Internet Safety. A guide to staying smart & safe online

Size: px
Start display at page:

Download "Internet Safety. A guide to staying smart & safe online"

Transcription

1 Internet Safety A guide to staying smart & safe online

2 What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online

3 It s not just about computers There are many ways to use the internet - Computers - Mobile Phones, ipods - Game Consoles (Xbox360, Playstation) And many places - At home, at friend s houses, on the street, in shops/cafes

4 Privacy If a website is too nosey you re probably right! If a website or person is asking for too much information think before handing over those details. Create an internet version of yourself Use a different date of birth for websites Use an internet name for websites (perhaps create a new middle name) Look for the Privacy Settings and you decide how private you want to keep your information

5 Privacy - tips No need to keep logged in! Stop others using your account if you leave your PC or phone unattended. This would be like walking away from an ATM leaving your card in the machine.

6 Privacy Tips Look for your Privacy Settings

7 Privacy You decide what level of privacy you want. Take responsibility for your information. Rule Of Thumb: if you wouldn t like the information stuck on your front door for everyone to see would you put it online? In the next few slides we ll show you some examples of how to take control of your information

8 Privacy Tips In this example anybody can see all of your information.

9 Privacy Tips In this example only your friends can see your information.

10 Privacy Tips You can decide using a Custom setting.

11 Privacy Tips With higher privacy settings none of this information would be available to a complete stranger. Adam has not used a real photo a good idea.

12 In this example Heather has not used a real photo and has blocked strangers from seeing any of her information

13 Privacy Tips Facebook? Bebo? Pretty much all the same

14 Staying Safe Online Cyberbullying is usually done through text messages, , online chat. In the next few slides we ll show you how to take action.

15 Staying Safe Online Best first step is to block someone from contacting you online. If they can t contact you they can t do anything. How to block someone on Facebook.

16 Staying Safe Online

17 Staying Safe Online Online Chat this includes online chatting in Facebook, Bebo and Instant Messenger. Every online chat system will have a way to block or delete people. Usually it is as simple as right-clicking on their name and choosing block or delete.

18 Staying Safe Online How to avoid trouble 99% of the time there are no problems online. Just like in real life you should stay aware of your surroundings. Classic internet arguments & problems - Online discussion forums with sensitive or controversial subject matter (politics, religion etc) - Keyboard Warriors who spend their time online looking for victims.

19 Internet Language Constantly changing You can do a search if you don t know what it means

20 Internet Language

21 Internet Language

22 Resources

23 Resources

24 Some tips if Ur Bn Bullied By text or video messages: Turn off your phone for a few days If it persists change your number Don t reply Report persistent abuse to your mobile service provider Keep the evidence Text harassment is a crime. If just annoying tell an adult; if threatening or malicious tell the Gardai

25 By phone calls: Put the phone down Always tell an adult Don t give any personal details Use voic or caller ID to vet your phone calls Don t leave your name on your voice mail greeting or get an adult to record your greeting Calls can usually be traced Think about changing your number Keep a record of nuisance calls and report them to the Gardai

26 By and website: Never reply to unwanted or unpleasant s Keep the messages as evidence and tell an adult Never reply to someone you don t know as this will confirm your address as real Keep personal information private Contact the sender s ISP by writing, e.g. Stop, Block and Tell Think B4U Click

QUICK START GUIDES 1

QUICK START GUIDES 1 QUICK START GUIDES Quick Start Guide Audio setup and making calls Set up your audio device First things first: set up your audio device and check the quality. You can use your computer s mic and speakers,

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Cyber bullying, sexting and Facebook. Know the law, know your rights

Cyber bullying, sexting and Facebook. Know the law, know your rights Cyber bullying, sexting and Facebook Know the law, know your rights 2 Cyber bullying, sexting and Facebook Contents 4 Cyber bullying 10 Sexting 14 Facebook 17 More information 18 Useful websites Disclaimer

More information

Now you are 18 Reputation and Social Media

Now you are 18 Reputation and Social Media Now you are 18 Reputation and Social Media Information presented (as of November 2015) is not intended as legal advice and cannot be relied on as such. YOUR REPUTATION Your reputation is what people think

More information

Social networking and Facebook information for foster carers

Social networking and Facebook information for foster carers Social networking and Facebook information for foster carers It is important that foster carers understand about social networking, including the opportunities and the dangers, and that they can discuss

