27
CYBERSAFETY CYBERSAFETY Acting Sergeant Kate Brown Acting Sergeant Kate Brown Christchurch Police Youth Christchurch Police Youth Education Education

CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education

Embed Size (px)

Citation preview

CYBERSAFETYCYBERSAFETY

Acting Sergeant Kate BrownActing Sergeant Kate Brown

Christchurch Police Youth EducationChristchurch Police Youth Education

Why do we need to focus on cybersafety?Why do we need to focus on cybersafety?

IssuesIssues

Policies/ProceduresPolicies/Procedures Resources availableResources available AdviceAdvice

IssuesIssues

Risks/safety onlineRisks/safety online CyberbullyingCyberbullying Inappropriate digital footprintInappropriate digital footprint CellphonesCellphones Social NetworkingSocial Networking

CHAT ROOMS

Hi you sound really cute!

How Old are you?

What do you like doing after school?

I am 14 and a bit of a fitness fanatic.

I often go power lifting after school

GroomingGrooming

Grooming is when a Grooming is when a person tries to ‘set up’ person tries to ‘set up’ and ‘prepare’ another and ‘prepare’ another person to be the victim of person to be the victim of sexual abuse. Although sexual abuse. Although not all sexual abuse not all sexual abuse involves being groomed, involves being groomed, it’s a very common (and it’s a very common (and tricky) process which can tricky) process which can be done by strangers or be done by strangers or by someone you know. by someone you know.

What is cyberbullying?What is cyberbullying?

BullyingBullying

Using the internet, mobile phone or other Using the internet, mobile phone or other technology like a camera to hurt somebody or technology like a camera to hurt somebody or embarrass themembarrass them

Is repeated or carries onIs repeated or carries on

over a period of timeover a period of time

Bullying on the internet or mobile Bullying on the internet or mobile phones can include many things:phones can include many things:

egeg-anonymous text messages-anonymous text messages-Posting nasty or threatening comments on facebook or -Posting nasty or threatening comments on facebook or

bebo pagebebo page-Sending mean or embarrassing photos or videos of you to -Sending mean or embarrassing photos or videos of you to

other peopleother people-Can involve people spreading rumours about you and -Can involve people spreading rumours about you and

scaring youscaring you-may try to stop you from communicating with others -may try to stop you from communicating with others -may hack or steal passwords for your online accounts-may hack or steal passwords for your online accounts

ExampleExample

School issue or not?School issue or not?

How do we deal with this?How do we deal with this?

When does something become a Police When does something become a Police matter?matter?

What do I do if I get cyberbullied?What do I do if I get cyberbullied?

Tell someone you trustTell someone you trust Don’t reply to messagesDon’t reply to messages Report/block the person Report/block the person Save evidence (screenshot/save Save evidence (screenshot/save

message) –may be used if reported to message) –may be used if reported to PolicePolice

If the bullying online or on your mobile If the bullying online or on your mobile involves physical threats, like threats to involves physical threats, like threats to hurt you or fight then contact the Policehurt you or fight then contact the Police

STOPSTOP

BLOCKBLOCK

TELLTELL

Cyberbullying and the LawCyberbullying and the Law Threatening BehaviourThreatening Behaviour HarassmentHarassment Cyberbullying can be a criminal offence under sections Cyberbullying can be a criminal offence under sections

249-252 of the Crimes Act 1961.249-252 of the Crimes Act 1961. S249S249 Accessing a computer system for Accessing a computer system for

dishonest purpose (7yrs)dishonest purpose (7yrs) S250S250 Damaging or interfering with Damaging or interfering with

computer systemcomputer system S251 S251 Making, selling or distributing Making, selling or distributing

software for committing crimesoftware for committing crime S252S252 Accessing a computer system Accessing a computer system

without authorisationwithout authorisation

DIGITAL FOOTPRINTDIGITAL FOOTPRINT

Trail you leave on the Trail you leave on the internet.internet.

Anything you do Anything you do online online Profiles createdProfiles created Sites visitedSites visited Online conversationsOnline conversations

Inappropriate digital footprintInappropriate digital footprint

Can come back to bite Can come back to bite you especially when:you especially when:

you’ve talked online about you’ve talked online about engaging in illegal activitiesengaging in illegal activities

You’ve harassed someone You’ve harassed someone onlineonline

Drunken or inappropriate Drunken or inappropriate photos eg nakedphotos eg naked

Hate blogsHate blogs Visiting questionable sites Visiting questionable sites

eg porn, hate siteseg porn, hate sites

Social NetworkingSocial Networking

Common sites Common sites

PrivacyPrivacy

Professional relationshipsProfessional relationships

PrivacyPrivacy

Make sure you keep an eye on your Make sure you keep an eye on your privacy settings. privacy settings.

Only people who you have invited to be Only people who you have invited to be your friend should be able to access your your friend should be able to access your profile.profile.

Privacy SettingsPrivacy Settings

Policies/ProceduresPolicies/Procedures School Cybersafety PolicySchool Cybersafety Policy

Cybersafety Use Agreement for Cybersafety Use Agreement for All School StaffAll School Staff Junior Primary studentsJunior Primary students Primary/Intermediate studentsPrimary/Intermediate students Secondary StudentsSecondary Students

Cell phones/Laptops at schoolCell phones/Laptops at school School Websites /online publishingSchool Websites /online publishing

www.netsafe.org.nzwww.netsafe.org.nz

Important!Important!

Review annually –technology moves Review annually –technology moves quickly quickly

Signed agreements ie caregiver Signed agreements ie caregiver permission permission

Procedures for dealing with breachesProcedures for dealing with breaches

Resources AvailableResources Available

Netsafe (Netsafe (www.netsafe.org.nz)) Netsafe kit for schoolsNetsafe kit for schools

Hector’s WorldHector’s World

Police Education OfficersPolice Education Officers

-Keeping Ourselves Safe, Kia Kaha, -Keeping Ourselves Safe, Kia Kaha, Cybersafety lessonsCybersafety lessons

Advice for TeachersAdvice for Teachers

Don’t become friends online with studentsDon’t become friends online with students Be careful what you post online –Be careful what you post online –

comments, photos, linkscomments, photos, links Consider how your conduct could affect Consider how your conduct could affect

your professional reputation and that of your professional reputation and that of the schoolthe school

Make your profiles “private”Make your profiles “private” Be approachable to studentsBe approachable to students

Advice for ParentsAdvice for Parents

Set guidelines for Set guidelines for computer use at computer use at homehome

Monitor use –Monitor use –computer in public computer in public areaarea

Learn as much as you Learn as much as you cancan

Encourage kids to Encourage kids to come to you for helpcome to you for help

Get involved in your child’s online life (NetSafe Get involved in your child’s online life (NetSafe recommends that children under 8 have an recommends that children under 8 have an adult with them) adult with them)

Check in with them about online and offline Check in with them about online and offline friends friends

Find out how they and their friends help each Find out how they and their friends help each other deal with online problems other deal with online problems

Ask them to show you what they like doing Ask them to show you what they like doing onlineonline

Try to keep calm if there are online issues (kids Try to keep calm if there are online issues (kids often stop talking to adults if they think parents often stop talking to adults if they think parents will react badly or take away the technology) will react badly or take away the technology)

Find out about online risks (for example, learn Find out about online risks (for example, learn how to stop cyberbullying/textbullying and how to stop cyberbullying/textbullying and harassment, spot online grooming, avoid harassment, spot online grooming, avoid malware) and discuss how your children are malware) and discuss how your children are currently managing those risks. currently managing those risks.