Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!

Similar presentations


Presentation on theme: "E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!"— Presentation transcript:

1 E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY

2 PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!

3 SHARING EXPERTISE – WE CAN’T DO EVERYTHING OURSELVES Gap between children and adults is widening – we need to upskill ourselves. We need to work together – share expertise Name: Class No: I’m able to help with Installing antivirus Applying Windows Updates Upgrading to Windows 10 Applying Parental controls Installing a Firewall Applying Restrictions e.g iPads Social media restrictions e.g Facebook, Instagram & Twitter

4 RESTRICTIONS - KEEP IT SIMPLE The No Technology Rule! Upstairs Mealtimes Specific times

5 PASSWORD- FOUR WORDS Create one with your children so you have access to their devices. Passwords with Parents: Sharing = Access

6 INTERNET HISTORY Do you know how to view your ‘internet history’ on multiple devices? Internet Explorer iPad- Safari History Google Chrome Mozilla Firefox

7 ANTI-VIRUS & FIREWALLS http://www.moneysavingexpert.com/utilities/fr ee-anti-virus-software#firewall

8 THE TECHIE BITS - HOW AWARE ARE YOU? TerminologyExplanation Malware Short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand alone computer or a networked pc. Worms Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again. Virus Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. Trojans A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft. Adware Generically adware is a software application in which advertising banners are displayed while any program is running. Adware can automatically get downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on a computer screen automatically. Adwares are used by companies for marketing purpose. Spyware Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. Spam Spamming is a method of flooding the Internet with copies of the same message. Most spams are commercial advertisements which are sent as an unwanted email to users. Tracking cookies A cookie is a plain text file that is stored on your computer in a cookies folder and it stores data about your browsing session. Cookies are used by many websites to track visitor information A tracking cookie is a cookie which keeps tracks of all your browsing information and this is used by hackers and companies to know all your personal details like bank account details, your credit card information etc. which is dangerous. Misleading applications Misleading applications misguide you about the security status of your computer and shows you that your computer is infected by some malware and you have to download the tool to remove the threat. As you download the tool it shows some threats in your computer and to remove it you have to buy the product for which it asks some personal information like credit card information etc. which is dangerous.

9 AGE LIMITS – IT’S NOT ABOUT KEEPING THEM QUIET!

10 CHILD FRIENDLY SEARCH ENGINES

11 CHILD-FRIENDLY APPS

12 INCREASING AWARENESS https://www.net-aware.org.uk

13 ANYONE CAN BECOME A TECHIE! http://www.internetmatters.org /parental-controls/interactive- guide/ http://www.internetmatters.org/

14 PARENTS & CHILDREN WORKING TOGETHER

15 LET THEM TEACH YOU! The people who know best about what your children are up to online, are your children! Get them to tell you about the sites they’re using. Ask them questions such as: Why do they like the site? What can they do on it? What’s so fun about it? Who uses it at school? Who you can talk to? Who are their friends on it? This is a good way to develop a trusting relationship with your child about what they are up to online.

16 REACH AN AGREEMENT A good way to set boundaries with your child about what they can and can’t do online is to set an agreement with them. Here are some examples of the areas you might want to discuss: Limits on the amount of time your child spends online, or playing computer games. Having regular screen breaks – at least five minutes every 45-60 minutes. Not sharing any pictures they wouldn’t be happy to share with you. Not giving out personal details, such as mobile phone number and address without parents permission/knowledge. Coming to you if they are concerned. Or, if not, knowing where they can go for independent help and support. Why not introduce an agreement after watching one of the Thinkuknow films?

17 GOING THAT EXTRA MILE http://www.hongkiat.com/blog/kid-safety-mobile-apps/

18 TOOLS TO PROTECT YOUR CHILDREN – PARENTAL CONTROL Every parental control package is different, but most provide services such as: Filtering – content to restrict access to particular sites Time limits – restrict the amount of time your child can be online, or set periods of time where your child can access certain sites. Monitoring – where you are informed of certain sites that your child is attempting to gain access to. Reporting – where you are provided with information about what sites your child has used.

19 ROUTER SETTINGS & SHIELD www.routerlogin.net

20 KNOW YOUR PIES!  Practical principles Talk with, NOT at your children. Agree family guidelines and rules. Discuss regularly online safety  InfrastructureVirus and firewall software up to- date, Browser ‘safe search’ enabled.  Education Learn together about new technologies and enjoy! Reflect together about new technologies, the benefits, dangers and potential.  Systems Keep technology in family rooms Monitor time spent on the internet View the ‘History’ or purchase filtering software. Have proportionate responses to problems.

21 Your child will not tell you about a problem if they feel their access to technology will be restricted.

22 STAYING INFORMED – SOCIAL MEDIA

23 USEFUL ONLINE RESOURCES http://www.childnet-int.org/ http://www.iwf.org.uk/ http://www.bbc.co.uk/cbbc/topics/stay-safe http://www.thinkuknow.co.uk https://www.thinkuknow.co.uk/parents/Primary/Convers ation-Starters/Go-to-the-movies/ http://www.kidsmart.org.uk http://www.childnet.com/resources/kia http://www.thinkuknow.co.uk http://primaryschoolict.com http://www.att.com/Common/images/safety/game.html http://www.cybersmart.gov.au www.saferinternet.org.uk/advice-and-resources/a-parents- guide


Download ppt "E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!"

Similar presentations


Ads by Google