SlideShare une entreprise Scribd logo
1  sur  28
A Parent’s Guide to the Safe Use of the World Wide Web eSafety
7-11s 11-16s Parental influence Autonomy Your changing relationship dictates different tactics
7-11s
“ Never, for any reason, leave children unattended outdoors or in the garden, especially near water.” Garden Safety for Children – Rule #1 Quote taken from http://www.thekidsgarden.co.uk
We only use the World Wide Web when an adult is with us We can click on the buttons and links when we know what they do We can search in the World Wide Web with an adult We always ask if we get lost on the World Wide Web We can send and open emails together We can write polite and friendly emails to people that we know These rules help us to stay safe on the internet
Garden Safety for Children – Rule #2 “ Although it’s not considered a substitute for adult supervision, fences are a good way to keep children from wandering into dangerous territory.” Quote taken from http://www.thekidsgarden.co.uk
Configuring your home PC
Configuring your home PC
Configuring your home PC http://www.microsoft.com/protect/products/family/vista.mspx
Configuring your home PC
Configuring your home PC
7-11s Rules for Garden Safety  “ Never, for any reason, leave children unattended outdoors or in the garden, especially near water.” “ Although it’s not considered a substitute for adult supervision, fences are a good way to keep children from wandering into dangerous territory.”
11-16s
When I was a boy of fourteen, my father was so ignorant I could hardly stand to have the old man around.  But when I got to be twenty-one, I was astonished at how much he had learned in seven years.  ~Mark Twain
meet  Jessica
she  keeps in touch  with most of her friends online…
…  her friends know what she is doing  24/7  wherever they are through Facebook Flickr Twitter
but in doing so   she   leaves an  online   data trail  for anyone to see   …… what she looks like who she’s friends with where she’s going to be tonight where she studies where she lives what she’s doing right now
and the web makes it so easy to aggregate personal information
.. ask  Jessica if she’s worried about the amount of information people can find about her online and she says …..
…  there are  millions  of others sharing  far  more  information online than me  …. …  you can’t expect me not to use these sites, it’s how I stay in touch  ….
The whole  point  of these sites is to  share  information about yourself…..
Who uses these sites to gather information? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring your home PC
Configuring your home PC !
make it  difficult  for strangers to connect the dots between your  online  and  real  identities Use a nickname instead of your real name and an avatar image instead of a photo Don’t disclose your exact location Be selective about what you share about yourself – hold back on too many specifics Arrange for your entry to stop being listed on 192.com When you set up an account be sure to check the default settings and how much is open for  all  to see Be selective about who you ‘friend’ 10 Privacy Settings Every Facebook User Should Know http://www.allfacebook.com/2009/02/facebook-privacy/
The ‘telling strangers on a train your life story’ analogy
Never talk to strangers Be cynical about anybody you meet online

Contenu connexe

En vedette

Loranger product presentation
Loranger product presentationLoranger product presentation
Loranger product presentationguestf30abb7e
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
How younger students use social media for non-leisure purposes
How younger students use social media for non-leisure purposesHow younger students use social media for non-leisure purposes
How younger students use social media for non-leisure purposestbirdcymru
 
Social media for students
Social media for studentsSocial media for students
Social media for studentsBrandon Eley
 
Smart use of smart phone for the smart clinic - PCNI New Delhi, nov 2016
Smart use of smart phone for the smart clinic -  PCNI New Delhi, nov 2016Smart use of smart phone for the smart clinic -  PCNI New Delhi, nov 2016
Smart use of smart phone for the smart clinic - PCNI New Delhi, nov 2016Gaurav Gupta
 
Smart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay VisanjiSmart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay VisanjiSanjay Visanji Chheda
 
Smart phones and their effects
Smart phones and their effectsSmart phones and their effects
Smart phones and their effectstdub4
 
Smart phone. addiction. blindness
Smart phone. addiction. blindnessSmart phone. addiction. blindness
Smart phone. addiction. blindnessSunnyBabyBabe
 
Your Cell Phone is my Drug
Your Cell Phone is my DrugYour Cell Phone is my Drug
Your Cell Phone is my Drugnicolejfournier
 
