programmes to discuss bullying and online
safety, including BBC Radio 1 and Radio 5 Live. She has also been interviewed on TV to
discuss specific news stories.
This can be done in person or by telephone.
Please contact [email protected]
Contact Us
This guide has been created by EyePAT Community Interest Company. Training sessions
are run throughout the UK. If you are interested in running a session or require further
information please get in touch.
For current information check www.eyepat.org email [email protected] or ring 01446
795055.
Follow us on Twitter: @Eye_PAT
Like our Facebook page: Eye PAT Internet Safety
Please support our Facebook campaign: Block Online Porn for Kids
Follow our blogs:
antibullyingtraining.wordpress.com
internetsafetytraining.wordpress.com
The information in this guide has been sourced from a variety of sources.
Last updated February 2014.
Please Note: You have purchased this guide for personal use only. You are permitted to print copies for your
personal use only. You are not permitted to print, duplicate, copy or sell the CD or make additional copies for
any other reason.
Additional copies are available from http://www.eyepat.org/BuyOnline.
Whilst every attempt is made to ensure the information in this guide is accurate and up to date with the ever changing techno logy EyePAT cannot
be held responsible for any subsequent changes.
© EyePAT Community Interest Company
Version 4.0 2014
12
www.eyepat.org
[email protected]
Using the Internet Safely
The Internet - an introduction
The internet can be accessed by PC’s, laptops, tablets, mobile phones, games consoles,
Kindle, etc.
It is a wonderful and amazing tool for obtaining information about almost anything you
want or need to know about. Children (and Adults) have at their finger tips the most
extensive encyclopaedias available which can be invaluable in their studies.
For most school children, they can register at their local library for online access to the
Encyclopaedia Britannica which they can then access from home.
It provides unequalled communication packages enabling children (and adults) to talk
across not only countries, but continents for little or no cost. They can share pictures and
speak live using webcams. They can view movies and listen to music.
Monitored properly it is an extremely useful tool and is now almost an essential study
tool. Schools (from primary upwards) and universities use it as part of their study
programmes.
For those parents who do not have their own computers, links to the internet facilities
are normally available at libraries, cyber cafes etc.
However, as the internet is open to everyone who has access, there are risks.
Depending on the site you are on, eg Wikipedia, remember not everything you read on
the internet is true – anyone can post anything – make sure you check your sources
before taking information as fact.
It is extremely rare for financial institutions like banks to contact you via email and if
they do they never ask you to click on a link or provide your password or personal
details. These are always scam [phishing] messages designed to get you to release data
so they can access your bank account. Never respond to them.
Never open attachments with a .exe tag or .zip unless you are 100% certain who has
sent it. These files are regularly used to transmit viruses.
Recently there have been a spate of messages purporting to be from the Inland Revenue
saying you have a tax rebate. These are also scams, just very clever ones as the email
address it is sent from is @hmrc.gov.uk. The earlier ones were easier to spot as they
used @hrmc.gov.uk.
Simple answer to this problem, never click on any link from anyone who is in any way
suspicious. If you are unsure ring them to check and look their phone number up, don’t
just accept the one on the web site.
© EyePAT Community Interest Company
Version 4.0 2014
13
www.eyepat.org
[email protected]
Using the Internet Safely
Stories known as “urban legends” and “virus threats” can be sent to you by e-mail by
well meaning friends telling you to pass them on to everyone in your address book.
Many of these are hoaxes.
A good way to check before sending them on is to go to
http://www.symantec.com/norton/security_response/threatexplorer/index.jsp.
They list all the current threats and whether they are real or not.
© EyePAT Community Interest Company
Version 4.0 2014
14
www.eyepat.org
[email protected]
Using the Internet Safely
Online Terminology
Digital footprint?
A digital footprint is the data trail left by a person’s online activities including the use
of TV, mobile phone, the World Wide Web, the internet, databases and other connected
devices and sensors.
Digital Footprints provide data on what you clicked on, searched for, Liked, where you
went, your location, your IP address, what you said, what was said about you.
This data can be used by companies and organisations to contact you online. It is used
for behavioural targeting, behavioural economics, personalisation, targeted marketing,
digital reputation, social influence and other social media or social graphing services.
In social media, a digital footprint can refer to the size of a person's "online presence"
measured by the number of individuals with whom they interact.
It can have an enormous impact on people’s lives and for young people goes far beyond
anything they can imagine.
We need to help young people understand how to make good choices online and how to
be responsible about their digital footprint.
Shredding
Shredding is a new internet craze where amateur singers sync their not-so-perfect vocals
and playing skills with videos of well-known artists.
A 'shredded' version of The Beach Boys’ classic ‘I Get Around’, uploaded by user
Massbetelnut, has already attracted over 1.6million hits on YouTube.
And the trend is spreading quickly, with takes on Metallica, Nirvana, Muse and even
Michael Bolton popping up on the video-sharing site. Some of the videos have been
online for months, but are now rapidly growing in popularity.
The name refers to heavy metal-style guitar playing and the word’s literal meaning.
Users strip the songs back to their bare minimum and then add an amusing twist, such
as over-exaggerated handclaps, detuned guitar strums or vocals like cat fights.
Ratting
One thing you need to be specifically
aware of is Ratting. One type of spyware
becoming increasingly common is known
as a RAT (Remote Access Trojan), which
criminals can use to access your computer
or mobile device to take control of it to
obtain your private information or spy on
you. This is known as ratting.
RATs are usually downloaded invisibly with
a program requested by you – for example
a game – or sent to you as an email attachment. They can perform actions similar to
legitimate software. RATs can be difficult to detect because neither do they usually show
© EyePAT Community Interest Company
Version 4.0 2014
15
www.eyepat.org
[email protected]
Using the Internet Safely
up in lists of the programs or tasks you are using, nor can you generally notice that they
are affecting your device’s performance.
RATs being used to take control of webcams is becoming increasingly common, with the
objective of the resulting video or images being used for blackmail or other inappropriate
purposes
Photobombing
The process of jumping into someone else’s photo. It is
normally done just for fun. This is a classic example:
Photoshopping
Taking a photo and altering it using packages
such as Photoshop. In this example Kenyan
senator has been caught photoshopping a
Nelson Mandela picture with Mohammed Ali
and replacing Ali with himself.
Photoshopping is often used in bullying as
photos can be altered with malicious intent.
Selfies
Taking your own photo with a camera or mobile phone. Most teenagers seem to
spend most of their time taking Selfies,
both camera and video.
This is probably the most famous selfie
with David Cameron, Barrak Obama and
Denmark's Prime Minister at Nelson
Mandela's Memorial Service.
See the films page on our website for a
short film on fun Selfies.
www.eyepat.org/films
© EyePAT Community Interest Company
Version 4.0 2014
16
www.eyepat.org
[email protected]
Using the Internet Safely
Why do we need to learn online safety?
One of the big problems school’s face is getting parents to attend online safety events.
They don’t turn up because they don’t understand how bad it is out there, but these are
the parents who really need to be there, as they are often the ones whose children are
at most risk!
Putting things in perspective
Latest figures released by BBC on 11th February 2014 - Internet Safety Day are:
UK Safer Internet Survey results:
43% of parents of 11-15s have spoken to their child about online pornography
35% of parents of 11-15s have spoken to their child about sexting
67% of parents of 11-15s have spoken to their child about meeting strangers on the
internet
YoungMinds results:
More than a third of under 18s have accessed porn on a smart phone or tablet. Almost
half of people under 25 have watched porn on a mobile device. Of those, 21 per cent
said they were disturbed by what they saw and 50 per cent said they were excited. The
poll also shows more than half of 11-14 year olds who'd watched porn online said it had
affected their relationships.
BBC Learning results:
A survey by BBC Learning shows that almost 1 in 5 children who use tablets or
smartphones have been upset by something they've seen on them in the last year and
almost half of these were worried by sexual content or 'rude things'. This is double the
figure that parents thought - and the majority of children are using their tablets and
smartphones alone.
Two-in-five had experienced people being unkind about someone that they know, while a
similar proportion had experienced unkindness themselves.
Among children who had seen something to upset them on their tablet, almost half had
been worried by 'rude things' and two-in-five by scary or violent content.
A quarter had experienced bullying and a fifth were upset by contact from strangers.
Prevalence of bullying was higher among children aged 13-16 than those aged 8-12.
The internet is a wonderful tool
Almost anything can be found on it. It has totally changed the way we both live and
work. However it has brought with it many challenges which we did not have 10 or even
5 years ago and its essential we all learn how to keep safe online, whether to protect us
personally or professionally or our families.
© EyePAT Community Interest Company
Version 4.0 2014
17
www.eyepat.org
[email protected]
Using the Internet Safely
Used safely and responsibly the internet opens up no end of possibilities. However it
does not come without many problems. It has to be remembered the original design of
the internet was as a communication tool for businesses so it was never built with the
safeguards for private and family use.
We are not scaremongering, neither are we prudish or puritanical. The internet was built
as a totally open communication tool for professional adults, hence no restrictions. Its
market was never children.
This is what is out there:
Unsuitable Sites
If you do not apply the appropriate blocks, it is likely your children will encounter
inappropriate materials this will damage or at the very least affect their minds.
In October 2013 a programme was shown by Channel 4 called Porn on the Brain
which, albeit on a small sample, showed proof that Porn Addiction is as real as Alcohol or
Drug addiction. The study was undertaken by Cambridge University Neuroscience
Department.
Without restrictions anyone can access the most horrifying and horrendous violent and
sexual images. They can link up to extremist sites and can join groups of likeminded
individuals, whether they be anorexics, terrorists, drug users etc.
To largely prevent this you can apply age appropriate parental controls which are now
available from some ISP’s (Internet Service Providers), through some Routers and via
Parental Control Software. Every family with children under the 18 should have these.
See Page 99 .
However applying controls is not enough. Communication between adults, teenagers and
children is an essential part of the safeguarding process.
Sexting
Young people are involved in or have experienced Sexting and this is growing at an
alarming rate. There is no “type” of young people who do this and there are many
reasons they do it. Once an image has been sent control is lost. CEOP list this as one of
the main problems. It now has its own name SGII (Self Generated Indecent Imagery).
Bullying
Nearly half (49%) of all school age children are now bullied, and 34% of children are
being cyber-bullied. The problem is getting worse and bullying can have devastating
consequences.
Workplace bullying has doubled in the last 10 years and is costing the country £billions
in lost productivity and staff absence. 1 in 3 adults now experience bullying and 80% of
victims said the abuse had affected their physical and mental health. 33% had decided
to take time off, or even left their jobs as a result.
Trolling
Is one of the latest sick trends. This involves sending or posting sick or abusive
messages onto sites, often remembrance sites or social networking sites, of people who
have died.
It has also now extended and covers abusive messages sent to individuals, celebrities
etc. One such example was at the Olympic Games of 2012, when Tom Daley was ‘trolled’
when he missed out on the medal, with people posting and tweeting messages saying
“his dead father would be ashamed of him”!
© EyePAT Community Interest Company
www.eyepat.org
18
Version 4.0 2014
[email protected]
Using the Internet Safely
There is nothing positive about trolling, however those that do it can have emotional or
mental health problems.
Grooming
Is the one threat most parents are aware of. When it happens it can have devastating
and far reaching effects and there is no doubt that the internet (especially Social
Networking) has become an extremely useful tool for paedophiles to contact children.
There is a lot of information in this guide on this subject. It is well to remember though
that by far the vast majority of grooming takes place face to face rather than over the
internet.
Violent Gaming
Gaming on the internet is brilliant, both for children and adults. The games can stretch
and develop a child’s mind in many ways. However this can be bad as well as good. This
is why games, like films have an age rating. Please don’t ignore these ratings. Violent
online gaming is changing the behaviours and brain mapping of young people.
Identity theft
How many people display their date of birth on social networking sites? What is the first
question, and sometimes the only one, you are normally asked to establish your
identity?
Identities can be stolen in many ways. As an adult you may not release private
information easily, however are your children as aware?
You can now be identified by face recognition software and from this there are very
clever people who can access information you have entered on line. See our advice on
Passwords on Page 162.
Mobiles (Smartphones) and Tablets
Are the norm, they now have internet access (with all the associated dangers), cameras
and many apps.
Most people have had photographs taken of them on mobiles which they don’t like.
These images can now be passed around hundreds or thousands of people in a matter of
seconds.
The internet is here to stay and if you learn how to use it safely and teach your children
the same thing, it is an amazing tool.
Technology is not bad, it is the way it is used which can be bad. It is our future
and we need to encourage people to use it. We just need to make sure we use it
safely.
In the same way as you need to learn to swim, ride a bike or drive safely you
need to learn to use the internet safely.
© EyePAT Community Interest Company
Version 4.0 2014
19
www.eyepat.org
[email protected]
Using the Internet Safely
How can the internet affect your children?
The following is a must read for anyone with children under the age of 16 and advisable
for anyone with young people under the age of 25. It explains how our online behaviours
can change our real world behaviour and how it can even change our brain development.
You may need to read it 2 or 3 times to totally understand it, but please do so. It is most
definitely worth it.
This extract is taken from the Bryon Review – Children and New Technology by Dr.
Tanya Byron, Consultant Clinical Psychologist – March 2008. To see the full report go to
http://www.dcsf.gov.uk/byronreview/
It in turn is sourced from “Brain development in Childhood: A literature review and
synthesis for the Byron Review on the impact of new technologies on children, by Mark H
Johnson, MRC Scientific Team Leader, Profession of Psychology, Birkbeck, University of
London. Director: Centre for Brain and Cognitive Development.”
Brain development takes place throughout childhood, developing ‘neural networks’
connecting different parts of the brain together as it grows and a significant change in
the amount of technology used during childhood, could potentially have a big impact on
how the structure and function of the brain develops. A major concern relating to video
game playing is whether children learn anti-social or violent behaviour from the games
they play. How much could children learn from inappropriate content or behaviour online
or in video games?
This could be positive (learning how to care for animals from playing a zoo-keeping video
game) or negative (learning how to victimise someone from playing a war game) and
depends also on the context of the experience (e.g. playing violent games within a
household where violence is the norm). Children’s expectations about the world may be
changed by what they see or experience online or in games
The implication is that if a child has had frequent experiences of playing a game, it is
possible that the brain will set up an ‘expectancy’ to act in the real world in the same
way that they act in their virtual world. However, whether this then generalises to their
real world behaviour is unknown.
One of the systems they use to make sense of other people’s actions is the “mirror
neurone system”. One of the earliest findings from research into mirror neurones is that
they are only activated when a human hand (versus a mechanical hand) grasps an
object (Tai et al, 2004). When we think about how children might learn from what they
see in a game or on the internet we need to consider whether the ‘agent’ (person or
cartoon) on the screen is perceived as ‘human’ by the brain. As graphics become more
real-life it is possible that these forms of learning, previously activated only by the real
world, will be activated. The implication is that media that requires active responses
(rather than simply passively viewing) is likely to have a more profound influence on the
children’s development. This could be beneficial (hand-eye coordination skills) or
negative (learning to use violence) – again, other factors such as the age and social
context of the children would be important determining factors here.
One of the key ways children learn about emotions, feelings and moral transgressions is
by discussing feelings, emotions and behaviour (usually in the family context). It could
have a detrimental impact if these discussions do not take place and are replaced by
excessive exposure to potentially inappropriate material that is not then discussed.
The nature of the experience during a video game might be very important in
determining children’s subsequent behaviour; although quite what the long-term impact
of this might be, or what other factors in the child’s individual make-up or experience
modulate this learning mechanism, is unclear and needs to be considered.
© EyePAT Community Interest Company
Version 4.0 2014
20
www.eyepat.org
[email protected]
Using the Internet Safely
However, it does appear that violent content may lead to sustained learning about
violent behaviour in children where violence is the norm (the game playing reinforcing
and validating real world experiences). More research is needed to clarify this so that we
can identify which children are more vulnerable.
Other concerns about the role of harmful or inappropriate material in technology is how
children use online or virtual information or experiences to develop a sense of self – the
inner working model of ourselves which drives how we think and feel about ourselves
and in turn affects how we behave (e.g. emotional regulation, impulse control, self
monitoring).
There is clear evidence of harm within the virtual world when vulnerable children with a
poor sense of self and low self esteem are ‘seduced’ and flattered by others who
represent themselves falsely within the virtual world (e.g. online predators pretending to
be children) (CEOP, 2007).
There are examples where the very vulnerable may access information and even
persuasion by others which may encourage them or even lead them to harm themselves
(suicide websites; pro-anorexia sites etc.). The online space can provide a supportive
environment and de-stigmatise the discussion of mental health or emotional difficulties
and enable those in distress to find sources of advice and support. However, what is
clear is that there exists a significant probability of risk for some individuals with mental
health and other vulnerabilities who engage with such material online.
How does a child’s brain work
Thinking about children’s age and stage of development is a
useful way of establishing general guidance on how to support children’s internet and
video game experiences. Children’s rate and profiles of growth vary enormously between
each other so while it is possible make broad statements, there will always be variations
with individuals.
One potentially very important set of robust findings relates to the development of the
front part of the brain – the ‘frontal cortex’ – the ‘intelligent’ part of the human brain.
This is the part of the brain that enables us to plan and organise, to have conscious
strategic control over our thoughts, feelings and behaviour and to choose between good
and bad, fantasy and reality. It also plays a key role in enabling us to override, suppress
or inhibit behaviours, such as unacceptable social responses.
The frontal cortex develops throughout childhood and into early adulthood and therefore
children with immature and developing frontal cortex structure and functioning are less
efficient at reasoning because they have yet to develop their critical evaluation skills
(how to judge information based on context), are worse at inhibiting irrelevant
information and also do not regulate their social behaviours well. Moreover, there is
recent evidence that adolescence (post puberty) is a time of enormous growth and
development of the frontal lobes.
One very important way to think about how to support children with the management of
‘harmful’ or ‘inappropriate’ material online and in video games is to look at the
© EyePAT Community Interest Company
Version 4.0 2014
21
www.eyepat.org
[email protected]
Using the Internet Safely
development of their frontal cortex. This is because the functioning of frontal lobes
enables us to make sense of the world and make judgments about our behaviour and
the behaviour of others, as well as differentiating between reality and fantasy.
So when we think about ways of making children safer online and in their gaming –
whether that’s through industry making the environments safer or parents being
supported to use the tools available to them – it is as if we are stepping in to provide the
necessary frontal cortex functions that enable children and young people to manage
risks at different ages and stages of development.
This approach acknowledges that children at different ages and developmental stages
have varying abilities in making sophisticated judgments about information such as the
credibility of a source or whether something is morally or socially appropriate.
These systems are not in place in the brain during early childhood and develop over time
into early adulthood. Just as we perform these functions for our children in the nondigital world, such as when helping them cross the road, we need to do this when they
use the internet and play video games.
What to do at what age?
Pre-school is a time when children are still very much focused on the family and the
home. Key to children’s development at this time is forming relationships with key
adults. These children are more vulnerable to content e.g. violent, frightening, sexual or
highly emotional as their ability to differentiate between reality and fantasy is very
limited. It is imperative that their access to the online world and video games is robustly
monitored and supervised. Their “technological diet” needs to be restricted, in terms of
what they should access, watch, play, when, and for how long.
5-11 years - during this time children start school and begin to make bigger shifts in
how they relate to others outside the family there frontal cortex is developing. They are
learning what is right and wrong, learning about social rules and norms, sorting
out reality from fantasy. They are still immature at self-regulation, and their ability to
inhibit and control impulses and emotions is still well below that observed in adults. This
is the time when children begin exploring websites beyond the boundaries originally set
for them by their parents and also when they start playing a wider range of video
games.
Critical evaluation and self regulation skills are still relatively poor due to their
underdeveloped frontal cortex, therefore adults need to provide support with these
functions for the child – allowing them to explore but at the same time regulating,
managing and restricting. Management of their media diet should start to change,
moving from heavy control to management by supervision and increasing discussion
about online and gaming behaviour. This enables the child to develop their own critical
evaluation and self management skills as well as being supported when they cannot or,
as in the case of the older children in this age band, choose not to.
11-14 years - The onset of puberty marks the beginning of a time during childhood
which is characterized by lots of brain and behavioural change. Adolescence is often an
unstable and emotional time when young people become vulnerable to the challenges
presented by the hormonal, physical and mental changes taking place. During this time
there is a significant drive for social interaction. The focus of the child’s social world
changes from the home and family to the external world, to peers and idols. This may
involve taking risks. Peer communication becomes a central part of adolescent behaviour
due to this drive for social interaction as young people attempt to find their own sense of
who they are in relation to others. There is some evidence that social networking sites
© EyePAT Community Interest Company
Version 4.0 2014
22
www.eyepat.org
[email protected]
Using the Internet Safely
offer teenagers a place to test various adolescent behaviours or to take ‘safe’ risks
(Livingstone, 2008).
Along with these changes comes an increased vulnerability to mental health problems
and susceptibility to poor self-esteem. Young people at this age may become more
vulnerable to messages about social acceptance including issues relating to body image
– this is a time with a significant increase in problems such as eating disorders, low selfesteem or depression.
There is an inherent drive at this age to seek out social experiences, access to age
restricted material and experiences such as video games which are designed for adults
These are more likely to be sought in the digital world as we restrict children’s and
young people’s access to the outdoor, offline socialisation.
There are biological drives and underpinnings to these changes in behaviour and we
need to respect and allow those while, at the same time, putting in place protections for
their vulnerabilities. In terms of adult input with the young person and technology, this
is a time to move towards collaborative management. Young people may evade and
rebel if parents are heavy handed at this stage. The aim is to protect them from some
content or experiences whilst empowering them by discussing risk.
15-18 years old - This period is the last stage of what we consider ‘childhood’, when
young people may still be the responsibility of their parents, but are also viewed as
young adults.
During this time, young people want to be seen as individuals and explore roles and
identities with a degree of autonomy and are often able to do this independently. They
can initiate and carry out tasks without supervision and can see themselves from the
viewpoint of others. By this stage their brain functioning is extremely close to that of an
adult and so they can master abstract thinking and develop theories to explain and make
sense of things. There are no longer the inherent restrictions of brain development that
lead to difficulties with evaluating information or making judgments. Indeed, young
people at this stage are beginning to develop their own set of values and beliefs (which
may be different from their parents).
Effective online management at this stage will involve providing opportunities for them
to explore and try different roles and identities while offering non-judgmental support in
the form of talking, discussing and supporting. At this stage young people need to begin
to make decisions for themselves and test things out while still having relationships in
place with e.g. parents, family members or friends to support them if opportunities turn
out to be too challenging.
Interestingly, much of the innovation and development of the new technologies and
games is done by people of this age.
Conclusion
When we teach our children to cross the road safely we do it in stages.
1. We hold their hand when they cross the road.
2. We teach them to think, look both ways and then cross.
3. When we see that they are starting to understand this we let them cross, walking
beside us, without holding on to them.
4. Eventually we let them do it alone, maybe watching from a distance at first, but
then unsupervised.
And throughout this, the environment supports them with signs and expected behaviour
from others in the community – the green man, zebra crossings, speed limits and other
responsible adults. Going online and playing video games may be more complex and
© EyePAT Community Interest Company
Version 4.0 2014
23
www.eyepat.org
[email protected]
Using the Internet Safely
diverse than crossing the road, but it illustrates that we should change the nature of our
approach and interventions
End of extract from - Children and New Technology by Dr. Tanya Byron, Consultant
Clinical Psychologist – March 2008. To see the full report go to
http://www.dcsf.gov.uk/byronreview/
Internet Addiction
Many thanks to Yoursphere.com for providing this information
“Addiction to the Internet shares some of the negative aspects of substance addiction
and has been shown to lead to consequences such as failing school, family, and
relationship problems.” Go to www.eyepar.org/research to see the full study.
We live in a much more connected world today than we did even five years ago. Today’s
Smartphones are more powerful than computers were a decade ago. We’re constantly
connected with each other, tweeting, posting, updating statuses and uploading photos,
and we see the addiction to this social media everywhere.
For children, however, they quickly get sucked into the idea that their online friends
need to know what they’re doing or thinking at all times, and that this information is
actually important.
Social media is a participatory media where a site’s members create the content and/or
push traffic to the site versus just consuming the content that’s put before them. Today’s
popular social media sites aren’t only participatory, though, they actually put a heavy
emphasis on features that promote instant gratification: Likes, thumbs up, +1’s,
retweets and comments are all examples of this. Engaging in this behaviour almost
becomes automatic for children and teens as they whip out their Smartphones every few
minutes just to see if anyone has liked or commented on whatever they posted.
Studies have shown that social media sites such as Facebook and Twitter can be more
addictive than cigarettes and alcohol. A team from the University of Chicago’s Booth
School of Business recently conducted a survey of 250 people which found that “the
urges to keep on top of social networks and work were the hardest to resist” and “In
contrast alcohol and tobacco prompted much lower levels of desire despite their
reputation for being addictive.”
Wilhelm Hofmann, the leader of the team, suggests people may fail to resist social media
so much because there is no obvious or immediate downside to checking services like
© EyePAT Community Interest Company
Version 4.0 2014
24
www.eyepat.org
[email protected]
Using the Internet Safely
Twitter or Facebook. He does warn that these services can ultimately be a huge drain on
users’ time, however.
The big downside to today’s popular social networking sites is that they encourage
children to engage in repetitive, unoriginal activity in exchange for rewards such as Likes
and comments. The activity doesn’t stimulate them; it instead feeds into an attentionseeking state of mind.
To help minimize the chances of Internet addiction affecting your children, we
recommend:
1. Keeping laptops/computers in the family room and away from the bedroom,
especially at night. Not only will this set the boundaries for when and where it’s
OK to use the computer, it allows you to monitor and regulate the amount of time
your child spends online.
2. Making time for outdoor activities. Establishing a healthy balance of online time
with outdoor time is a great way to minimize Internet addiction. Being outdoors
with family and friends reminds children that there’s more to life than status
updates and tweets.
3. Computer monitoring is a parental responsibility. Some people call it helicopter
parenting, others call it spying, but the bottom line is parental monitoring
software helps ensure that your child is having a safe and positive experience
online.
© EyePAT Community Interest Company
Version 4.0 2014
25
www.eyepat.org
[email protected]
Using the Internet Safely
Inappropriate Sites
Much is written about porn sites and the very real effects they have on young people.
Porn Addiction is now a recognised addiction. On-line porn has become far more extreme
in the 5 years since we started raising awareness of it.
Parents and carers need to visit these sites in order to understand exactly what their
children are viewing and how this can impact on their sexual attitudes and expectations.
It will not be a pleasant experience as very little of it can now be considered erotic.
To sum it up, it makes 50 Shades of Grey look like Disney.
Porn Sites
Very few adults actually realise the level of depravity of online porn accessible without
restriction to any age group.
These sites include various genre’s including “Mother & Daughter”, “Anal When She is
Drunk”, “Outstanding Teen Sex Skills”.
Sites regularly visited by young people include PornHub, JuggWorld.
Viewing Inappropriate Images on Mobiles
Young people can and do access content from the internet and TV wherever they are,
and without parental or teacher supervision. Young people use them at school to view
pornography and other inappropriate sites.
Parents fear porn on children's mobiles
Daily Telegraph - 10th October 2012
More than two-fifths of parents are worried that their children can access unsuitable
content online on their mobile phones, research has found.
95 per cent of 11-13 year olds have a mobile
phone, according to new research
According to a new survey, more than half of
all children get their first mobile phone before
the age of 11 but almost a third of parents are
unaware of online safety tools that can prevent
their children from seeing inappropriate
content, such as pornography, gambling or
other adult material.
Though mobile networks do automatically block access to adult content via their own
networks, the Wi-Fi capabilities on modern smartphones mean that children often do
have access to inappropriate material. Forty-two per cent of parents said they were
concerned about their children's access to unsuitable material, according to a survey for
Phones4U.
One in eight said they felt they had no control over what their child accesses online on
their phone, while only one in 16 parents had the same concern about their child's
computer access.
© EyePAT Community Interest Company
Version 4.0 2014
26
www.eyepat.org
[email protected]
Using the Internet Safely
The research comes just weeks after a senior board member of the UK Council for Child
internet Safety [UKCCIS] warned that social networks "cannot be trusted to protect
children online".
John Carr called for closer regulation of online brands by external organisations such as
Ofcom of in the wake of "scandals" such as the exposé of sexualised content on
children's social network Habbo Hotel.
Suicide Sites
Young people leading up to or going through puberty can have violent mood swings. It
can be a time when they contemplate suicide for a variety of reasons. The most common
reason young people take their lives is as a result of being bullied. Bullying affects nearly
half of all school children.
Unfortunately the internet can be used to investigate suicide methods. This is an
example of a site young people can easily find.
Eating Disorder Sites
There are many sites out there to encourage anorexia and bulimia. There are also sites
to support people who are victims of eating disorders.
It has flourished on the Internet, mainly through tight-knit support groups centred
around web forums and, more recently, social network services such as Tumblr, Xanga,
LiveJournal, Facebook and Myspace These groups are typically small, vulnerable, partly
hidden and characterized by frequent migrations. They also have an overwhelmingly
female readership and are frequently the only means of support available to socially
isolated anorexics
© EyePAT Community Interest Company
Version 4.0 2014
27
www.eyepat.org
[email protected]
Using the Internet Safely
Members of such support groups may:










