SlideShare a Scribd company logo
1 of 12
The Sacred Heart Language College
Kite and E-safety
Kite – our MLE
The Sacred Heart Language College
E-safety
• E-safety is all about how to stay safe on technology, such as
mobile phones, games consoles, the internet and wireless
devices.
• This evening’s focus will be how you can help to protect your
daughters and show respect for others online:
– Social Networking Websites
– Sharing Pictures or Videos
– Online Security
– Emails
– Cyber Bullying
– Golden Rules
What is E-Safety?
• Popular social-networking sites include:
Key points to remember:
• Children need to be at least 13 years old to use social networking
sites
• They must not accept any friend requests from people they don’t
know
• Make sure they know about privacy settings to block people who
bother them and keep your profile limited to those you want to
share with.
• Make sure they know how to report people who are causing
problems online.
Social Networking Websites
Instagram Facebook Whatsapp
Snapchat Tumblr Twitter
Key messages for your daughters:
• Any pictures or videos that are shared could eventually be
seen by millions of people.
• When posting on a forum or a blog remember, if it’s shared by
others, anyone can read this post.
• Make sure they now how to remove posts altogether.
• If they have lost control of their post, log onto the site and
delete it straight away.
Remember:
Whatever goes on the internet, stays on the internet – unless
you do something about it.
Sharing Pictures or Videos
Key messages for your daughters:
• It is important to recognise that people can steal
online identities; this is called ‘identity theft’.
• Do not give away personal information - this
includes: full name, date of birth, home address and
school name.
• Have different passwords on all accounts
• Strong passwords have a mixture of capital and lower
case letters, numbers and symbols.
Online Security
Key messages for your daughters:
• Activate the account’s spam filter
• Do not share your email address unless it’s a trusted website
• Do not open any attachments or emails from people you do
not know as they could cause viruses in your device.
• Do not leave your email open; always logout once you have
finished.
To sum up…
• To prevent hacking, advise your daughters to set a strong
password, don’t click on links from people you don’t know, if
possible use antivirus software and lock or logout of all
accounts when you are finished using them.
Emails
Key messages for your daughters:
• Online bullying can be stopped
• Tell someone you trust
• Block the bullies
• Keep evidence of any emails, texts or web pages that
show what been happening.
• Don’t forget to report mean comments or pages to
the website.
Cyber Bullying
Golden Rules for your Daughter
S SAFE - Do not share personal information with people you
do not trust.
M MEET - Do not meet someone you have spoken to online
A ACCEPTING – Do not open any unknown emails or files,
pictures or texts from people you do not know
R RELIABLE – Check three or four websites before using
factual information, as it may not be true.
T TELL – If you are worried about something, someone is
bothering you or you know someone is being bullied
online, tell someone you trust, so it can be stopped.
https://www.youtube.com/watch?v=hK5OeGeu
dBM&feature=player_embedded
“Consequences” Video
• For more information visit:
www.thinkuknow.co.uk
And finally…

More Related Content

What's hot

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussamguest40f537
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94bookgirljoy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 

What's hot (20)

Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Instant Messaging Chat Room Saftey Afnan, Hussam
Instant Messaging Chat Room Saftey   Afnan, HussamInstant Messaging Chat Room Saftey   Afnan, Hussam
Instant Messaging Chat Room Saftey Afnan, Hussam
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
School presentation
School presentationSchool presentation
School presentation
 
Internet safety
Internet safety Internet safety
Internet safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to E-Safety and Kite Info

CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyCoyleFinancial
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 

Similar to E-Safety and Kite Info (20)

CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Internet security
Internet securityInternet security
Internet security
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 

More from oneill74

Community and tradition revision 2
Community and tradition revision 2Community and tradition revision 2
Community and tradition revision 2oneill74
 
Letter to mp abortion
Letter to mp abortionLetter to mp abortion
Letter to mp abortiononeill74
 
Foetal development
Foetal developmentFoetal development
Foetal developmentoneill74
 
Rembrant's prodigal son
Rembrant's prodigal sonRembrant's prodigal son
Rembrant's prodigal sononeill74
 
Sacred heart & euphrasie barbier
Sacred heart & euphrasie barbierSacred heart & euphrasie barbier
Sacred heart & euphrasie barbieroneill74
 
Who was jesus
Who was jesusWho was jesus
Who was jesusoneill74
 
Introducing sikhism
Introducing sikhismIntroducing sikhism
Introducing sikhismoneill74
 
Applying the dimensions
Applying the dimensionsApplying the dimensions
Applying the dimensionsoneill74
 
Lesson 2 Seven Dimensions
Lesson 2   Seven DimensionsLesson 2   Seven Dimensions
Lesson 2 Seven Dimensionsoneill74
 