Hey College Students! Do Social Media Well...
Hey College Students! Do Social Media Well...Hey College Students! Do Social Media Well...
Hey College Students! Do Social Media Well...Paul Brown
 
The negative impact caused by smartphones.ppt 11
The negative impact caused by smartphones.ppt 11The negative impact caused by smartphones.ppt 11
The negative impact caused by smartphones.ppt 11cebilewaikiki
 
Advantage and Disadvantage of Social media
Advantage and Disadvantage of Social mediaAdvantage and Disadvantage of Social media
Advantage and Disadvantage of Social mediaSnehlata Maurya
 
The World Wide Web Power Point
The World Wide Web Power PointThe World Wide Web Power Point
The World Wide Web Power Pointkaramfilova
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglyMichael VanDervort
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 

En vedette (19)

Loranger product presentation
Loranger product presentationLoranger product presentation
Loranger product presentation
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
How younger students use social media for non-leisure purposes
How younger students use social media for non-leisure purposesHow younger students use social media for non-leisure purposes
How younger students use social media for non-leisure purposes
 
Social + Process
Social + ProcessSocial + Process
Social + Process
 
Social media for students
Social media for studentsSocial media for students
Social media for students
 
Smart use of smart phone for the smart clinic - PCNI New Delhi, nov 2016
Smart use of smart phone for the smart clinic -  PCNI New Delhi, nov 2016Smart use of smart phone for the smart clinic -  PCNI New Delhi, nov 2016
Smart use of smart phone for the smart clinic - PCNI New Delhi, nov 2016
 
How Students Use Social Media
How Students Use Social MediaHow Students Use Social Media
How Students Use Social Media
 
Smart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay VisanjiSmart Use of Smart Phone by Chheda Sanjay Visanji
Smart Use of Smart Phone by Chheda Sanjay Visanji
 
SMARTPHONE ADDICTED
SMARTPHONE ADDICTEDSMARTPHONE ADDICTED
SMARTPHONE ADDICTED
 
Smart phones and their effects
Smart phones and their effectsSmart phones and their effects
Smart phones and their effects
 
Smart phone. addiction. blindness
Smart phone. addiction. blindnessSmart phone. addiction. blindness
Smart phone. addiction. blindness
 
Smart Phone Addiction
Smart Phone AddictionSmart Phone Addiction
Smart Phone Addiction
 
Your Cell Phone is my Drug
Your Cell Phone is my DrugYour Cell Phone is my Drug
Your Cell Phone is my Drug
 
Hey College Students! Do Social Media Well...
Hey College Students! Do Social Media Well...Hey College Students! Do Social Media Well...
Hey College Students! Do Social Media Well...
 
The negative impact caused by smartphones.ppt 11
The negative impact caused by smartphones.ppt 11The negative impact caused by smartphones.ppt 11
The negative impact caused by smartphones.ppt 11
 
Advantage and Disadvantage of Social media
Advantage and Disadvantage of Social mediaAdvantage and Disadvantage of Social media
Advantage and Disadvantage of Social media
 
The World Wide Web Power Point
The World Wide Web Power PointThe World Wide Web Power Point
The World Wide Web Power Point
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 

Similaire à A Parent’s Guide to the Safe Use of the World Wide Web

Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Brochure
BrochureBrochure
Brochurejrj6819
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Internet safety
Internet safetyInternet safety
Internet safetyerinmarkus
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetyt2839ms18
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 

Similaire à A Parent’s Guide to the Safe Use of the World Wide Web (20)

Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Gd prnts-en
Gd prnts-enGd prnts-en
Gd prnts-en
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Brochure
BrochureBrochure
Brochure
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Cyber safe manual_2
Cyber safe manual_2Cyber safe manual_2
Cyber safe manual_2
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Dont delete.pptx
Dont delete.pptxDont delete.pptx
Dont delete.pptx
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 

Plus de Simon Revell

How to collaborate in the 21st century global organization
How to collaborate in the 21st century global  organizationHow to collaborate in the 21st century global  organization
How to collaborate in the 21st century global organizationSimon Revell
 
Digital Marketing for Pharma
Digital Marketing for PharmaDigital Marketing for Pharma
Digital Marketing for PharmaSimon Revell
 