Endorse anorexia and/or bulimia as desirable (84% and 64% respectively in a
2010 survey
Share crash dieting techniques
Coach each other on using socially acceptable pretexts for refusing food, such
as veganism
Compete with each other at losing weight, or fast together in displays of
solidarity.
Commiserate with one another after breaking fast or binging.
Advise on how to best induce vomiting, and on using laxatives and emetics.
Give tips on hiding weight loss from parents and doctors
Share information on reducing the side-effects of anorexia
Post their weight, body measurements, details of their dietary regimen or pictures
of themselves to solicit acceptance and affirmation
Suggest ways to ignore or suppress hunger pangs
These sites can also be called thinspiration sites.
Sites include:
http://perfectioninana.webs.com/tipsandtricks.htm
http://www.myproana.com/index.php/blog/946-skinnywarriors/
Drug Sites
The internet is an information tool and it contains lots of information of how Not to Do
Drugs as well as information and blogs from people who have tried and liked drugs.
Two sites you may want to check out are:


http://www.talktofrank.com
http://www.interdope.com/amazing.htm
Terrorist Sites
These are readily available with little research. I found Wikipedia gave me a good
starting point, by listing all the terrorist organisations on the US State list with links to
their websites.
Very good for those wishing to find out more and research other religions and cultures.
An easy stepping stone for those who wish to find out more about specific groups.
Snuff Movies
A snuff film is a motion picture genre that depicts the actual murder of a person or
people, without the aid of special effects, for the express purpose of distribution and
entertainment or financial exploitation.
These films are illegal as are Child Abuse images, but there are available on the internet
and can be shared on peer to peer networks.
© EyePAT Community Interest Company
Version 4.0 2014
28
www.eyepat.org
[email protected]
Using the Internet Safely
Blogging
As with all internet activities there is nothing wrong with blogging as long as it is done
safely and without causing harm or distress to others.
These are 2 of the most popular blogging apps. Tumblr is especially popular with young
people and is used as a form of social networking.
Tumblr
In contrast to other blogging platforms like WordPress,
Typepad or Blogger, Tumblr is a streamlined blogging platform
that adds creating and sharing (“re-blogging”) photo, video
and audio blog posts. Of course, users can post traditional blog
articles, but what attracts the younger crowd is the ability to
create somewhat of a collage of photos, videos and quotes that
represent their individuality. As with Facebook both adults and
children can join the Tumblr community
WordPress
WordPress is a free and open source blogging tool and
a content management system (CMS) based
on PHP and MySQL, which runs on a web hosting
service. Features include a plug-in architecture and a template system. WordPress is
used by more than 18.9% of the top 10 million websites as of August 2013. WordPress
is the most popular blogging system in use on the Web, at more than 60 million
websites.
It was first released on May 27, 2003. As of February 3, 2014, version 3.8 had been
downloaded more than 16 million times.
© EyePAT Community Interest Company
Version 4.0 2014
29
www.eyepat.org
[email protected]
Using the Internet Safely
Apps
A mobile app, short for mobile application or just app, is application software designed to
run on smartphones, tablet computers and other mobile devices.
There are thousands and thousands of them, some of which are excellent and some not
so. Some apps are free, but the majority have to be bought. Do beware of the ones
which have ongoing costs through buying things for a few pence here and there. These
can add up and become expensive.
Also beware if you have a Kindle Fire. Once your card details are logged with Amazon on
the device, you can continue to download anything without further recourse to the card.
Useful if used properly, can be very expensive if abused by children and young people.
StaySafe
http://www.staysafeapp.com/
StaySafe Personal safety tracker app is your personal
guardian. The app notifies your emergency contacts by
email or text message if you don't check-in safely after
working, socialising or travelling alone, providing your
exact GPS location so that help can find you quickly.
The mobile app contains location based tracking, and
has a timer which counts down from the time you have
stated that you will be alone, say 20 minutes. The location tracking updates in real-time
as you change location, so if you are walking or getting into a taxi alone it will track your
route.
The app automatically triggers an SMS text or email to be sent instantly to your
emergency contacts, containing details of your location.
StaySafe Business provides personal protection for lone
working employees. Our smartphone app tracks location in
real-time enabling lone workers to check-in safely after
working. The online Hub receives alerts and provides
detailed location mapping for employers. For SME’s and
large organisations.
Staysafe has been recommended to us by parents who have used it to keep a track on
their children.
Parental Controls is an application that provides parents
and guardians simple options to restrict access to specific
BlackBerry functions, features and applications such as
the Browser and Text Messaging.
You can track your child's movements online
with this app from Spare Backup Inc. Website
account required. UK users:
www.mycellguardian.co.uk
© EyePAT Community Interest Company
Version 4.0 2014
30
www.eyepat.org
[email protected]
Using the Internet Safely
Mobiflock My Life is a free smart device protection
service, or upgrade to Mobiflock My Child for
parental control services (30 day free trial!) and
protect your kids from online threats such as
cyberbullying, accessing inappropriate content, sexual harassment & sexting. Mobiflock
My Life (free!) Remotely locate and lock a missing device Remotely delete device
information Block unwanted contacts.
Midon7, proactive safety. After your 15 days trial
your app will reverse to Midon7 FREE version. The
family safety tracking app for mobile can monitor
your children’s whereabouts and cell phone
activities to keep them safe.
A few which have been recommended by Anne Shooter and David Thomas for very
young children include.
My First Numberjacks
Cost £1.49
A Charlie Brown Christmas
Cost from £1.99
Thomas & Friends: Engine Activity Fun
Cost: Free
Drawing Together
Cost: £1.49
DipDap
Cost: £1.99
© EyePAT Community Interest Company
Version 4.0 2014
31
www.eyepat.org
[email protected]
Using the Internet Safely
Adventure Time Super Jumping Finn
Cost: £1.49
Others include
BBC i-player
Cost: Free
ITV Player
Cost: Free - but still makes you watch the adverts!
The VoiceUK
Cost: Free
© EyePAT Community Interest Company
Version 4.0 2014
32
www.eyepat.org
[email protected]
Using the Internet Safely
Social Networking
A social networking site is an online forum where people can chat online (talk by
broadcasting messages to people on the same forum in real time) and now increasingly
chat by video link using webcams (Facebook for example).
Sometimes these venues are moderated by having people patrol the venue, watching for
disruptive or otherwise undesirable behaviour.
The sites are varied and are used by children, young people and adults. Some have a
very adult theme and should not be used by children.
It is quite alarming how much personal information both children and adults will record
on their sites and share out with people. Many give away their date of birth, their e-mail
address, their phone number and even their address.
Unfortunately many children will put photographs up thinking they ‘look cool’, when in
fact these photographs are a paedophile’s dream.
To have a site on for example Facebook you should be 13. However no checks take place
and, clearly this age limit does not work.
Most social networking sites operate a friends or buddy list where other members ask to
be your ‘friend’ and the number of ‘friends’ you have are listed. Unfortunately with many
children, quantity is more important than quality and some children gauge their
popularity by the number of friends they have, irrespective of who these ‘friends’ are.
Hoax sites are also common. This is where a site is set up by one person or a group of
people, pretending to be someone else. This occurs with



celebrities (always check celebrity official web pages for links
cyberbullies where fake sites can be set up in either a child or a teacher’s name
paedophile who then ‘makes friends’ with other pupils in order to see their
personal information.
Picture Messaging
Snapchat and Instagram are the current favourites with young people. Many are leaving
Facebook as they are starting to relate to it as a site their parents use! They take an
image and can then edit it either by adding text or ink drawings onto the image and then
forward it on to people on their list. Instagram allows people to take pictures and videos,
apply digital filters to them and share them on a variety of social networking sites such
as Facebook, Twitter, Tumblr and Flickr. They can also record and share videos lasting
up to 15 seconds.
Instant messaging
Examples include: KIKMessenger, WhatsApp Messenger, FacebookMessenger,
MessengerWithYou, BBM (Blackberry Messenger)
Instant messenger is one of the most popular ways of chatting for young people. Often
known as IM, this involves two or more people being online at the same time, and is
different from chat rooms, because the people involved can only chat to people who are
on their contact list. Young people often feel that they can talk more intimately in this
environment, and often use their own text style language to do so.
Instant messaging is now available through Facebook, but is not currently available
through many of the sites for younger children. However this is changing and you do
need to check out each individual site your child goes on.
© EyePAT Community Interest Company
Version 4.0 2014
33
www.eyepat.org
[email protected]
Using the Internet Safely
Some sites such as Club Penguin and Moshi Monsters use a system of postcards where
messages can be left. See Page 35.
Chat Rooms
Chat Rooms are for a group of people to chat online. They do not need to be friends,
they just enter the chat room site and start talking. More often than not, you have no
idea who you are actually talking to as most people use pen names rather than their real
identity.
Chat rooms are usually areas where people meet to chat as they would in the real world
in a youth club or bar. Young people love them because they are often unrestricted and
they can be exciting places to meet old and new friends.
Although chatting online can be great fun, young people can sometimes find themselves
in situations where they can feel out of their depth.
Video Messaging
This is where you chat using the webcams to talk on camera rather than typing. On
some of the sites you chat with “Friends” you have chosen, Facetime, Google Chat,
Facebook, Skype, however on others Chatroulette, Pinkroulette, Tinychat and Stickam,
you can randomly chat to anyone on line.
Discussion groups
They are similar to chat rooms, but do not take place in real time, you post messages
and then wait for responses. They are often used by groups of like minded people to
swap ideas and thoughts. Many professional people use these to share information or
get answers.
© EyePAT Community Interest Company
Version 4.0 2014
34
www.eyepat.org
[email protected]
Using the Internet Safely
Messaging
Far cheaper than texting. They have to be used on a mobile phone or tablet. Be aware
however that all of these messaging systems can leave the young person open to cyber
bullying and grooming. KikMessenger is extremely popular and is one which protects the
users privacy by using usernames, not phone numbers. This does protect children, but it
can also create a shield to protect people who bully!
Top 15 Social Networking Sites
1 | Facebook
800,000,000 - Estimated Unique Monthly Visitors
2 | Twitter
250,000,000 - Estimated Unique Monthly Visitors
3 | LinkedIn
200,000,000 - Estimated Unique Monthly Visitors
4 | Google Plus+
150,000,000 - Estimated Unique Monthly Visitors
5 | Pinterest
140,500,000 - Estimated Unique Monthly Visitors
6 | Tumblr
110,000,000 - Estimated Unique Monthly Visitors
7 | Flickr
67,000,000 - Estimated Unique Monthly Visitors
8 | VK
65,400,000 - Estimated Unique Monthly Visitors
© EyePAT Community Interest Company
Version 4.0 2014
35
www.eyepat.org
[email protected]
Using the Internet Safely
9 | Instagram
50,000,000 - Estimated Unique Monthly Visitors
10 | MySpace
26,500,000 - Estimated Unique Monthly Visitors
11 | Tagged
20,500,000 - Estimated Unique Monthly Visitors
12 | Meetup
17,500,000 - Estimated Unique Monthly Visitors
13 | Ning
13,000,000 - Estimated Unique Monthly Visitors
14 | MeetMe
10,500,000 - Estimated Unique Monthly Visitors
15 | ClassMates
10,000,000 - Estimated Unique Monthly Visitors
Other Apps/Social Networks used by Young People
WhatsApp Messenger
WhatsApp Messenger is a smartphone messenger available
for Android, BlackBerry, iPhone, Windows Phone and Nokia
phones. WhatsApp uses your 3G or WiFi (when available) to
message with friends and family. With WhatsApp you can
send and receive messages, pictures, audio notes, and video
messages. First year FREE! ($0.99/year after)
© EyePAT Community Interest Company
Version 4.0 2014
36
www.eyepat.org
[email protected]
Using the Internet Safely
KikMessenger
KikMessenger has 19 million users! It's the fast, simple, and
personal smartphone messenger that connects you to
everyone
Kik say they are hands-down the fastest, most reliable
smartphone messenger available. And with sent, delivered,
read, and typing notifications, your conversations will come to life.
You can send messages, pictures, videos, sketches and more.
Your Kik username - not your phone number - is your Kik Identity, so they say you can
keep complete control of your privacy. KikMessenger can connect with other social apps
like Instagram, SocialCam, and Viddy.
Messenger WithYou
Allows unlimited chatting with all your Messenger Contacts.
The app is FREE and there is no charge for sending &
receiving messages!
Key features include:


Chat with Windows Live Messenger (MSN) and Yahoo
Messenger contacts
Chat with contacts whether they are connected on
mobile, Tablet, PC or even Xbox
Bump
You Bump two phones together to share photos, contacts,
and apps! You can Bump photos from your phone to your
computer! go to http://bump on your computer web
browser.
Ping
Ping! is a instant messaging client for the iPhone that looks
and feels like the built in iPhone SMS client. It aims to
provide free iPhone to iPhone (and iPod touch on wifi)
messaging.
Once you’ve download the (currently free) app and selected
a username, you can invite/find friends and family you know
own an iPhone or iPod touch, and you’re ready to go.
Once you’ve started a conversation, the application works
just like the SMS client except it’s free, instant and works
internationally at no extra cost (aside from your
international roaming costs that is).
© EyePAT Community Interest Company
Version 4.0 2014
37
www.eyepat.org
[email protected]
Using the Internet Safely
Touch
You can message your friends through chats and, share
photos. It works on Blackberry, i-Phone and Android. has b
BBM
You share your pin or unique barcode
to connect with friends. You can chat,
share stories, pictures, videos and
more with individual contacts or groups
of friends instantly. Even share app
experiences with BBM-connected apps
These are some of the apps which are
available with BBM. I found these by
searching for Parental Controls under
BBM.
Snapchat
Software which deletes images after 10 seconds. It has become
one of the most popular forms of social communication amongst
young people.
Whilst it can be used to send any picture, it can be used for
Sexting and for bullying. Research conducted in the UK has shown
that, as of June 2013, half of all 18 to 30-year-old respondents
(47 percent) have received nude pictures, while 67 percent had
received images of "inappropriate poses or gestures. Media Group
Ltd. Retrieved 21 July 2013.
Snapchat's blog responded to the speculation regarding the retrieval of its app's images:
If you’ve ever tried to recover lost data after accidentally deleting a drive or
maybe watched an episode of CSI, you might know that with the right forensic
tools, it’s sometimes possible to retrieve data after it has been deleted. So… you
know… keep that in mind before putting any state secrets in your selfies :)
Since Snapchat was launched to automatically delete images, new Apps have been
created to capture the Snapchat images before they are deleted, such as SnapWebChat
or Snap Save.
There are even websites which purport to display leaked Snapchat images. One is called
http://snapchatleaked.com/.
One thing is clear - if you send any image on Snapchat never assume it cannot be saved
or passed on.
© EyePAT Community Interest Company
Version 4.0 2014
38
www.eyepat.org
[email protected]
Using the Internet Safely
Snapchat runs on tablets and mobiles. Snapchat is an app that allows users to take a
photo and share it with someone for up to 10 seconds. When the allotted time is up, the
photo is permanently deleted. If the recipient tries to take a screenshot of the photo, the
sender is notified.
Faceparty
Not to be confused with Facebook, Faceparty is open to
members aged 16 and above. It is definitely aimed more at
the adult market, rather than younger people.
This site should be added to the blocked list on your
Parental Control software if you have children.
Friendster
An online community with more than 90 million
members worldwide, Friendster uses friend networks
to locate and stay in touch with old friends and
connect with new people.
Users, who are a minimum of 16 years old, create
basic online profiles featuring name, gender, age,
relationship status, zodiac sign, location, hometown,
and “member-since” date.
Profiles are personalized with photographs, school information, occupation, hobbies and
interests, employers, favourite books, movies, music, television shows, and an “about
me” and “who I want to meet” section.
Search boxes allow users to locate friends by name, school, hometown, keywords, age
range, gender, and affiliations; friends are approved by the individual, as well as
© EyePAT Community Interest Company
Version 4.0 2014
39
www.eyepat.org
[email protected]
Using the Internet Safely
personal testimonials featured on the profile. Within Friendster, users can create blogs,
e-mail other members and join interest groups.
MSN Messenger
MSN Messenger is a popular site with preteens and young
teens. It was originally set up as a messaging service for
university and college students (as Facebook was) but is
now widely used by a much younger audience.
You can chat in real time, use the webcam and share
pictures.
© EyePAT Community Interest Company
Version 4.0 2014
40
www.eyepat.org
[email protected]
Using the Internet Safely
Video Messaging
With all these applications you chat with a video link. This of course can be brilliant when
talking to family or real friends, but opens up a whole load of possibilities when talking to
people you may not know so well.
Parents who give their children smartphones and tablets need to be aware of this.
There are a number of other Video Calling packages out there but these are just a few of
them.
Facetime (Apple)
You can make video calls to iPad 2, iPhone 4, the new iPod
touch, or another Mac. from your Mac. You don’t need to set
up special accounts or screen names. All you do is find the
entry in your contacts and tap the FaceTime button. When
you are talking to the person you can tap the FaceTime
button any time you like on the screen. The person at the
other end has to accept the invitation before the video call
commences.
Google Chat
This is Google’s alternative to Facetime. If your friend
doesn't have a camera next to their name in your chat list,
you can invite them to download the voice and video chat
plug-in from the Video & more menu in a chat window. Even
if your friend doesn't have a video camera, you can still have
a voice chat or a 1-way video chat.
Facebook
You can now make Video calls via Facebook and chat to any of your friends who are
online.
You will need a webcam. Most laptops have them inbuilt and the modern ones have
amazing clarity. If you are using a PC you will need to buy a webcam if you do not
already have one.
Although you will be able to hear someone through your device speakers you will need a
microphone so they can hear you. Most laptops have them inbuilt, however if you don’t
have one you need to buy a headset.
You will need to install the “plug in” to start the process, however this is very simple to
do.
Facebook uses the Skype technology to do this.
This means that if you have children you need to be aware they could be doing this.

Open your Facebook account
© EyePAT Community Interest Company
Version 4.0 2014
41
www.eyepat.org
[email protected]
Using the Internet Safely

Go to Chat and click on the Camera symbol (see below). Your PC or laptop will
take you through the process to install it.

If this box comes up select allow. It will keep coping up each time you make or
received a call unless you select Do not show me the warning for this
program again.

The receiver will hear a ringing sound and will be prompted to answer the call.
You will see this.

Likewise if you hear a ring tone you will be prompted to answer the call.
Note: Make sure you have a headset attached and set up so you can hear and
speak to the person.
© EyePAT Community Interest Company
Version 4.0 2014
42
www.eyepat.org
[email protected]
Using the Internet Safely
Skype
Skype has 600 million users. It was bought by Microsoft in May 2011 for £5bn. Microsoft
is paying a big price for the right to embed Skype in its other consumer platforms such
as 'Windows', 'Microsoft Office' software, email service 'Hotmail', and the search engine
'Bing'
It is a free program which enables you to speak to another Skype user over the internet,
anywhere in the world and at any time, for nothing. Skype to Skype users can also
make video calls and use instant messaging for nothing.
You can also use Skype to make ordinary phone calls to landlines or mobiles but there is
a charge. Depending on your package, these calls can still be much cheaper than others
offered on the open market.
You will need speakers and a microphone to use it, and if you want people to see you, a
web cam.
To get the Skype program, just type in Skype in your search engine or type in
www.skype.com in the address bar of your browser and press the enter key. This will
take you to Skype’s home page. Follow the instructions.
Chatroulette.com and Pinkroutlette.com
Like the other sites these involve the use of web cams and online written chat. Unlike
the others you are linking with total strangers and you are not given the option to accept
or request each interaction.
© EyePAT Community Interest Company
Version 4.0 2014
43
www.eyepat.org
[email protected]
Using the Internet Safely
They are basically communication sites with no rules and no control. You have to have a
web cam and this has to be enabled to use them. You log in and dial, you are connected
with anyone at random and you can keep clicking on next until you find someone you
want to talk to.
Unfortunately many children go on these sites and some repeatedly. There are no
controls, they are not suitable for children, and it is used by many perverts who like to
be watched, often by the children.
These sites should be added to the blocked list on your Parental Control software if you
have children.
Tinychat.com
This is advertised via Facebook. It’s aimed at teens and its instant live chat with cameras
and is totally uncontrolled. There are a lot of kids on there, but there are also a lot of
older people or perhaps you might call them perverts! This site should be added to the
blocked list on your Parental Control software if you have children.
Stickam
http://www.stickam.com/
Launched in 2005, Stickam claim to be the pioneer of the live interactive web
broadcasting space and have the largest live community online.
Anyone with a camera and an internet connection can instantly broadcast LIVE to the
world from a computer or mobile device. Whether you want to videochat live with friends
or broadcast a show live to thousands of fans, Stickam provides the tools -- and the
audience.
© EyePAT Community Interest Company
Version 4.0 2014
44
www.eyepat.org
[email protected]
Using the Internet Safely
STICKAM FEATURES:

Broadcast your live video feed to the world

Add your Stickam player to your website, blog, or Facebook page

HD streaming supported

Multiple guest camera support

Mobile broadcasting and viewing support

White label, fully customizable API, virtual “velvet roping” and pay-per-view
options are available
STICKAM BY THE NUMBERS:

9 Million Registered Users

6 Million Unique Monthly Visitors

3 Million Daily Page Views

3 Million Streams Viewed Daily

Long Average Stay of 20 minutes -- Stickam is sticky!

20,000+ Views Per Hour For Shows Featured on the Stickam homepage – unlike
a lot of live streaming sites, Stickam can bring an audience to you!

Named the “Top Video Destination for Teens” by Nielsen.
Safety - in their words
Our goal is to offer the Stickam social networking community a service where friends
and family can interact within the guidelines set forth in our Terms of Service.
Although the Stickam service offers features for reporting and filtering content that
violates our Terms of Service or is otherwise deemed inappropriate, there is no
assurance you will not encounter such content while using Stickam.
© EyePAT Community Interest Company
Version 4.0 2014
45
www.eyepat.org
[email protected]
Using the Internet Safely
Geo-Social Apps - Hook Up Apps
The new way to connect people! Geo-Social Apps use GPS technology to track the
whereabouts of the people interacting on their site.
With Geographical Positing System (GPS) when visiting a foreign city they will tell you
where the landmarks etc. are, users can meet new people, and can get familiar with
many unfamiliar things.
Using the location-planning feature in some apps users can search and visit nearby
stores and restaurants. You can rate as you visit the location, share opinion and post
pictures for others.
You do need to be aware however that their purpose is to link up with total strangers in
your vicinity regardless of where you are in the world.
Like all forms of social networking, when used responsibly they can enable you to meet
new people, when used irresponsibly they can put you in all sorts of danger.
Examples of these types of social networking apps include:
Full Circle
FullCircle is an app which brings people together based on their
location in real time.
It is a mobile portal which integrates location awareness with
social networking, enabling mobile device users to identify and
interact with other registered Full Circle members based on their
physical proximity, interests and preferences - quickly, easily, and
free.
FullCircle has added the dimension of enabling users to easily create location aware
groups or communities surrounding an interest be it social or business. From within
these groups, members can identify other group members nearby, send a broadcast
message to the group, and use mapping to observe group clusters. They claim to have
strong privacy protections..They allow members to create their own "location based
networks".
Tango
Cost: Free. A Canadian based social network. Uses video chat, has only one
privacy setting, public or private. The app tracks the location of the user and
gives them lists of other profiles in the locality.
I have seen it being used to groom a young child. The matter has been reported to
CEOP. The child in particular was approached by 2 men, one in his 30’s the other in his
50’s who went through all the classic grooming actions of sending her online flowers,
making friends with her and then progressing the sexual imagery, sexual video calls
throughout the night and threats that they would finder her kill her if she did not do
what they said and told anyone.
© EyePAT Community Interest Company
Version 4.0 2014
46
www.eyepat.org
[email protected]
Using the Internet Safely
Pickloc
Pickloc allows users to create virtual bulletin boards based on a current
location. Future visitors to the location are then able to see the locationspecific board, as well as add their own notes.
While Pickloc worked as intended to allow user interaction with the usercreated boards, there was something lacking that would otherwise make it
even more social: Facebook integration. From version 1.4, Pickloc allowed you to share
your posts and locs (bulletin boards) on your Facebook wall.
While the core functionality is the same, now your Facebook friends will be able to easily
see your Pickloc postings, even if they are not yet users of the app.
WEKHO
It is a social networking and geo-location based app for
Apple devices that helps you find new people and places
using local maps.
WEKHO allows you to share and view photos, videos,
audio notes, and other social networking stuff with the
people around you. Visit any area in the city and make it yours!
© EyePAT Community Interest Company
Version 4.0 2014
47
www.eyepat.org
[email protected]
Using the Internet Safely
Anonymous social networking
There has been an increase in the number of anonymous social networking sites. The
issues regarding these sites are that by their very nature, they can be used to post nasty
or malicious messages online. There is a specific problem within schools, where pupils
are using these sites to bully their peers.
Honesty Box
Is an application within Facebook. It
allows you to ask questions and it
allows people to post anonymous
comments about you. The fact that
messages can by posted anonymously
leaves it wide open to be used by
people who wish to post nasty or
bullying messages. Schools are
increasingly reporting that this is one
of the applications being used in
bullying.
Formspring
Formspring (formerly formspring.me) is a question-andanswer-based social website, launched in November 2009.
The site allows its users to set up a profile page, from which
anyone can ask them questions. The questions and their given responses are then
published on the user's profile page.
The questions can be asked with a user's name hidden, or they can be visibly sent from
another Formspring account, according to the asker's preference. Users can however
choose to disallow anonymous questions, and have the ability to block selected people
from asking further questions, even if the asker has remained anonymous. The site also
allows users to link their accounts to many popular social networking and blogging
websites, including Facebook, Twitter, and Blogger.
On February 9, 2011, Formspring announced on its blog that it was approaching 22
million registered users.
Little Gossip
This site appears, gets closed down and then appears
again. As at October 2013 it was up again. Its only
purpose is to spread malicious anonymous gossip and
there is nothing positive about it.
© EyePAT Community Interest Company
Version 4.0 2014
48
www.eyepat.org
[email protected]
Using the Internet Safely
Spillit
The only purpose of spillit.me appears to be to put yourself
up there for criticism, which begs the question, why are so
many young people setting up accounts. It brings to mind
the Oscar Wilde quote “There is only one thing in life worse than being talked about, and
that is not being talked about”.
By default the public search option is on and you can turn it off.
These are the questions you can ask about yourself. The questions are all
predetermined.
Unfortunately they don’t seem to have the most obvious one “Why have I set up an
account here - do I want to be bullied?”.
So not to be deterred we used the option to create our own question
You appear to have the choice as to how anonymous you want your bullies sorry
contacts to be and can choose from these options.
© EyePAT Community Interest Company
Version 4.0 2014
49
www.eyepat.org
[email protected]
Using the Internet Safely
As the site is obviously aware that you are going to get a shed load of abuse they make
you accept this disclaimer if you accept anything other than the high level so they cannot
be held responsible.
It does give you an opt out however:
In case it is not obvious, our recommendation is that unless you would like to receive
abuse don’t set up an account with Spillit.
© EyePAT Community Interest Company
Version 4.0 2014
50
www.eyepat.org
[email protected]
Using the Internet Safely
Social Networking - Privacy and Parental Settings
Friends, Contacts or Strangers
The key issue for protection from cyberbullying and grooming is who your friends are,
who are contacts and acquaintances and who are strangers. There are many ways to
define the differences but these may help.
Friend
Contact
Stranger
•Share private photos
•Share secrets
•Enjoy being with them
•Meet or talk regularly
•Talk freely about happy,
funny or sad events in your
life.
•Someone you trust
•Someone whose values you
generally agree with or
accept.
•Know their name and what
they look like but probably
not much about their
personal life
•Talk primarily online
•Don't spend face-to-face
leisure time with them
•Talk generally but not about
personal matters
•Perhaps someone in your
school year, work or social
activities who you don't
'hang out' with.
•Someone whose values you
are uncertain about.
•Don't know outside social
media
•Never meet up with on
purpose in real life
•Know little or nothing about
them
•Perhaps friend of someone
you know.
•Someone whose values you
don't know.
Most systems have privacy controls to protect you from individuals outside your
accepted friends list, however they work on the basis that you are willing to share all
your information with those you accept as they are your friends.
We need to get the message out that having many friends on say a Facebook page is not
a popularity contest. Popularity is about having real friends, not contacts, acquaintances,
strangers or hangers on.
Business people using social media have lots of contacts because they want to use social
media to promote their business. It is a form of marketing and in this situation its fine,
as long as they treat their social media as a business tool.
Individuals who want to use social media to publish personal information should just link
with their real friends and family or they are leaving themselves open to abuse.
If you would not leave the front door unlocked and allow total strangers to rifle through
your home, your family albums, your private documents why would you allow them to
do so on social media?
In Facebook language a Friend is really a contact. Calling them friends can lull you into
a false sense of security. Look at your list of ‘friends’. Would you really share all your
personal information with these people if you met them face to face?
© EyePAT Community Interest Company
Version 4.0 2014
51
www.eyepat.org
[email protected]
Using the Internet Safely
If you have over a hundred “friends” on Facebook you can work on the basis that:
10% like you
80% dont
care either
way
10% don't
like you
Facebook has no safety provisions for those under 13 as they should not be on there. It
treats under 18’s as minors and by default sets everything to “friends of friends”. This is
some protection, but once they reach 18 these settings can be opened up. If however
they have lied about their age to join when under 13, these could be opened up much
earlier.
Dictionary of Social Networking Terms:





Posting - writing something into either your wall or a friend’s wall. Now called
timeline.
Chat - instant private chat which does not appear on the wall. You can chat to
many people at the same time
Account Settings - where you change your email address or password
Privacy Settings - where you change what different people can see
Friend - contacts whom you have accepted to see all your information
1. Facebook
With Facebook there are 4 buttons to the right which provide access to:
1. Your name gives you access to your Profile which includes your timeline (posts)
and your friends amongst other things
2. Home - which gives you access to everyone else’s posts
3. The padlock which shows your Privacy Settings
4. The spike wheel which is your Account Settings
To access your account settings

In the top navigation bar click on the Settings Icon [spikey wheel] and then
choose Account
© EyePAT Community Interest Company
Version 4.0 2014
52
www.eyepat.org
[email protected]
Using the Internet Safely
Note – If the young person is aged 13 to 18 and if they have told the truth about their
age, Facebook will apply the child settings, which basically mean that no one can see
their profile unless they have accepted them as a friend. However Facebook only works
out the person’s age from the date of birth they have given. Children under 13 cannot
set up an account unless they lie about their date of birth
Changing your Privacy Settings

In the top navigation bar click on the padlock and you will see the Privacy
Shortcut.
The options available are:



Who can see my stuff? This includes all posts, pictures etc.
Who can Contact Me?
How do I stop someone from bothering me?
Who can see my Stuff?
You can choose between



Public - everyone irrespective if you have accepted them or not
Friends - everyone your have accepted onto your friends list
Friends except acquaintances
© EyePAT Community Interest Company
www.eyepat.org
53
Version 4.0 2014
[email protected]
Using the Internet Safely



Only Me
Custom
Within customise you can choose Specific People or Only Me for info you wish
to keep private.
Any other sub list including Close Friends etc.
Note: It calls contacts ‘friends’ even though you may never has spoken to them in your
life.
Who Can Contact Me
This only determines who can contact you and ask you to be their “friend”. We
recommend Basic Filtering for adults and Strict Filtering for vulnerable adults, young
people and children.
© EyePAT Community Interest Company
Version 4.0 2014
54
www.eyepat.org
[email protected]
Using the Internet Safely
Receiving Messages
Facebook now separates your messages into two groups.
1. Those who you have accepted as Friends
2. Those who you are not connected to
You can receive messages from both.
Click on the Message Icon on the left of the blue bar.
Messages are now stored separately.