What is religion?
What is religion?What is religion?
What is religion?oneill74
 
Mtl cover sheet
Mtl cover sheetMtl cover sheet
Mtl cover sheetoneill74
 
Phase 3 module 7 ao neill final mac version
Phase 3 module 7 ao neill final mac versionPhase 3 module 7 ao neill final mac version
Phase 3 module 7 ao neill final mac versiononeill74
 
Year 7 cover 9th dec
Year 7 cover 9th decYear 7 cover 9th dec
Year 7 cover 9th deconeill74
 

More from oneill74 (14)

Community and tradition revision 2
Community and tradition revision 2Community and tradition revision 2
Community and tradition revision 2
 
Letter to mp abortion
Letter to mp abortionLetter to mp abortion
Letter to mp abortion
 
Foetal development
Foetal developmentFoetal development
Foetal development
 
Rembrant's prodigal son
Rembrant's prodigal sonRembrant's prodigal son
Rembrant's prodigal son
 
Parables
ParablesParables
Parables
 
Sacred heart & euphrasie barbier
Sacred heart & euphrasie barbierSacred heart & euphrasie barbier
Sacred heart & euphrasie barbier
 
Who was jesus
Who was jesusWho was jesus
Who was jesus
 
Introducing sikhism
Introducing sikhismIntroducing sikhism
Introducing sikhism
 
Applying the dimensions
Applying the dimensionsApplying the dimensions
Applying the dimensions
 
Lesson 2 Seven Dimensions
Lesson 2   Seven DimensionsLesson 2   Seven Dimensions
Lesson 2 Seven Dimensions
 
What is religion?
What is religion?What is religion?
What is religion?
 
Mtl cover sheet
Mtl cover sheetMtl cover sheet
Mtl cover sheet
 
Phase 3 module 7 ao neill final mac version
Phase 3 module 7 ao neill final mac versionPhase 3 module 7 ao neill final mac version
Phase 3 module 7 ao neill final mac version
 
Year 7 cover 9th dec
Year 7 cover 9th decYear 7 cover 9th dec
Year 7 cover 9th dec
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

E-Safety and Kite Info

  • 1. The Sacred Heart Language College Kite and E-safety
  • 3. The Sacred Heart Language College E-safety
  • 4. • E-safety is all about how to stay safe on technology, such as mobile phones, games consoles, the internet and wireless devices. • This evening’s focus will be how you can help to protect your daughters and show respect for others online: – Social Networking Websites – Sharing Pictures or Videos – Online Security – Emails – Cyber Bullying – Golden Rules What is E-Safety?
  • 5. • Popular social-networking sites include: Key points to remember: • Children need to be at least 13 years old to use social networking sites • They must not accept any friend requests from people they don’t know • Make sure they know about privacy settings to block people who bother them and keep your profile limited to those you want to share with. • Make sure they know how to report people who are causing problems online. Social Networking Websites Instagram Facebook Whatsapp Snapchat Tumblr Twitter
  • 6. Key messages for your daughters: • Any pictures or videos that are shared could eventually be seen by millions of people. • When posting on a forum or a blog remember, if it’s shared by others, anyone can read this post. • Make sure they now how to remove posts altogether. • If they have lost control of their post, log onto the site and delete it straight away. Remember: Whatever goes on the internet, stays on the internet – unless you do something about it. Sharing Pictures or Videos
  • 7. Key messages for your daughters: • It is important to recognise that people can steal online identities; this is called ‘identity theft’. • Do not give away personal information - this includes: full name, date of birth, home address and school name. • Have different passwords on all accounts • Strong passwords have a mixture of capital and lower case letters, numbers and symbols. Online Security
  • 8. Key messages for your daughters: • Activate the account’s spam filter • Do not share your email address unless it’s a trusted website • Do not open any attachments or emails from people you do not know as they could cause viruses in your device. • Do not leave your email open; always logout once you have finished. To sum up… • To prevent hacking, advise your daughters to set a strong password, don’t click on links from people you don’t know, if possible use antivirus software and lock or logout of all accounts when you are finished using them. Emails
  • 9. Key messages for your daughters: • Online bullying can be stopped • Tell someone you trust • Block the bullies • Keep evidence of any emails, texts or web pages that show what been happening. • Don’t forget to report mean comments or pages to the website. Cyber Bullying
  • 10. Golden Rules for your Daughter S SAFE - Do not share personal information with people you do not trust. M MEET - Do not meet someone you have spoken to online A ACCEPTING – Do not open any unknown emails or files, pictures or texts from people you do not know R RELIABLE – Check three or four websites before using factual information, as it may not be true. T TELL – If you are worried about something, someone is bothering you or you know someone is being bullied online, tell someone you trust, so it can be stopped.
  • 12. • For more information visit: www.thinkuknow.co.uk And finally…

Editor's Notes

  1. Demo of the website