Knowledge notebooks
Knowledge notebooksKnowledge notebooks
Knowledge notebooksSimon Revell
 
Making SharePoint Social
Making SharePoint SocialMaking SharePoint Social
Making SharePoint SocialSimon Revell
 
Sowing the seeds of enterprise2.0 in a global organization
Sowing the seeds of enterprise2.0 in a global organizationSowing the seeds of enterprise2.0 in a global organization
Sowing the seeds of enterprise2.0 in a global organizationSimon Revell
 

Plus de Simon Revell (6)

How to collaborate in the 21st century global organization
How to collaborate in the 21st century global  organizationHow to collaborate in the 21st century global  organization
How to collaborate in the 21st century global organization
 
Digital Marketing for Pharma
Digital Marketing for PharmaDigital Marketing for Pharma
Digital Marketing for Pharma
 
Knowledge notebooks
Knowledge notebooksKnowledge notebooks
Knowledge notebooks
 
Making SharePoint Social
Making SharePoint SocialMaking SharePoint Social
Making SharePoint Social
 
Sowing the seeds of enterprise2.0 in a global organization
Sowing the seeds of enterprise2.0 in a global organizationSowing the seeds of enterprise2.0 in a global organization
Sowing the seeds of enterprise2.0 in a global organization
 
What is web2.0?
What is web2.0?What is web2.0?
What is web2.0?
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

A Parent’s Guide to the Safe Use of the World Wide Web

  • 1. A Parent’s Guide to the Safe Use of the World Wide Web eSafety
  • 2. 7-11s 11-16s Parental influence Autonomy Your changing relationship dictates different tactics
  • 4. “ Never, for any reason, leave children unattended outdoors or in the garden, especially near water.” Garden Safety for Children – Rule #1 Quote taken from http://www.thekidsgarden.co.uk
  • 5. We only use the World Wide Web when an adult is with us We can click on the buttons and links when we know what they do We can search in the World Wide Web with an adult We always ask if we get lost on the World Wide Web We can send and open emails together We can write polite and friendly emails to people that we know These rules help us to stay safe on the internet
  • 6. Garden Safety for Children – Rule #2 “ Although it’s not considered a substitute for adult supervision, fences are a good way to keep children from wandering into dangerous territory.” Quote taken from http://www.thekidsgarden.co.uk
  • 9. Configuring your home PC http://www.microsoft.com/protect/products/family/vista.mspx
  • 12. 7-11s Rules for Garden Safety “ Never, for any reason, leave children unattended outdoors or in the garden, especially near water.” “ Although it’s not considered a substitute for adult supervision, fences are a good way to keep children from wandering into dangerous territory.”
  • 14. When I was a boy of fourteen, my father was so ignorant I could hardly stand to have the old man around.  But when I got to be twenty-one, I was astonished at how much he had learned in seven years.  ~Mark Twain
  • 16. she keeps in touch with most of her friends online…
  • 17. … her friends know what she is doing 24/7 wherever they are through Facebook Flickr Twitter
  • 18. but in doing so she leaves an online data trail for anyone to see …… what she looks like who she’s friends with where she’s going to be tonight where she studies where she lives what she’s doing right now
  • 19. and the web makes it so easy to aggregate personal information
  • 20. .. ask Jessica if she’s worried about the amount of information people can find about her online and she says …..
  • 21. … there are millions of others sharing far more information online than me …. … you can’t expect me not to use these sites, it’s how I stay in touch ….
  • 22. The whole point of these sites is to share information about yourself…..
  • 23.
  • 26. make it difficult for strangers to connect the dots between your online and real identities Use a nickname instead of your real name and an avatar image instead of a photo Don’t disclose your exact location Be selective about what you share about yourself – hold back on too many specifics Arrange for your entry to stop being listed on 192.com When you set up an account be sure to check the default settings and how much is open for all to see Be selective about who you ‘friend’ 10 Privacy Settings Every Facebook User Should Know http://www.allfacebook.com/2009/02/facebook-privacy/
  • 27. The ‘telling strangers on a train your life story’ analogy
  • 28. Never talk to strangers Be cynical about anybody you meet online

