Your SlideShare is downloading. ×
  • Like
Freedom online: do you have voice in your college?
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Freedom online: do you have voice in your college?


A workshop delivered by Becta at the NUS Further Education Zone Conference, Manchester, 2009

A workshop delivered by Becta at the NUS Further Education Zone Conference, Manchester, 2009

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide
  • Title slide of presentation.
  • – assuming the identity of others using an email address or spoofing obtain sensitive info from spam recipients Flaming: The act of sending or posting electronic messages that are deliberately hostile and insulting,
  • MySpace, Bebo, Facebook, Twitter


  • 1. Sue Pickering – e-Safety Consultant Marianne Green – Head of Workforce & Leadership (Colleges) Freedom online Do you have a voice in your College?
  • 2. Dilemma Exercise
    • Using the internet is mainly a very positive experience. However, consider the following dilemma and discuss with your table colleagues
    • Agree which of the following is most appropriate with regard to assessing the risk level:
      • Red
      • Amber
      • Green
  • 3. Dilemma
    • Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’.
  • 4.
    • Lois’s ‘friends’ have been collected by sharing address books.
    • She only knows about one third of the people in her contact list.
    • She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates.
    • She also has a group for ‘friends of friends’ i.e. internet strangers.
    • She does not give out any personal details to these people.
    • She is happy to chat online with friends of friends, but nothing more.
    • She does not use her web cam when she talks to this group.
  • 5.
    • Restrict?
    • or
    • Educate?
    E-Safety Protect? or Exclude?
  • 6. E-Safety covers, but is not limited to…..
    • Cyber bullying/stalking/threatening (4 in every 10 learners have been victims)
    • Grooming
    • Flaming
    • Happy Slapping
    • Shopping
    • Attack by Viruses or other malware
    • Intentional abuse/attack (Phishing, Spoofing, Violence and Terrorism)
    • Intentional misuse of facilities or equipment
    • Wireless and hardwired networks
    • Data Transfer
    • Use of memory sticks
    • Downloads
    • Pornography
    • Etc, etc
  • 7. Acceptable User Policy
    • Are you aware of an Acceptable User Policy in your College?
    • Were you involved in its development?
    • Are any of these included in the AUP?
      • Using your own technology in the College
      • Protecting your personal information online
      • Downloading music, videos, media - Are you aware of the penalties?
      • Accessing social networking or Second Life sites - Are there restrictions?
      • Using Twitter, Skype, MSN, Blogs or Wikies to communicate with tutors?
      • Information about someone you can go to if you receive information which contains unacceptable content or contains information you find offensive?
  • 8. What can you do?
    • Contribute to the development of AUPs / e-Safety Policy
    • Read the Policies and adhere to them
    • Take responsibility for keeping safe online
      • Regularly change passwords – don’t share them! Use mix of upper/lower case letters/numbers/symbols
      • Set social networking space to private: don’t include name, address or DOB
      • Home wireless – is it secure?
      • Memory sticks – are they encrypted?
    • Censor yourself online:
      • consider what a future employer might think of your postings – [email_address]
      • Chat rooms – info for criminals ie address or on holiday
    • Respect the feeling, rights, values and intellectual property rights of others
    • Support others who may be experiencing e-Safety issues
  • 9.