More information

Guidance on Cyber Bullying

Guidance on Cyber Bullying Guidance on Cyber Bullying Human Resources HR Policies Discipline Grievance Bullying and harassment Equal opportunities Stress management Sickness absence Staff handbook Social media Dignity at work Mediation

More information

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING Read this CYBER BULLYING An initiative of the Department of Basic Education If you re like most teenagers, you spend a lot of time on a cell phone or instant messenger chatting with friends and uploading

More information

Lostwithiel School Anti Bullying Policy April 2016

Lostwithiel School Anti Bullying Policy April 2016 Lostwithiel School Anti Bullying Policy April 2016 At Lostwithiel School, we are committed to safeguarding children. The health, safety and emotional well-being of every child are our paramount concern.

More information

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Cyber Safety and Anti Bullying Policy

Cyber Safety and Anti Bullying Policy Tarlee Primary School Cyber Safety and Anti Bullying Policy Policy Review: Due to the rapid speed of technological innovation, Internet technology and the schools use of technological resources that will

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Merton Safeguarding Children Board. Supporting Merton s young people to stay safe online. An e-safety strategy

Merton Safeguarding Children Board. Supporting Merton s young people to stay safe online. An e-safety strategy Merton Safeguarding Children Board Supporting Merton s young people to stay safe online An e-safety strategy 2014-2015 1.0 Foreword Helping children and young people to stay safe online will always be

More information

Cybersafety and protocols for conducting online life?

Cybersafety and protocols for conducting online life? Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Services for Children, Young People and Families

Services for Children, Young People and Families Services for Children, Young People and Families CHILDREN IN CARE Safe and Proper Use of Computers and the Internet Reviewed October 2015 Reviewed by: Sally Rimmer Date to be Reviewed: November 2016 The

More information

Policy on Pupils Use of IT, Mobile Phones and Other Electronic Equipment

Policy on Pupils Use of IT, Mobile Phones and Other Electronic Equipment Policy on Pupils Use of IT, Mobile Phones and Other Electronic Equipment Please also refer to the Whole School Anti-Bullying Policy and Procedures, Whole School Safeguarding (Including Child Protection)

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Lync 2013 Quick Reference

Lync 2013 Quick Reference Lync 2013 Quick Reference Audio Set up your audio device Before using Lync to make a call or join a conference, set up your audio device and check the quality. You can use your computer s mic and speakers,

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Cybersafety: Creep Quiz. Fact Only 46% of teens have turned off location-tracking features on their mobile phone or within an app.

Cybersafety: Creep Quiz. Fact Only 46% of teens have turned off location-tracking features on their mobile phone or within an app. Creep Quiz More information Shifty Shane Only 46% of teens have turned off location-tracking features on their mobile phone or within an app. Almost all smart devices have an inbuilt Global Positioning

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

Getting Started with Microsoft Lync : Windows and Mac

Getting Started with Microsoft Lync : Windows and Mac Getting Started with Microsoft Lync : Windows and Mac Microsoft Lync for Windows 2013 Microsoft Lync helps you stay connected to the people who are important to you via instant messaging, email, audio,

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

This Cyber -Bullying Policy is to be reviewed by the Board of Management. This Cyber- Bullying Policy was agreed on

This Cyber -Bullying Policy is to be reviewed by the Board of Management. This Cyber- Bullying Policy was agreed on This Cyber -Bullying Policy is to be reviewed by the Board of Management. This Cyber- Bullying Policy was agreed on Signature (Chair of.. Board of Management)... (Principal) Date for Review. Cyber-Bullying

More information

Audio setup and making calls

Audio setup and making calls Forward your Quick Start Guide phone calls Want your calls to go to your Voice Mail or to your cell phone or a hotel room phone?. In the lower-left of the main Skype for Business window, click the Call

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

MySpace Bebo Facebook cyberbullying contact by adults with a sexual interest in children

MySpace Bebo Facebook cyberbullying contact by adults with a sexual interest in children YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING sites Social networking sites, such as MySpace, Bebo and Facebook, are very popular with children,

More information

SPIRITULIZED YOUTH FOR CHRIST e-safety & Acceptable Use Policy. To be read alongside the Safeguarding Policy

SPIRITULIZED YOUTH FOR CHRIST e-safety & Acceptable Use Policy. To be read alongside the Safeguarding Policy SPIRITULIZED YOUTH FOR CHRIST e-safety & Acceptable Use Policy To be read alongside the Safeguarding Policy SPIRITULIZED YFC e-safety and Acceptable Use Policy February 2012 (v1) Page 1 Contents Section