Notes de l'éditeur

  1. Guide to Safely Participating in Online Social Networking Pfizer Internal The fictional person we will use throughout this session is Jessica.
  2. Guide to Safely Participating in Online Social Networking Pfizer Internal Jessica has a large social network of friends that she maintains mainly by use of online services and activities especially as she didn’t grow up or go to school in the local area where she now works. Of course she also made lots of friends when she attended university ….
  3. Guide to Safely Participating in Online Social Networking Pfizer Internal So her contacts are scattered wide and far and live in different time zones…. She makes use of lots of on line networks to keep in touch so her friends and family know what she is doing and how her career is progressing….
  4. Guide to Safely Participating in Online Social Networking Pfizer Internal From the data Jessica has posted on line, people can see What she looks like – from photos taken on holiday, with friends, socially…maybe even what her pets look like… Who her friends are and probably where they live.. What her social diary is like and maybe her professional one… Where she works and what she does there… Where she lives, how long she has lived there and where she goes in the locality …. Also what she is doing right at that moment in her on line diary…and who with Put this all together and it builds quite a picture.
  5. Guide to Safely Participating in Online Social Networking Pfizer Internal In Jessica’s eyes, she controls what information she puts on the web
  6. Guide to Safely Participating in Online Social Networking Pfizer Internal However the problems might not be the amount of information she shares, but what you can tell from it … the picture you can build. What she posts may be well controlled but as soon as you start linking to friends, and they start mentioning and talking about you as well, how do you know who has access to their information…? For example - Jessica may not have disclosed her home address on her web pages, but her friend Freddy mentioned on his pages what a nice house she has, and when he visited her at the weekend down in Deal what a difference her improvements have made… look at the before and after pictures … and isn't it in a nice location in Acacia Avenue…
  7. Guide to Safely Participating in Online Social Networking Pfizer Internal Of course here in the UK we have the added worry of animal rights and implications if they are able to piece information together on the web. Jessica is a little worried as she does feel a little exposed on that front since her name is now plastered across the web in conjunction with Pfizer as well and she has had some thoughts about what she can do to better protect herself from such an occurrence but would certainly like to hear the opinions of the security experts. .. But where to go for advice….?
  8. Guide to Safely Participating in Online Social Networking Pfizer Internal We know that various agencies including Police Investigators Recruitment Agencies Prospective employers Marketing companies And Extremist Groups All use these sites as one of the mean for gathering data on individuals and building a picture of individuals for their own use and means. Recent examples are Virgin Atlantic when they became aware of several employees discussing their feelings about the company on one of the well known blog sites…. xxxxxx On 26 Feb 09 Facebook revised their Privacy Policy and terms and conditions following user and Privacy group feedback when they amended the existing guidance to state that they would hold your details and content of users websites even if the user removed or closed their account. Facebook will publish two documents ­ the Facebook Principles, focusing on users¹ rights, and the Statement of Rights and Responsibilities, outlining the social networking site¹s new terms and conditions. With both documents, we tried hard to simplify the language so you have a clear understanding of how Facebook will be run¹, Facebook¹s founder and CEO, Mark Zuckerberg, wrote on his blog. http://blog.facebook.com/blog.php?post=56566967130 Facebook users will have opportunity to vote for or against any proposed changes to the terms and conditions before they go into effect. Lets work through an example – this is a real life example involving a real person and the resultant activity actually happened.
  9. Guide to Safely Participating in Online Social Networking Pfizer Internal A few simple tips that Jessica can follow… On public social networking sites, you can use a nickname rather than your real name and you can use an avatar (cartoon or image) or an old photo of yourself when you were a lot younger. Think about what you include in the info… would you be happy for complete strangers to know this information Know who you are befriending South of England, Kent rather than 3 Acacia Avenue, Deal, … You can arrange for your details not to appear on 192.com and also the electoral role (which is mandatory for you to complete) will allow you to opt out from your details appearing on the publicly accessible register. At lot of Social networking sites (Facebook) require a certain amount of information before you can log on and create your own pages or profile. However, a lot of them default the privacy settings to allow everything and anyone so it is recommended that you immediately change these in order to control the accessibility of your data.