For messages from those you have accepted as friends click on Inbox
For messages from those who are not on your Friends list click on Other
Block Someone - quick method



Click on the Padlock on the right of the Blue Bar
Click on How Do I Stop Someone from Bothering Me
Enter their name or email in the box provided
© EyePAT Community Interest Company
Version 4.0 2014
55
www.eyepat.org
[email protected]
Using the Internet Safely
Categorising, Reporting, Blocking, Unfriending Friends
Friends can be categorised individually which can take some time if you have many
friends.



Click on your Profile [your name]
Select the box containing your friends. This will be in the left panel, but you may
have to scroll down.
Click on the word Friends at the top of the box

Select a friend and hover over the

From here you can choose to:
o Make them Close Friend or Acquaintance
o Report or Block them
o Unfriend them
Select the required option by clicking on it.

button.
More Privacy Settings
Facebook has a double system of privacy settings, basic ones which are easily accessible
via the padlock and more detailed ones which can be accessed by clicking on See More
Settings
With Facebook you can have a very secure site. It is just up to you who you allow to
access it and who you accept as your friends.
© EyePAT Community Interest Company
Version 4.0 2014
56
www.eyepat.org
[email protected]
Using the Internet Safely
If you find a person you have accepted as a contact is contacting you either by message
or posts, in a way you are unhappy with you can Unfriend, Block or Report them.
Facebook takes privacy very seriously.
Please note, if the person is under 13 and Facebook is aware of this fact, they will delete
the account, irrespective of whether they have done anything wrong, as they should not
be on Facebook.
Timeline and Tagging Settings
Blocking
You can block anything People, Invitations, Apps etc.
© EyePAT Community Interest Company
Version 4.0 2014
57
www.eyepat.org
[email protected]
Using the Internet Safely
Photo and Photo Albums
Perhaps the section you need to be most careful about is photographs. Remember
photographs can be taken from your web site and distributed. Perhaps you may not
wish your work colleagues or acquaintances to see certain pictures.
Most of these options are fairly obvious, however the privacy settings for photo’s are
more hidden.
Individual Photos

Click on the picture or Album

Click on the downward arrow beside the picture - see below

Choose the group you wish the picture to be seen by.
© EyePAT Community Interest Company
Version 4.0 2014
58
www.eyepat.org
[email protected]
Using the Internet Safely
Photo Albums
With a photo album, there is another step in the process:

Select Albums

Double click on the Album

Click on Edit


Click on the downward pointing arrow under Privacy
Choose who you wish to see the album
© EyePAT Community Interest Company
Version 4.0 2014
59
www.eyepat.org
[email protected]
Using the Internet Safely
Changing your Account Settings
This is where you control what is going on with your Facebook Pages.

To access click on the Account Settings icon [spikey wheel]
Is someone logging onto your Facebook account without you knowing?
This is covered by Account Security. We would suggest you switch this one on. It will
let you know if anyone accesses your Facebook account from a new computer or mobile.
It could alert you to bullying before it even gets going and you can immediately change
the password.
Stopping someone from logging onto your Page
You can go one stage further by setting a pin which has to be entered in order for
someone to log into your account.

Click on Login Approvals
© EyePAT Community Interest Company
Version 4.0 2014
60
www.eyepat.org
[email protected]
Using the Internet Safely
Password - Changing your Facebook password
Never give your password to, or allow anyone to see you logging onto your Facebook
account. Once they have your password they can do anything to your account and you
can’t do anything about it, other than change your password, as long as they haven’t
already changed it and blocked you out. If so contact Facebook directly.
If you think someone has hacked into your Facebook account either by guessing or
seeing your password, you need to change it. This is especially important for children as
they will often allow their friends to see them typing in their passwords and then this
information can be passed on. One of the most common forms of cyber bullying is to
hack into someone’s account and start sending out nasty or untrue messages.





To access click on the Account Settings icon [spikey wheel]
Click on the General
Type in your old password
Type in your new password
Type in your new password again. Don’t cut and paste. The purpose of typing it in
twice is to make sure you have it right.
© EyePAT Community Interest Company
Version 4.0 2014
61
www.eyepat.org
[email protected]
Using the Internet Safely
Blocking Facebook
There is free software which you can download called FB Limited. You can use it to block
Facebook for certain periods of time, say during work or study hours.
www.facebooklimited.com. We have not tried it, but in theory it sounds good.
2. Twitter
The most likely form of abuse you will receive from people on Twitter will be from those
who follow you. Unlike with other social networking sites, on Twitter they choose to
follow rather than asking to follow.
Whilst you cannot stop someone from saying things about you on Twitter, you can block
them from contacting you.
1. Log into Twitter using your email address and password
2. Click on Me
3. Click on Followers and then click on the downward facing arrow next to the
Settings Icon [spikey wheel]
4. This will then list a variety of options from which you can choose, one of which is
Block and another is Report. Please remember Threatening Behaviour and
Harassment are illegal. If you are being bullied in this way, save all the evidence.
See Page 196
© EyePAT Community Interest Company
Version 4.0 2014
62
www.eyepat.org
[email protected]
Using the Internet Safely
3. LinkedIn
You are less likely to receive abuse or inappropriate messages via LinkedIn. It is
primarily a social network for professional and business people. However evidence shows
that an increasing number of children are moving to LinkedIn as they feel safe.
1. To access your privacy settings log in as normal
2. Click on your image icon on the right and choose Privacy & Settings
Options are available to change who sees what.
If you have any issues with any individual you can always “uncontact them”
1. Choose Network then Contacts
2. Go to the persons profile and under the More button select Remove
Connection.
© EyePAT Community Interest Company
Version 4.0 2014
63
www.eyepat.org
[email protected]
Using the Internet Safely
4. Google+
With Google+ you allocate your contacts into Circles [groups]. You can then change or
alter the contact. You can create your own Circles of say Close Friends, School Friends
etc.
1. Log into to your Google+ Account
2. Click on the Settings Icon [spikey button]
This allows you to administer who can contact you.
5. PinInterest
Rather like with Twitter and Google+ you Follow or Unfollow People on PinInterest.
1. To access your settings click on your name ad then choose Settings
You can set up email notifications for any activities involving your account.
You can de-activate your account.
© EyePAT Community Interest Company
Version 4.0 2014
64
www.eyepat.org
[email protected]
Using the Internet Safely
To report a pin
a.
b.
c.
d.
e.
Click on it to view its full size
Hover over the pin until the flag appears at the bottom
Click the flag
Choose reason for report
Click Report Pin.
To report a person
a.
b.
c.
d.
Go to their profile
Hover over flag to right of profile info
Choose the reason for your report
Confirm that you want to report.
To report a comment.
a.
b.
c.
d.
Click on the pin to view its full size
Hover over the flat to the right of the comment
Click Flag Comment.
Choose reason for Report and click Flag Comment.
If you report someone, they will not be notified that you have reported them and they
can use their Pin Interest account normally unless they are found to have violated terms
and services, the Pins or Boards may be removed, restrict the use of their account or
disable the account.
6. Tumblr
Tumblr keeps things simple. The only information they ask of you during sign up is your
name, email and password. However, as soon as you hit start you’re asked to type in
your age, and if you type in anything below 13 Tumblr rejects your registration. This
means, and as Tumblr’s Terms of Service makes clear, children 12 and under are not
allowed on Tumblr.
If cyberbullying or any kind of online harassment becomes an issue, Tumblr makes it
easy to report and block a specific user and/or their Tumblr blog.
What parents need to know
And because of Tumblr’s compilation style of blogging, you can literally find anything
from art and crafts ideas to hardcore porn, and equally as easy.
© EyePAT Community Interest Company
Version 4.0 2014
65
www.eyepat.org
[email protected]
Using the Internet Safely
All of that being said, finding pornography on Tumblr is no different than finding it on
Twitter or Facebook. A simple tag search for “porn”, “sex” or “adult” results in a stream
of pornographic images and video that any Tumblr user can see and share.
Despite it being a creative outlet for young minds, the fact remains that Tumblr is not for
children. Websites like Facebook, Twitter and Tumblr can only go as far as requesting
their age during registration; it’s in your hands to educate your child about following the
rules, whether it’s in school, on the soccer field or online.
I can hear a child saying: “Dad, I don’t use Tumblr for all these things you’re worried
about. My friends and I don’t go looking for that stuff you mentioned. Don’t worry so
much!” Don’t fall prey to these comments. The fact of the matter is, Tumblr, like many
websites, blog platforms and social networks, does not have the content filters or
oversight in place to ensure a healthy experience for your child.
For your teens, it might help to create a dialogue about their activity on Tumblr – find
out what they post, who they follow, and if necessary, create an account of your own
and follow them. Let them know you know what kind of content is available to them in
the Tumblr community and how inappropriate content, regardless of where it’s coming
from, can often times lead to malicious applications and computer viruses. If you feel
that blocking Tumblr altogether is necessary in your home, there are several options
available to you:
How To Report People On Tumblr
1. First of all, try to always keep the hate message that this person/blog has sent
you. This is a proof that you can send to Tumblr just in case they ask for it.
2. Sent an email to [email protected] including the user’s name and screenshots
of the harassment message
© EyePAT Community Interest Company
Version 4.0 2014
66
www.eyepat.org
[email protected]
Using the Internet Safely
7. Flickr
What if I don't want everyone to see my photos?
Every photo has its own privacy settings. You can make a photo available to everyone
(that's public, and includes people visiting the site who aren't Flickr members); make it
visible only to your friends, your family, or both your friends and family; or keep it
completely private.
Bear in mind that you can always see every image in your own photostream.
You can set a default privacy setting for every photo you upload.
Changing the privacy level of any photo ("public" --> "friends", or "friends" --> "family")
will change the image file name. This ensures that any photo truly becomes private.
Please note that this will "break" any photo that has been blogged elsewhere as the
image file will have a new URL.
Setting privacy levels on my photos?
You can specify the privacy level as you upload photos using the form or Uploadr or by
email).
You can choose: Public, Visible to friends, Visible to family, or Private.
You can also set a default privacy level for all your uploads.
To change the privacy levels on photos you've already uploaded, you have two options:
1. Change the privacy level in the Owner settings section under the Privacy
heading on the right of the photo page, or
2. Batch them in Organizr, then click Permissions and select Who can see,
comment, tag?
Privacy Uploading by Email
With their upload system, you can add a little bit of text to your Flickr email address to
set privacy levels as you upload. These permissions will override the default upload
permissions you set..
Let's say your magic email address is [email protected]. Then you could
use:
[email protected] - Visible to friends
[email protected] - Visible to family
[email protected] - Visible to friends and family
[email protected] - Only visible to you
[email protected] - Visible to everyone
Tip: Save the addresses you use frequently to your address book so you can email on
the fly.
Can anyone leave a comment?
Most of the time, yes -- any Flickr member can leave a comment unless you say you
don't want them to.
In your account area you can specify default settings for what you'd like most of the
time. You can change the setting for individual photos.
© EyePAT Community Interest Company
Version 4.0 2014
67
www.eyepat.org
[email protected]
Using the Internet Safely
Please note, adding an image to a group will override your comment preferences and
allow people in the group to add notes and comments.
I've uploaded photos and made them public. Where do they show up?
All sorts of places!
One page shows you all the photos uploaded to Flickr:
http://www.flickr.com/photos/
Your photo will also show up for your contacts, in a special list that shows them all
photos uploaded by their contacts:
http://www.flickr.com/photos/friends/
Photos on this page will also be governed by your relationships to your contacts and how
you set privacy on a photo. For example, you upload a photo and set it to be visible to
your family. Your contacts who you marked as family can see that photo. Other Flickr
members can't.
Your public photos will show up in tag pages, too. And if one of your photos is really
interesting, it might show up on the Explore page!
Can I make a public photo private again?
Yes. The privacy setting you associate with a photo is completely flexible. You can show
or hide any photo anytime you like.
Note: Changing something from public to private will remove favourites that have
accumulated. This is because a favourite is like a bookmark, and if you change the
privacy so someone no longer has access, they shouldn't be able to view it any longer.
http://www.flickr.com/help/faq/
8. VK
VK is the second biggest social network service in Europe after Facebook. It is available
in several languages, but particularly popular among Russian-speaking users around the
world, especially in Russia, Ukraine, Azerbaijan, Kazakhstan, Moldova, Belarus,
and Israel. Like other social networks, VK allows users to message contacts publicly or
privately, create groups, public pages and events, share and tag images, audio and
video, and play browser-based games.
As of January 2014, VK had at least 239 million accounts. VK is ranked 23 (as of
November 25, 2013) in Alexa's global Top 500 sites and is the second most visited
website in Russia, after Yandex. According to eBizMBA Rank, it is 8th most popular social
networking site in the world. As of January 2014 VK had an average of 55 million daily
users.
1. Log into your account and go to My Settings and then Privacy:
© EyePAT Community Interest Company
Version 4.0 2014
68
www.eyepat.org
[email protected]
Using the Internet Safely
You can change
who can see
your:
Profile
Posts
Contact
9. Instagram
How do I report something for abuse or spam?
You can report a photo or video right from the app or when viewing it on the web. To
report a post:
1. Tap "..." below the post
2. Tap Report Inappropriate
3. Select why you're reporting the post
How do I block or unblock someone?
To block or unblock someone:
1. Go to their profile by tapping
name or username
at the bottom of the app and searching for their
2. Tap
(iPhone) or the three dots (Android/Windows Phone) in the upper-right
corner of their profile
3. Tap Block User or Unblock User
What can I do if someone is impersonating me on Instagram?
Instagram takes safety seriously. If you're being impersonated, please submit a
report and make sure to provide all of the requested info, including a photo of
your government-issued ID.
Help on applying privacy settings to Instagram is available from
http://help.instagram.com/
© EyePAT Community Interest Company
Version 4.0 2014
69
www.eyepat.org
[email protected]
Using the Internet Safely
10. MySpace
Once you have logged in:

Click on Home / Settings / Privacy

Click on Notifications
To change the password
If you need to change the password for any reason, take the following steps:

Click on Homes / Settings / Profile / Password and follow the instructions to
change your password.
© EyePAT Community Interest Company
Version 4.0 2014
70
www.eyepat.org
[email protected]
Using the Internet Safely
MSN Messenger
This was an extremely popular instant chat option, especially amongst secondary school
children. It is no longer as popular but we felt it would be helpful to show how to change
your password, which can be essential if the account has been hacked, either
professionally or by someone watching the person sign in.
Changing your MSN Password

Click on your name and Choose Account Settings


Choose Password from the list on the left.
Enter the new password twice and then press save.
Skype
Profile Settings
To edit or change details on your profile, click on the Skype / Profile / Edit Your
Profile.
© EyePAT Community Interest Company
www.eyepat.org
71
Version 4.0 2014
[email protected]
Using the Internet Safely
Important things to be aware of:

Public parts of your Skype profile can be seen by all other Skype users

Do not put details in your profile that you do not want to be publicly available

You do not have to fill in your profile if you do not want to
You can change your profile at any time.
Privacy Settings
To get to the Privacy Settings in Skype you must log in via the link from your Desktop or
from your Programs, you do not appear to be able to log in from the website.

In Skype, from the menu bar, click Skype > Privacy.
The Privacy Settings panel is displayed.
From here you have control over who can access you for what.
If you find people you do not wish to speak to are trying to contact you, you can block
them.
© EyePAT Community Interest Company
Version 4.0 2014
72
www.eyepat.org
[email protected]
Using the Internet Safely
To change the password
If you need to change the password in Skype for any reason, take the following steps
once you have logged in:

Click on the Skype Menu at the top of the screen and select the Change
Password option
© EyePAT Community Interest Company
Version 4.0 2014
73
www.eyepat.org
[email protected]
Using the Internet Safely

Enter the current password

Enter the new password

Re-enter the new password to confirm
Click on the Apply button
© EyePAT Community Interest Company
Version 4.0 2014
74
www.eyepat.org
[email protected]
Using the Internet Safely
Internet & DVD Gaming
Many children have games consoles, computers, laptops, tablets and smartphones.
These technological wonders open up hours of fun and because they can link to the
internet, allow all sorts of opportunities to communicate with friends ... and strangers.
But do you know what your child is doing in this virtual world? Are you parenting
them in the same way you would perhaps in real life situations? Would you know what
they are doing?
Some of the new technology and terminology can baffle parents and carers. It can also
alarm them with frequent stories in the media about spam, online grooming, cyberbullying and video messaging. It's hard to protect children when you aren't as familiar
Gaming consoles such as X-box and Playstation enable multiplayer gaming - this is
where multiple people can play the same game at the same time over the internet. In
multiplayer games, players either all compete against each other, or team up to achieve
a common goal such as defeating an enemy that can consist of either a computer or
human players.
The good
Playing games online can be a fantastic pastime for young people, and gives parents a
wonderful opportunity to play along with their children, so they can understand what
they are playing and how to help keep them safe.
Gaming is great fun, and can be a place where young people play and chat with each
other.
Gaming can be escapism from the stress of school and exams and can develop and
stretch children’s minds.
Gaming chat is normally focused solely on the game, and young people will swap user
names to ensure that they can get to the next levels so they can learn to work as a team
with other children.
Gaming can be a fun way for children to learn computer skills.
The bad
Children can be affected by the adult content of some games, for example extreme
violence or sexual behaviour.
© EyePAT Community Interest Company
Version 4.0 2014
75
www.eyepat.org
[email protected]
Using the Internet Safely
There are some young people who engage in risky behaviour (sometimes for the thrill or
the challenge) to obtain cheats or knowledge to progress within a game. Adults with a
sexual interest in children will encourage them to engage in ‘inappropriate’ behaviour for
rewards, including sexual acts via a webcam or sex chat.
We need to be aware that studies suggest what we do in our lives changes the way we
think and our brain mapping and there is no positive research to support excessive
online activity.
Gaming is no exception and violent and/or prolonged gaming can potentially alter our
brain mapping and our behaviours. This is most relevant to children but also applies to
adults.
Gaming classifications
Games have an age rating similar to that for films. Shops are restricted from selling
games to underage children, however they are often bought by elder siblings and then
passed on.
Do make sure you match the age rating of the game to the age of the child playing it.
However much the child or young person enjoys playing it, it is important to understand
what affect it could be having on them.
Video game ratings using the Pegi (Pan-European Game Information) system have
become legally enforceable in the UK.
Retailers that sell titles with ratings of 12, 16 or 18 years to children below the age limits
will be subject to prosecution.
In addition to the age ratings, packaging will also feature diagrams warning if the title
includes bad language, drugs, discrimination, fear, gambling, sex, violence or online
gameplay with other people.
Violence
Bad
Language
Fear
Sex
Drugs
Discrimination
Online
Gambling
Online
Game
Violence



Games are rated for 12-years and over if they include non-graphic violence to human
or animal characters, a slightly higher threshold of violence to fantasy characters or
significant nudity or bad language.
Games are rated 16-years and over if the depiction of violence or sexual activity
looks the same as it would do in normal life. Drug and tobacco references also trigger
the age limit.
Games are rated 18-years and over if there is a "gross" level of violence likely to
make the viewer feel a sense of revulsion.
The PEGI website will contain up to date information and can be found at
http://www.pegi.info/en/index/
© EyePAT Community Interest Company
Version 4.0 2014
76
www.eyepat.org
[email protected]
Using the Internet Safely
Available Games
There are millions of games out there and it would be impossible to list them all here so
we have given details of a few more popular ones.
There are many sites offering simple and free games for your children to play and many
of the social networking sites include gaming.
Be aware that whilst many of these sites appear to be free, you often find you are
“giving the opportunity” to buy credits using a credit card.
A number of them also have a free and a subscription option which has many more
features.
There are some brilliant, fun and sometimes educational games out there however,
remember that the gaming your children do can affect their behaviour and brain
development.
Games have an age restriction rating, not just as a guide, but to try and prevent young
children from playing games which they are too young to be able to deal with.
Please see Page 76 for information on gaming classifications.
We personally have heard many stories of young children developing violent behaviour in
school, and when traced it often went back to games they were playing at home,
perhaps ones they had borrowed from their older siblings.
If you want to find out about a specific game, you can either Google it or look at a site
which sells and gives reviews of games.
One such site is http://uk.ign.com/.
Older Online Games
© EyePAT Community Interest Company
Version 4.0 2014
77
www.eyepat.org
[email protected]
Using the Internet Safely
Violent Games
World of Warcraft – has very strict controls – you can’t swear, use racist comments
etc. It is taken seriously by some players. Its a fun game – fantasy violence, no blood,
no gore, all elves, goblins, dragons etc. Free up to level 20 then you have to pay for
membership
Eve – it’s very difficult and advanced so suitable for experienced game players – It’s
advertised as 14+ but needs high level of gaming experience. Its About space ships,
intergalactic battles, no blood, no gore. Free
Runescape – Its free but you can pay for membership for exclusive features. Fantasy
adventure – goblins dragons etc . No blood no gore!
Grand Theft Auto – for X Box - violent - imagine a hard hitting gangster movie. It is
an 18+ game. There are movies much worse, but has a higher level of violence with lots
of blood. Don’t get to dismember people, but you can shoot and knife them.
Call of Duty – War Game. Xbox, PlayStation, PC. Play online with others and talk to
them in realtime. Who you play with depends on privacy settings you set. Can play on
family settings and it will only allow you to play with others with family settings. Else it
can be quite vile. Groups can fit into 3 basic categories, includes 30+ experts, 18-20+
having a good time – [but beware can be drunk], Ages 12-15 who can be pretty vile,
swearing, throw tantrums etc. Realistic human images. You are the soldier and you
have to kill people!
Dead Space 3 – 18+ game. Not aimed at children. Horror survival game. It is terrifying.
Essentially you are a stranded miner in outer space stuck on a spaceship full of aliens,
mutants etc. which you have to kill. Lots of blood and gore. Realistic human images.
Resident Evil – 18+ game – really not aimed at children. Again can be pretty scary.
Basically a zombie survival game. You control characters who are trying to survive
zombies. Very human images. Lots of blood – can be gory at times.
Mortal Kombat – fighting game – 18+ - banned in the early 80’s due to way violence
was perceived. Typical fighting, punching, kicking – has fatality moves which can be
quite horrific. Example one character called Sub Zero move is to freeze them and then
shatters them into a thousand pieces and he’s one of the nicer ones! Some sexually
charged characters, but no sex.
God of War18+ game – you are the demi god Kratos, your family was killed and you
go around killing the other gods. Open sex scenes – soft porn. Quite graphic violence.
You fight the hydra and cut its head off.
The Witcher – 18+ has a very graphic sex scene, soft porn – fantasy dragons, magic
etc.
© EyePAT Community Interest Company
Version 4.0 2014
78
www.eyepat.org
[email protected]
Using the Internet Safely
Games/Social Networking for Younger Children
There are a number of sites aimed at primary school children where the children can
interact with other characters. There are many of these sites, ask your children to tell
you about the ones they or their friends use, and then check them out. If you need help,
ask your child to help you.
Habbo
In Habbo the children create their own character (Avatar)
and then go around the online hotel talking to the other
avatars.
There can be many thousands of children online at any one
time.
This is an example of the chat going on in one of the clubs.
Our character is standing on her own not talking to anyone,
but we can still see all the chat going on in the room.
Habbo has been flagged as a high risk site for young
children and a number of high street retailers are now
refusing to stock the gift cards.
Club Penguin
With Club Penguin the child’s avatar is a penguin. They do
not engage in live chat, but they can leave post cards for
the other penguins.
With all these games it is possible for anyone to set up an
account.
This can be a really good game to play with your younger children.
Jacqueline Wilson
Jacqueline Wilson is a children’s author. This is popular
with the younger children as they can send chat. It is
aimed at the 6-11 market. The kids can play games, talk to
each other (only after messages have been checked for
content), enter competitions, set up book groups etc.
Web address is http://www.jacquelinewilson.co.uk/
© EyePAT Community Interest Company
Version 4.0 2014
79
www.eyepat.org
[email protected]
Using the Internet Safely
Moshi Monsters
With over 50 million Moshi Monsters already adopted by
children this is an extremely popular site for young children.
They can ‘chat’ with friends and play games.
However beware, some children have had messages left
asking them their “real name” “what school they go to” etc.
Disney Superbia
There are two ways to make friends in Superbia. Children
can find real life friends by asking them what their Share
Code is and adding them to their game, or they can make
friends by visiting other people’s houses. Superbia claim
they keep children safe and as this is a Disney product one hopes that this is the case.
They claim that there is no way people you don’t know can contact the children directly
within the game.
SmileyTalk
SmileyTalk is a relatively new package. It is probably the
safest social network for young children simply because
there is no free typing. The children choose questions and
answers from lists. Within SmileyTalk there are no language
barriers. The child selects the question or answer in their
language and it is automatically translated into the recipient
child’s language.
Yoursphere
Yoursphere.com is the kids' social network that's a
destination for imagination offering members a uniquely
engaging age-appropriate online experience.
Yoursphere.com is approved by the Privacy Vaults Online
Safe Harbor of the FTC for it's online privacy and safety
practices.
Stardolls
According to Stardolls they are the largest online
community for girls who love fashion, making friends,
shopping, decorating and being creative! It has a facility to
leave messages and it is also used by older children. We
have seen some quite spiteful messages left!
© EyePAT Community Interest Company
Version 4.0 2014
80
www.eyepat.org
[email protected]
Using the Internet Safely
Child/Parent Contracts on Internet Use
A good way of agreeing Internet use with your children is by drawing up a contract. Both
parents and children need to make a commitment.
The contract needs to be drawn up with both you and your child’s agreement and signed
by both the child/children and the parents. If you have more than one child you may,
depending on their age difference, need more than one contract.
If the child lives in separate family homes [perhaps due to divorce or separation] the
contracts need to be applied in both homes and should have similar objectives.
Here are some guidelines on setting up a contract.
1. Identify the key issues with your children on the internet. These obviously
will be:

specific to your children’s age, interests and time spent on the Internet.

specifically to keep them safe from viewing inappropriate sites, cyber
bullying, grooming and identity theft.

apply to any items they can access the internet from, laptop, home PC,
mobile phone, tablet, gaming machine etc.
An example with a younger child may be:

You must let Mum or Dad know whenever you are going to log onto
Club Penguin / Moshi Monsters etc. Explain to your children that this is
because bad people might want to contact them, pretending to be
other children.
In your parents contract it might read

Mum or Dad promise to spend at least 15 minutes after school, 3 days
a week, playing with you on Club Penguin.
For an older child it may be:

You will accept the age restriction software we have loaded onto your
machine and will apply by the restrictions. If you find you are unable to
do your homework/research due to these restrictions you will come to
us. Explain to them that not all the information on the internet is ok for
them to see and could hurt them in one way or another.
In your parents contract it might read.

If you are unable to do your homework/research, we promise to spend
time with you on the internet helping you with this research.
2. Be clear and concise when identifying each issue.
Its important there is no chance of a child or teenager being able to say, they
© EyePAT Community Interest Company
Version 4.0 2014
81
www.eyepat.org
[email protected]
Using the Internet Safely
didn’t understand what was meant.
3. Agree and list what the rewards and consequences will be when your
child either follows the rules or chooses to break them.
We suggest they are called Trust Points.
These privileges and consequences should be natural and logical. In other words,
when possible, set a consequence that is related to the misbehaviour. Be sure
you, the parent, are willing and able to apply the rewards and consequences that
you set or your contract will be worthless.
Don’t just consider materialistic rewards. Many children favour time with their
parents, both on and off line as a reward.
For example:
For younger children.

If you comply with this for one week/month, we will take you to the park
for one hour at the weekend.

If at any time you do not comply with this, we will add ‘your favourite site’
to the banned list of web sites for 1 day/week/month.
For older children

If you comply with this for one week/month you will earn our trust and we
will extend your daily internet access by half an hour.

If at any time you do not comply with this we will reduce your internet
access by half an hour.
4. Set a date that the contract may be revised and/or negotiated.
Let the child/teenager know that he/she may earn more or fewer privileges based
on their behaviour until that renewal. If they can be trusted you can trust them
more. Talk to them about privileges they may want to earn in the future.
5. VERY IMPORTANT – Make sure anyone else involved in parenting your
child is party to this agreement and are willing to enforce the contract..
If parental figures do not agree on some of the items, revise them until you come
to an agreement.
Example Contracts
If you search the internet you will find layouts for contracts. However it can be fun for
your children to design their own. They can:

Cut and stick or draw pictures

Word Art or create special writing

Paint or colour it in
The most important thing is the content. It needs to say what the children will do and
also what the parents will do.
© EyePAT Community Interest Company
Version 4.0 2014
82
www.eyepat.org
[email protected]
Using the Internet Safely
They have both a child and a parent contract. Remember for this to be effective both you
and your child need to agree the terms.
Alternatively you can use the EyePAT contracts which can be downloaded from
www.eyepat.org/contracts.
Ideas for Parents

I promise to listen to what my child’s wants

I promise not just to say no without thinking

I promise never to be annoyed if my child tells me about any problem they are
having on the internet.

