SlideShare a Scribd company logo
1 of 8
E-SAFETY
(USING THE INTERNET AND
MOBILES SENSIBLY AND
SAFELY)
Cyberbullying
Click the button above to follow the link to the
video 'Let's Fight it Together'
When the webpage opens, maximise the video
Cyberbullying IS bullying
Cyberbullying can be a criminal offence
under a range of different laws including:
 Protection from Harassment Act 1997
 Malicious Communications Act 1988
 Communications Act 2003
 Public Order Act 1986
If you think you are the victim of cyberbullying
through your mobile, the internet, etc., you
should report it. You can make it stop and also
prevent it happening to someone else.
http://www.childnet-int.org/
Link to report cyberbullying to the Child
Exploitation and Online Protection Centre :
http://www.ceop.gov.uk/reportabuse/index.asp
You or your parent/carer can
report cyber-bullying, illegal
content on the internet, etc.
via the Childnet International
website.
Reporting cyberbullying to the College
Don’t hesitate if you want to report an incident
of cyberbullying. You can report it to:
 your tutor or any teacher
 your Senior Tutor
 a Child Protection Designated Person
(Heather Chambers, Olwyn Benjamin or
Richard Skelding)
None of these people can promise confidentiality, but
they will only speak to people in positions of authority
who will be sensitive to your feelings and will be
working to help you. In some cases the Police will be
involved.
Make sure you keep the text messages, print-outs of
webpages, relevant times and dates and any other
Prevention is better than cure
Mobile phones
 Only give your number to trusted friends
 Never put your number online
 Think before you send a message or
image – always respect others
 Save any abusive or threatening
messages
 Never retaliate because it will only
escalate the problem, and you cease being
just the victim
Prevention is better than cure
Online
 Never give anyone a password
 Don’t believe anything someone you meet
online says – how do you know their age,
location, gender or anything else
 Learn how to restrict access to your profile
on a social network site and only accept
‘real friends’ as ‘friends’
 Be careful what content you place online –
could an image or video be used
maliciously?
USE NEW TECHNOLOGY
SENSIBLY, RESPONSIBLY
AND SAFELY!!!

More Related Content

What's hot

Inter safety 2011
Inter safety 2011Inter safety 2011
Inter safety 2011
temgamarra
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
yasha15
 
Int Safety
Int SafetyInt Safety
Int Safety
MrsMac9
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 

What's hot (20)

Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Inter safety 2011
Inter safety 2011Inter safety 2011
Inter safety 2011
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Int Safety
Int SafetyInt Safety
Int Safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Viewers also liked

Social networking risks
Social networking risksSocial networking risks
Social networking risks
LRMoodle-LRC
 
Repvblicanismvs geopoliticvs fontes origines et via massimo morigi geopolitica
Repvblicanismvs geopoliticvs fontes origines et via massimo morigi  geopoliticaRepvblicanismvs geopoliticvs fontes origines et via massimo morigi  geopolitica
Repvblicanismvs geopoliticvs fontes origines et via massimo morigi geopolitica
UNIVERSITY OF COIMBRA
 

Viewers also liked (7)

Social networking risks
Social networking risksSocial networking risks
Social networking risks
 
Dialettica del postmodernismo, omnium
Dialettica del postmodernismo, omniumDialettica del postmodernismo, omnium
Dialettica del postmodernismo, omnium
 
Repvblicanismvs geopoliticvs fontes origines et via massimo morigi geopolitica
Repvblicanismvs geopoliticvs fontes origines et via massimo morigi  geopoliticaRepvblicanismvs geopoliticvs fontes origines et via massimo morigi  geopolitica
Repvblicanismvs geopoliticvs fontes origines et via massimo morigi geopolitica
 
Typografia miejska w Poznaniu
Typografia miejska w PoznaniuTypografia miejska w Poznaniu
Typografia miejska w Poznaniu
 
Aesthetica fascistica i repubblicanesimo omnium
Aesthetica fascistica i   repubblicanesimo omniumAesthetica fascistica i   repubblicanesimo omnium
Aesthetica fascistica i repubblicanesimo omnium
 
Teoria della distruzione del valore
Teoria della distruzione del valoreTeoria della distruzione del valore
Teoria della distruzione del valore
 
Anemo 2016
Anemo 2016Anemo 2016
Anemo 2016
 

Similar to E safety

Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
amulhall
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Nani Owen
 

Similar to E safety (20)

Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
My protection plan
My protection planMy protection plan
My protection plan
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Online safety
Online safetyOnline safety
Online safety
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 

Recently uploaded

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

E safety

  • 1. E-SAFETY (USING THE INTERNET AND MOBILES SENSIBLY AND SAFELY)
  • 2. Cyberbullying Click the button above to follow the link to the video 'Let's Fight it Together' When the webpage opens, maximise the video
  • 3. Cyberbullying IS bullying Cyberbullying can be a criminal offence under a range of different laws including:  Protection from Harassment Act 1997  Malicious Communications Act 1988  Communications Act 2003  Public Order Act 1986 If you think you are the victim of cyberbullying through your mobile, the internet, etc., you should report it. You can make it stop and also prevent it happening to someone else.
  • 4. http://www.childnet-int.org/ Link to report cyberbullying to the Child Exploitation and Online Protection Centre : http://www.ceop.gov.uk/reportabuse/index.asp You or your parent/carer can report cyber-bullying, illegal content on the internet, etc. via the Childnet International website.
  • 5. Reporting cyberbullying to the College Don’t hesitate if you want to report an incident of cyberbullying. You can report it to:  your tutor or any teacher  your Senior Tutor  a Child Protection Designated Person (Heather Chambers, Olwyn Benjamin or Richard Skelding) None of these people can promise confidentiality, but they will only speak to people in positions of authority who will be sensitive to your feelings and will be working to help you. In some cases the Police will be involved. Make sure you keep the text messages, print-outs of webpages, relevant times and dates and any other
  • 6. Prevention is better than cure Mobile phones  Only give your number to trusted friends  Never put your number online  Think before you send a message or image – always respect others  Save any abusive or threatening messages  Never retaliate because it will only escalate the problem, and you cease being just the victim
  • 7. Prevention is better than cure Online  Never give anyone a password  Don’t believe anything someone you meet online says – how do you know their age, location, gender or anything else  Learn how to restrict access to your profile on a social network site and only accept ‘real friends’ as ‘friends’  Be careful what content you place online – could an image or video be used maliciously?
  • 8. USE NEW TECHNOLOGY SENSIBLY, RESPONSIBLY AND SAFELY!!!