More information

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012

More information

Staying Safe.. out and about

Staying Safe.. out and about Staying Safe.. out and about An easy read guide for people with learning disabilities What this guide is about Being safe and feeling safe are important. We wrote some top tips to help you think about

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses

More information

New Social Networking Apps

New Social Networking Apps Do you track your child s Facebook account and texting (We certainly hope so!)? Well, time for an update on alternative networking and messaging apps teens are using (often with a much more raw side of

More information

Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile

Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging

More information

Facebook Guidelines For Parents

Facebook Guidelines For Parents Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Department of Information Technology. Microsoft Lync Basic Functions

Department of Information Technology. Microsoft Lync Basic Functions Department of Information Technology Microsoft Lync 2013 Basic Functions October 2013 Table of Contents Table of Contents... 2 Overview... 3 Objectives... 3 Microsoft Lync Training... 4 Getting Started...

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Cyber Bullying. Lesson Plan. Ice-Breaker. Learning Outcomes:

Cyber Bullying. Lesson Plan. Ice-Breaker. Learning Outcomes: Cyber Bullying Lesson Plan Learning Outcomes:. For the YP to define cyberbullying. To suggest ways in which YP can stay safe online.. To look at online dangers.. To identify cyberbullying and it s consequences..

More information

Stalking. Office for Student Affairs

Stalking. Office for Student Affairs Stalking The Aurora Center for Advocacy & Education 117 Appleby Hall*128 Pleasant St. SE*Minneapolis, MN 55455 Business Line: (612) 626-2929 Email: aurora.center@umn.edu*website: www.umn.edu/aurora Office

More information

Safer Internet Day Quiz Are you a good friend online?

Safer Internet Day Quiz Are you a good friend online? Safer Internet Day Quiz Are you a good friend online? Safer Internet Day 2015 is all about helping to create a better internet together. One way to do this is to be a good friend to others online. What

More information

RCN BUSINESS OFFICE MOBILITY FOR DESKTOP

RCN BUSINESS OFFICE MOBILITY FOR DESKTOP RCN BUSINESS OFFICE MOBILITY FOR DESKTOP Quick Reference Guide 3 Office Mobility File Tools Help RECEIVING CALLS JOE SMITH Enter name or number + When someone calls your RCN Business number, you ll see

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Nower Hill High School

Nower Hill High School Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

MOBILE PHONE POLICY. Date Reviewed/Adopted. 17 June Signature of Chair. Signature

MOBILE PHONE POLICY. Date Reviewed/Adopted. 17 June Signature of Chair. Signature MOBILE PHONE POLICY Date Reviewed/Adopted Name of Chair 17 June 2015 G Rooney Signature of Chair Headteacher Mr J Pout Signature Date for next Review 17 June 2016 Appendix 1 - Rainhill High School Mobile

More information

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by: A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

HARASSMENT/BULLYING PREVENTION LESSON 8 th Grade 2013

HARASSMENT/BULLYING PREVENTION LESSON 8 th Grade 2013 HARASSMENT/BULLYING PREVENTION LESSON 8 th Grade 2013 1 Agenda Harassment/Bullying What are the different types? The Bystander Effect Let s Fight Together Video Have You Ever? Activity What s Your Story:

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009

Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Princeton Survey Research Associates International for the Pew Internet & American Life Project Sample:

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Internet Safety & Autism

Internet Safety & Autism Being able to use new technology is an important part of life for most teenagers and adults. You can use the Internet for activities like banking, buying tickets to events, ordering food, DVDs and clothes,

More information

Cyberbullying A whole-school community issue

Cyberbullying A whole-school community issue Cyberbullying A whole-school community issue Introduction Today s children and young people have grown up in a world that is very different from that of most adults. Many young people experience the internet

More information

Lync 2013 Quick Reference Lync Meetings. Join a Lync Meeting. Schedule a Lync Meeting. Do I need a PIN, work number or extension? Set meeting options

Lync 2013 Quick Reference Lync Meetings. Join a Lync Meeting. Schedule a Lync Meeting. Do I need a PIN, work number or extension? Set meeting options Join a Lync Meeting 1. In the meeting request, click Join Lync Meeting or click Join Online in the meeting reminder. 2. On the Join Meeting Audio window, select one of the options: Use Lync (full audio

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Create a Basic Skype* Account. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.