I promise we will work together and solve any problems

I promise to get to know my child’s online friends just as I know their other
friends

I promise to listen if my child tells me if they are planning to meet an online
friend and to always go with them

I promise not just allow my child to use the computer or internet regularly as a
means for me getting some peace and quiet

I promise to play games on the computer with my child

I promise to help them with their online homework

I promise to get to know the sites my child uses. If I do not know how to I will
get my child to show me

These rules will be stuck on the computer so everyone remembers them
Ideas for young people

We will decide as a family when I can be online and what I can do. I won’t do
anything else without asking permission first

I will use the internet sensibly and not do anything that hurts other people

I will not give out any personal information such as address, phone numbers or
school details without asking my parents first

I will not give out my password to anyone except my parents (especially not to
my friends)

I will ask my parents about any messages I do not understand

I will never send anyone my picture without asking my parents first

I will tell my parents if I find anything which makes me feel uncomfortable

I will never agree to meet any of my online friends without asking my parents
first.

I will not reply to any messages that upset me or make me feel uncomfortable. If
I do I will tell my parents straight away

I will help my parents understand how to have fun and learn things online and
teach them anything they would like to know
© EyePAT Community Interest Company
Version 4.0 2014
83
www.eyepat.org
[email protected]
Using the Internet Safely
Mobiles
Most mobiles are now Smartphones and have gone way beyond being used just for
telephone calls and text messages. They are used for messaging, emails, apps, cameras
and online activities. They are increasingly replacing the computer and are now the most
common method of internet access for young people.
They are now changing from phones to phone watches!
Mobile parental controls
All mobile phone providers offer free parental control services which limit the content
children can access via the mobile network to items suitable for under 18s. However,
they may not always be automatically switched on. Check with your service provider that
the parental control settings are switched on, and ask for them to be switched on if they
are not. This is particularly important if the phone was used by an adult before.
Many mobiles can use Bluetooth to send messages, photos and videos between phones.
However, this means that other people are able to send unwanted messages which
parental controls can’t stop. But, you can turn Bluetooth on and off using the mobile
handset or you can stop other people being able to access your phone without your
permission. Instructions on how to do this should be contained in the handset manual. If
you need help, ask your service provider. It is important that you discuss using
Bluetooth with your child.
Young people often take photographs and videos of themselves (Selfies) and each other
on their mobile phones but they should be very careful how they then share these
images. Embarrassing or inappropriate photos/videos could easily be passed between
phones and put online. Once sent or put online, control over the images may be lost and
they could end up in the hands of strangers. Photographs or videos may also be used to
fuel bullying or harassment.
Chatrooms are popular with children and young people and while mobile providers’ own
chatrooms aimed at children may be moderated, others might not be. Discuss with your
child which sites they are visiting, what’s OK to post and what behaviour is acceptable.
Visit the http://www.chatdanger.com/ website for more information and advice on
this.
If your child has a profile on a social networking site they may access it on their mobile
phone. Ensure they know why it is important to allow their personal information only to
be shared with people they know in the real world. Most of the larger social networking
sites specify a minimum age of 13 for all members. For those sites that are aimed at
younger children, parental consent and confirmation of the child’s age will usually be
required. Check the minimum age requirement for users – ask your child which sites
they visit to make sure they’re visiting sites appropriate for their age.
Ofcom http://consumers.ofcom.org.uk/2009/10/parental-controls-for-mobile-phones/
© EyePAT Community Interest Company
Version 4.0 2014
84
www.eyepat.org
[email protected]
Using the Internet Safely
Sexting
Sexting is texting but with a sexual message. It can consist of just text messages but it
also often involves intimate photographs.
Children as young as 11/12 are Sexting and the latest statistics show that 38% of young
people are participating. Often it involves sending photographs to boys/girls with whom
they are currently in a relationship, or would like to be in a relationship with. What these
young people forget is that once they send a photograph or message to someone else
they have lost control over it. Very often these messages and especially photographs are
sent on by the recipient to their mates who “have a good laugh”. This can be devastating
for the sender and it is very important that children realise what can happen.
Taking these pictures is nothing new. Many adults have taken provocative pictures to
share with their partner. The big difference now is that instead of being hidden in a shoe
box in the attic or back of the wardrobe, they now get published online.
One high profile star to become a victim was Vanessa Hudgens (Gabriella from High
School Musical). In 2007 at the age of 19 she sent some nude pictures of herself to her
then long term boyfriend Zac Efron (Troy in High School Musical) but the pictures ended
up on the web and are still there for anyone to see. They will be there for many years to
come.
Jessica Logan was only 1 year younger.
Sexting is not new, but it is becoming more prevalent amongst younger people.
One tragic case was Hope Witsell was just beginning the
journey from child to teen. The middle-school student had
a tight-knit group of friends, the requisite poster of
“Twilight” heartthrob Robert Pattinson and big plans to
become a landscaper when she grew up.
But one impetuous move robbed Hope of her childhood,
and eventually, her life. The 13-year-old Florida girl sent a
topless photo of herself to a boy in hope of gaining his
attention. Instead, she got the attention of her school, as
well as the high school nearby.
The incessant bullying by classmates that followed when
the photo spread put an emotional weight upon Hope that
she ultimately could not bear.
Hope Witsell hanged herself in her bedroom
© EyePAT Community Interest Company
Version 4.0 2014
85
www.eyepat.org
[email protected]
Using the Internet Safely
One of the big problems is what to do if you receive or become aware of sexting
messages.
In the UK it is illegal to be in possession of or to distribute child abuse images. A child
abuse image is a picture of a person under the age of 18 in a naked or obviously sexual
pose. How do these laws fit in with images being taken by the children of themselves
and then sent on.
One thing is clear, you are breaking the law if you have indecent images of children
under the age of 18 on your phone or any phone in your name, however they got there.

If as an adult these images are on your phone or a phone owned by you, you are
in possession of child abuse images. Never send on or show these images onto
anyone. To protect the child you should hand the phone over the Police or to the
Head Teacher of the school the child attends, or if appropriate, to the Child’s
Parents, if you know them, and advise them that the images are there. You do
not under any circumstances show the images to them. If you are not willing to
do this, then immediately delete the images.

If your son or daughter receives an image like this they should immediately
delete it, they could potentially be prosecuted if they do not.

The way the law stands at the moment, as a Parent you should also delete it.

The Schools in particular need to be careful as personal equipment is likely to be
involved. It is not recommended that anyone in school should look at a pupil's
phone without the parents being there.

Schools should have a policy for reporting incidents. Many LAs use the flowchart
in the Becta AUPs in context publication. If they are concerned at all, they
should contact their LA for advice (they all have a LSCB - local safeguarding
children's board) or contact the Police.

Parents and Teachers should talk about the issues with pupils about the serious
consequences of doing this. Preventing it happening is the top priority.

If a child brings their phone into school with an image someone else has sent
them the schools need to follow the ‘Dealing with an Incident Flowchart’.

If these images are published on the web it could need reporting to the IWF sexual photographic images of children under 18 are illegal. These are not child
pornography pictures as some sites refer to them - they would be classed as
child abuse.
There is a dictionary of Sexting terminology on Page 190
For more information on Sexting or SGII see the CEOP website www.ceop.gov.uk.
Advice for Schools and Professionals who care for young people
Up to date information of how to deal with Sexting (SGII) incidents is available on our
website www.eyepat.org/sexting. This topic is also covered in detail in the EyePAT
Training Workshops for Teachers, Social Workers, Foster Carers and Childminders.
© EyePAT Community Interest Company
Version 4.0 2014
86
www.eyepat.org
[email protected]
Using the Internet Safely
Bullying
Bullying is on the increase. Social media, texting and online messaging has meant the
bully no longer has to be physically strong or ‘brave’ to bully. They don’t have to have
followers to make them feel safe in a group, they can now operate alone and if they wish
anonymously.
We can help the victims to deal with the bullying and there is a lot of much needed help
and support available for this.
However few people think of helping the Bully. Bullies bully for a reason and if we can
help them deal with that reason and stop bullying then we won’t have the victims. If we
recognise that the bullies, not the victims, are the ones with the problems then the
power of the bully is diminished.
Happy People Don’t Bully
Think about it. Do you know one happy person who bullies. There are lots of unhappy
people who don’t bully and there are lots of ok’ish people who don’t bully, but happy
people never bully. They have no reason to.
So - if you bully it is because you are unhappy. The target is just the person the bully
uses to pick on. The reasons for the bullying are nothing to do with the target, it is the
bullies problem.
EyePAT run workshops for adults called Happy People Don’t Bully. We also run a
Happy People Don’t Bully for Parents which complements our Happy Kids Don’t
Bully programme for children.
Workplace bullying has doubled in the last 10 years and is costing the country billions of
pounds in lost productivity and staff absence. 1 in 3 adults (34%) now experience
bullying and 80% of victims said the abuse had affected their physical and mental
health. 33% had decided to take time off, or even left their jobs as a result.
Apart from the mental anguish this causes what cost is there to society and to our
national purse. How much more effective would businesses and organisations be if they
did not have to contend with bullying?
If you would like to find out more about the workshops we run for businesses,
corporations and organisations please get in touch. [email protected] or 01446 795055.
Happy Kid’s Don’t Bully
Everything we say about people who display bullying behaviours applies to children.
However with children the statistics are even worse. Nearly half (49%) of all school
children will be bullied.
We have children taking their lives because they cannot deal with it.
We have young people growing up into damaged adults because of it.
If you would like to know more about the workshops we run in schools please get in
touch [email protected] or 01446 795055.
© EyePAT Community Interest Company
Version 4.0 2014
87
www.eyepat.org
[email protected]
Using the Internet Safely
Cyber Bullying
Cyber Bullying is social terror by technology ... and it’s on the rise. Next to viewing
“unsuitable” images, it is the second most likely thing to affect your child.
When a child of any age, up to 18 is threatened, harassed, or humiliated via the use of
technology --- this is Cyber Bullying.
Cyber Bullying is not illegal but harassment and threatening behaviour is. If it is
consistent or physically threatening, you can and should report it. However please bear
in mind, the problem is so great the police are inundated and are struggling to deal with
the number of cases. If the cyberbullying stems from the school, go first to the school
and then if necessary, through them to the Police Schools Liaison Officer.
Cyber Bullying makes it easier for bullies because they are not face to face with their
victim(s). One of the worst things about cyber bullying is that it is 24/7 – there is no
escape.
15% of Teachers are subjected to cyber bullying. This can have a whole host of effects
on the teacher personally, their class and the school.
This social online terror is sent through e-mail, Mobile Phones, social networking sites,
pager text messages, instant messaging, web sites and online personal polling web sites.
It is normally, but not always, done by children, deliberately and repeatedly and is used
by an individual or group with the intention of harming other children and teens.
Children use technology to talk to their friends and make new ones. While most children
use the Internet responsibly, others are using all of this technology to terrorize and
Cyber Bully!
Cyber Bullying is the perfect way for bullies to remain anonymous. So anonymous, the
bully thinks he has no fear of punishment. However this is not the case. Most bullies do
not realise that in fact they can be traced.
Children and teens bully online in various ways:
Instant Messaging/Text Messaging/e-mail harassment
This includes:
Sending hateful or threatening messages to other children
© EyePAT Community Interest Company
Version 4.0 2014
88
www.eyepat.org
[email protected]
Using the Internet Safely
Sending death threats using text messaging, photos and videos
Ganging up on their victim in text wars or text attacks. They send hundreds or
thousands of text messages to the victim's cell phone or other mobile device.
Creating a screen name which is very similar to another child's name but adding or
removing an extra letter. Then they use this name to say disparaging things to other
users whilst posing as the other person.
Web Sites and Social Networking Sites
Children can post photos, videos and all kinds of personal information (such as phone
numbers, address, etc.) which could endanger the child who is the victim.
Sending Pictures through E-mail and Mobile Phones
Mobile phones allow children to send pictures to each other. Pictures are received
directly on the phones and could end up in everyone's picture library.
Children often take photos of someone in a locker room, bathroom or dressing room and
post it online or send it to others on Mobile Phones. They send these via mass e-mail to
others. Some of these photos could include nude or degrading pictures of their victims.
E-mails like that get passed around to hundreds of others - ending up everywhere in
cyberspace.
Remind your child that any image they send on their mobile can be changed and shared
online, and that once they have sent an image they have lost control of it. Ask them if
they would like it posted on the school notice board. If they don’t, don’t send it!
Impersonation
Posing as the victim, Cyber Bullies may post erotic or suggestive messages in a group's
chat room posing as the victim - inviting an attack against them. They give the name,
address and phone number of the victim to make the hate group's job easier. They
might even send a message to someone saying hateful or threatening things while
masquerading as the victim. They often alter a message actually from the victim, making
it seem that they have said something horrible.
Sending Malicious Code
Children can send viruses, spyware and hacking programs to their victims to destroy
their computers or spy on their victim. If the Cyber Bully uses a Trojan Horse program
they can potentially control their victim's computer remotely, and do whatever they
want.
Sending Porn and Other Junk E-Mail and IMs
Cyber Bullies may sign their victims up for numerous e-mailing and IM marketing lists
which creates mass e-mails for the victim. They can even sign them up for porn or adult
dating sites.
Blogs
These online journals are a way for children to damage other children’s reputations or
invade their privacy. Sometimes children set up a blog or profile page pretending to be
their victim and saying things to humiliate them.
© EyePAT Community Interest Company
Version 4.0 2014
89
www.eyepat.org
[email protected]
Using the Internet Safely
Stealing Passwords
-
Children can steal the password and lock the victim out of their own account.
-
Children may use another child's password to change his/her profile and write
sexual, racist and disparaging remarks about that person.
-
Children may steal another child's password and chat with others pretending to
be the other child. They can say mean things to this person's friends or other
people.
-
Children can give or sell the password to a hacker to hack into the victim's
computer
-
Children can coerce their friends into giving them their passwords by threatening
not to be their friend if they don’t.
Internet Polling
A perfect way for children to create more rumours! Asking Who's a Bitch? Who's Not?
And children poll to answer by voting.
Trolling
This involves the posting of hateful or vindictive messages on notice boards normally
posthumously, or following a specific incident. The terms is also used when for example,
during the Olympics 2012 Trolls tweeted and posted messages on social networking to
Tom Daley saying he had let his dead father down but not getting a medal in the pairs
diving.
How would you know if your child is being bullied
With physical bullying there are often physical signs, bruises, ripped or dirty clothes,
damaged book bags or books. However with cyber bullying there are no such signs.
1. Check your child’s body language when they receive a text, are they happy or
depressed. Do their shoulders drop as if in anticipation of reading something they
don’t want to see.
2. Keep an eye for changes in a child’s appetite. A child under stress will often either
stop eating or comfort eat.
3. For the same reason, have they started to complain regularly about feeling sick.
4. Has the child suddenly started not wanting to go into school, or hang around with
their mates.
5. Is the child shutting down e-mails/social networking sites when you walk into the
room.
6. Has the child become withdrawn and stopped talking about their friends or their
day.
7. If you are a parent and are concerned you can check the child’s incoming and
outgoing text messages. It is obviously up to you as a parent to decide whether
you do this with your child’s knowledge or consent.
If you child has deleted their messages, ask why?
8. If you are concerned, speak to your child’s teachers. Ask them if they have
noticed anything different in their behaviour.
9. Set your Google Alerts with your child’s name. See Page 161.
www.eyepat.org
90
© EyePAT Community Interest Company
Version 4.0 2014
[email protected]
Using the Internet Safely
I am an adult and I am bullying what can I do?
Get the help you need to deal with the issues which are causing you to bully so you can
stop.
In the workplace go to your HR Department and ask to speak to a counsellor.
Go to your GP and ask them to refer you to a counsellor. Explain to them what has
caused you to bully.
Why Do I Bully?
Are you unhappy with your job or your life and taking it out on others?
Do you enjoy the sense of power when you hurt someone's feelings?
Do you think those people you bully deserve to be picked on because they are inferior to
you?
Were you bullied in the past and are now getting your own back?
Are you bullying your spouse or partner and your children?
Whatever the reason, we know that people who bully others do not function as well as
those who have good relationships with their families, friends and colleagues. You may
not even be aware of the hurt and suffering you are causing, but the reality is that you
need to change your behaviour.
Some suggestions:

Think before you act or speak - a delay of even 10 seconds can help you to
temper your behaviour

Ask yourself if you would like to be treated in the way you are treating others

Tell yourself that you do not need to bully - you can be nice

Apologise if you bully someone. If you can't bring yourself to say sorry at first,
then write a note

Give yourself time - it takes a while to break the habits of a lifetime

If the bullying is related to your job, change jobs

If something in your life is making you miserable and causing you to act
like a bully, then make a decision to tackle the problem
These are some websites which may help you.
http://www.kidscape.org.uk/advice/step6a.shtml
http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bullying/
DG_10031375
http://www.youthoria.org/home/life/relationships/relationshipsbullying/1239707769.175/
http://www.experienceproject.com/groups/Am-A-Bully/117245
I am a child and I am bullying what can I do?
Speak to your school or a teacher and ask them to help you.
Talk to an adult you can trust and ask them to help you. This could be a parent, a
brother or sister, a relative or a family friend.
© EyePAT Community Interest Company
Version 4.0 2014
91
www.eyepat.org
[email protected]
Using the Internet Safely
If you are in care, talk to your Foster Carer, Social Worker or Guardian.
Contact CyberMentors, NSPCC or ChildLine and ask them to help you. Details of all these
organisations are available on www.eyepat.org/help.
Remember - Happy Kids Don’t Bully. There is a reason you are bullying and it is this
reason you need to deal with and get help with.
How would you know if your child was a bully
This is more difficult, but the sad fact is that all bullies are somebody’s children. A couple
of things you might look for or do are:
1. Open up a line of communication for the child to talk to someone about issues
which affect them and how they deal with them. Remember Happy Kids Don’t
Bully.
2. Check if they suddenly buy a secondary ‘pay as you go’ mobile phone as to why?
Hiding behind non registered numbers is a favourite tool for a bully.
3. Keep an eye on their social networking and the things they are posting online.
4. Think if they have recently started saying really nasty things about someone,
either in general or more specifically within their groups of friends.
Why should I do something
Remember threatening behaviour and harassment are both illegal. Posting information
on social networking sites is considered in law to be publishing.
If you or your child is bullying the police can get involved and you/they could be
charged.
Under British Law you could find yourself being sued for damages for libel if you publish
defamatory untrue information about someone.
How can you prevent or stop bullying
There is not one quick fix to stop cyber bullying in the way you can with blocking web
pages and sites. Here are some suggestions which you may find useful.
You are the parent and as such it is up to you to decide how, when and where your
children can use technology. Especially as you are normally the one paying the bill!
If you give your child a mobile phone, it is a good idea to make it clear at the outset,
what the conditions are for your child to have this phone.
If you give your child access to a PC/Laptop and the Internet, it is again up to you, as
the parent, to agree the timings, content and location of that access.
One good way is to draw up a contract with your child at the outset, so the rules are
easily understood by both you and your children.
Things you can do are:
For Adults
1. In work - ask your workplace to run an EyePAT Happy People Don’t Bully
Workshop to help the bullies to stop.
2. If you are being bullied in work talk to someone. Do not keep it to yourself. If
possible go to your HR Department. If it is a line manager, go to a senior line
manager.
© EyePAT Community Interest Company
Version 4.0 2014
92
www.eyepat.org
[email protected]
Using the Internet Safely
3. If the bullying is via a social networking site, report it to them. They should take
action.
4. If it threatens physical violence or is life threatening contact the police.
5. Talk to someone you know or if needs be contact organisations who can help you
deal with the issues like the Samaritans.
6. Never erase anything – it may be needed as evidence,
7. Above all, remember bullying is all about the bullies problems, not about you.
For Children and Young People
1. At school - ask the school to run an EyePAT Happy Kids Don’t Bully Workshop to
help the bullies to stop.
2. Do not allow a child to have a laptop with wireless internet. Make sure they can
only access the internet when in your sight.
3. Teach children not to open or read messages from cyber bullies. Pass them onto
you and just store them as evidence.
4. Talk to the child now and tell them they can always talk to you. If you think they
may not for whatever reason, find another family member/friend who they may
be able to talk to.
5. If the child is cyberbullied, go to the school immediately. Some schools are better
than others in taking action, especially if they consider the bullying to be taking
place “out of school”, but they need to be informed.
6. Tell the child they can contact www.cybermentors.org.uk. They provide online mentors for children who have been bullied and give your child someone to
talk through their experiences with.
7. Go online to http://www.beatbullying.org/ they provide invaluable help and
advice.
8. Go online to www.anti-bullyingalliance.org.uk. They are an alliance of over 60
organisations who work together to stop bullying.
9. Contact your local anti-bullying groups. Try typing your local town/city name into
your search engine followed by “anti bullying”. This should give you a result. You
could always ask the local schools, or ring the Local Council.
10. If the bullying is via a social networking site, report it to them. They should take
action.
11. If it threatens physical violence or is life threatening contact the police. Each
school should have a school liaison officer. Ask the school for their name and
contact them.
12. Never erase anything – it may be needed as evidence
© EyePAT Community Interest Company
Version 4.0 2014
93
www.eyepat.org
[email protected]
Using the Internet Safely
Grooming and online child abuse?
Adults who want to engage children in sexual acts, or talk to them for sexual
gratification will often seek out young people who are looking for friendship.
They will often use a number of grooming techniques, including building trust with the
child through lying, creating different personas and then attempting to engage the child
in more intimate forms of communication including compromising a child with the use of
images and webcams.
Child sex abusers will often use blackmail and guilt as methods of securing a meeting
with the child.
The reality is that children leave themselves so open online, paedophiles no longer have
to work that hard to make contact.
At a workshop for foster parents and children’s home staff, we were told by the Manager
of a Children’s Home that some children in care actively promote themselves online in
order to attract potential paedophiles. Their very sad reasoning is “that to be wanted
by a paedophile is better than not being wanted at all”!
It also needs to be recognised that young people who spend excessive hours playing online to the exclusion of other activities, may not develop the social skills necessary to
meet friends and can resort to using the computer for this.
There was a case in 2009 of a young man of 22, who had spent most of his life on his PC
and perhaps had not developed the necessary skills to meet girls of his age. In this
particular case he ended up abducting a (willing) 13 year old girl. When his parents were
questioned about his disappearance their response was “he doesn’t go out he’s always
up on his computer”. He was sentenced for 6 years for child sex offences and had to sign
the sex offenders register.
This is not beginning to suggest that every child who spends hours on the internet is
going to become violent or a paedophile and it is possible that in this case his online
behaviours made no difference as he was sexually attracted to young girls.
Why child sex abusers like to use the internet to contact children?
Child sex abusers find the internet an easier place to participate in a range of child
sexual abuse activity including contact with children due to its anonymity. They will often
lie and pretend to be younger than they are, or people other than themselves.
They set up bogus email accounts and chat personas to mask their identity online. It is
very easy to do – you can set up an account on these chat rooms calling yourself
anything and using any email address to engage in conversations. During our initial
research, to find out how easy it was, one of our team, a man in his late 50s, set
himself up as a 15 year old girl called Petra. There were no checks and no come backs.
For information we did delete the account unused!
What are children at risk of?
There are a number of actions which these adults will engage in online.
These include:

Swapping child abuse images in chat areas or through instant messaging with
other adults or young people and forming networks with other child abusers to
share tips on how to groom more effectively and how to avoid being caught.

Swapping personal information on children that they have collected with other
abusers. Seemingly unrelated and disguised questions can be asked, for example
© EyePAT Community Interest Company
Version 4.0 2014
94
www.eyepat.org
[email protected]
Using the Internet Safely
– “I hate living in Newtown, it’s the pits, nothing to do – what’s it like where you
live?” – followed by “my school uniform is brown and yellow – it’s so yuk, what’s
yours like?” The groomer knows where the child lives and just by checking out
school websites for the area to see uniform colours, what school the child goes to,
and so it goes on!

Participating in online communities such as blogs, forums and chat rooms with
the intention to groom children, collect sexually explicit images and meet them to
have sex.
Children at specific risk
Certain groups of children are more at risk than others. Some children will be more
secretive about who they are meeting. They are also, in some cases, more likely to elect
to meet someone in private, so they cannot be seen.
Some groups of children and young people who will be at more risk are those who intend
meeting someone if they:

are from a different religion

are from a different culture whom their family may not approve of

are gay, bi-sexual or transgender

have not developed a trusting relationship with their carers

live within a family where parental alcohol or substance abuse is common

are estranged emotionally from their parents and siblings

are from a different social background whom they know their parents would not
approve of
These groups of children need to put separate plans in place to ensure their safety.

Never meet anyone in private, the risk of doing so, is far greater than any risk of
being seen. If necessary go somewhere you are unlikely to see anyone you know,
but never a private place.

Take the mobile phone number, car registration number of any person you are
meeting and text it to someone you trust. Let them know the time you are
meeting the person and text them when you leave.

Expect the person you are meeting to do the same with you. They also need to be
safe, but never assume that because they are going through the motions of doing
this that they are genuine.

Openly in front of the person you are meeting, take their picture and text it to
someone. If the person you are meeting is not genuine, they are unlikely to allow
you to do this.

If at all possible take someone with you as a chaperone, or if you know someone
who runs a coffee shop, restaurant, pub or bar meet there. If you leave with the
person, give a note to the person at the shop with the person’s details. They do
not have to sit with you, they can just be in the vicinity.

If you are gay and you don’t want your friends or family to know yet, don’t tell
them the real reason you are meeting the person, but do tell them who they are
and where you are going.

View the person via web cam so you can at least see that the person who you are
talking to is who they say they are. Do not however agree to do or say
anything on camera, other than general conversation. You may be being
filmed or recorded.
© EyePAT Community Interest Company
Version 4.0 2014
95
www.eyepat.org
[email protected]
Using the Internet Safely
Tips to keep your children safe on the internet
1. Know what your children are doing online and who they are talking to.
2. Ask them to teach you to use any applications you have never used.
3. Talk with your children about limiting access to approved Web sites and the hours
spent online.
4. Sit with them when they’re online - play online games with them especially when
they interact with other people.
5. Ask an elder sibling to supervise them if you can’t.
6. Keep the computer(s) in a communal area of the house, where it is easier to monitor
what your children are viewing.
7. Help your children to understand that they should never give out personal details to
online friends - personal information includes:

Their messenger ‘addy’, email address,

Mobile number

Pictures of themselves, their family or friends - if your child publishes a
picture or video online - anyone can change it or share it.

Their name, age, sex, home address, phone numbers,

Your bank details, pin numbers, passwords and user names.
8. Never ever share passwords with friends. Friends can think it’s funny to log in as
you and send out messages pretending to be you. It happens quite regularly! They
can also purposely or inadvertently pass them on.
9. If it is necessary to supply details for registration, or to buy something, your children
should always ask for permission and help from you.
10. If they want to subscribe to any services online, use a family email address to
receive the mail, or use yours.
11. If your child receives chain/spam/junk email & texts, remind them never to believe
them, reply to them or use them. They will not lose all their friends and develop
spots overnight if they don’t forward them on to 10 other people!
12. It's not a good idea for your child to open files from people they don't know. They
won't know what they contain - it could be a virus, or worse - an inappropriate image
or film.
13. Help your child to understand that some people lie online and that therefore it's
better to keep online mates online. They should never meet up with any strangers
without an adult they know and trust.
14. Teach your child to always ask anyone who contacts them on-line to switch on their
web cam so they can see who it is, or ring them over the phone so they can check
that they are really talking to the person they think they are. If you can’t see or hear
them, how do you know it’s them?
15. Warn your child that some children may think it’s amusing to goad your child into
saying bad things about someone else on a chat site, knowing that the target is
sitting with them and reading everything as it is typed.
© EyePAT Community Interest Company
Version 4.0 2014
96
www.eyepat.org
[email protected]
Using the Internet Safely
16. Let your child know that it's never too late to tell someone if something makes them
feel uncomfortable.
17. Teach young people how to block someone online and report them if they feel
uncomfortable.
18. Think seriously about using internet filtering software, walled gardens and childfriendly search engines. Use your browser's controls where these offer varying levels
of security for each family member. Details of this are available from Page 99.
19. Check out the child protection services from your internet service provider, for
example, do they filter for spam? If not, ask them why they don’t.
20. Children love to ‘chat’, but make sure they only use moderated chatrooms. Monitor
the chatrooms they are using and encourage them to introduce you to their online
friends. No one should visit private areas of chat rooms. All chat rooms visited
should be moderated and child friendly.
21. Extreme caution should be taken if your children should arrange to meet someone
they have met via the internet. You or another responsible adult must be present
and always ensure the meeting is in a public place. It may be totally genuine and the
start of a new friendship, however it may not be!
22. Encourage your children to tell you if they feel uncomfortable, upset or threatened by
anything they see online. If they receive frightening or bullying emails, or any spam
with unacceptable content they should tell you. It is not their fault that they have
received them and they must always feel confident in talking to you about anything
which makes them unhappy.
23. Suggest to your younger children that they use child friendly search engines like
Yahooligans, AskJeeveskids. To find out what is currently available type ‘child friendly
search engines’ into your internet browser.
24. Most schools will now have an Acceptable Use Policy for use of the internet (including
emails) within school. This should be made available to you, as parents. You will also
probably be asked to sign a consent form for your child to use the internet in school.
Ask the school for a copy and use it for guidance.
25. Surf the web together. Talk with your children. Go online with your children and
become part of their online life. Communication is the key to safe surfing. Involve
your children in writing your own family code of acceptable Internet use. Remember
that what is acceptable for a teenager is not necessarily alright for a primary school
child so get their input.
26. To keep up to date (with your children) on emerging technologies register on
www.thinkuknow.co.uk/parents
What to do when abuse takes place?
It obviously depends on the circumstances, however for serious offences including
abuse, consistent or threatening bullying or grooming:

Teach your children to protect their friends and report what has happened.

