Download presentation
Presentation is loading. Please wait.
1
E-safety Staying safe online 2017/18
2
Introduction Being eSafe relies on
understanding the risks of using the Internet and mobile technologies having the tools and the knowledge to be able to use the Internet safely knowing how to behave online yourself knowing what is acceptable behaviour online from others selecting appropriate privacy levels For TUTORS: - Ofsted inspectors will want to know: To what extent learners feel safe How safe learners feel at College and their understanding of safety issues such as bullying What kind of school support learners have access to if they feel unsafe See the final slide for contact details
3
Social Networking Social Networking websites are online applications which help connect friends - using tools like blogs, profiles, internal systems and photos.
4
“Phishing” s are s that try to get private and personal information or money from you. Legitimate banks and businesses will never ask for your password or personal details by If it seems too good to be true….IT IS. You have not magically won the lottery If the is from someone you don’t know - do not open any attachments or reply – delete without opening
5
This address is a genuine address of HMRC but it does NOT mean it was from them… this is a clever disguise This is the biggest danger of this … the attached webpage will ask for your personal details and will submit them to someone other than the real HMRC Did you even make a tax return recently? I didn’t when I received this . If you’re not sure – ring them. Click the weblink to see the proof >>>>
6
Cyber Bullying Cyber (online) bullying is when one or more people uses the to deliberately upset another person (threaten, tease, humiliate) This type of bullying can affect someone at College, work or in their own home Threats can have a 24/7 nature – sent at any time of the day or night Children and young people can be particularly vulnerable
7
Cyber Bullying The spectrum of Cyber Bullying actions is very broad.
The most famous examples are:- Harassment Stalking Rumour spreading Disclosure (sharing of personal information of others without their consent) Exclusion/Ostracism Heated exchanges Defaming, belittling, or mocking Impersonating Threats of harm, gossiping, exclusion and ignoring It is often related to offline problems. Girls are twice more likely to experience it than boys. Cyber bullying affects teens of all races equally.
8
What to do if you have had a threat sent to you on your phone or via the Internet
Save evidence of the threat Your must report the threat to your tutor if it has happened during your time at the College Block the bully (on IM, social networking sites, etc.) Don’t reply or retaliate to things they say or do Any threats that may have been made will be logged Useful advice can be found at the site below -
9
Chat rooms and Instant Messaging
These can be used to communicate with people in ‘real time’ – that is, there is no time delay in sending and receiving replies. You must be careful when using chat rooms You do not know if people are telling the truth Predatory people are out there!
10
E-Safety Concerns If you have any concerns about specific issues raised in this presentation or if another student or group of students has posted unpleasant or threatening messages about you or a member of your family, please contact one of the following:- All threats are logged. If you have recently made a threat about another person or group of people via phone or the Internet, you may want to talk to your tutor to discuss. More information on the topic can be found at: E-skills UK
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.