SlideShare a Scribd company logo
1 of 33
Internet Safety
Adele Roberts
&
Jane Miller
Youth Justice Service Officers
Flintshire Youth Justice Service
By the end of today, you may have
the urge to……
Please don’t. It’s not the
computers fault, it’s the users!!
We know the threat from this?
But have we even considered?
What do we mean by technology?
 Computers
 Digital cameras
 Mobile phones (including smart phones)
 Playstation
 Xbox
 Wii
 Hand held games consoles (DS)
We all know that children adapt to
new technology faster then adults
Video Clip
It’s more than sex
 Suicide
 Self harm.
 Eating disorders.
 Online fraud.
 Dangerous trends.
There are many forms of social
networking
 Networks specifically set up to facilitate
meeting people online.
 Networks for online games.
 Peer to peer networks.
 Virtual worlds
If you can’t imagine it…….
And there’s always just Google
Social Networking Sites
 Be careful what information you give out on your
profile. Remember that you don’t know who your
friend’s friends are… or your friend’s friends’ friends!
And you don’t know what they’ll do with your picture
or your phone number if you give it out by mistake.
Once your picture is out there, it’s out there forever
and you won’t be able to get it back.
 Be aware that information on your profile could
potentially be viewed by anyone. So if you wouldn’t
be comfortable printing it off and handing it out on the
street, maybe it shouldn’t be on your profile.
 The internet has a long memory and its
24/7 365 days a year.
 70% of employers now research social
network when checking suitability for
employment.
Camera phones
 Whilst having a camera phone is great and
really useful, be careful if you share your
photos with others. Pictures can be changed
or shared around, so think about what the
image is and who you are sending it to,
before you press send. Once it’s out there it’s
out there forever!
Cyber Bullying
 Someone uses the internet or mobiles to deliberately upset someone
else.
 Undertaken through technology such as mobiles or the internet
 Bullying can affect someone not just at school, but at home as well.
Because it takes place in the virtual world, it has a 24/7 nature and can
make someone feel upset or threatened in their own home
 Can be hard to identify who the cyberbully is because they could block
their number or post things on a website anonymously. The nature of
this type of bullying means it can have a large audience, many of whom
may not even realise that they are being bullies.
 A positive thin about this kind of bullying is that it can be evidenced.
With normal bullying, it can be one person’s word against another’s, but
with cyberbullying you can save texts or print our
emails/IM’s/WebPages. This can be used as proof to catch the bully
and stop them upsetting someone: this could be your or a friend’s child
or young people with whom you are working.
Video Clip
GPS technology
 The worrying thing about the social networking using
GPS technology, is that your contacts will be on a
map, showing exactly where they are. If you can see
them, your contacts can also see where you are too.
Quite scary if you have contacts on your profile that
you don’t know or don’t trust. If you do want to use
these sort of apps, you need to remember to use
your privacy settings and remove anyone you don’t
know or don’t trust, from your contacts.
Google Maps
Uploading pictures
 Only upload pictures that you’d be happy for your mum to see –
anything too sexy to be passed round the dinner table should
NOT make it onto the web, as you don’t know who could be
looking at it or what they might be doing with it.
 Don’t post your phone number or email address on your
homepage. Think about it – why would anyone actually need
this info when they can message you privately via your social
networking site?
 Don’t post pictures of you or your mates wearing school uniform
– if dodgy people see your school badge, they can work out
where you are and find you. The more anonymous you are, the
less vulnerable you are to people with bad intentions.
 Tick the “no pic forwarding” option on your settings page – this
will stop people forwarding your pictures to anyone without your
consent.
Sexting
 Someone taking an indecent image of themselves, and sending
it to their friends or boy/girlfriend via a mobile phone or some
other form of technology is sometimes referred to as ‘sexting’.
 Once these images have been taken and sent to others, control
is lost of them and they can end up anywhere. They could be
seen by friends and family, a future employer, or even, in some
cases, end up in the possession an offender!
 This also puts that person who originally sent the images in a
vulnerable position, as somebody they may or may not know
now has these images and could use technology to bully,
harass or even try to locate them.
 Just think – if you wouldn’t print and pass these images around
your school or show your mum or dad, they are not appropriate
to share via phone or other technologies.
Video Clip
Gaming
 Online games where you chat and play with people you
don’t know can be great
 Can be addictive
 Remember that no one will die in real life if you don’t win!
 Adults with bad intentions…..
 Remember - people are not always who they say they
are.
 Don’t get tricked or blackmailed to give out any personal
details
 use a nickname as your username/ character name
 You don’t need to share personal information to
enjoy the game!
PEGI
 There is a new rating system in Europe called PEGI which can help you decide if you want
to be involved in a game or not. It’s a bit like film classification and tells you which age
group the game is appropriate for and what kind of content it might contain.