Alert the school head, social services or the police.

Go to the Eye PAT web site www.eyepat.org and look at the Help page. It contains
lots of useful links.

Use the CEOP Report Abuse button. It’s on the government Child Exploitation and
On Line Protection web site. http://www.ceop.gov.uk/
© EyePAT Community Interest Company
Version 4.0 2014
97
www.eyepat.org
[email protected]
Using the Internet Safely

Report the person to the chat site

A child who is bullied can contact www.cybermentors.org.uk or
www.bulliesout.com for support and guidance

Go online to www.childnetinternational.org.uk

You can also contact Childline (0800 1111). Children will be counselled, adults will
be given advice on what to do.
For less serious offences – say someone accessing your child’s MSN and sending out
messages

Change the password for MSN – or get a friend to do it if you are away and don’t
have internet access.

Send a message out to all your child’s friends telling them their account has been
hacked and to ignore any messages they have received.

Get your children to tell you if a friend starts sending strange messages. Get your
child to ring them or you ring their parents. Encourage your friends to ask their
children to do the same. Let the school know.
For less serious offences – say someone setting up a hoax or FAKE chat room account.

Try to access the account, through any invite, and post a notice on the wall to say it
is a fake account.

Block that account from accessing any parts of your account.

Contact anyone who has accepted a friends request and advise them that it is a
hoax account.

Contact the chat room site and ask for the account to be removed – it could take
some days.

Monitor it until it is removed.
Remember it could be a child doing it for a laugh, or it could be a paedophile
trying to get the children to disclose personal information.
© EyePAT Community Interest Company
Version 4.0 2014
98
www.eyepat.org
[email protected]
Using the Internet Safely
Parental Controls and Privacy Settings
The 1st thing to get clear in your mind is what filter is what. What sits where and what
does the terminology mean. The average number of internet enabled devices in houses
in 2014 is said to be 13! This includes:







Desktop computers
Laptops
Tablets
Mobile Phones
Gaming Machines
Internet TV
Mobile Watches
Long gone are the instructions to keep the computer or laptop in a central place!
There is talk about forcing the industry to enable all the internet disabled devices in the
home to run under one single filtering / control system. However this is not going to
happen within the next year or so, so for the time being parents need to look at all the
alternatives.
Communication - It’s an essential part of the process
When setting up any kind of filtering software, it is a good idea to talk to your children,
about what they want to use on the internet and why. Explain to them why you are
using the filters. Remember a child can always visit a friend’s computer which may not
have the same filters, so education needs to play a key part in their protection.
Eye PAT does however strongly encourage the use of filters, both for time, so children
cannot use their laptops or PCs at night unsupervised, and more importantly cannot be
watched if they have inadvertently left their webcam online.
For filtering to Work
Before deciding what filtering to choose you need to ask these questions:
Will it work with the age range of my children?.
We suggest you use the film classifications think this through.
What is ok for a 15 year old to see may not be suitable for a 9
year old
If the oldest is say 15 and the youngest 5, you will need
separate accounts for them with different filter levels on each.
One setting will just not work.
Time Controls - Do you want to be able to restrict access at
night and perhaps at other times? Children do go online in the
middle of the night without their parents knowledge.
Online Time - Do you want to be able to restrict the length of
time per day and perhaps per session the child is online?
Virus Control - do you need it combined or do you have a
separate package?
Ease of use - who is going to set it up?
© EyePAT Community Interest Company
Version 4.0 2014
99
www.eyepat.org
[email protected]
Using the Internet Safely
Overblocking
This can be as detrimental as under blocking as it can lead to the frustration of removing
the filters altogether, or at the least stopping people being able to access the sites they
need to. There is a lot of work being done to address this currently.
Over or underblocking will occur if the solution you choose does not fit the ages of your
family.
Technology
There are 2 key areas you need to consider:
Safety inside the home
Safety in public spaces
or friends houses.
To ensure that you are safe in both, you will probably need to apply different types of
filters to different devices.
It is imperative you have good anti virus software on your PC. If children or young
people have access to the laptop/PC it is also imperative that you install a good parental
control software. There are lots of packages available out there.
The 5 levels of filtering.
1. ISP or Internet Service Provider. All the main ISPs [Virgin, BT, Sky, TalkTalk etc.
have to provide free filters.
© EyePAT Community Interest Company
Version 4.0 2014
100
www.eyepat.org
[email protected]
Using the Internet Safely
2.
3.
4.
5.
Router - this is the box which brings the internet connection into your home.
Device - this is the desktop, the tablet, the mobile etc.
The Search Engine - Google, Bing, MSN etc.
The application - YouTube, StarDolls, Facebook, Call of Duty
Make sure the solution you choose fits your needs or the needs of your family.
In your research you may hear the terms Whitelist and Blacklist filters.
Whitelist filters
Lock every website and you then actively permit certain sites.
We would never recommend giving a very young child internet access, without
“whitelist” filters. You then have complete control about the sites they can access.
Blacklist filters
Categorise young people by age and block sites they deem inappropriate for that age
group. Allow all other sites.
Webcams
Nearly all laptops and many desktops have webcams. One specific risk with a webcam if
used in the bedroom is they can then be seen getting changed, or ready for bed.
To protect children from being watched at night you can apply time controls to their
internet access via either Parental Control software or Routers.
© EyePAT Community Interest Company
Version 4.0 2014
101
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - ISP [Internet Service Providers]
This is the Internet Service Provider the person you pay the bill to for your broadband.
Due to a lot of pressure the large ISP providers all now provide free filters.
In October 2011 the four main UK ISPs, in consultation with the government and the UK
Council for Child Internet Safety agreed to a code of practice regarding adult content
filters.
.
A side-effect of ISPs offering free parental control solutions is that the UK market for
such software will basically be decided by the choices of ISPs. Of the five main ISPs,
three offer McAfee as their parental control software.
Those who currently provide it free are BT, Virgin, TalkTalk, Sky, Orange, O2. Some
have developed their own, others like Orange use McAfee.
For details and instructions on how to set them up, contact your ISP Provider or visit
http://www.eyepat.org/howto to see the set up videos.
© EyePAT Community Interest Company
Version 4.0 2014
102
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Routers
Options are:







BT Home Hub
Linksys Wireless-G Broadband Router with SpeedBooster 802.11g
Linksys E2000 Advanced Wireless-N Router
Netgear Wireless-N 300 Router with DSL Modem
Cisco Linksys X3000 review
ZyXEL P-334WT Broadband Wireless Router
VigorPro 5510 UTM Firewall with Anti-Virus & Anti-Spam
If your router is not on this list check with the supplier. You can start by searching
online!
Reason to Block
Example
Unsuitable
Adult material for children
Undesirable
Time wasting sites for employees
Dangerous
Malware or virus-ridden web sites
Fraudulent
Confidiential data leaving your network
Routers can be programmed to restrict access times – this way you can determine how
much time and between what times - your child can access the internet.
It makes it very difficult for kids to get round it as the programming is on the router not
the PC. You can have one administrator account with access to everything. This is of
course provided they cannot guess the password!
You can set the controls for PC’s, laptops and gaming machines. Mobiles, iPAD’s and
tablets normally have their own GPRS (Internet) connection, but some do run through
the house router.
If you need help, again we suggest you go to your local IT supplier.
Do be aware there is a potential risk of children overriding this as they can use the hard
reset (which is a pin into a pin hole) and there are lists of the default passwords for all
routers circulating on Google.
There is also package out there called Routerpassview which will actually retrieve the
password which has been set up for the router, from the config. backup file which has
been stored on the machine.
Bear in mind, there is no such thing as total security as shown when Gary McKinnon
hacked into over 90 US Military computer systems! All you can do is the best you can.
© EyePAT Community Interest Company
Version 4.0 2014
103
www.eyepat.org
[email protected]
Using the Internet Safely
Netgear
NETGEAR Wireless-N 300 Router (WNR2000)
Netgear is working with Open DNS to use filtering technology in their router. There are
no additional fees or subscriptions required.
NETGEAR’s Live Parental Controls enable parents and businesses to restrict access to
unsafe websites and filter inappropriate content. Rather than install and manage
parental control software applications on individual computers and other Internetconnected devices, customers set the rules on the router, which can be managed
remotely. Therefore, these powerful network-based parental controls not only protect
personal computers but also mobile wireless devices such as the PSP™ and iPod Touch™,
and gaming consoles such as the Wii™, when connected to the wireless home network.
Additionally, the Live Parental Controls go beyond blocking inappropriate content to
include anti-phishing protection, complementing the customer’s existing Internet
security software to prevent phishing scams.
Live Parental Controls enable customers to set up filters to block content according to
more than 50 categories, including social networking sites, pornography, violence and
others. Additionally, these settings can be specified on a per-user, per-time basis. That
is, certain sites or content can be blocked for certain people at certain times of the day.
For example, a parent can block social networking sites on their child’s computer during
the day and then free it up for use in the evening when their homework has been
completed.
Live Parental Controls are immediately available on new NETGEAR Wireless-N 300
Routers (WNR2000). Installation is made simple by following the instructions on the
Smart Wizard installation CD included with the product. Customers can also visit
http://www.netgear.com/lpc for an installation tutorial and additional product
information. NETGEAR’s Wireless-N 300 Router is backed by a one-year warranty and
24/7 technical support.
Shop around as costs vary, however internet sites sell it for between £40 and £75.
Additional product information and photos can be found at
http://www.netgear.com/Products/RoutersandGateways/WirelessNRoutersan
dGateways/WNR2000.aspx.
© EyePAT Community Interest Company
Version 4.0 2014
104
www.eyepat.org
[email protected]
Using the Internet Safely
BT Homehub
BT do provide Parental Control software. Always check for their latest information on
www.bt.com. Just type Parental Controls into the BT Search Box.
These are the main features of BT Family Protection and what each of them allows you
to do:
Web blocking



Select the categories of websites that will be blocked or allowed for each user
Create a list of custom keywords to block
Set the filtering of YouTube videos
Instant messaging


Select which instant messaging applications you allow
Log instant message conversations that your children have through MSN Instant
Messenger, AIM (AOL Instant Messenger), Yahoo! Instant Messenger and ICQ
Instant Messenger applications
Time limits


Set limits on how long a child is allowed online each day
Set a daily schedule that specifies what time of day a child is allowed to be online
Email blocking

Filter email so your children can only exchange emails with addresses that you
approve
Social networking


Monitor inappropriate and vulgar words posted on social networking sites, blogs,
forums and other sites
Enter private information that you wouldn't want posted online and get alerts if
this information makes it on to the internet
© EyePAT Community Interest Company
Version 4.0 2014
105
www.eyepat.org
[email protected]
Using the Internet Safely
Program blocking


Take control of applications, file transfer protocols, and communication protocols
that use the internet such as instant messengers, email, FTP, and peer-to-peer
file sharing
Add custom programs that BT Family Protection will either block completely, or
monitor their usage
Usage reporting

See what websites were visited and blocked, instant messenger conversations,
and any programs that have been used online
Instant alerts

Select a sensitivity level and be notified instantly by email, text message, or
phone when a user tries to access banned websites
DrayTek
DrayTek's Web Content Filtering (WCF) facilities enable you to
protect your network and your users from web content
according to your preferences.
As DrayTek WCF is performed by your router - your point of
entry to the Internet - it is far more difficult to circumvent
than software solutions installed on each client/PC and applies
to guest PCs too (laptops etc.). Blocking/filtering can be
selective for certain users or groups too, so that, for example,
managers can have less filtering imposed than other users
and time schedules can apply these content filtering for
specific time periods only.
Staff Internet Abuse - A real cost to your business
The Internet provides your business with an effective, useful and often essential facility.
Your staff can use it to find quick answers, liaise with customers, send and receive
emails and many other productive tasks. Unfortunately, the Internet also provides the
opportunity for misuse. DrayTek products can help you restrict, control and monitor staff
Internet usage.
Staff using your Internet facility for time-wasteful activities are costing you. Even more
importantly these activities can put your businesses computers and network at risk. A
recent survey of 10,000 employees indicated that 44% admitted to spending time on the
Internet for personal use, for up to 2.1 hours per day.
Most staff are responsible and prudent with their Internet use and we always
recommend a suitable AUP (Acceptable Use Policy) to be in place so that staff or any
users of your systems know what they are and aren't permitted to use the computers
for. This AUP can be re-inforced by DrayTek routers which can block specific content
(either at certain times only or all times) and also block potentially harmful file/code
© EyePAT Community Interest Company
Version 4.0 2014
106
www.eyepat.org
[email protected]
Using the Internet Safely
types from being installed by rogue web sites. There are some staff who will make
severe abuse of the Internet facilities - spending literally hours on personal matters or
social networking sites.
Top 5 Personal Internet Uses for Employees

Personal Email: Hotmail, Gmail, Yahoo etc.

Instant Messaging: MSN, AOL, Yahoo etc.

Social Networking: Facebook, MySpace etc.

Buying: Using Amazon, Ebay etc.

Multimedia : YouTube, iPlayer etc.
It's easy to let a 'quick visit' become a prolonged stay without realising and losing track
of time. All of the above activities can be immensely time consuming and addictive.
What doesn't quite make the list but could be even more serious in its consequences is
adult or illegal material being accessed in the workplace, as well as the higher likelihood
that such sites are infected with malware which will then get onto your business
network. There is also the potential to 'innocently' download software and install it on
local PCs, unwittingly introducing spyware or Trojans onto your network.
DrayTek Web Content Filtering
DrayTek Web Filtering allows you to block web content in three main ways:
1. By matching keyword / specific sites
2. By web site category (Subject to Subscription)
3. By digital content type
4. IP Filtering (Actually part of the firewall, along with many other security
features.)
Features 1,3 and 4 above are included with the router. Feature 2 is included but requires
an annual subscription to the external server which keeps a real-time constantly updated
database of web sites. More details of that later.
1. Keyword Matching
In Keyword Matching you can specify a list of either banned (blacklist)) or permitted
sites (whitelist). The DrayTek method is 'object' oriented, which means that you create
lists of keywords or sites, can then group them and then apply them into specific user
groups or time periods
Using a blacklist, all sites would be accessible by your users except those that match the
keywords you specify. This would be useful, for example where there are specific sites
known to be causing disruption or time wasting in your organisation such as social
networking or webmail. The example below would allow access to all sites except the
ones listed:
Their website is www.draytek.co.uk. Search the site for “Parental Controls”.
© EyePAT Community Interest Company
Version 4.0 2014
107
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Device - Operating Systems
Windows 7
To provide filters Windows links the person’s account to Windows Life Family Safety.
Unless you are happy for everyone who uses the computer to have the same level of
access you firstly need to create an account for each person.



Click on the Start Button
Select Control Panel
Under User Accounts and Family Safety


Choose Add or Remove User Account
Click Create a New Account [see below]

Enter the name for the account and then press Create Account
© EyePAT Community Interest Company
Version 4.0 2014
108
www.eyepat.org
[email protected]
Using the Internet Safely
To turn on Parental Controls for a standard user account

Click on the account

Click on Set Up Parental Controls
If you're prompted for an administrator password or confirmation, type the
password or provide confirmation.


Rechoose the Account
You will now be promoted to log into your Windows Live Family Safety Account.
Enter your Username and Password

If you do not have an account click on Don’t Have a Microsoft Account - Sign Up
and fill in the appropriate boxes.
© EyePAT Community Interest Company
Version 4.0 2014
109
www.eyepat.org
[email protected]
Using the Internet Safely
Once signed in you may need to revert to the Set Up Parental Controls screen [see
above} and click on Child again. Either way this box will appear.

Choose the account to monitor and click on Next
You will be asked to match the child with a family safety member. If one does not exist
create a new one. Do not choose the adult.
© EyePAT Community Interest Company
Version 4.0 2014
110
www.eyepat.org
[email protected]
Using the Internet Safely

Click on Save
Setting up Windows Life Family Safety
This is the next stage in the process. All you have done in Windows is to apply the
Family Safety setting to the Child’s Account. You now need to apply the setting for the
child / children within Windows Live Family Safety.


Click on the Family Safety Website link [see above]. This will take you onto the
appropriate web page.
Choose the child’s account.
© EyePAT Community Interest Company
Version 4.0 2014
111
www.eyepat.org
[email protected]
Using the Internet Safely

Apply the relevant settings within each box. Carefully check each box out.

When you have finished click on the
icon to return to
another account.
To log out click on your name to the right of the screen and choose Sign Out.

© EyePAT Community Interest Company
Version 4.0 2014
112
www.eyepat.org
[email protected]
Using the Internet Safely
Windows 8
The same process applies for Windows 8 as Windows 7. It is just the steps look different
because of the different layout or graphics between the two.

Move your cursor all the way to the right in the Windows 8 Desktop, and then
select Settings [spikey wheel] when the Charm bar appears

Select Control Panel from the options under Settings

Click on Family Safety where it appears over on the left in the Control Panel.
© EyePAT Community Interest Company
Version 4.0 2014
113
www.eyepat.org
[email protected]
Using the Internet Safely

Click on Manage settings on the Family Safety Website

Login to the family safety account using the same user password as is on your
computer. Click View activity report on the user you want to set up parental
controls for.

Click on Web Filtering and select Turn on web filtering to filter what the user
can access on the Internet. Select the Designed for Children option and click
Save.
© EyePAT Community Interest Company
Version 4.0 2014
114
www.eyepat.org
[email protected]
Using the Internet Safely
Apple Mac
To create a user account:




Choose Apple Menu / System Preferences and click Accounts
Open Accounts preferences
Click the Lock icon to unlock it and type an administrator name and password
Click the Add [+] button below the list of accounts
Choose a type of account from the New Account pop-up menu
Administrator - an administrator can create, delete and modify accounts, install software
and change system settings.
Standard - standard users can install software for their own use and change settings
related to their accounts but can’t administer other accounts
Managed with Parental Controls - for these accounts the administrator can restrict access
to applications and inappropriate content and limit the amount of time users can use the
computer.
Sharing Only - sharing only users can access shared files but can’t log in or change
settings on the computer
Group - a group account contains other user accounts and is used for setting privileges
for shared files.



Enter a Name for the account.
A short name is generated automatically. If you want to use a different short
name, enter it now. [After the account has been created you can’t change the
short name].
Enter the Account Password in the Password and Verify fields and then enter
a Hint to help the user remember the password.
Click Create Account
Managed with Parental controls Accounts
Under this type of account you can limit almost everything, from programs that can be
used, internet sites, whether or not they can print, burn CD/ DVD’s, films, downloads,
browsing and apply time limits.
It is simply a matter of clicking the boxes that you’d like to allow access to.
© EyePAT Community Interest Company
Version 4.0 2014
115
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Device - Commercial Software
There are a number of software packages available on the market to help you monitor
what your child(ren) can look at and do on the internet. They range in their functionality
from:
 Reading every email sent or received
 Seeing both sides of every chat or message they take part in
 Seeing every webpage they visit and how long they stay there
 Blocking access to inappropriate sites
 Seeing every keystroke they type in on their computer
 Controlling when they can use the computer and what programs they can use
 Being notified when any specific words you select are used in any communication
 Filters are updated regularly and automatically when they are logged on,
irrespective of which computer is used, e.g. home desktop, own laptop, etc.
These are some which are recommended:
© EyePAT Community Interest Company
Version 4.0 2014
116
www.eyepat.org
[email protected]
Using the Internet Safely
The Utility Warehouse Packages
To purchase a broadband package visit www.utilitywarehouse.co.uk/G35815. If you
need any help with this call us on 01446 795055 or contact us on [email protected].
© EyePAT Community Interest Company
Version 4.0 2014
117
www.eyepat.org
[email protected]
Using the Internet Safely
Note: To help fund the work we do on online safety and anti-bullying, EyePAT CIC
receives a donation for every householder or business who signs up for any of the Utility
Warehouse packages.
My Secure PC from Utility Warehouse
To order go to : www.telecomplus.org.uk/G35815 or http://www.eyepat.org/mysecurepc
As part of their ‘Broadcall’ package, Utility Warehouse offer MySecurePC.
MySecurePC provides a comprehensive range of tools to provide all-round protection
against internet threats such as spam, viruses, and hackers. It's also really simple to
install!
Once installed, MySecurePC is hassle free, helping to ensure that your computer is safe
from all the threats of the internet. It automatically protects your computer in the
following ways:
Parental Control - Allows parents to restrict which websites can be accessed and also
limit internet use to specific times of day, giving you complete
control and peace of mind.
Anti-virus -
Detects and removes all known viruses, with automatic updates.
Firewall -
Protects your computer against hackers. You are in control of who
can access your computer and data.
Anti-spyware -
Constantly checks and removes any malicious software which may
have become installed on your computer.
Anti-spam -
Monitors all incoming e-mail and automatically transfers any
suspect e-mails into a spam folder for you to view at your leisure.
Internet customers can try the service free for 30 days by visiting 'the Clubhouse',
© EyePAT Community Interest Company
www.eyepat.org
118
Version 4.0 2014
[email protected]
Using the Internet Safely
available at www.utilitywarehouse.co.uk/clubhouse.
Customers will need to unsubscribe if they do not wish to continue with the service
after the 30 day trial. At the expiry of the free trial, MySecurePC costs the following:
Number
of
Licences
Cost per month
1
3
5
8
16
24
£3
£4
£7
£10
£17
£25
© EyePAT Community Interest Company
Version 4.0 2014
119
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Device - Tablet
Tablets Connect to the internet via the broadband. The filters which are applied at the
ISP or Router level will therefore apply in the same way to the tablet as they do to a PC
or laptop.
As with a laptop however, when you use the tablet in public spaces or via someone else’s
Broadband, those restrictions will apply.
Currently parental filters in public places are purely voluntary. McDonald’s do have them,
but many places like coffee shops offer unlimited unfiltered WIFI.
If using a Dongle then the filters on this will apply.
It is important to remember that filters may need to be applied at more than one source.
iPAD Applying Safety Controls
The iPad is a hand held computer which connects to the
internet. This means parents should take the time to
understand the iPad’s parental controls and how to set
them. Taking a few minutes to apply the correct controls
can be invaluable for your children.
The process is fairly simple and very similar to that of the
iPhone and the iPOD Touch
You can always use RangerBrowser instead. See Page 148
Find the Settings button on your home
screen
Find the General tab on the left side.
Click the Restrictions option
At the top of the screen click Enable
Restrictions. This will bring up a password
box. As this is your first time, you’ll need
to think of a code and enter it twice to
confirm.
Note we suggest you use the same code
for all these applications.
Note Don’t forget this password. It’s your only
way to turn restrictions on and off on the
© EyePAT Community Interest Company
Version 4.0 2014
120
www.eyepat.org
[email protected]
Using the Internet Safely
iPad. If you forget, the only way to bypass
it is by resetting your iPad to the factory
settings.
You have the option to disable or enable a
number of apps and allowances:
Safari – (the Apple Internet Browser),
YouTube, installing apps, etc.
Switching these apps to the off position
will actually remove them from the iPad’s
homepage—meaning your children won’t
be able to access them until you switch
them back on.
Some suggestions:
Safari – Turn this off if you don’t want your
child browsing the web.
Safari doesn’t have a content filter, so
unless you’ve installed a third-party, kidfriendly web browser, it is advisable to
switch this to off.
YouTube Safety mode isn’t available, so it
is safer to switch this to off.
Installing Apps with this switched on
children can download apps and you could
well receive unwanted bills from Apple.
Scroll down on the same page.
You can choose the type of content you
allow to be downloaded, installed or viewed
on your iPad, as well as the option to
disable in-app purchases.
© EyePAT Community Interest Company
Version 4.0 2014
121
www.eyepat.org
[email protected]
Using the Internet Safely
The recommended setting for these is Off.
In-app purchases – these are actual
purchases made inside any app that’s
downloaded to your iPad. eg If your son or
daughter decides that they want to buy
£100 worth of gold coins in a game they
can.
Note - if you’ve ever bought an app in the
App Store your iTunes account is probably
linked to your credit card.
You can also limit the kind of content that
gets downloaded or played on your iPad.
This is done by selecting the rating for
each type of content.
Music – setting the Explicit setting to OFF
disables all explicit purchases in the iTunes
Store and stops explicit songs that your
child may already have on their iPad being
played
Movies
The recommended setting for this is G or
PG
TV Shows
The recommended setting for this is G or
PG
Apps
The recommended setting for this is 4+ or
9+ depending on the age of your children.
Note These settings are based on your children being under 11. If the children are
older then adjust the settings accordingly.
© EyePAT Community Interest Company
Version 4.0 2014
122
www.eyepat.org
[email protected]
Using the Internet Safely
Disabling In-App Purchases on iOS and Android Devices
Many thanks to Yoursphere.com for providing this information
In-app purchases can pose one of the biggest headaches for parents whose children
have Smartphones or tablets. If you assigned your credit card to your child’s
Smartphone, you probably didn’t give it much thought. By why would you? They don’t
have their own credit card, so it only made sense. But what parents usually don’t realize
about these devices is that their child has easy access to three different types of mobile
apps out there:
Free
Paid-for
“Freemium”
The first two are self-explanatory, but freemium is a word that’s new to a lot of people,
and it essentially means that the app is free to download and free to use, for the most
part, but the user has the option to make purchases from within the app. These
purchases are tied directly to your credit card account, making the entire purchasing
process rather easy and fast for even the youngest child.
Months later, the unsuspecting parent takes a look at their credit card statement only to
find a £5 charge here, a £10 charge there and a few more £1 charges from a company
they’ve never heard of. At this point, of course, it’s a day too late, but that doesn’t mean
you can’t prevent it from happening again.
Below is a guide that shows you how to quickly disable in-app
purchases in an Apple or Android mobile device, including
Smartphones and tablets. Please share it with other parents who
you think would benefit from it.
Tap the Settings icon
Tap General
Tap Restrictions and then Enable Restrictions
© EyePAT Community Interest Company
Version 4.0 2014
123
www.eyepat.org
[email protected]
Using the Internet Safely
Enter a PIN and re-enter to confirm
Now, scroll down and turn off in-app purchases
Disabling In-App Purchases on Android Devices
1. Open the Google Play Store app
2. Press the Menu button and then choose Settings
3. Scroll down a bit and under User Controls select Set
or Change PIN
4. Enter a PIN and press OK
5. Re-enter the PIN
6. Check the box that says Use PIN for purchases
Now you can take comfort in knowing that your child is enjoying their smartphone
without having to worry about an unexpected credit card bill or them seeing content that
you don’t approve of. Technology should be enjoyed by all of us, especially our children,
but only when parents are involved and proactive!
© EyePAT Community Interest Company
Version 4.0 2014
124
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Device - Mobile
Mobile Phone Operators Parental Controls
Links to videos showing how to apply parental controls are available from the EyePAT
website http://www.eyepat.org/howto
Check out the websites for these operators for more up to date information. At the time
of writing February 2014 .........
They have developed a system called Content Lock which helps
prevent children from accessing 18-rated material. Content Lock
has three settings: On; Moderate and Off. All mobiles, USB
sticks and data cards are sold with Moderate Content Lock
already applied, free of charge.
With Content Lock on, you won't be able to access any unmoderated [and interactive]
user generated sites, chatrooms and 18-rated material from the internet, t-zones (our
downloads portal) and third party shortcodes. Moderate Content Lock still restricts
access to all 18 rated material, but allows most social networking sites such as Twitter
and unmoderated user generated content sites such as Youtube, Flickr etc.
Types of websites that can't be accessed when Content Lock is on, include:
Unmoderated social networking sites, Unmoderated chatrooms, Sites with persistent bad
language, Visual material of a sexual nature, Horror content, Extremely violent content
Tip: Your child may also receive content directly from other people, for example in text
messages or picture messages. We can't filter any of that privately sent content. You
should therefore discuss with your child the types of content you'd be unhappy for them
to receive or share with others.
How to apply Content Lock
Children are at high risk of coming into contact with inappropriate content when they are
given a second hand phone where Content Lock has been turned off. If you give a TMobile phone to a child, it's your responsibility to make sure Content Lock is turned on
again before you give it to them.
You can find out whether Content Lock is on or off on your phone by either,
calling 1818 or by calling Customer Services on 150 or from My T-Mobile.
If you find that Content Lock is off and you want to turn it on before giving the phone to
your child, you can do this simply by texting STRICT to 879.
To switch to Moderate Content Lock .i.e give your child access to Youtube, Twitter and
other similar content, but not 18 rated content, text MODERATE to 879.
How to remove Content Lock
Moderate Content Lock is automatically applied to all our devices however, you can ask
to have Content Lock removed if you can prove that you're over 18. There are various
simple ways by which you can you can verify your age and remove Content Lock
Call 1818 from your T-Mobile phone and enter in your credit card details,
Enter your credit card details in the web page that appears when you access a site
blocked by Content Lock.
Login to My T-Mobile and remove Content Lock (pay monthly customers only)
Visit a T-Mobile store with a proof of ID such as a. driving licence, credit card or passport
Or call 150
© EyePAT Community Interest Company
Version 4.0 2014
125
www.eyepat.org
[email protected]
Using the Internet Safely
If Content Lock is turned off using a credit card, a £2 charge is applied and then
recredited immediately to that credit card. The transaction will appear on the card
holder's next credit card statement as 'Content Lock Removed'
Three Parental control on your child’s phone.
They protect under-18s from adult content, so they’ve made sure that all
phones on their network can restrict access to websites and phone services
that contain content that is inappropriate for people under the age of 18.
You might want to consider this if you're concerned about your child
accessing age inappropriate content on their phone. The restrictions are
applied by Three so your child won't be able to remove them.
If your child has a Pay As You Go phone, adult content will automatically be filtered on
their phone.
If your child has a Pay Monthly phone, they'll automatically be able to view adult content
unless you choose to block it by setting up an adult filter on their phone. Once it's been
set up, the filter can only be removed by someone aged 18 or over
Accessing adult content on your phone.
They’re working with the BBFC to make sure that adult content can only be accessed on
phones if you’re aged 18 or over.
Certain websites will be filtered for anyone under 18.
How to change your filter settings.
You can block and unblock adult content on your phone by giving us a call or adjusting
your settings yourself.
1. Go to mobile.three.co.uk on your phone.
2. Select My3 account.
3. Select Account security.
4. Select Update adult filter settings.
5. Enter your PIN. If you haven’t got one, you’ll need to set up a PIN in your My3
account.
6. Switch your adult filter settings to on. You can turn it off again whenever you
want.
7. Select Save.
Mobile Parental Controls mean that adult content such as
pornography, gambling and violent games is filtered out when you
use the internet on your phone. This is designed to help protect
under 18s from accessing inappropriate content and is turned on by
default on all phones. If you want to turn it off, you can do this by
calling us on 08700878751.
Its important to remember that Mobile Parental Controls will only apply to websites
accessed over our mobile network. If you connect the phone to your home broadband
using wireless then you can use their online security service HomeSafe™ , which lets you
control the types of websites the household can access, across every single device that
connects to your home broadband. Its free and set up through My Account .
© EyePAT Community Interest Company
Version 4.0 2014
126
www.eyepat.org
[email protected]
Using the Internet Safely
There is also lots of advice to help you keep you and your family safe online in
http://www.talktalk.co.uk/security/.
Parental Control is a service they offer to help parents protect their
children while they're online. It restricts internet access on a mobile to
sites which are suitable and interesting for children.
To turn Parental Control on or off Call 61818 to control web access on your mobile
or use the online service
Call 1300 to keep your phone location private
'Location based services' are mobile phone services which depend on information about
the location of a mobile in order to work. For example, when you're lost, you use
Streetmap. And on O2 Active, there's a service to help you find the nearest cashpoint.
Although it might seem like a useful idea to be able to track where your child is via their
mobile, it can actually bring with it certain risks. It means that any third parties, whether
they have any harmful intentions or not, are able to find out the whereabouts of a child's
mobile - and potentially, its owner.
When you buy your child a new mobile phone or pass down a used one, you should
check the location based settings on the phone by dialling 1300, an automated response
number. You'll then be able to select from a menu of four different privacy settings. To
have maximum privacy for your child, select option 4. You can then check and change
this setting as often as you like, by dialling 1300 from the mobile.
Please note: if there's ever an emergency and the police need to track down a person's
phone, they will be able to request that the location based settings be switched back on,
regardless of which setting has been selected.
Call 61018 to block 18+ content on your mobile
We respect our customers' freedom to choose what material they access. But equally,
we want to help protect children from seeing things they shouldn't. So our approach to
controlling access is strict.
You should check your child's phone is set at the right level by phoning the Age
Verification automated service on 61018. Just dial the number and follow the prompts.
This is especially important with a 'hand-me-down' phone, which could have been
switched to the 18+ setting by its previous owner.
For further details go to:
http://www.o2.co.uk/support/generalhelp/howdoi/safetycontrolandaccess/p
arentalcontrol
Vodaphone – Content control and Vodafone Guardian
Content control protects younger customers from seeing inappropriate
pictures and internet content on our network. They automatically put
it in place on their devices to protect from: chat and dating services,
erotica, gambling and violent games
To remove it for the first time they need to check you’re over 18, and after that it’s easy
to add or remove it again – say if you lend it to someone under 18.
Vodafone Guardian is their free Android app to help parents protect their children as they
use their phones – with even more control than our content control.
© EyePAT Community Interest Company
www.eyepat.org
127
Version 4.0 2014
[email protected]
Using the Internet Safely
For further details go to http://help.vodafone.co.uk
Orange – New ADSL Value Added Service content filtering from
Orange internet can block access to known sites that promote objectionable content and
approve a list of sites for children to enjoy.
Blocked Categories include IWF-Restricted Categories, Adult/Mature Content, Illegal
Drugs, Illegal/Questionable Sites, Intimate Apparel/Swimsuit, Nudity, Personals/Dating,
Phishing, Pornography, Proxy Avoidance, Sex Education, Sexuality/Alternative Lifestyles,
Spyware Effects/Privacy Concerns, Spyware/Malware Sources, Violence/Hate/Racism,
Weapons
You can choose the categories you want to block by entering your Parental Control
username and password.
Full details are available on:
http://www.orange.jo/sites/residential/English/MyAccount/internet/Pages/p
arentalControl.aspx
Virgin - If you’re a Virgin Media customer, you don’t need to buy
parental controls software because it's included in their Virgin Media Security product.
Virgin Media Security lets you filter and block more than 550 million websites based on
how suitable they are to your child, and it constantly updates to stop any unsuitable
sites slipping through the net.
Firstly, you will need to create a Windows User Account for each person in your home.
This will then be used to configure Virgin Media Security to fit the age of your children.
You might choose a more relaxed profile for your older child, for example. You can also
set up a profile with no restrictions for the adults in the house..)
You can also stop your kids using the web at certain times (perhaps when it’s past their
bedtime) or specific sites (like Facebook and YouTube) when they’re meant to be doing
their homework.
More details available on:
https://my.virginmedia.com/discover/broadband/your-broadband/protectfamily/parental-controls/
© EyePAT Community Interest Company
Version 4.0 2014
128
www.eyepat.org
[email protected]
Using the Internet Safely
iPhone Controls
iPhones, as with nearly all mobile phones have internet access.
This needs to be controlled in the same way as any other
internet enabled device. Here are a few things you can do.
However you still need to phone the service provider (whom
you pay) and ask for Parental Controls to be applied to the
phone if it is being used by a child.
You can always use RangerBrowser instead. See Page 148
Go into the phones
Settings
Go to the General Tab
Scroll down and look for
the tab called
Restrictions.
If it says Off change it to
Enable Restrictions.
At the top, click on
Enable Restrictions.
Create a password and
don’t forget it as
there’s no way to
retrieve it.
Disable any functions such
as YouTube. This removes
the icon completely from
the iPhone’s screen.
Note Re-enabling these functions is as simple as following the same steps, re-entering
your password, and turning the functions back on.
Passwords – it’s a really good idea to create one sophisticated password but easily
remembered password for all your children’s devices. It must be one they cannot
guess. It should contain capitals and lower case and numerals
© EyePAT Community Interest Company
Version 4.0 2014
129
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - iPod
Just about everything safety related is managed from the
Settings App. Tap it and select the menu called “General”.
From the General menu, scroll down to the option called
“Restrictions”. When you click this you’ll be asked for a
password. Create one, don’t share it, and don’t forget it.
Now you’ll be at the Restrictions page. This is essentially your Parental Safety Controls
Dashboard. Here you can do several things, including:



Remove/restore certain apps from the device.
Set restrictions for the App Store.
Set content restrictions for videos and music.
The first thing to do is switch Location to “off”. No one needs to know where your child
is in real life!
Next disable Safari since it doesn’t allow you to set content filters. If you want to allow
your child to access the Internet, download one of these browsers:



K9 Web Browser
Ranger Browser
AVG Family Safety Browser
© EyePAT Community Interest Company
Version 4.0 2014
130
www.eyepat.org
[email protected]
Using the Internet Safely
With the new browser installed turn off the YouTube app since there’s no way to set a
filter there which forces you to rely on the web version of YouTube via the mobile
browser.
Finally turn off the ability for your child to install apps without your permission. Turning
this off removes the App Store button from the Touch entirely. From here you can now
set the content restrictions for movies, TV shows and music.
Note that setting the Explicit setting to OFF makes it so any
explicit songs that your child may already have on their iPod
become unavailable. It also disables all explicit purchases in
the iTunes Store.
There is also the option to set the age restrictions for downloading
apps from the App Store, but this is somewhat useless as it still allows
your child to see the adult apps and read the description. They are
only prevented from downloading it to their iPod.
© EyePAT Community Interest Company
Version 4.0 2014
131
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Device - Gaming
XBox 360 - Parental Controls
Due to Xbox’s success it attracts cyberbullying, Sexting,
grooming, and inappropriate communication.
XBox is great but it is also used by people who would like to
harm your children. So its important to activate Xbox’s Family
Setting safety controls to keep them safe.
There are 2 key things a parent needs to do when allowing their
children to use an XBox.
a) Make sure their child doesn’t post any Information online which could result in
them being traced or found.
b) Take responsibility for their child’s safety by setting the Xbox Family Setting
safety controls.
1. On the main dashboard, go to the tab called My
Xbox
2. Then scroll over to the box called System
Settings
3. Click on Family Settings
4. Click on Console Controls
Each category is explained in detail below. Do each
one in turn.
© EyePAT Community Interest Company
Version 4.0 2014
132
www.eyepat.org
[email protected]
Using the Internet Safely
Console Controls & Game Ratings
Choose the game rating
5. Recommended Setting for children is G or PG
Console Controls Video Ratings
For DVDs
6. Recommended Setting for children is G or PG
Unrated DVDs (family DVDs are not rated)
7. Recommended setting for children is Allowed
Console Controls XBOX Live access - allow or block
altogether.
Blocking prevents your child from using ANY Xbox Live
feature, i.e. online gaming, Netflix, Zune, and chatting
with friends.
8. Safest setting for very young children is Blocked,
however this may be too restrictive for older
children. Suggest Allowed but only with parental
supervision.
Console Controls XBOX Live Membership
Creation allows you to block or allow people from
creating new memberships on the console.
Console Controls Restricted Content
9. If you are unlikely to change previous settings:
Recommended setting Hide Restricted Content
If you want easy access to change settings using
password
Recommended setting Show All Content
© EyePAT Community Interest Company
Version 4.0 2014
133
www.eyepat.org
[email protected]
Using the Internet Safely
Console Controls Family Timer
Set weekly and daily time limits for children logging
into their Xbox accounts.
10. Highly recommended – research has shown
excessive gaming does change children’s
behaviour.
Console Controls Set Pass Code
11. Set a password – very important
Use a password you will remember but the children
can’t guess.
Select Done button and Yes, save changes
Its all done!
Note: If you set a family timer, you should immediately see a pop-up which shows a
countdown.
Note: You can test the family settings by running a game that exceeds the rating you
specified. If the game is rated higher than you allowed you’ll see a pop-up asking for the
pass code.
© EyePAT Community Interest Company
Version 4.0 2014
134
www.eyepat.org
[email protected]
Using the Internet Safely
Xbox 360 Netflix ‘Just For Kids’ User Interface
Many thanks to Techcrunch for providing this information
Netflix is making it even easier for kids to bypass channel surfing and search for their
favourite shows and characters, with an updated app for the Xbox 360. The latest
version of Netflix’s Xbox 360 app, brings its increasingly popular ‘Just For Kids’ user
interface to the gaming console.
Netflix’s Just For Kids UI debuted nearly a year ago, offering its younger users an easier
way to find and watch their favourite shows.
Unlike Netflix’s usual user interface, which highlights movie box art and descriptions,
Just For Kids is character-centric, so that toddlers can navigate what they want to watch
based on which popular characters most appeal to them, whether it be Dora The
Explorer or Spongebob Squarepants.
Since introducing the UI on the web, Netflix has been busy porting it to other devices,
such as the Nintendo Wii, PlayStation 3, Apple TV… and now the Xbox.
For the Xbox 360, the updated app is a clear win, as it will mean even more media
consumption on the game console. Microsoft seems to be pushing the Xbox more as a
media hub than a game console these days, so grabbing the attention of a home’s
youngest users is one way to solidify its place in the living room.
© EyePAT Community Interest Company
Version 4.0 2014
135
www.eyepat.org
[email protected]
Using the Internet Safely
Wii Parental Controls
If your Wii connects to the internet you need to set the
parental controls to keep your children safe.
It’s your choice whether you tell the children you have done
this, but children don’t always like parental controls and some
do try and get around them. Quietly setting it up beforehand
means the children may not realise they are there.
These step by step instructions should make it easy to do.
What to do:
1. Turn on the WII and from The Wii Menu, select the Wii button
2. Select Wii Settings.
3. Click the blue arrow on the right to access Wii System Settings 2.1
4. Select "Parental Controls" and Yes.
5. Click Ok 3 times to begin setup.
6. Input a PIN number then select OK. Your pin number must be secret but something you
will easily remember but not easily guessed (avoid birthdays your children know them!)
7. Enter the PIN number again and select OK.
8. Select a secret question and click OK. Again make sure the children can’t guess it.
9. Enter the answer and select OK.
10. Select Game Settings and PIN then
The Highest Game Rating.
© EyePAT Community Interest Company
Version 4.0 2014
136
www.eyepat.org
[email protected]
Using the Internet Safely
11. Use the blue arrow to scroll through the ESRB ratings.
See below for a description of the settings.
12. Select the desired rating restriction and OK.
13. Select Confirm.
Select Other Settings and OK.
This allows you to restrict settings to:

Internet access
© EyePAT Community Interest Company
Version 4.0 2014
137
www.eyepat.org
[email protected]
Using the Internet Safely



spending Wii Points in the Wii Shop
user-to-user communication
Wii News Channel.
Restricting the features:

Recommended restriction setting is Yes.
The Internet Channel – Allows the use of the Wiii to browse the Internet. We would not
recommended this for young children. Do they really need it from their Wii?

Suggested restriction setting is Yes.
The Wii Shop Channel – This is where Wii users can purchase Wii points with their credit
card, and then use those points to buy downloadable games (old Nintendo games, Wii
games, etc) or applications like Netflix *.

Recommended restriction setting is Yes.
User-to-user communication – Pretty much exactly what it sounds like. Restricting this
is a good idea as the Wii allows your children to chat with other Wii owners (strangers) via
text or voice. This is not safe for young children.

Recommended restriction setting - No
The News Channel
Note: Some features will not appear until the Wii Console is connected to the Internet.
14. Once all selections are made, select Confirm.
15. Select Settings Complete to save the changes.
*
Note: The Netflix app is not disabled or filtered by any of these Parental Controls. The
restrictions you set on game ratings do not affect the content which can be streamed on Netflix.
Netflix has separate parental controls for this, which you can access through your Netflix
account.
© EyePAT Community Interest Company
Version 4.0 2014
138
www.eyepat.org
[email protected]
Using the Internet Safely



Go to Netflix.com, log in, and then click on the link in the top right corner called Your
Account & Help.
Scroll down to the Preferences box and click on the link called Change Parental
Control Setting.
From here you can select the restrictions that best suit your family.
© EyePAT Community Interest Company
Version 4.0 2014
139
www.eyepat.org
[email protected]
Using the Internet Safely
Filtering - Search Engines [Browser]
Firefox



Open Firefox
Click the Firefox tab in the top left
corner. Scroll over Options and then
select Options from the menu.
The Options window will display. Click
the Privacy tab.
Here, you’ll need to do a few things.


First, check the box that says Tell websites I do not want to be tracked.
Then, under the History section, select Use custom settings for history from
the drop down menu. This will allow you to customize your settings for cookies
and web browsing history.
Here are the settings that Yoursphere.com recommend.
Firefox Family Safety
There are no inbuilt Parental Filters or Controls It is done by the same Add on as used by
Google - Web Filter Pro
© EyePAT Community Interest Company
Version 4.0 2014
140
www.eyepat.org
[email protected]
Using the Internet Safely
Yahoo SafeSearch
The Yahoo SafeSearch feature is designed to filter out explicit, inappropriate and adult-oriented
content from Yahoo Search results. Here's how to change your SafeSearch settings.
Changing your SafeSearch filter


Sign in to Yahoo.
In the search box, enter a search and click Search.







Mouse over the gear icon
.
Click Preferences.
Next to "SafeSearch," select an option:
Strict - no adult content
Moderate - no images or video
Off - do not filter results
Click Save.
Are you are unable to turn off SafeSearch?
There are two possibilities:
You may be signed in to a Yahoo Account that's registered as an under-18 account.
You may need to contact your Internet Service Provider (ISP) for further details.
SafeSearch Lock
SafeSearch lock can be activated when you're signed in to your Yahoo Account. To disable it, you'll need to be signed in, and pass an extra verification step confirming that
you're over 18 years of age.
Google Chrome Family Safety
Like Firefox, Google Chrome uses an add on called WebFilter Pro.
To download it for Chrome go to https://chrome.google.com/webstore.
© EyePAT Community Interest Company
Version 4.0 2014
141
www.eyepat.org
[email protected]
Using the Internet Safely
WebFilter Pro can make web browsing safer by restricting access to:






pornography
adult social networks
violent content
online gaming websites
gambling websites
drug related websites
any site that threatens your computer’s security (scams, malware, spyware, viruses, etc)
Chrome Set Up Process
Once you’ve installed WebFilter Pro from this link,
simply click on the icon in the top right corner of your
browser.
1. Choose Settings and click the box called Enable Password Protection.
2. On the drop down, click Sign Up and
follow the steps to register your email address.
The whole point of this process is to password
protect your settings so you and only you can
change them in the future.
3. After you’ve checked your
email and clicked the
activation link, go back to the
Settings page and begin
adding a check mark to
anything you want blocked on
your Chrome browser.
© EyePAT Community Interest Company
Version 4.0 2014
142
www.eyepat.org
[email protected]
Using the Internet Safely
4. The restrictions do a very good
job of blocking exactly what they
need to block. On top of these
settings, you also have the option of
blocking (or allowing) specific
websites as you or your child come
across them. All you have to do is
click the little icon in the top right
corner and make your selection.
5. When you’re done, the last thing you need to
do is switch WebFilter Pro to Kids mode
under Settings. Doing this will password
protect all the changes you’ve made to the
block list, as well as the basic settings.
Chrome


Open Chrome
Click the wrench icon in the top right and select
Options.


Click on Under the Hood on the left navigation panel.
In the Privacy section, click the Content settings button.
© EyePAT Community Interest Company
Version 4.0 2014
143
www.eyepat.org
[email protected]
Using the Internet Safely

The Content Settings menu will appear. Here you’ll want to make sure that your
settings match the screenshot below, at minimum.
Bing Safe Search
(Bing isn’t the best option for families since you can’t lock SafeSearch).

Go to www.bing.com and you’ll see the homepage.

Click the gear icon in the upper right hand corner (Outlined in red in the
screenshot below).

Clicking the gear icon will take you to Preferences page and from there you can
set up your search filters.
© EyePAT Community Interest Company
Version 4.0 2014
144
www.eyepat.org
[email protected]
Using the Internet Safely

When you’re done setting up Safe Search click the yellow Save button in the
upper right hand corner.
Unfortunately, you cannot save your Safe Search settings for Bing since the settings
aren’t tied in any way to your user account.
Internet Explorer 11
A browser is an application that lets you view web sites on the internet. The most
popular one at present is Internet Explorer. It has security and privacy options that can
be set by users, but the options differ slightly, depending on which version of Internet
Explorer you have on your computer.
To find out which version you have on your computer:



Open Internet Explorer
Click on the Help Menu option at the top of the screen
Select the About Internet Explorer option

Open Internet Explorer

Open up Click on the Tools Menu and select Internet Option

Click on the Content tab

Select Family Safety
© EyePAT Community Interest Company
Version 4.0 2014
145
www.eyepat.org
[email protected]
Using the Internet Safely
If you wish or need different members of the family to have different levels of access
you need to apply them to different accounts.
From here you can create accounts. You can also do this from your Control Panel
within Windows.

Follow the instructions given in this box.
© EyePAT Community Interest Company
Version 4.0 2014
146
www.eyepat.org
[email protected]
Using the Internet Safely
Kid Safe Search Engines
Google is a search engine, as is Yahoo, Bing etc. etc.
There are some search engines specifically designed for children. They filter out sites
which some parents and teachers might find inappropriate for children. This usually
includes sites which deal with explicit sexual matters, porn sites, violence, hate speech,
gambling and drug use.
Bing appears to have built in some security settings. Test them out using words which
you think may bring up inappropriate sites. For those of you who have attended an Eye
PAT awareness session, use the word you learnt during the session. It is a good test.
Microsoft and CEOP create child-friendly version of IE9
By James Trew
posted Feb 7th 2012
https://www.thinkuknow.co.uk/parents/ie9/
To protect very young minds from the perils of the internet Microsoft teamed up with
CEOP (Child Exploitation and Online Protection Centre) to create a special kid-friendly
version of its IE9 browser.
Access to key CEOP pages are baked right in, and there are dedicated tabs for the
thinkuknow.co.uk information site and, of course, Bing.
Additional security comes via a Jump List that lets parents and carers set the age group
of their child and prevents them from seeing unsuitable content. It's only available on
Windows 7, and you'll need to prevent your curious children from using any other
browser, but at least it's extra peace of mind at no extra cost.
© EyePAT Community Interest Company
Version 4.0 2014
147
www.eyepat.org
[email protected]
Using the Internet Safely
SafeSearch for Kids is the child friendly search
engine where safe search is always 'on',
powered by Google. The safe browsing feature
allows your kids to safely surf the web with a
much lower risk of accidentally seeing illicit
material.
http://www.askkids.com/
Ask Jeeves For Kids - http://www.ajkids.com/
KidsClick! - http://www.kidsclick.org/
Yahooligans -http://www.yahooligans.com/ (For chidren aged 7-12)
CBBC - http://www.bbc.co.uk/cbbc/find/
Ranger Browser – A Safe Browser for a Child’s iPhone, iPad or Android
You can download all versions of the Ranger Browser app, from
http://www.mobsafety.com/.
Note : This product has been tested and recommended by Yoursphere in the USA.
Yoursphere are a reputable and recognised organisation. They wrote these instructions.
Whatever a child is viewing on that iPad or Android phone should be
safe and age-appropriate.
Kids now often know more than their parents when it comes to
technology, but we still need to parent online in the same way we do
offline.
The only way to ensure a safe and age-appropriate experience is by placing
predetermined limits and filters on these devices.
Ranger Browser is a free app available in the Apple App Store and Android Marketplace
(for some Android devices). The app replaces the standard mobile web browser (i.e.
© EyePAT Community Interest Company
Version 4.0 2014
148
www.eyepat.org
[email protected]
Using the Internet Safely
Safari on the iPhone or iPod) and packs much better safety features and monitoring
tools. Up front, Ranger Browser:




Keeps a record of all visited websites so parents can view them later
Has five different levels of filtering
Offers both a white list and black list function that allows parents to allow/block
specific websites
Plus, the ability to set time limits on Internet access
Yoursphere tested Ranger Browser on a third generation iPod Touch and found that the
application does what it claims to do. Installation and setting up the parent account was
all very straightforward and simple, but here are some written instructions which may
help.
1. Download the app and register as a parent. You can
download all versions of the app at the Mobsafety
website.
2. Make it the default browser on whatever device it’s on.
On an Android, the quickest way to do this is by opening the Ranger Browser
app > Settings > Set as default browser.
If a popup box shows up listing the browsers on the device, check the “Use this
action by default” box and then choose Ranger Browser.
To set the default browser on an iPhone, iPod Touch or iPad, you’ll need to disable
the Safari app through the Restrictions menu, which you can learn to do here.
Then, simply put the Ranger Browser app icon in its place.
Step 3 – Once you’ve done that, head back to www.mobsafety.com and log in with the
username and password that you set up in step 1. From here, you can access your
child’s browsing history and set filters and time limits.
© EyePAT Community Interest Company
Version 4.0 2014
149
www.eyepat.org
[email protected]
Using the Internet Safely
You can also customize each predetermined setting as you see fit. To test the application
we set the content filtering to “Medium” and visited several non-child friendly sites. All
were blocked as seen below.
What really amazed our team was how the parent dashboard is updated in real time, so
you can see what your child is viewing as they’re viewing it on their smartphone or
tablet.
The Time Limit function also worked very well, although it would be nice to have a slider
that allows you to set more specific time limits. Currently, you can only choose hours
© EyePAT Community Interest Company
Version 4.0 2014
150
www.eyepat.org
[email protected]
Using the Internet Safely
and not minutes, so if bedtime is at 9:30, you can only set the Internet access to cut off
at 9 or 10.
Overall, the application works wonderfully, and we didn’t encounter any bugs or crashes
while testing. If your children use a smartphone or tablet and you’re interested in
keeping them safe on the web, Ranger Browser is definitely worth looking into. And best
of all, it’s free!
Safari


Open Safari
Click the Tools icon in the top right corner and click
Preferences
From here, click the Privacy tab and select the Block cookies
from third-parties and advertisers radio button.
© EyePAT Community Interest Company
Version 4.0 2014
151
www.eyepat.org
[email protected]
Using the Internet Safely
Filters - Applications
You Tube Safety Mode
YouTube does a fairly good job of removing inappropriate
content on the site. But with the millions of videos being
uploaded and viewed every day there are risks.
for their children.
YouTube's Safety Mode is an added safeguard to filter
out videos that some parents may consider inappropriate
YouTube Safety Mode is a simple process; if it’s not done right it can easily be undone.
1. Go to the computer that your kids use and visit YouTube.com.
2. Clicking the Sign In button in the top right corner.
3. You need to have a Google Account in order to do this. A Google Account is easy
to set up and can be done using your normal email address.
Once this is set up you can use it for any Google Accounts.
Note - Make sure you do not click the option to ask Google to remember your log
in and password, otherwise you children will be able to use it.
4. Scroll to the bottom of the homepage and look for Safety Off
5. Click On and Save and lock safety mode on this browser
Doing this will ensure that, even if you’re logged out, Safety Mode will stay on
© EyePAT Community Interest Company
Version 4.0 2014
152
www.eyepat.org
[email protected]
Using the Internet Safely
Note: Safety Mode only stays locked on one web browser on that particular computer
user account. You will need to repeat this for each child’s account.
Use YouTube Privacy Settings
Stop Cyberbullying on YouTube.
You can prevent people from embedding your video on other websites by disabling video
embedding and you can disable commenting. It is the commenting which allows the
majority of cyber bullying to take place. Turn this off and you have gone a long way to
preventing it.,
You can choose from one of the three privacy settings:
Public – Anyone can search for and view your video
Unlisted – Only those people with a link to your video can watch it
Private – You choose who can view the video
You must first of all have an account. If not create one.



Open your Account
Upload your Video
Click on Basic Tab and choose Private


Click on Advanced Tab and remove ticks from Comments and Embedding
Choose via Syndication whether you wish the Video to be able through Mobile
and TV.
© EyePAT Community Interest Company
Version 4.0 2014
153
www.eyepat.org
[email protected]
Using the Internet Safely
History
Internet Explorer History
One way of keeping track on what sites have been looked at is to use the History Option.

To find History click on View, then choose the Explorer bar

Choose History

You will see a list of days and weeks, similar to below.

Click on any one of these and you will see the sites visited that day provided:
o
they have not been deleted
o
InPrivate Browsing has not been used.
Deleting the History
It is extremely easy to delete the history. All you need to do is press the right hand
mouse button over any link and choose delete. It is therefore by no means a fool proof
way of tracking web sites which have been viewed and technologically savvy kids will
know exactly how to do it. It can be useful however to see where younger children have
© EyePAT Community Interest Company
Version 4.0 2014
154
www.eyepat.org
[email protected]
Using the Internet Safely
been. Be aware, if your kids know how to use it, they can see where you have been –
especially to track Christmas present shopping!
One thing which may help, if you know your kids have been online and there is no
history, you know they have been deleting it.
Google Chrome History


Go to the right of the screen and click on the Icon with the 3 orange lines
Choose Settings

Click on History on the left of the screen
© EyePAT Community Interest Company
Version 4.0 2014
155
www.eyepat.org
[email protected]
Using the Internet Safely
Tips on using the History page

You can easily clear items from the History page.

Use the search box at the top of the page or the address bar to search your
history.

To see the pages you've visited in your current browsing session, click and hold
down the forward and backward arrows next to address bar.

To see your most frequently visited sites, open the New Tab page.
If you are signed in:


choose Settings from the bottom right of the screen
select Web History
© EyePAT Community Interest Company
Version 4.0 2014
156
www.eyepat.org
[email protected]
Using the Internet Safely
In Private Browsing
InPrivate Browsing is probably one of the worst inventions by Microsoft when it comes to
child safety! Its purpose is that if you use someone else’s PC or a public PC in a Library
or Internet, then you can turn it on so it does not leave a trail. However unfortunately it
also applies to your PC.
To turn it on

click on Tools in the Internet Explorer Toolbar.