Create a Basic Skype* Account. Intel Easy Steps 1 2012 Intel Corporation All rights reserved. Create a Basic Skype* Account Intel Easy Steps 1 2012 Intel Corporation Using Skype* to Communicate: Create and use a Basic Skype Account There are different ways of communicating and sharing through the

More information

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). ELECTRONICALLY MEDIATED COMMUNICATION (EMC) Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). Examples of EMC Cell phones Computerconferencing Discussion boards

More information

How to block unwanted s on gmail.com

How to block unwanted  s on gmail.com How to block unwanted emails on gmail.com by Naveed Farooq. naveeid@gmail.com www.nidokidos.org Many people don t know how to get rid of unwanted emails Its very easy follow these steps 1) Open the email

More information

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Unified Communications Android Client Quick Reference Guide

Unified Communications Android Client Quick Reference Guide Unified Communications Android Client Quick Reference Guide Table of Contents About MegaPath Unified Communications (UC)... 2 Download and Install the UC Client... 2 Logging In... 3 Logout... 3 The UC

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

TECHNOLOGY Understanding the laws surrounding cell phones and computers

TECHNOLOGY Understanding the laws surrounding cell phones and computers TECHNOLOGY Understanding the laws surrounding cell phones and computers Most young people have been exposed to technology such as cell phones and the Internet for most of their lives. Read on to learn

More information

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading

More information

Skype for Business: Get Started... 3. Set-up Audio... 3. Set-up Video... 3. Conversation Window... 4. Shut Your Virtual Office Door...

Skype for Business: Get Started... 3. Set-up Audio... 3. Set-up Video... 3. Conversation Window... 4. Shut Your Virtual Office Door... Desktop/Laptop Contents : Get Started... 3 Set-up Audio... 3 Set-up Video... 3 Conversation Window... 4 Shut Your Virtual Office Door... 4 Personalise... 5 Customise What s Happening Today... 5 Profile

More information

Terese Jonsson, Open Up Administrator, talks through the basics of online social networking.

Terese Jonsson, Open Up Administrator, talks through the basics of online social networking. Social Networking Terese Jonsson, Open Up Administrator, talks through the basics of online social networking. What is social networking? An online social network is a website where you can set up a profile

More information

Keeping safe on the internet

Keeping safe on the internet Keeping safe on the internet www.fifedirect.org.uk/internetsafety The internet is part of everyday life. Many people are not confident about using the internet. It is important to know how to keep yourself

More information

East Sussex County Council. A guide for schools

East Sussex County Council. A guide for schools East Sussex County Council A guide for schools Introduction Mobile phones and computers have become essential everyday items that allow us to keep in touch with our friends, families and colleagues, as

More information

Keeping your child safe online

Keeping your child safe online Keeping your child safe online This presentation is about.. Why Internet safety is more important than ever before Five tips to becoming an Internet parent Five everyday ways to help your child keep themselves

More information

Preston C of E Primary School Acceptable Use of ICT Policy (including Social Media Policy) Introduction This policy will define the acceptable use of

Preston C of E Primary School Acceptable Use of ICT Policy (including Social Media Policy) Introduction This policy will define the acceptable use of Preston C of E Primary School Acceptable Use of ICT Policy (including Social Media Policy) Introduction This policy will define the acceptable use of ICT (Information and Communications Technology) within

More information

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Internet Safety & Awareness. Dan Tomlinson 02/23/2013 Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Work Smart: Using Lync 2010 with Office 2010

Work Smart: Using Lync 2010 with Office 2010 Work Smart: Using Lync 2010 with Office 2010 When you run Microsoft Office 2010 with Microsoft Lync 2010 communications software, you can access many Lync 2010 features directly from your Office 2010 programs.

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Online Security. Protect your identity, your personal information and your family. make it safe make it simple makeitsecure.org

Online Security. Protect your identity, your personal information and your family. make it safe make it simple makeitsecure.org Online Security Protect your identity, your personal information and your family. make it safe make it simple makeitsecure.org Make the most of your Internet experience by surfing wisely The Internet is

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Kik Messenger Guide for Parents and Carers

Kik Messenger Guide for Parents and Carers Kik Messenger Guide for Parents and Carers What is Kik Messenger? Kik Messenger is a free instant mobile messaging app which allows users to exchange messages online within the app using data or wifi,

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information