 Violence
 Game contains depictions of violence

 Discrimination
 Game contains depictions of, or material which may encourage, discrimination

 Sex
 Game depicts nudity and/or sexual behaviour or sexual references

 Drugs
 Game refers to or depicts the use of drugs

 Fear
 Game may be frightening or scary for young children

 Bad Language
 Game contains bad language
Is the protection of children on
the internet an issue?
 In 2002 there were 71 cases.
 •In 2003 there were 90 cases.
 •In 2004 there were 117 cases.
 •In 2005 there were 157 cases
 •In 2006 there were 250 cases
 •In 2007 there were 276 cases.
 •In 2008 there were 307 cases.
 •In 2009 there were 325 cases.
 •In 2010 there were 189 cases.!!!!!!!!
 86% of these offences in North Wales involve sexual child abuse.
 75% of the offenders investigated
 North Wales Police Hi-tech Crime Unit were previously unknown to the police.
Figures taken from data from North Wales Police Hi-tech Crime Unit
 Who in this room do you know is not a
paedophile ?
 You can be anything
you want to be on the
internet.
 Do you really know who
you work with?
 Grading images.
  Level 1 nudity sexual posing.
  Level 2 sexual activity between children
 none penetrative.
  Level 3 sexual activity between adults and
 children none penetrative.
  Level 4 penetrative sexual activity involving
 children.
  Level 5 bestiality, sadomasochism, bondage
 or unusual acts involving children.
 Age of criminality
 Age of consent
 Under 16
 Under 13
 Making contact
 Harassment
 Cyberbullying
 Sexting
Ok, so it’s gone wrong, so what
can we do?
 Preserve the evidence.
 Don’t be tempted to be an amateur sleuth.
 If its off leave it off.
 If its on note what's on the screen photograph
if possible then pull the plug from the back of
the computer
 If it’s a laptop pull the battery.
 Mobile phone switch it off.
 Bag it in an appropriate bag.
Any questions?

More Related Content

What's hot

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquetteguestc38192
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineDizeo
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th gradePamela Taylor
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for StudentsKelgator
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 

What's hot (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Test
TestTest
Test
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 

Similar to Internet safety presentation

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldDeborah Gonzalez, Esq.
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Internet safety
Internet safetyInternet safety
Internet safety12ROYA
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngmiliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaasofisalazar00
 

Similar to Internet safety presentation (20)

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital World
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
What is sexting
What is sexting What is sexting
What is sexting
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 

Recently uploaded

How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Celine George
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxnuriaiuzzolino1
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptxmanishaJyala2
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Celine George
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfaedhbteg
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...Nguyen Thanh Tu Collection
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 

Recently uploaded (20)

How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdf
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 