Select InPrivate Browsing
Click on a new tab and the following will appear. You can see that InPrivate is turned on
in the title bar.

type in the name of your web site, anything you enter using this browser window
will not show in the history.
When you start InPrivate Browsing, Internet Explorer opens a new browser window. The
protection that InPrivate Browsing provides is only in effect during the time that you use
that window. You can open as many tabs as you want in that window, and they will all
be protected. However, if you open another browser window, that window will not be
protected. To end your InPrivate Browsing session, close the browser window.
While you are surfing using InPrivate Browsing, Internet Explorer stores some
information—such as cookies and temporary Internet files—so that the webpages you
visit will work correctly. However, at the end of your InPrivate Browsing session, this
information is discarded. The following table describes which information InPrivate
Browsing discards when you close the browser and how it is affected during your
browsing session:
© EyePAT Community Interest Company
Version 4.0 2014
157
www.eyepat.org
[email protected]
Using the Internet Safely
Information
How it is affected by InPrivate Browsing
Cookies
Kept in memory so pages work correctly, but cleared when you
close the browser.
Temporary Internet
Files
Stored on disk so pages work correctly, but deleted when you
close the browser.
Webpage history
This information is not stored.
Form data and
passwords
This information is not stored.
Anti-phishing cache
Temporary information is encrypted and stored so pages work
correctly.
Address bar and
search AutoComplete
This information is not stored.
Automatic Crash
Restore (ACR)
ACR can restore when a tab crashes in a session, but if the
whole window crashes, data is deleted and the window cannot
be restored.
Document Object
Model (DOM) storage
The DOM storage is a kind of "super cookie" web developers
can use to retain information. Like regular cookies, they are not
kept after the window is closed.
IncognitoGone - overrides InPrivate Browsing
All the major Web browsers offer private browsing options that make it difficult if not
impossible to monitor a user's browsing history.
While such features are great for responsible adults, they don't always sit well with
another group of responsible adults: those responsible for children.
Parents are responsible for what their children do online, yet private browsing features
like Google Chrome's Incognito mode make in particularly hard for them to keep an eye
on their kids in cyberspace. IncognitoGone is a free tool that disables private browsing in
Chrome and Internet Explorer.
In Firefox it only disables the visible private browsing option, though, meaning that
users who know the keyboard shortcut can still access the feature.
Before you run IncognitoGone, please understand that its effects are permanent and
can't be undone.
© EyePAT Community Interest Company
Version 4.0 2014
158
www.eyepat.org
[email protected]
Using the Internet Safely
Cnet downloaded, extracted, and ran IncognitoGone, which opened with a small box
containing four buttons, one each for Chrome, IE, Firefox, and Safari.
We only had the first three installed, so the Safari entry was greyed out. Before we ran
IncognitoGone, they opened each browser to verify its private browsing feature.
In Firefox, that involved clicking Start Private Browsing on the Start button menu. In
Chrome, it's done by opening a new Incognito window.
IE's feature is called InPrivate Browsing, and it's found on the Safety menu. They
disabled the feature in each browser.
IncognitoGone warned us that the change was permanent before we proceeded. When
we opened IE, InPrivate Browsing was gone from the Safety menu.
The new Incognito window command was inactive in Chrome's controls.
However, not only was the feature still available in Firefox, but so was the menu entry.
For concerned parents or anyone who has a compelling interest in preventing incognito
Web browsing on a PC they control, IncognitoGone is a boon.
We don't recommend it for individuals who might want to re-enable private browsing
later on since that's made difficult to do, by design. Use with caution.
Read more: Incognito Gone - CNET Download.com http://download.cnet.com/Incognito-
Gone/3000-2132_4-75651404.html#ixzz2SoSjHiDE
This review is from the Cnet website, a program downloading site .
© EyePAT Community Interest Company
Version 4.0 2014
159
www.eyepat.org
[email protected]
Using the Internet Safely
© EyePAT Community Interest Company
Version 4.0 2014
160
www.eyepat.org
[email protected]
Using the Internet Safely
Google Alerts
One key way to keep tab on what is being said about you, your company, or your family
is via Google Alerts. This will not let you know what is being said inside a Facebook
account, but it will let you know if anything is being published elsewhere.


Google – ‘google alerts’
The following screen will appear

Create your first entry, if you do not have a Google Account you will need to
verify your e-mail address.
Once you have entered your one alert you should then be taken to the following screen
where you can create New Alerts or delete existing alerts.
E-mails will then be sent to you automatically every time one of your search items is
mentioned.
These alerts can be used for any subject you wish.
© EyePAT Community Interest Company
Version 4.0 2014
161
www.eyepat.org
[email protected]
Using the Internet Safely
Tracking & Monitoring Software
Again there are many products out there. EyePAT is not affiliated to any of these
companies and we only recommend on merit.
You can always find a list of software available through Google or consumer magazines
such as Which can be a productive source.
As most systems are now international and it is common to make purchases on your
credit card in foreign currency there are no restrictions to the source of the protection
software.
uKnowKids Software Review
Many thanks to Yoursphere.com for providing this information
uKnowKidsis a new web-based monitoring system for your child’s Smartphone and social
network accounts. The testing team used the “Premier” subscription which provides
comprehensive monitoring on Facebook, Twitter and MySpace, as well as Androidpowered Smartphones and Blackberry devices. Subscription prices vary depending on
how many children you want to monitor, extra features and technical support.
Setup
The Team tested the uKnowKids monitoring system with a Facebook profile, Twitter
account, and Android-powered Smartphone. Syncing the social networks requires, the
parent, to know their child’s usernames and passwords. Inputting this information is all
you need to sync Facebook and MySpace to uKnowKids. For Twitter and
Android/Blackberry Smartphones, however, you will need to install an application called
FamilyConnect. FamilyConnect establishes a link between the Smartphone and/or Twitter
account and the uKnowKids software. We delve a little more into this syncing process
later in the review, but we’re fairly confident that parents won’t encounter any problems
with this initial setup.
© EyePAT Community Interest Company
Version 4.0 2014
162
www.eyepat.org
[email protected]
Using the Internet Safely
When you enter your child’s info during the setup process (name and birth date)
uKnowKids does a great job of detecting any other social networks that they may be a
part of. That said, with the exception of Facebook, Twitter and MySpace, monitoring
these other networks through the uKnowKids software isn’t an option.
Monitoring -
uKnow’s monitoring capabilities are where the software really
shines. Once accounts and phones are synced up, parents can
view private messages, news feeds, texts and phone call
history to see who their child is friends with and who they’re
talking to. No need to worry if your child normally accesses
Facebook, Twitter or MySpace from a mobile device –
uKnowKids monitors their profile, regardless of the device they
access it on.
Depending on how you filter the information using the
Notifications toolbar (shown here on the right), parents can
view communication exchanges that uKnow deems suspicious
or inappropriate.
Furthermore, not only can parents view “possible adult contact” when there is
communication with someone who has publically indicated that they are over 18, but
uKnow gives parents the ability to monitor a specific contact as well as a full exchange of
communication between their child and that contact.
Communication trends are displayed on the dashboard as well. And though these trends
are a better representation of the most active users in the social networks that you’re
tracking, it’s still a great way to see who your child’s Facebook or Twitter friends are, the
type of conversations that they’re having, and ultimately, the conversations that your
child is exposed to.
In the end, all of this information allows parents to have a fully-prepared conversation
with their child about their online posts, the people they consider “friends”, or perhaps a
specific exchange of text messages.
For the parents who don’t have time to log in every day, uKnow sends out a daily
comprehensive overview of what their child or teen did that day.
© EyePAT Community Interest Company
Version 4.0 2014
163
www.eyepat.org
[email protected]
Using the Internet Safely
Family Locator (GPS tracking)
The GPS locator is just another layer of monitoring that uKnow offers parents. Granted
you have the FamilyConnect app installed on your child’s smartphone and their GPS
turned on, uKnow can track your child’s last known physical location. From what we
could tell, uKnow updates Family Locator several times a day.
Syncing
uKnowKids is, in a lot of ways, a very reliable monitoring system that can assist parents
in their daily conversations with their child. However, there is one compromising
imperfection that we feel parents should know about, and it has to do with the
FamilyConnect app that was mentioned earlier. On Twitter and Smartphones, this app
can very easily be uninstalled by your child. On a Smartphone, FamilyConnect is treated
like any other app, right there on the phone’s interface or application list. On Twitter,
you can see what it looks like in the screenshot below.
© EyePAT Community Interest Company
Version 4.0 2014
164
www.eyepat.org
[email protected]
Using the Internet Safely
The team uninstalled the apps on both Twitter and the Smartphone hoping to receive
some sort of email notification from uKnow, but we received nothing, even 24 hours
later.
Please note: Hiding the FamilyConnect app on Twitter or the Smartphone would make
uKnowKids a spyware monitoring system, which it is not. That said, our review isn’t
meant to imply that the folks at uKnow should make the apps invisible to your child. Our
intention is only to make it clear to parents who read this review that, like with all
monitoring software, a consistent dialogue with your children is absolutely necessary
when using uKnowKids. If you notice that monitoring of their Twitter account of
Smartphone has stopped, you can directly address the matter with your child.
Screen Retriever Review and Installation
Many thanks to Yoursphere.com for providing this information
ScreenRetriever,is a monitoring program which allows parents to record and remotely
view their children’s computer screen in real time. The program lets you “check-in” on
your children from time to time without having to be right over their shoulder.
Yoursphere found ScreenRetriever to be a well-rounded program; it does what it claims
to do and they didn’t encounter any bugs or problems. A couple of things to note,
though:


The software needs to be installed on your computer and your child’s computer.
The software only works when your computer and your child’s computer are on
the same computer network (router).
During their testing with ScreenRetriever, they came across a few aspects of the setup
process that some parents might find tricky, so below is a how-to guide.
Installation
1. Go to www.screenretriever.com and click on the Free Trial button
© EyePAT Community Interest Company
Version 4.0 2014
165
www.eyepat.org
[email protected]
Using the Internet Safely
2. On the Free Trial page enter your email address in order to download the
program. After you click the Submit button the program will download
automatically.
3. Once the program is downloaded open it up and it will ask you to create a
password and enter an email address. This password is for you to know, not your
child. It grants access to the entire ScreenRetriever Control Panel. If your child
knows the password, they can disable the program on their computer.
4. ScreenRetriever will then ask if you want to “view” this computer from other
computers on your wireless network. Before you proceed, know that
ScreenRetriever needs to be installed on YOUR computer and YOUR CHILD’s
computer in order for it to work properly.
So…
When installing on your computer, choose No.
© EyePAT Community Interest Company
Version 4.0 2014
166
www.eyepat.org
[email protected]
Using the Internet Safely
When installing on your child’s computer, choose Yes.
5. The same goes for the next pop up.
On your computer, choose Don’t allow viewing of this computer
On your child’s computer, choose one of the first two Allow viewing of this
computer
6. The next pop up asks if you would like to record the computer’s activity. Whether
you’re installing on your computer or your child’s, they recommend choosing no
for now. You can always choose to record after ScreenRetriever has been
installed on both computers. (guide below)
Now that you’re done with the installation, and assuming you’ve followed the same steps
on your child’s computer, you need to know about the Control Panel.
Control Panel
To start the remote viewing of your child’s computer click the Screen Retriever
Control Panel icon on your desktop. Here, you can control all available functions,
including screen recording and live viewing.
Live Viewing
1. Click the Allow/Disallow viewing on this computer button that is
outlined in red below.
© EyePAT Community Interest Company
Version 4.0 2014
167
www.eyepat.org
[email protected]
Using the Internet Safely
This will take you to a menu where you can choose the computer(s) you
want to view. Remember, you can only view computers that are on the same
wireless network as your computer and have the software installed on them. This is
the only way the ScreenRetriever software works.
2. Click the Add button on the lower left-hand corner of the menu.
3. On the next screen, choose the computer you wish to add. Then click the
View button which is on the lower left-hand corner of the menu.
© EyePAT Community Interest Company
Version 4.0 2014
168
www.eyepat.org
[email protected]
Using the Internet Safely
There should now be a small window that shows you exactly what your
child is doing on their computer. You can choose to make the window
larger or smaller by using the S and L buttons that are on the upper left
hand corner of the window.
Recording
1. If you wish to record your child’s computer activity to view at a later date,
you will need to go on your child’s computer, open the ScreenRetriever
Control Panel there, and click the Start/Stop recording this computer
button which is highlighted in yellow in the screenshot below.
2. This will take you to a menu that allows you to start, pause, and stop
recording. To stop recording, either you can go back to your child’s
computer and click the Stop button (shown below), or you can wait for
the memory limit you set to be reached (also shown below).
© EyePAT Community Interest Company
Version 4.0 2014
169
www.eyepat.org
[email protected]
Using the Internet Safely
To view the recording, you will need to go back to your computer, open up the Control
Panel and choose the Play recordings button.
Though set up can be lengthy, ScreenRetriever is a great way to keep an eye on your
child’s online activities. Issue with webcams can be avoided altogether if your child
knows you can tune in whenever you want—an approach you might find useful if your
son or daughter is fond of video-chatting sites TinyChat or Stickam.
Facebook Monitoring Solutions for Parents
With thanks to Yoursphere.com for this article
ZoneAlarm Social Guard – Software program
We have not tested this product but assume that as it is PC based not mobile then it
should work. Please let us know if this is not the case. [email protected].
The Good:
Social Guard is a software program that you must install on your computer. Once you’ve
downloaded it, installed it and synced your child’s account, the software constantly runs
in the background scanning your children’s profiles. (Note: Your child is not limited to
accessing Facebook on that specific computer. Social Guard successfully monitors your
child’s account no matter where or what device they access Facebook from.)
Social Guard’s parental monitoring solution was the most comprehensive one we tested.
Not only does it flag concerning language and tell you why it was flagged, but it checks
for dangerous links, it looks for evidence of cyberbullying, and it even looks at the age
gaps between your child and the people they’re talking to [note from EyePAT - only
problem here is who tells the truth about their age on Facebook!]. Like the other
© EyePAT Community Interest Company
Version 4.0 2014
170
www.eyepat.org
[email protected]
Using the Internet Safely
products in this review, email notifications are sent to you when concerning language is
detected. In addition, you can add specific words that you want the software to flag.
The Bad:
This package is unable to get around the Facebook password requirement. So yes,
during set up, Social Guard requires you to enter your child’s Facebook email and
password in order to sync it with the program. On the other hand, if your child changes
their Facebook password or deletes their account, you will be sent a notification.
It’s also worth noting that, since Social Guard is a software program and not web-based,
you can only access it from the computer you installed it on.
Mamabear Parental Monitoring App Review
http://mamabearapp.com
Thank you to Yoursphere.com for this article
We have not tested this product but assume that as it is PC based not mobile then it
should work. Please let us know if this is not the case. [email protected].
Computers, smartphones, satellites and
massive data networks have made this
process easier and more convenient (and
some cases more challenging) than we
could have ever imagined.
Traditional parenting techniques, like having an open dialogue with your children,
meeting their friends’ parents and knowing who their teachers and coaches are should
never fall by the wayside, but as parents in the 21 st century we also have a responsibility
to adapt to the ever-changing world of technology.
Mamabear attempts to make this adaptation just a little bit easier for you and your
children.
© EyePAT Community Interest Company
Version 4.0 2014
171
www.eyepat.org
[email protected]
Using the Internet Safely
Setup
You can download the app by searching for Mamabear in the App Store. The initial
download and set up needs to take place on your iPhone (or iPad), not your child’s.
The application will require you to set up a parent account and username/password for
your child’s account.
Next, you’ll want to download the app again, but this time on your child’s iPhone. As
soon as you input their username and password, a link is created between the app on
your iPhone and the app on theirs.
If you’ve disabled location tracking on their iPhone for you will need to turn it back on in
order for Mamabear to work properly. That being said, however, you can still leave the
Camera’s location services turned off. See the image below.
GPS Tracking
The monitoring feature of Mamabear allows you to see where your child is at any given
time by using the GPS tracker on their iPhone—the same technology that gives you turnby-turn navigation on your typical smartphone. What’s really neat is you can set up
alerts that let you know when your child has reached a specific location, or if they leave
a specific location before a predetermined time. Aside from the tremendous safety
advantages of this feature, setting alerts can be a great way to make sure your older
teens aren’t playing hooky from school or soccer practice.
Though this feature worked really well during our testing, delivering real-time, accurate
location alerts, we found ourselves wanting a way to set a radius around the designated
address as a way to limit the number of alerts we were getting. As it stands, Mamabear
sends you an alert every time your child ventures out of the exact designated address.
© EyePAT Community Interest Company
Version 4.0 2014
172
www.eyepat.org
[email protected]
Using the Internet Safely
Facebook and Speeding Alerts (teens)
If your teen uses Facebook, Mamabear can track their activity. Just like the GPS locator,
you can set alerts for when they add new friends, use inappropriate language, and when
their account shows signs of them being the target of bullying. This tool worked very
well during our testing, making it one of the more impressive features of Mamabear.
As an added bonus, Mamabear utilizes the iPhone’s accelerometer to let you know if your
teen is in a speeding car, which, by all means and purposes is a very useful feature, but
kind of makes me question the intended audience of the app itself. Everything from
design to functionality makes Mamabear seem like it’s targeted toward parents with
younger children, making this feature seem like something they shoehorned in to attract
a wider audience.
© EyePAT Community Interest Company
Version 4.0 2014
173
www.eyepat.org
[email protected]
Using the Internet Safely
Emergency Contact Shortcuts
The emergency features of Mamabear are less robust but no less functional. Mamabear
displays three buttons on the child’s phone: “Come Get Me”, “Call for Help”, which sends
an emergency alert to all guardians, and “Call Mama”, a phone call shortcut to mum.
These three buttons are really the only thing your child has access to on their version of
the Mamabear application; the rest of the features work quietly in the background on the
parent’s side.
Configuring and using this part of the application is very easy, allowing even a panicked
child to easily get the help and assistance they need as fast as possible. The phone
numbers that are assigned to the buttons are setup when the application is initially
downloaded on the parent’s phone, so no extra work is needed.
You can try Mamabear free for 30 days, so test it out for yourself to see if it’s right for
your family!
© EyePAT Community Interest Company
Version 4.0 2014
174
www.eyepat.org
[email protected]
Using the Internet Safely
Internet Cookies
Thank you to Yoursphere.com for this explanation
If you’re like most parents, the first time you heard of Internet cookies you probably
wondered to yourself, ‘what the heck are cookies?
Well, simply put, cookies are small, often encrypted (protected) text-only files that
reside on your web browser or computer’s memory.
In a nutshell, cookies are used to make your web-browsing experience a little more
convenient by remembering things like where you left off, addresses, account numbers,
username and encrypted passwords, and other specific preferences. But cookies can also
be used to track specific web analytics or a user’s navigation through a particular
website.
There are two different types of cookies, first-party and third-party, each serving their own
purpose.
First-party cookies are cookies issued by the website you’re actually visiting. These cookies
serve the function mentioned above: saving usernames, language preferences, and
other specific preferences to make your browsing experience more convenient.
Take Amazon.com as an example. As you’re browsing the site, you can add things to
your cart and continue shopping. This works because Amazon places a temporary cookie
on your web browser so it remembers what’s in your cart. Without it, the cart will be
empty as soon as you navigate to a new page within Amazon.
First-party cookies, for the most part, are harmless as they typically do not contain any
personal information about the user.
Third-party cookies, on the other hand, are issued by an entity like an ad network or a
marketing firm. These companies can place third-party cookies on online advertisements
as a way to track and analyze your personal interests or browsing habits. This
information allows ad networks to deliver more relevant ads to the user.
As you can imagine, this is where things can get hairy with user consent, ‘do not track’
regulations and online privacy concerns. The WSJ put together a really nice video that
explains exactly how this works.
Like I touched on in the How to Easily Block Ads on Your Child’s Computer article, it might not
sit well with you that marketing firms are using cookies to track your child’s web
browsing preferences. If that’s the case, you can follow
these steps to disable cookies on their/your family’s web
browser.
© EyePAT Community Interest Company
Version 4.0 2014
175
www.eyepat.org
[email protected]
Using the Internet Safely
Passwords and Online Security - Top Tips
There are 4,500,000 pieces of virus, scumware etc. out there for PC’s
For Androids - talking about 1,000,000 pieces within the next 12 months
For iPAD there are free pieces of antivirus but still has problems
Malware and Spyware [Scumware]
These products will remove Trojans, spyware, malware and basically anything which is
trying to do damage to your computer.
We recommend you run them weekly
Malware Software
It is also a good idea to load Malware
Software. It does what it says, removed
Malware from your PC/laptop which has
been downloaded without your permission.
A free one we use is Malwarebytes
Spyware Software
We would also suggest you remove Spyware.
There is a free version of this also.
Anti Virus and Parental Controls
Must be set up per user per device (unfiltered public WIFI)
This must be installed on each and every computer and tablets.
They should run daily and need to be set up.
Accounts must be set up for the children.
© EyePAT Community Interest Company
Version 4.0 2014
176
www.eyepat.org
[email protected]
Using the Internet Safely
System Cleaners
Adults need to use to keep computer clean from what kids have been doing.
Kids may also use to hide tracks from what they have been doing. Try
CC Cleaner
or PC Tools
WIFI in open space
they can access your computer
Always click Public - never home or office - gives a little more protection
Passwords
You need 5 different ones for:
1.
2.
3.
4.
5.
Banking - credit cards and anything involving personal details
Online shopping
Social Media - similar but different per social media site
For your business work - online forums etc.
Throwaway - does not matter if someone gets hold of it.
Do not use the name of your children, your pets or other names which people who know
you, or who look you up on Facebook, can guess.
© EyePAT Community Interest Company
Version 4.0 2014
177
www.eyepat.org
[email protected]
Using the Internet Safely
Homework Sites
The internet is fantastic for homework research. Here is a list of sites we have gathered
which may help. Due to the time we live in, we have to state that whilst we have looked
at all these sites we cannot be held responsible for their content. These were all sites
which have been suggested to us as being particularly good.
Super Maths World, http://www.supermathsworld.com/
Online resources for teachers - http://www.echalk.co.uk/ (this requires payment)
https://www.samlearning.com/ (this also requires subscription by school)
http://www.bbc.co.uk/schools/bitesize/ free from BBC,
http://www.wjec.co.uk/index.php?nav=105 for past exam papers
www.froguts.com – dissect a frog without having to touch it!
www.wikipedia.com – answers for anything, however anyone can post. Make sure you
verify the answers. As a guide Wikipedia is good for finding out general information, but
as almost anyone can post on it, it is essential to verify information.
Another general site which gives access to many other sites is
http://www.thebigproject.co.uk/kids/
The following is a list of sites suggested to us from Marlwood School Site. At the time of
writing we checked all the sites listed and these were still live sites. Web sites do
however frequently close. We obviously cannot be held responsible for the accuracy of
any information on the sites.
Key
Stage
Art and Design Website Addresses
www.npg.org.uk
www.nationalgallery.org.uk
Business Education Website Address
Key
Stage
www.businesstudiesonline.co.uk
4&5
www.tutor2u.net
5
www.bized.co.uk
4&5
www.spideybiz.co.uk
4&5
www.s-cool.co.uk
4&5
www.bbc.co.uk
4&5
© EyePAT Community Interest Company
Version 4.0 2014
178
www.eyepat.org
[email protected]
Using the Internet Safely
D & T Website Address
Key
Stage
www.engagerevision.co.uk - subscription site
4
www.technologystudent.com
3/4
www.s-cool.co.uk
4
www.bbc.co.uk/bitesize
3/4
www.nutrition.org.uk
4
www.foodafactoflife.org.uk
4
www.food.gov.uk
4
English Website Addresses
Key
Stage
www.bbc.co.uk/schools/ks3bitesize/english
3
www.bbc.co.uk/schools/ks3bitesize/english/reading/index.shtml
3
http://www.edufind.com/index.php
3
http://www.cgpbooks.co.uk/pages/home.asp (sells books but has
some online data)
3&4
Geography Website Addresses
Key
Stage
www.bbc.co.uk/gcsebitesize/geography
4
www.s-cool.co.uk
4
www.revisioncentre.co.uk/gcse/geography
4
www.geographypages.co.uk/revision.htm
Mathematics Website Addresses
Key
Stage
www.bbc.co.uk/schools/ks3bitesize/maths
3
www.mymaths.co.uk (subscription site)
3
www.channel4.com/learning/microsites/M/mathszone/index.shtml (scroll
down for this one – mathszone is on lower part of page)
3
www.waldomaths.com
Music Website Addresses
Key
Stage
www.bbc.co.uk/gcsebitesize/music
4
www.tonalcentre.org
5
© EyePAT Community Interest Company
Version 4.0 2014
179
www.eyepat.org
[email protected]
Using the Internet Safely
Key
Stage
French Website Addresses
www.linguascope.com (subscription site)
http://www.reallyusefulfrench.co.uk/
http://www.wildfrench.co.uk/
http://www.atantot.com/
http://www.quia.com/
http://www.espanol-extra.co.uk/
http://www.linguacentral.co.uk/
http://www.zut.org.uk/index.html (subscription site)
http://www.frenchinaclick.com/ (subscription site)
http://www.sunderlandschools.org/mfl-sunderland/
http://www.alienlanguage.co.uk/alienlanguage/index.htm
GERMAN
http://www.klar.co.uk/ (subscription site)
KS4
http://www.languageskills.co.uk/index.html (subscription site)
http://www.yjc.org.uk/
http://www.bbc.co.uk/schools/gcsebitesize/german/
http://www.gcse.com/german/speaking.htm
http://www.revisioncentre.co.uk/index.html
http://www.s-cool.co.uk/gcse/german.html
PE Website Address
Key
Stage
www.teachpe.com
4&5
www.bbc.co.uk/schools/gcsebitesize/pe
4
Psychology Website Address
Key
Stage
www.bps.org.uk
5
www.s-cool.co.uk
5
www.psycport.com
5
www.psychlotron.org.uk
5
© EyePAT Community Interest Company
Version 4.0 2014
180
www.eyepat.org
[email protected]
Using the Internet Safely
Science Website Address
Key
Stage
www.bbc.co.uk/gcsebitesize/science
3
http://www.docbrown.info/
3
http://lgfl.skoool.co.uk/keystage3.aspx?id=80
3
http://www.dbeducation.co.uk/ (subscription site)
3
Chemistry
http://www.webelements.com/
http://www.docbrown.info/
http://www.chemguide.co.uk/
4
http://antoine.frostburg.edu/chem/senese/101/index.shtml
5
http://www.chem.qmul.ac.uk/iupac/
http://www.le.ac.uk/spectraschool/
© EyePAT Community Interest Company
Version 4.0 2014
181
www.eyepat.org
[email protected]
Using the Internet Safely
Text and MSN abbreviations
Word or Phrase
Abbreviation(s)
Account
acc
Address
addy
At the moment
atm
Be right back
brb
Be back later
bbl
Be back soon
bbs
Because
cuz, bcuz, bcz, bcos, bc, cos, coz or bcoz
Best friend or Boy friend
bf or b/f
Best friend(s) for life
bffl
Best friend(s) forever
bff
By the way
btw
Can't be assed
cba
Comment me back
cmb (usually used for social networking
sites)
Definitely
def
Don't worry
dw
Forever
4eva or 4evr
For your information
fyi
Friend
frend or frnd
Got to go
g2g or gtg
Have a nice day
H.A.N.D.
Hold on
hld on or h/o
Homework
hw, hwk or hmwk
How are you
hru
I don't care
idc
I don't know
idk
I do what I want
idwiw
I love you
ily, luv u, ilu, or luv ya
If I recall correctly or If I remember
correctly
iirc
In my opinion
imo
In my humble opinion
imho
Jokes
jks
Just for laughs
jfl
© EyePAT Community Interest Company
Version 4.0 2014
182
www.eyepat.org
[email protected]
Using the Internet Safely
Word or Phrase
Abbreviation(s)
Just joking – only joking
Jj - oj
Just kidding
jk
Just to let you know
jtlyk or j2luk
Know
kno or noe
Kiss my teeth
kmt
Kiss my ass
kma
Laugh out loud or lots of laughs
lol
Lots of love
lol
Laughing my ass off
lmao
Laughing my fucking ass off
lmfao
Laughing quietly to myself
lqtm
Message (as in a text message)
msg
Never mind
nm or nvm (depending on context used)
No problem
np
No thank you
no tnk u, nty, no ty
Nothing much
nm
Obviously
ovvi or obv
Of course
ov cors or ofc
Oh My God
omg or (comically) zomg
Parents over shoulder
pos
Please
plz or plez
Probably
probz, prbly, prolly, or prob
Love
<3 or luv
Peace
pce, pece, or \/ (V sign)
Right
rite
Rolling on the floor laughing (out loud)
rofl(ol)
Rolling on (the) floor laughing my ass off
roflmao or rotflmao
See you/see you later
cya, cu, or cya/cu l8er/l8a
Shut the fuck up
stfu
Something
sth, s/t, or sumthin
Son of a bitch
sob
Sorry
sry, "soz", or "sori"
Talk to you later
ttyl
Tata for now
ttfn
says
ses or sez
Text
txt
Text back
txt bck or tb
© EyePAT Community Interest Company
Version 4.0 2014
183
www.eyepat.org
[email protected]
Using the Internet Safely
Word or Phrase
Abbreviation(s)
Thanks
Thnx, thanx, thx, or fnx
Thank you
ty or "thnk u"
Thank you very much
tyvm
Tomorrow
tom, 2moz, 2moro, 2mrw or 2mara
To be honest
tbh
Welcome Back
wb
What
Wa, wat, wut, wht, or wha
Whatever
w/e or wateva, watevs
© EyePAT Community Interest Company
Version 4.0 2014
184
www.eyepat.org
[email protected]
Using the Internet Safely
Dictionary of terms used in chat rooms
Word
Definition
Word
Definition
!
Indicates, " have a comment"
CYA
1. See Ya. 2. Cover Your Ass.
$0.02
Throwing in your two cents' worth.
CYAL8R
See You All Later.
?
Indicates, "I have a question"
DIIK
Damned If I Know.
<arching
eyebrows>
Indicates the speaker arches eyebrows
DIKU?
Do I Know You?
<chuckle>
Indicates the speaker chuckles
DIY
Do It Yourself .
<frown>
Indicates the speaker is frowning
DK
Don’t Know
<g>
Grin
DLTBBB
Don't Let The Bed Bugs Bite.
<grin>
Indicates the speaker is grinning
dotgov
A government official (from the .gov ending of
government domain names).
<smile>
Indicates the one writing the message is
smiling
DTRT
Do The Right Thing
<smirk>
Indicates the one writing the message is
smirking
DWIMC
Do What I Mean, Correctly.
<wink>
Indicates the one writing the message is
winking
DWIMNWIS
Do What I Mean, Not What I Say.
501
An excuse that's full of holes.
ESAD
Eat Sh** And Die
AAMOF
As A Matter Of Fact
ETLA
Extended Three Letter Acronym.
ADN
Any Day Now
F2F
Face To Face
AFAIC
As Far As I'm Concerned.
FCFS
First Come, First Served
AFAIK
As Far As I Know
FISH
First In, Still Here.
AFAIR
As Far As I Remember
FITB
Fill In The Blank
AFJ
April Fool’s Joke
FOAD
F*** off and die
AFK
Away From the Keyboard
FOAF
Friend Of A Friend
AISI
As I See It.
FS
For Sale
ANFAWFOS
And Now For A Word From Our Sponsor.
FTASB
Faster Than A Speeding Bullet.
ANFSCD
And Now For Something Completely
Different …
FTF
Face to Face.
A-OLs
Administrators On-Line. Administrators who
police on-line services.
FTL
Faster Than Light.
AS
Another Subject.
FUBAR
Fouled Up Beyond All Repair
ASAP
As Soon As Possible
FUBB
Fouled Up Beyond Belief.
ATSL
Along The Same Line.
FUD
Fear, Uncertainty and Doubt
AWC
After While, Crocodile
FURTB
Full Up Ready To Burst - describing hard drive.
AWGTHTGTATA
Are We Going To Have To Go Through All
This Again?.
FWIW
For What It’s Worth
AWGTHTGTWTA?
Are We Going To Have To Go Through With
This Again?
FYA
For Your Amusement
AYOR
At Your Own Risk.
FYI
For Your Information
B4N
Bye For Now
GA
Go Ahead
BAK
Back At Keyboard
GAL
Get A Life
BBFN
Bye Bye For Now
GD&R
Grinning, Ducking and Running
BBIAB
Be Back In A Bit.
GD&RF
Grinning, Ducking, and Running Fast.
BBIAF
Be Back In A Few (minutes)
GD&WVVF
Grinning, Ducking, and Walking Very, Very
Fast
© EyePAT Community Interest Company
Version 4.0 2014
185
www.eyepat.org
[email protected]
Using the Internet Safely
Word
Definition
Word
Definition
BBL
Be Back Later
GDW
Grin, Duck and Weave.
BBR
Burnt Beyond Repair.
GF
Girl Friend.
BCNU
Be seein’ you
GFN
Gone For Now.
BEG
Big Evil Grin.
GFR
Grim File Reaper.
BF
Boy Friend.
GIWIST
Gee, I Wish I’d Said That
BFN
Bye For Now.
GLGH
Good Luck and Good Hunting.
BION
Believe it or not.
GMTA
Great Minds Think Alike
BOT
Back On Topic.
GOWI
Get On With It.
BRB
Be Right Back
GTSY
Great To See You.
BRS
Big Red Switch.
H&K
Hugs and Kisses.
BTA
But Then Again
HAK
Hugs And Kisses.
BTAIM
Be That As It May.
HHIS
Hanging Head In Shame.
BTHOM
Beats The Hell Outta Me.
HHO 1/2 K
Ha, Ha, Only Half Kidding.
BTOBD
Be There Or Be Dead.
HHOJ
Ha Ha Only Joking
BTW
By The Way
HHOK
Ha Ha Only Kidding
BWL
Bursting With Laughter.
HHOS
Ha Ha Only Serious
BWQ
Buzz Word Quotient.
HHTYAY
Happy Holidays to You and Yours.
BYE?
"Are you ready to say goodbye?" If so, the
other person replies "BYE"
HOYEW
Hanging On Your Every Word
BYKT
But You Knew That
HSIK
How Should I Know.
BYOB
Bring Your Own Bottle
HTH
Hope That Helps!
BYOM
Bring Your Own Mac
IAAA
I Am An Accountant.
C&G
Chuckle and Grin.
IAAL
I Am A Lawyer.
CADET
Can't Add, Doesn't Even Try.
IAE
In Any Event.
CID
Crying In Disgrace.
IANAA
I Am Not An Accountant.
CMIIW
Correct Me If I’m Wrong
IANAL
I Am Not A Lawyer (but ) A disclaimer which is
usually followed by a legal opinion
CO
1. Conference. 2. Company.
IAW
In Accordance With
CSG
Chuckle, Snicker, Grin.
IBTD
I Beg To Differ.
CU
See You
IC
I See
CU2
See You, Too.
IIABDFI
If It Ain't Broke, Don't Fix It.
CUL
See you later
IIRC
If I Remember Correctly
CUL8R
See You Later
IIWM
If It Were Me . . . (or) If It Were Mine . . . .
CULA
See You Later, Alligator
IJWTK
I Just Want To Know
CWYL
Chat With You Later.
IJWTS
I Just Want To Say
IKWUM
I Know What You Mean
NIMBY
Not In My Back Yard.
IMA
I Might Add
NINO
1. Nothing In, Nothing Out. 2. No Input, No
Output.
IMAO
In My Arrogant Opinion
NOYB
None Of Your Business.
IMCO
In My Considered Opinion
NP
No Problem.
IME
In My Experience
NQA
No Questions Asked.
IMHO
In My Humble Opinion
NTIM
Not That It Matters.
IMNSHO
In My Not So Humble Opinion
NTIMM
Not That It Matters Much.
IMO
In My Opinion
NTW
Not To Worry.
IMPOV
In My Point Of View.
NTYMI
Now That You Mention It.
© EyePAT Community Interest Company
Version 4.0 2014
186
www.eyepat.org
[email protected]
Using the Internet Safely
Word
Definition
Word
Definition
INPO
In No Particular Order
O
Over (completion of communication)
IOW
In Other Words
OATUS
On A Totally Unrelated Subject.
IRL
1. In Real Life (chat). 2. Industrial Robot
Language. A high-level language used for
the programming of industrial robots.
OAUS
On An Unrelated Subject.
ISS
I’m So Sure
OBO
Or Best Offer
ISSYGTI
I’m So Sure You Get The Idea!
OBTW
Oh, By The Way
ISWIM
If (you) See What I Mean
OIC
Oh, I See
ITFA
In The Final Analysis.
ONNA
Oh No, Not Again.
ITSFWI
If The Shoe Fits, Wear It.
ONNTA
Oh No, Not This Again.
IWALU
I Will Always Love You.
OO
Over and Out (end of communication)
IWBNI
It Would Be Nice If
OOTC
Obligatory On-Topic Comment.
IYFEG
Insert Your Favorite Ethnic Group (for
ethnic jokes)
OTF
On the Floor (laughing)
IYSWIM
If You See What I Mean
OTFL
On the Floor Laughing
JAM
Just A Minute
OTL
Out To Lunch.
JAS
Just A Second.
OTOH
On The Other Hand
JIC
Just In Case
OTOOH
On The Other Other Hand.
JMO
Just My Opinion.
OTT
Over The Top; too much
JSNM
Just Stark Naked Magic.
OTTH
On The Third Hand.
JTLYK
Just To Let You Know .
OTTOMH
Off The Top Of My Head.
k
Okay
OWTTE
Or Words To That Effect.
KHYF
Know How You Feel.
PABG
Packing a Big Gun.
KIBO
Knowledge In, Bullshit Out
PDS
Please Don't Shout. (Shouting in chat mode is
typing all in capital letters, which is considered
rude.) Example: PLEASE DON'T SHOUT.
KISS
Keep It Simple, Stupid.
PLOKTA
Press Lots Of Keys To Abort.
KIT
Keep In Touch.
PMBI
Pardon My Butting In.
KMA
Kiss My Ass.
PMF
1. Pardon My French. 2. Pure Freaking Magic.
KWIM
Know What I Mean?
PMFBI
Pardon Me For Butting In
KYFC
Keep Your Fingers Crossed
PMFJI
Pardon Me For Jumping In
L
Laugh
PMIGBOM
Put Mind In Gear, Before Opening Mouth.
L8R
Later
PMJI
Pardon My Jumping In
LABATYD or
LAB&TYD
Life's A Bitch And Then You Die.
PNCAH
Please, No Cursing Allowed Here
LJBF
Let’s Just Be Friends
POSSLQ
Person Of Opposite Sex Sharing Living
Quarters.
LLTA
Lots and Lots of Thunderous Applause.
ppl
People
LMAO
Laughing My Ass Off.
PTMM
Please Tell Me More
LMHO
Laughing My Head Off .
R U THERE?
Are you there?
LOL
Laughing Out Loud
RAEBNC
Read And Enjoyed, But No Comment.
LSHMBA
Laughing So Hard My Belly Aches
re
1 Hello again; regreet 2 In regard to
LSHMBH
Laughing So Hard My Belly Hurts.
rehi
Hi again
LTHTT
Laughing Too Hard To Type
RHIP
Rank Has Its Privileges.
LTNS
Long Time No See
RL
Real Life (an abbreviation used in MUDs and
chat)
LTNT
Long Time, No Type.
RLCO
Real Life Conference.
© EyePAT Community Interest Company
Version 4.0 2014
187
www.eyepat.org
[email protected]
Using the Internet Safely
Word
Definition
Word
Definition
LTS
Laughing to Self.
ROFL
Rolling On Floor Laughing.
LUWAMH
Love You With All My Heart.
ROFLASTC
Rolling On Floor Laughing And Scaring The Cat.
LY
Love You.
ROFLGO
Rolling On Floor Laughing Guts Out.
MLA
Multiple Letter Acronym.
ROFLMAO
Roll On Floor Laughing My Arse Off.
MOF
Matter Of Fact.
ROTF
Rolling On The Floor
MOTAS
Member Of The Appropriate Sex
ROTFL
Rolling On The Floor Laughing
MOTD
Message of the day
ROTFLAHMS
Rolling On The Floor Laughing And Holding My
Sides.
MOTOS
Member Of The Opposite Sex
ROTFLOL
Rolling On The Floor Laughing Out Loud
MOTSS
Member Of The Same Sex
RRQ
Return Receipt Request.
MTF
more to follow
RSN
Real Soon Now
MTFBWY
May The Force Be With You.
RSVP
Respondez S'il Vous Plait French for "please
reply"; a notation often found on invitations
MYOB
1. Mind Your Own Business (chat). 2. A
small business accounting package from
Best!Ware.
RTBM
Read The Bloody Manual
NAVY
Never Again Volunteer Yourself.
RTFAQ
Read The Frequently Asked Questions
NBD
No Big Deal.
RTFF
Read The Freaking FAQ.
NFW
No Friggin' Way!.
RTFM
Read The F------ Manual. A gentle suggestion
to users who ask questions they could have
answered themselves
NHOH
Never Heard Of Him/Her
RTM
Read The Manual
NIH
Not Invented Here.
RTSM
Read The Silly Manual.
RTWFQ
Read The Whole Friggin' Question.
TPTB
The Powers That Be
RYFM
Read Your Friendly Manual
TRDMC
Tears Running Down My Cheeks.
RYS
Read Your Screen.
TSR
Totally Stupid Rules.
S
Smile
TTBOMK
To The Best Of My Knowledge
SAPFU
Surpassing All Previous Foul Ups.
TTFN
Ta Ta For Now
SCNR
Sorry, Could Not Resist.
TTKSF
Trying To Keep a Straight Face
SEC
Wait a second
TTUL
Talk To You Later.
SETE
Smiling Ear To Ear.
TTYAWFN
Talk To You A While From Now.
SFLA
Stupid Four Letter Acronym.
TTYL
Talk To You Later
SICS
Sitting In Chair Snickering.
TYCLO
Turn Your CAPS LOCK Off (Quit Shouting).
SLM
See Last Mail.
TYVM
Thank You Very Much
SMOP
Small Matter of Programming.
UOK
Are You OK?
SNAFU
Situation Normal: All Fouled Up
WAEF
When All Else Fails.
SO
Significant Other
WB
Welcome Back
SOL
SH** Out Of Luck
WDYMBT
What Do You Mean By That?.
SOS
1. Same Old Stuff. 2. Help!.
WDYT
What Do You Think?
SOW
Speaking Of Which.
WIBAMU
Well, I'll Be A Monkey's Uncle.
SUFID
Screwing Up Face In Disgust.
WIBNI
Wouldn’t It Be Nice If
SWIM
See What I Mean?
WMMOWS
Wash My Mouth Out With Soap.
SWL
Screaming With Laughter.
WNOHGB
Where No One Has Gone Before.
SYS
See You Soon.
WOA
Work Of Art.
TAF
That's All, Folks!.
WOTAM
Waste Of Time And Money.
TAFN
That’s All For Now
WRT
With Regard To, or With Respect To
© EyePAT Community Interest Company
Version 4.0 2014
188
www.eyepat.org
[email protected]
Using the Internet Safely
Word
Definition
Word
Definition
TANJ
There Ain’t No Justice
WT
Without Thinking.
TANSTAAFL
There Ain’t No Such Thing As A Free Lunch
WTB
Want To Buy
TARFU
Things Are Really Fouled Up.
WTF
What The F***?
TBYB
Try Before You Buy.
WTG
Way To Go!
TDM
Too Darn Many.
WTGP
Want To Go Private?
TFS
Three Finger Salute (Ctl-Alt-Del).
WTH
What the hell?
TFTHAOT
Thanx For The Help Ahead Of Time.
WTTM
Without Thinking Too Much.
TFTT
Thanks For The Thought.
WYGISWYPF
What You Get Is What You Pay For
TGAL
Think Globally, Act Locally.
XOXOXO
Kisses and hugs
THX
Thanks
YABA
Yet Another Bloody Acronym
TIA
Thanks In Advance
YAOTM
Yet Another Off-Topic Message.
TIC
Tongue In Cheek
YAUN
Yet Another Unix Nerd
TINWIS
That Is Not What I Said.
YGLT
You're Gonna Love This ....
TNSTAAFL
There's No Such Thing As A Free Lunch.
YGTI
You Get The Idea?
TNTL
Trying Not To Laugh
YGWYPF
You Get What You Pay For
TNX
Thanks
YIU
Yes, I Understand
TNXE6
Thanks A Million ("E6" means 10 to the 6th
power = a million)
YIWGP
Yes, I Will Go Private
TOBAL
There Oughta Be A Law.
YKYARW
You Know You're A Redneck When . . ..
TOBG
This Oughta Be Good.
YMMV
Your Mileage May Vary (or your experience
could be different)
TOY
Thinking Of You.
© EyePAT Community Interest Company
Version 4.0 2014
189
www.eyepat.org
[email protected]
Using the Internet Safely
Dictionary of Sexting terms
Our apologies if you find some of these offensive. Unfortunately this is the nature of the
subject. It is important that you know what your children may know.
8
Oral sex
9
Parent Alert
1337
Elite
143
I love you
182
I hate you
459
I love you
1174
Nude club
420
Marijuana
ADR
Address
ASL
Age/Sex/Location
banana
Penis
CD9, Code 9
parents are around
DUMDo
You Masturbate?
DUSL
Do You Scream Loud?
FB
F*** Buddy
FMLTWIA
F*** Me Like The Whore I Am
FOL
Fond of Leather
GNOC
Get Naked On Cam
GYPO
Get Your Pants Off
IAYM
I Am Your Master
IF/IB
In the Front -or- In the Back
IIT
Is It Tight?
ILF/MD
Love Female/Male Dominance
IMEZRU
I Am Easy, Are You?
IWSN
I Want Sex Now
J/O
Jerking Off
KFY or K4Y
Kiss For You
kitty
Vagina
KPC
Keeping Parents Clueless
LMIRL
Let's Meet In Real Life
© Eye PAT Community Interest Company
Version 4.0 2014
190
www.eyepat.org
[email protected]
Using the Internet Safely
MOOS
Member Of The Opposite Sex
MOSS
Member(s) Of The Same Sex
MorF
Male or Female
MOS
Mom Over Shoulder
MPFB
My Personal Fuck Buddy
NALOPKT
Not A Lot Of People Know That
NIFOC
Nude In Front Of The Computer
NMU
Not Much, You?
P911
Parent Alert
PAL
Parents Are Listening
PAW
Parents Are Watching
PIR
Parent In Room
POS
Parent Over Shoulder -or- Piece Of Shit
PRON
Porn
Q2C
Quick To Cum
RU/18
Are You Over 18?
RUH
Are You Horny?
S2R
Send To Receive
SorG
Straight or Gay
TDTM
Talk Dirty To Me
WYCM
Will You Call Me?
© Eye PAT Community Interest Company
Version 4.0 2014
191
www.eyepat.org
[email protected]
Using the Internet Safely
Internet Chat and Drug Lingo
Lingo to warn of Parental Monitoring
POS
Parent Over Shoulder
PAW
Parents Are Watching
PIR
Parent In Room
PAL
Parents Are Listening
P911
Parent Alert
KPC
Keeping Parents Clueless
Internet lingo of social or sexual nature
WYCM
Will You Call Me?
HAK
Hugs And Kisses
ASL
Age/Sex/Location
ILU or ILY
I Love You
MorF
Male or Female
KOTL
Kiss On The Lips
KFY
Kiss For You
SMIM
Send Me an Instant Message
MOOS
Member(s) Of the Opposite Sex
SMEM
Send Me an E-Mail
ADR
Address
WUF
Where Are You From?
LMIRL
Let's Meet In Real Life
WYRN
What's Your Real Name?
Similar to Internet lingo, drug nomenclature can be cryptic. Parents can monitor for drug
use by learning popular drug lingo and asking questions. A few examples of popular drug
lingo are listed below; a database containing more than 2,300 street terms is also
available.
Marijuana Lingo
Pot–Grass–Dope–Weed–Bud–Mary Jane–Ganja–Whacky Backy
Alternative names for Marijuana
Kind Bud
An expensive and potent strain of marijuana
Blunt
Marijuana rolled into a Philly Blunt or similar type of cigar
Bong
A large water filtered pipe for smoking marijuana
Prescription Drug
Pharming
Raiding medical cabinets to trade and consume prescription drugs to get high
Robotripping
Drinking cough medicine to get high (comes from the brand name Robitussin)
Lean
Drinking prescription cough syrup mixed with painkillers and soda
O
Oxycontin
Tweaking
High on amphetamines
Blue Boogers
Snorting Adderall or Ritalin
© Eye PAT Community Interest Company
Version 4.0 2014
192
www.eyepat.org
[email protected]
Using the Internet Safely
Emoticons
Word
Definition
Word
Definition
Word
Definition
=^D
Big grin
8-o
Shocked
8
Infinity
=^*
Kisses
8-O
Astonished
8-#
Death
:(
Sad
8-P
Yuck!
\_/
Empty glass
:.(
Crying
8-]
Wow!
~/
Full glass
:|
Bored, sad
8-|
Wide-eyed surprise
]:-)
Happy devil
}: [
Angry, frustrated
8 :-)
Wizard
]:->
Devil
8-)
Wide-eyed, or wearing glasses
8-[
Frayed nerves; overwrought
][
Back to back
:-D
Laughing
:'
Crying
^5
High five
:-(
Frown
:'(
Crying
`:-)
Raised eyebrow
(-:
Left-handed smile, or smiley from
the southern hemisphere
:'-(
Crying
d :-o
Hats off to you!
>:)
Little devil
:'-)
Tears of happiness
{}
No comment
:-{)
Smile with moustache
:*)
Clowning
|(
Sleepy (on late night email
message)
:-{)}
Smile with moustache and beard
:+(
Got punched in the nose
|-(
Sleepy, struggling to stay awake,
or sleeping badly
:-/
Wry face
:,(
Crying
|-<>
Puckered up for a kiss
:-#
My lips are sealed; or someone
wearing braces
:-
Male
|-D
Big laugh
:-@
Screaming
:-'|
Sniffles
|-O
Yawn
>:-<
Angry
:-*
Kiss
|-{
Good grief!
:/)
Not funny
:-,
Smirk
|-|
Asleep
()
Hugging
:-6
Exhausted
|I
Asleep
((()))
Lots of hugging (initials or a name
can be put in the middle of the
one being hugged)
:-9
Licking lips
|^o
Snoring
*
Kiss
:-<
Very sad
[]
Hug
+<:-|
Monk or nun
:-><
Puckered up to kiss
[[ ]]
Hug Insert a name in the
brackets of the one who is being
hugged, as: [[Marcia]]
:**:
Returning kiss
:->
Smile of happiness or
sarcasm
}-)
Wry smile
:-&
Tongue-tied
:-C
Astonished
}{
Face to face
:-?
Licking lips, or tongue in cheek
:-I
Pondering, or impartial
~ :-(
Steaming mad
:( )
Loudmouth, talks all the time; or
shouting
:-M
Speak no evil
~:-(
Flame message
^^^
Giggles
:-P
Sticking out tongue
~~:-(
Especially hot flame message
{{ }}
Hug; the one whose name is in
the brackets is being hugged
Example: {{MJ}}
:-Q~
Smoking
~:-\
Elvis
P*
French kiss
:-V
Shouting
~:\
Elvis
%(|:-)
Propeller-head
:-Y
Aside comment
( 8(|)
Homer
:-)
Classic smiley
:-]
Smiling blockhead; also
sarcasm
7:)
Ronald Reagan
;-)
Winkey
:-[
Unsmiling blockhead; also
criticism
7:^)
Ronald Reagan
=O
Surprised
:-c
Very unhappy
>-<
Furious
:-O
Open-mouthed, surprised
:-d~
Heavy smoker
?(
Black eye
-)
Tongue in cheek
:-e
Disappointed
?-(
Black eye
© Eye PAT Community Interest Company
Version 4.0 2014
193
www.eyepat.org
[email protected]
Using the Internet Safely
Word
Definition
Word
Definition
Word
Definition
;P
Wink with a raspberry
:-f
Sticking out tongue
@==
Atomic bomb
>=^ P
Yuck
:-i
Wry smile or half-smile
@>--->---
A long-stemmed rose
:-Q
Tongue hanging out in disgust, or
a smoker
:-j
One-sided smile
@}->--
Rose
:P
Sticking out tongue
:-k
Puzzlement
B:-)
Sunglasses on head
Q:-)
College graduate
:-l
One-sided smile
M-)
See no evil
:-X
My lips are sealed; or a kiss
:-o
Surprised look, or yawn
M-), :X, :-M
See no evil, hear no evil, speak
no evil
8)
Wide-eyed, or wearing glasses
:-p
Sticking tongue out
M:-)
A salute
:[
Bored, sad
:-p~
Heavy smoker
O8-)
Starry-eyed angel
:*
Kiss
:-r
Sticking tongue out
O 8-)
Starry-eyed angel
:)
Smile
:-s
What?!
O:-)
Angel
;)
Wink
:-t
Unsmiley
O :-)
Angel
=X
My lips are sealed
:-x
Kiss, or My lips are sealed
O+
Female
:-J
Tongue in cheek
:-{}
Blowing a kiss
O->
Male
!-(
Black eye
:-|
Indifferent, bored or
disgusted
X-(
Just died
!-)
Proud of black eye
:-| :-|
Deja vu
[:-)
Wearing a Walkman
#-)
Wiped out, partied all night
:-||
Very angry
[:-]
Square head
#:-o
Shocked
:-}
Mischievous smile
[:-|
Frankenstein
$-)
Won the lottery, or money on the
brain
:-~|
A cold
[:]
Robot
%*}
Inebriated
:/i
No smoking
[:|
Frankenstein
%+{
Got beat up
:>
What?
[:|]
Robot
%-)
Dazed or silly
:@
What?
~=
Lit candle, indicating a flame
(inflammatory message)
%-(
Confused
:C
Astonished
~==
Begins a flame (inflammatory
message)
%-6
Brain-dead
:X
Hear no evil
~:o
Baby
%-|
Worked all night
:^D
Happy, approving
~~:[
Net flame
%-{
Ironic
:`-(
Shedding a tear
~~~~8}
Snake
%-}
Humorous or ironic
:x
Kiss
~~~~~8}
Snake
%\
Hangover
:e
Disappointed
IOHO
In Our Humble Opinion
')
Winky
:~-(
Crying
///\
Laughter
'-)
Winky
:-~)
A cold
( <> .. <> )
alienated
(( )):**
Hugs and kisses
:{
Having a hard time
5:-)
Elvis
(:&
Angry
:~)
A cold
>-
Female
(:-
Unsmiley
:~/
Confused
12x@>--->--
A dozen roses
(:-&
Angry
;(
Crying
2B|^2B
To be or not to be
(:-(
Unsmiley
;-(
Angry, or got a black eye
>->
Winking devil
(:-)
Smiley variation
;-D
Winking and laughing
>>:-<<
Furious
(:-*
Kiss
<:>
Devilish expression
+O:-)
The Pope
(:-\
Very sad
<:->
Devilish expression
-=
Snuffed candle to end a flame
message
(::()::)
Bandaid, meaning comfort
<:-(
Dunce
-=#:-)
Wizard
(:|
Egghead
<:-)
Innocently asking dumb
question
0:-)
Angel
*-)
Shot to death
<:-|
Dunce
>:-)
Mischievous devil
*<|:-)
Santa Claus, or a clown
<:|
Dunce
>:-<
Mad
© Eye PAT Community Interest Company
Version 4.0 2014
194
www.eyepat.org
[email protected]
Using the Internet Safely
Word
Definition
Word
Definition
Word
Definition
*<:-)
Santa Claus
=):-)=
Abraham Lincoln
>:->
Very mischievous devil
+:-)
Priest
=:-)
Punk, or hosehead
>-)
Devilish wink
+<:-)
Religious leader
=====:}
Snake
>:-(
Annoyed
© Eye PAT Community Interest Company
Version 4.0 2014
195
www.eyepat.org
[email protected]
Using the Internet Safely
Evidence - How to Save
Without evidence it makes it extremely difficult for the police to investigate and reports
of online abuse.
So, whatever you do don't delete any messages which are either threatening or ask for
any sexual actions or arrangements to meet.
Keep a diary note making a note of the dates, times and any other details including who
was involved, what happened and who may have witnessed it.
From a laptop or computer
To copy screen images from your computer follow these 5 step instructions.
1.
Make sure the message is on your screen.
2.
Press the Print Screen button (on most Computers this will appear as
PRTSC)
3.
This will take a copy of whatever is on your screen at that moment
4.
Open Word, PowerPoint or Outlook. If you don't have one of these
you can use Notebook
5.
(Notebook can be found under
Start/All Programs/Accessories/Notebook)
6.
Use the Paste function to copy it into the document/file you have open.
7.
This can be done by using: any of these three options:
Ctrl + V, or
Edit/Paste or
Press the right hand mouse button and choose Paste.
Save the document using File/Save or Ctrl+S. Don’t forget to name it!
You now have a record of what was on the screen.
From a Tablet
Android 4.0 (Ice Cream Sandwich): Hit the Power and Volume Down Button
Simultaneously
Google introduced a screenshot-taking feature (which Apple's iOS already had) finally with Ice
Cream Sandwich, Android 4.0. If you have Android 4.0 or later, you can take a screenshot of your
device by pressing the power button and the volume down button at the same time. It might take
a little bit of trial-and-error to master that simultaneous pressing. (I find that holding the buttons
down for at least more than a second together avoids the annoying situation when your phone
simply turns off the screen or lowers the volume.) You'll find the screenshots in your Gallery under
a Screenshots folder.
© Eye PAT Community Interest Company
Version 4.0 2014
196
www.eyepat.org
[email protected]
Using the Internet Safely
From a Mobile
Use Your Phone's Built-in Shortcuts
Some phones come with screen grabbing utilities built-in. Many Samsung devices, such
as the Galaxy SII and Galaxy Note, for example, let you press the power and home
button together to take a screenshot and place it in your Gallery.
To find out if your phone has a screenshot tool, either check the manual or do a simple
Google search for "[name of phone] take a screenshot]"
There might also be a device-specific app you can download to take screenshots and also
do more with those images of your screen. For example, Screen Capture Shortcut Free works
with some Samsung devices and lets you take captures after a delay or when you shake
your phone. For other devices. search the Google Play Store for the name of your device
and "screenshot," "screengrab," or "screen capture."
Install an App for Screenshots
If you don't have ICS or your phone doesn't have a built-in screenshot feature, you can
try an Android app that does or doesn't require rooting your Android device. (Rooting
gives you more control over it, so you can do things like tether your phone to serve as a
modem for your laptop (without the onerous fees) or give a third-party app permission
to take a picture of your Android phone's screen.)
No Root Screenshot It doesn't require root, and it allows you to take screenshots via a
widget, annotate screenshots, and more. It's $4.99, but there's a free trial available.
If your device is rooted, you can use a custom ROM (e.g., Cyanogenmod) which has a
"capture screenshot" option when you long-press the power button. An alternative is to
use one of the many apps available that will let you take a screen grab. aScreenshot is a
free one and AirDroid, which wirelessly manages your Android device, also lets you take
screenshots of your Android device--wirelessly, even, through your computer's web
browser.
Use the Android SDK
Finally, you can take screenshots of any Android device by installing the Android SDK
from Google on to your computer. The Android SDK is a software development kit used
by developers to create and test Android apps, but it's freely available to everyone. To
use the Android SDK, you'll need the Java SE Development Kit, Android SDK, and possibly
USB drivers for your device (found on the manufacturer's website). Then you plug in
your phone, run the Dalvik Debug Monitor (DDMS.BAT file), and click on Device >
Screen Capture... in the Dalvik Debug Monitor menu. It's kind of a clunky way to take
screenshots, but if nothing else works or you have the Android SDK set up anyway, it's
easy to use.
http://mobileoffice.about.com/od/phonesformobileworkers
Samsung Mini Phone
Hold down Home + Power button at the same time and the screen shot is saved to
your gallery.
© Eye PAT Community Interest Company
Version 4.0 2014
197
www.eyepat.org
[email protected]
Using the Internet Safely
Please remember, this is an
Internet Safety Guide
The internet is a wonderful tool
It is our future
and
Communication is the most
effective way to keep people
safe
© Eye PAT Community Interest Company
Version 4.0 2014
198
www.eyepat.org
[email protected]
Using the Internet Safely
© Eye PAT Community Interest Company
Version 4.0 2014
199
www.eyepat.org
[email protected]
Using the Internet Safely
www.eyepat.org
[email protected]
01446 795055
© Eye PAT Community Interest Company
Version 4.0 2014
200
www.eyepat.org
[email protected]