SafetyNet4 Training Ian Gover

Slides:



Advertisements
Similar presentations
Login window pops up when signing into the website Internet Explorer white screen and login prompt won’t close.
Advertisements

Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Keeping our Children Safe Online
Basic Network Concepts And Troubleshooting. A Simple Computer Network for File Sharing.
Configuring your users browsers. PRACTICAL EXERCISE - 1 We assume here that your LOCAL CACHE has been previously configured to peer with the JWCS. Advice.
ICT Curriculum Evening – an introduction to Wizkid.
LGfL supporting e-safety Helen Warner Royal Borough of Kensington and Chelsea ICT Support Service.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Studying with Technology Session 5b By Ian Cole Lecturer in Information & Communication Technology.
Microsoft Passport Waldemar Swiercz.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
On-Line Database Placement Application Tutorial. How to Change Your Information On York’s System.
Kirkwood Scan to Set Up. Scan to Set up 1. Click on Start, Settings, Printers to get this screen.
Google Account Basics: Getting Started with free Google applications.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Technical Training: DIR-615
Leading at Every Turn. 1)Make sure you have your Trusted Sites configured properly in Internet Explorer 2)Store your credentials on your PC so you.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
St Meryl School e-Safety Presentation for Parents 16 th June 2015 Mr Davies (Computing Subject Leader)
How to create an account on. Open a web browser (e.g. Mozilla Firefox or Internet Explorer) and type in the address bar, then press.
On-Line Service Voucher Log (SVL) Overview. To Be On-line You Must… Be an Enrolled ABC Child Care Provider Have internet access Have Web Browser Internet.
Next Generation Learning How good is your Acceptable Use Policy (AUP)? Presented by Ruth Hammond, Manager, Safeguarding Programmes Presented at BETT 2009.
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Milestone SAP Portal Learning at the Lakes August 12, 2009.
Logging into a Remote Desktop Connection. Connecting to ‘Remote Desktop Connection’ through the application.
Web CEO Assessment Training Module Cancellation and search Engine Ranking by Kat Orense (Oct 06, 2011)
E-SAFETY Children at Shobnall use the Internet on a regular basis as part of their learning. In School, we have regular ‘e-safety’ activities tor remind.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Managing your Own Filtering Why a school should manage their own filtering Ian Christine Woodgate
Creating a SIS account. Type in address into web browser Explorer, Firefox or Chrome  dcs.org dcs.org.
Attention After changing your internet browser (proxy) settings, you can only access those web sites allowed/directed by KHU Library. In order to browse.
E-Safety Cyber-bullying Staying safe Security.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Adding and Modifying Accounts in Microsoft ® Outlook Express ™, and modifying connection settings in Microsoft ® Internet Explorer ™.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
E-Safety By Ian Hopper. Session Aims Apoyo Training & Consultancy -Develop a shared understanding of E-safety -Understand good practice in this area -Understand.
Remote Access Using a Netgear DG834 Router 1http://
E-Safety Parent Talk Helping to keep your children safe online.
They Need You - to encourage them to make good choices. - to teach them about how to stay safe. - to help them to recognise scams. - to encourage good.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Keeping Safe Online A Guide for Parents. Quality & Improvement Service nyASSIST Data for children in the Craven area % of Year 6 pupils have their.
Accessing the Intranet
Online Safety and Safeguarding Update
Living with technology Helping you and your family to stay in control
Creating an Account on Wikieducator
FastFacts Feature Presentation
Online Safety.
STOP. THINK. CONNECT. Online Safety Quiz.
Adobe Connect: Web Conferencing, Collaboration, and Teaching Online
End User Guide.
Access eJournals Form Your Home
KASC – Registration Guide For Swimmers
Logging in How to log in to the Edge Hill Network.
Awareness Training… V 1.1.
Procedure for adding a Trusted Site
Internet Vocabulary Beth Felton McKelvey.
Understanding NHS Jobs
Presentation transcript:

SafetyNet4 Training Ian Gover

Introductions Why have School level filtering? How the filtering software works –an overview Logging In and setting up new accounts Web Access Policies Your School list –allow or deny Times of the day Staff Proxy Logs and recording – school procedures Making sure that everyone is safe – esafety training Agenda

Ofsted ‘Where the provision for e-safety was outstanding, the schools had managed rather than locked down systems. In the best practice seen, pupils were helped, from a very early age, to assess the risk of accessing sites and therefore gradually to acquire skills which would help them adopt safe practices even when they were not supervised.’ (Page 8, The Safe Use of New Technologies – Ofsted Ref No ).

Ofsted ‘Where the provision for e-safety was outstanding, the schools had managed rather than locked down systems. In the best practice seen, pupils were helped, from a very early age, to assess the risk of accessing sites and therefore gradually to acquire skills which would help them adopt safe practices even when they were not supervised.’ (Page 8, The Safe Use of New Technologies – Ofsted Ref No ). This is not a reduction in safeguarding but an opportunity for better esafety education.

Do the educational benefits outweigh the risks?

How the filtering Software works ‘ Internet SWGfL SomerNET School Single IP address

How the Filtering Software works IWF SWGfL LA School Needs of all schools 60 Primary All filters still exist

Logging in New Accounts Two/Three named people No anonymous accounts

The Lists Two/Three named people No anonymous accounts

How the Filtering Software works All users are covered by the filter You can have as many different filter lists as you want Filter lists can be applied for specific periods of time Individual selected users can be set up to avoid the filters

The Lists Allow or Deny to ALL users All web rules are case insensitive. Bits of website can be filtered What would these deny? Toyshop.com toyshop.com/shop *toyshop*

5 minutes for any changes – but test

Set Your Time Periods Select list Select time period for list Times of the Day

Only with written ( ) permission from head? Staff Proxy Should not be easy

You have been given Staff Proxy rights. You can switch to using the Staff Proxy server for the duration of a browser session, as follows: 1.Open Internet Explorer and go to ‘Tools/Internet Options’ 2.Click on the ‘connections’ tab 3.Click on ‘LAN settings’, and tick ‘Use Proxy Server for your LAN’ 4.Enter ‘staffproxy.swgfl.org.uk’ in the address box and specify port Click ‘OK’ 6.Type ‘login.staffproxy’ into the address line and enter your filtering user name and password. Click ‘OK’. When you have finished using the Staff Proxy, close your browser. You will be automatically switched back to using your school's usual proxy server, with filtering enabled. Staff Proxy

Logs

Keeping Safe Make sure that you have a letter from your headteacher to say that they want you to complete this role – AUP does not cover this If in doubt about a web site NEVER investigate If unsure then ask another adult to supervise ‘Inappropriate’ – what you as a reasonable adult don’t think a child should be viewing (taking age into consideration), ‘Illegal’ – child porn and racial hate comments or images – Child Protection issue

Keeping the School Safe

Phone Number: RMid number

Evaluation