Internet safety presentation

  • 1. Internet Safety Adele Roberts & Jane Miller Youth Justice Service Officers Flintshire Youth Justice Service
  • 2. By the end of today, you may have the urge to……
  • 3. Please don’t. It’s not the computers fault, it’s the users!!
  • 4. We know the threat from this?
  • 5. But have we even considered?
  • 6. What do we mean by technology?  Computers  Digital cameras  Mobile phones (including smart phones)  Playstation  Xbox  Wii  Hand held games consoles (DS)
  • 7. We all know that children adapt to new technology faster then adults
  • 9. It’s more than sex  Suicide  Self harm.  Eating disorders.  Online fraud.  Dangerous trends.
  • 10. There are many forms of social networking  Networks specifically set up to facilitate meeting people online.  Networks for online games.  Peer to peer networks.  Virtual worlds
  • 11. If you can’t imagine it…….
  • 12. And there’s always just Google
  • 13. Social Networking Sites  Be careful what information you give out on your profile. Remember that you don’t know who your friend’s friends are… or your friend’s friends’ friends! And you don’t know what they’ll do with your picture or your phone number if you give it out by mistake. Once your picture is out there, it’s out there forever and you won’t be able to get it back.  Be aware that information on your profile could potentially be viewed by anyone. So if you wouldn’t be comfortable printing it off and handing it out on the street, maybe it shouldn’t be on your profile.
  • 14.  The internet has a long memory and its 24/7 365 days a year.  70% of employers now research social network when checking suitability for employment.
  • 15. Camera phones  Whilst having a camera phone is great and really useful, be careful if you share your photos with others. Pictures can be changed or shared around, so think about what the image is and who you are sending it to, before you press send. Once it’s out there it’s out there forever!
  • 16. Cyber Bullying  Someone uses the internet or mobiles to deliberately upset someone else.  Undertaken through technology such as mobiles or the internet  Bullying can affect someone not just at school, but at home as well. Because it takes place in the virtual world, it has a 24/7 nature and can make someone feel upset or threatened in their own home  Can be hard to identify who the cyberbully is because they could block their number or post things on a website anonymously. The nature of this type of bullying means it can have a large audience, many of whom may not even realise that they are being bullies.  A positive thin about this kind of bullying is that it can be evidenced. With normal bullying, it can be one person’s word against another’s, but with cyberbullying you can save texts or print our emails/IM’s/WebPages. This can be used as proof to catch the bully and stop them upsetting someone: this could be your or a friend’s child or young people with whom you are working.
  • 18. GPS technology  The worrying thing about the social networking using GPS technology, is that your contacts will be on a map, showing exactly where they are. If you can see them, your contacts can also see where you are too. Quite scary if you have contacts on your profile that you don’t know or don’t trust. If you do want to use these sort of apps, you need to remember to use your privacy settings and remove anyone you don’t know or don’t trust, from your contacts.
  • 20. Uploading pictures  Only upload pictures that you’d be happy for your mum to see – anything too sexy to be passed round the dinner table should NOT make it onto the web, as you don’t know who could be looking at it or what they might be doing with it.  Don’t post your phone number or email address on your homepage. Think about it – why would anyone actually need this info when they can message you privately via your social networking site?  Don’t post pictures of you or your mates wearing school uniform – if dodgy people see your school badge, they can work out where you are and find you. The more anonymous you are, the less vulnerable you are to people with bad intentions.  Tick the “no pic forwarding” option on your settings page – this will stop people forwarding your pictures to anyone without your consent.
  • 21. Sexting  Someone taking an indecent image of themselves, and sending it to their friends or boy/girlfriend via a mobile phone or some other form of technology is sometimes referred to as ‘sexting’.  Once these images have been taken and sent to others, control is lost of them and they can end up anywhere. They could be seen by friends and family, a future employer, or even, in some cases, end up in the possession an offender!  This also puts that person who originally sent the images in a vulnerable position, as somebody they may or may not know now has these images and could use technology to bully, harass or even try to locate them.  Just think – if you wouldn’t print and pass these images around your school or show your mum or dad, they are not appropriate to share via phone or other technologies.
  • 23. Gaming  Online games where you chat and play with people you don’t know can be great  Can be addictive  Remember that no one will die in real life if you don’t win!  Adults with bad intentions…..  Remember - people are not always who they say they are.  Don’t get tricked or blackmailed to give out any personal details  use a nickname as your username/ character name  You don’t need to share personal information to enjoy the game!
  • 24. PEGI  There is a new rating system in Europe called PEGI which can help you decide if you want to be involved in a game or not. It’s a bit like film classification and tells you which age group the game is appropriate for and what kind of content it might contain.   Violence  Game contains depictions of violence   Discrimination  Game contains depictions of, or material which may encourage, discrimination   Sex  Game depicts nudity and/or sexual behaviour or sexual references   Drugs  Game refers to or depicts the use of drugs   Fear  Game may be frightening or scary for young children   Bad Language  Game contains bad language
  • 25. Is the protection of children on the internet an issue?
  • 26.  In 2002 there were 71 cases.  •In 2003 there were 90 cases.  •In 2004 there were 117 cases.  •In 2005 there were 157 cases  •In 2006 there were 250 cases  •In 2007 there were 276 cases.  •In 2008 there were 307 cases.  •In 2009 there were 325 cases.  •In 2010 there were 189 cases.!!!!!!!!  86% of these offences in North Wales involve sexual child abuse.  75% of the offenders investigated  North Wales Police Hi-tech Crime Unit were previously unknown to the police. Figures taken from data from North Wales Police Hi-tech Crime Unit
  • 27.  Who in this room do you know is not a paedophile ?
  • 28.  You can be anything you want to be on the internet.  Do you really know who you work with?
  • 29.  Grading images.   Level 1 nudity sexual posing.   Level 2 sexual activity between children  none penetrative.   Level 3 sexual activity between adults and  children none penetrative.   Level 4 penetrative sexual activity involving  children.   Level 5 bestiality, sadomasochism, bondage  or unusual acts involving children.
  • 30.  Age of criminality  Age of consent  Under 16  Under 13  Making contact  Harassment  Cyberbullying  Sexting
  • 31. Ok, so it’s gone wrong, so what can we do?  Preserve the evidence.  Don’t be tempted to be an amateur sleuth.  If its off leave it off.  If its on note what's on the screen photograph if possible then pull the plug from the back of the computer
  • 32.  If it’s a laptop pull the battery.  Mobile phone switch it off.  Bag it in an appropriate bag.