Upload
austen-tate
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
CYBERSAFETYCYBERSAFETY
Acting Sergeant Kate BrownActing Sergeant Kate Brown
Christchurch Police Youth EducationChristchurch Police Youth Education
Why do we need to focus on cybersafety?Why do we need to focus on cybersafety?
IssuesIssues
Policies/ProceduresPolicies/Procedures Resources availableResources available AdviceAdvice
IssuesIssues
Risks/safety onlineRisks/safety online CyberbullyingCyberbullying Inappropriate digital footprintInappropriate digital footprint CellphonesCellphones Social NetworkingSocial Networking
CHAT ROOMS
Hi you sound really cute!
How Old are you?
What do you like doing after school?
I am 14 and a bit of a fitness fanatic.
I often go power lifting after school
GroomingGrooming
Grooming is when a Grooming is when a person tries to ‘set up’ person tries to ‘set up’ and ‘prepare’ another and ‘prepare’ another person to be the victim of person to be the victim of sexual abuse. Although sexual abuse. Although not all sexual abuse not all sexual abuse involves being groomed, involves being groomed, it’s a very common (and it’s a very common (and tricky) process which can tricky) process which can be done by strangers or be done by strangers or by someone you know. by someone you know.
What is cyberbullying?What is cyberbullying?
BullyingBullying
Using the internet, mobile phone or other Using the internet, mobile phone or other technology like a camera to hurt somebody or technology like a camera to hurt somebody or embarrass themembarrass them
Is repeated or carries onIs repeated or carries on
over a period of timeover a period of time
Bullying on the internet or mobile Bullying on the internet or mobile phones can include many things:phones can include many things:
egeg-anonymous text messages-anonymous text messages-Posting nasty or threatening comments on facebook or -Posting nasty or threatening comments on facebook or
bebo pagebebo page-Sending mean or embarrassing photos or videos of you to -Sending mean or embarrassing photos or videos of you to
other peopleother people-Can involve people spreading rumours about you and -Can involve people spreading rumours about you and
scaring youscaring you-may try to stop you from communicating with others -may try to stop you from communicating with others -may hack or steal passwords for your online accounts-may hack or steal passwords for your online accounts
ExampleExample
School issue or not?School issue or not?
How do we deal with this?How do we deal with this?
When does something become a Police When does something become a Police matter?matter?
What do I do if I get cyberbullied?What do I do if I get cyberbullied?
Tell someone you trustTell someone you trust Don’t reply to messagesDon’t reply to messages Report/block the person Report/block the person Save evidence (screenshot/save Save evidence (screenshot/save
message) –may be used if reported to message) –may be used if reported to PolicePolice
If the bullying online or on your mobile If the bullying online or on your mobile involves physical threats, like threats to involves physical threats, like threats to hurt you or fight then contact the Policehurt you or fight then contact the Police
Cyberbullying and the LawCyberbullying and the Law Threatening BehaviourThreatening Behaviour HarassmentHarassment Cyberbullying can be a criminal offence under sections Cyberbullying can be a criminal offence under sections
249-252 of the Crimes Act 1961.249-252 of the Crimes Act 1961. S249S249 Accessing a computer system for Accessing a computer system for
dishonest purpose (7yrs)dishonest purpose (7yrs) S250S250 Damaging or interfering with Damaging or interfering with
computer systemcomputer system S251 S251 Making, selling or distributing Making, selling or distributing
software for committing crimesoftware for committing crime S252S252 Accessing a computer system Accessing a computer system
without authorisationwithout authorisation
DIGITAL FOOTPRINTDIGITAL FOOTPRINT
Trail you leave on the Trail you leave on the internet.internet.
Anything you do Anything you do online online Profiles createdProfiles created Sites visitedSites visited Online conversationsOnline conversations
Inappropriate digital footprintInappropriate digital footprint
Can come back to bite Can come back to bite you especially when:you especially when:
you’ve talked online about you’ve talked online about engaging in illegal activitiesengaging in illegal activities
You’ve harassed someone You’ve harassed someone onlineonline
Drunken or inappropriate Drunken or inappropriate photos eg nakedphotos eg naked
Hate blogsHate blogs Visiting questionable sites Visiting questionable sites
eg porn, hate siteseg porn, hate sites
Social NetworkingSocial Networking
Common sites Common sites
PrivacyPrivacy
Professional relationshipsProfessional relationships
PrivacyPrivacy
Make sure you keep an eye on your Make sure you keep an eye on your privacy settings. privacy settings.
Only people who you have invited to be Only people who you have invited to be your friend should be able to access your your friend should be able to access your profile.profile.
Policies/ProceduresPolicies/Procedures School Cybersafety PolicySchool Cybersafety Policy
Cybersafety Use Agreement for Cybersafety Use Agreement for All School StaffAll School Staff Junior Primary studentsJunior Primary students Primary/Intermediate studentsPrimary/Intermediate students Secondary StudentsSecondary Students
Cell phones/Laptops at schoolCell phones/Laptops at school School Websites /online publishingSchool Websites /online publishing
www.netsafe.org.nzwww.netsafe.org.nz
Important!Important!
Review annually –technology moves Review annually –technology moves quickly quickly
Signed agreements ie caregiver Signed agreements ie caregiver permission permission
Procedures for dealing with breachesProcedures for dealing with breaches
Resources AvailableResources Available
Netsafe (Netsafe (www.netsafe.org.nz)) Netsafe kit for schoolsNetsafe kit for schools
Hector’s WorldHector’s World
Police Education OfficersPolice Education Officers
-Keeping Ourselves Safe, Kia Kaha, -Keeping Ourselves Safe, Kia Kaha, Cybersafety lessonsCybersafety lessons
Advice for TeachersAdvice for Teachers
Don’t become friends online with studentsDon’t become friends online with students Be careful what you post online –Be careful what you post online –
comments, photos, linkscomments, photos, links Consider how your conduct could affect Consider how your conduct could affect
your professional reputation and that of your professional reputation and that of the schoolthe school
Make your profiles “private”Make your profiles “private” Be approachable to studentsBe approachable to students
Advice for ParentsAdvice for Parents
Set guidelines for Set guidelines for computer use at computer use at homehome
Monitor use –Monitor use –computer in public computer in public areaarea
Learn as much as you Learn as much as you cancan
Encourage kids to Encourage kids to come to you for helpcome to you for help
Get involved in your child’s online life (NetSafe Get involved in your child’s online life (NetSafe recommends that children under 8 have an recommends that children under 8 have an adult with them) adult with them)
Check in with them about online and offline Check in with them about online and offline friends friends
Find out how they and their friends help each Find out how they and their friends help each other deal with online problems other deal with online problems
Ask them to show you what they like doing Ask them to show you what they like doing onlineonline
Try to keep calm if there are online issues (kids Try to keep calm if there are online issues (kids often stop talking to adults if they think parents often stop talking to adults if they think parents will react badly or take away the technology) will react badly or take away the technology)
Find out about online risks (for example, learn Find out about online risks (for example, learn how to stop cyberbullying/textbullying and how to stop cyberbullying/textbullying and harassment, spot online grooming, avoid harassment, spot online grooming, avoid malware) and discuss how your children are malware) and discuss how your children are currently managing those risks. currently managing those risks.