Wednesday, 1 December 2010

E-Safety Savvy

Chat rooms

Chat rooms are a form of communicating with people around the world through the Internet who you don't necessarily know. To keep safe in a chat room you should not give out any personal information to anyone as they person you are talking to may not be who you think you are.

Posting images

Posting images is dangerous as the site you post it on can keep your picture for years after you delete it. It is also dangerous because people you don't know can look at your pictures. To prevent people from looking at your pictures go on to your privacy settings and change your settings so only you and your friends can look at them.

Privacy settings

Privacy settings on social network sites let you decide who you want to see your pictures and posts. To stop people looking at your posts and pictures change your settings so you can decide who gets to see your posts and pictures.

Cyberbullying

Cyberbullying is when someone receives texts or emails which are offensive towards them. Cyberbullying can sometimes lead to people committing suicide or harming themselves. If you do get bullied through the Internet you can click the report abuse button,  block the person or tell your parents or teachers.

Sexting

Sexting is when someone sends sexual messages or pictures to someone else using their phone.The only way to prevent this is to not do it.

Child grooming

When an adult pretends to be younger and befreinds kids and eventually forces them to accept sexual abuse from them. To prevent this only talk to people you know.

Phishing

When someone sends an e-mail to you that can steakl your username and password. To prevent this delete any dodgy messages you get or mark them as spam.

CEOP
CEOP (Child Exploitation and Online Protection Centre ) which works both nationally and internationally to bring online child sex offenders, including those involved in the production, distribution and viewing of child pornography, to the UK courts.

Malware

Malware (malicious software) is software designed to secretly access a computer system without the owner's pemission.