2014 EyePAT Training Guide v 4.0
Transcription
2014 EyePAT Training Guide v 4.0
150 Table of Contents Introduction ....................................................................................................... 11 About this Guide .............................................................................................. 11 About EyePAT .................................................................................................. 11 Public speaking: ............................................................................................... 12 TV and Radio ................................................................................................... 12 Contact Us ...................................................................................................... 12 The Internet - an introduction ............................................................................... 13 Online Terminology ............................................................................................. 15 Digital footprint? .............................................................................................. 15 Shredding ....................................................................................................... 15 Ratting ........................................................................................................... 15 Photobombing ................................................................................................. 16 Photoshopping ................................................................................................. 16 Selfies ............................................................................................................ 16 Why do we need to learn online safety? ................................................................. 17 Putting things in perspective.............................................................................. 17 YoungMinds results: ...................................................................................... 17 BBC Learning results: .................................................................................... 17 The internet is a wonderful tool .......................................................................... 17 Unsuitable Sites ............................................................................................ 18 Sexting ........................................................................................................ 18 Bullying ....................................................................................................... 18 Trolling ........................................................................................................ 18 Grooming ..................................................................................................... 19 Violent Gaming ............................................................................................. 19 Identity theft ................................................................................................ 19 Mobiles (Smartphones) and Tablets ................................................................. 19 How can the internet affect your children?.............................................................. 20 How does a child’s brain work ............................................................................ 21 What to do at what age? ................................................................................... 22 Internet Addiction ............................................................................................ 24 Inappropriate Sites .............................................................................................. 26 Porn Sites ....................................................................................................... 26 Viewing Inappropriate Images on Mobiles ........................................................ 26 © Eye PAT Ltd. Version 4.0 2014 3 info@eyepat.org www.eyepat.org Using the Internet Safely Parents fear porn on children's mobiles ............................................................ 26 Suicide Sites.................................................................................................... 27 Eating Disorder Sites ........................................................................................ 27 Drug Sites ....................................................................................................... 28 Terrorist Sites .................................................................................................. 28 Snuff Movies.................................................................................................... 28 Blogging ............................................................................................................ 29 Tumblr............................................................................................................ 29 WordPress ....................................................................................................... 29 Apps .................................................................................................................. 30 StaySafe ......................................................................................................... 30 Social Networking ............................................................................................... 33 Picture Messaging ............................................................................................ 33 Instant messaging............................................................................................ 33 Chat Rooms..................................................................................................... 34 Video Messaging .............................................................................................. 34 Discussion groups ............................................................................................ 34 Messaging .......................................................................................................... 35 Top 15 Social Networking Sites .......................................................................... 35 Other Apps/Social Networks used by Young People............................................... 36 WhatsApp Messenger .................................................................................... 36 KikMessenger ............................................................................................... 37 Messenger WithYou ....................................................................................... 37 Bump .......................................................................................................... 37 Ping ............................................................................................................ 37 Touch .......................................................................................................... 38 BBM ............................................................................................................ 38 Snapchat ..................................................................................................... 38 Faceparty ..................................................................................................... 39 Friendster .................................................................................................... 39 MSN Messenger ............................................................................................ 40 Video Messaging ................................................................................................. 41 Facetime (Apple).............................................................................................. 41 Google Chat .................................................................................................... 41 Facebook ........................................................................................................ 41 Skype ............................................................................................................. 43 Chatroulette.com and Pinkroutlette.com.............................................................. 43 © EyePAT Community Interest Company Version 4.0 2014 4 www.eyepat.org info@eyepat.org Using the Internet Safely Tinychat.com ................................................................................................... 44 Stickam .......................................................................................................... 44 Geo-Social Apps - Hook Up Apps ........................................................................... 46 Full Circle ........................................................................................................ 46 Tango ............................................................................................................. 46 Pickloc ............................................................................................................ 47 WEKHO ........................................................................................................... 47 Anonymous social networking ............................................................................... 48 Honesty Box .................................................................................................... 48 Formspring...................................................................................................... 48 Little Gossip .................................................................................................... 48 Spillit .............................................................................................................. 49 Social Networking - Privacy and Parental Settings ................................................... 51 Friends, Contacts or Strangers ........................................................................ 51 Dictionary of Social Networking Terms: ............................................................ 52 1. Facebook..................................................................................................... 52 To access your account settings ...................................................................... 52 Changing your Privacy Settings....................................................................... 53 Who can see my Stuff? .................................................................................. 53 Who Can Contact Me ..................................................................................... 54 Receiving Messages ....................................................................................... 55 Block Someone - quick method ....................................................................... 55 Categorising, Reporting, Blocking, Unfriending Friends ....................................... 56 More Privacy Settings .................................................................................... 56 Timeline and Tagging Settings ........................................................................ 57 Blocking ....................................................................................................... 57 Photo Albums ............................................................................................... 59 Changing your Account Settings...................................................................... 60 Is someone logging onto your Facebook account without you knowing? ............... 60 Stopping someone from logging onto your Page ................................................ 60 Password - Changing your Facebook password ................................................. 61 Blocking Facebook ......................................................................................... 62 2. Twitter ........................................................................................................ 62 3. LinkedIn ...................................................................................................... 63 4. Google+ ...................................................................................................... 64 5. PinInterest .................................................................................................. 64 To report a pin.............................................................................................. 65 © EyePAT Community Interest Company Version 4.0 2014 5 www.eyepat.org info@eyepat.org Using the Internet Safely To report a person ........................................................................................ 65 To report a comment. .................................................................................... 65 6. Tumblr ........................................................................................................ 65 What parents need to know ............................................................................ 65 How To Report People On Tumblr .................................................................... 66 7. Flickr .......................................................................................................... 67 What if I don't want everyone to see my photos? .............................................. 67 Setting privacy levels on my photos? ............................................................... 67 Privacy Uploading by Email............................................................................. 67 Can anyone leave a comment? ....................................................................... 67 I've uploaded photos and made them public. Where do they show up? ................ 68 Can I make a public photo private again? ......................................................... 68 8. VK .............................................................................................................. 68 9. Instagram ................................................................................................... 69 How do I report something for abuse or spam? ................................................. 69 How do I block or unblock someone? ............................................................... 69 What can I do if someone is impersonating me on Instagram? ............................ 69 10. MySpace.................................................................................................... 70 MSN Messenger ............................................................................................... 71 Changing your MSN Password ......................................................................... 71 Skype ............................................................................................................. 71 Profile Settings ............................................................................................. 71 Privacy Settings ............................................................................................ 72 To change the password ................................................................................ 73 Internet & DVD Gaming ....................................................................................... 75 The good......................................................................................................... 75 The bad .......................................................................................................... 75 Gaming classifications....................................................................................... 76 Available Games .............................................................................................. 77 Older Online Games ......................................................................................... 77 Violent Games ................................................................................................. 78 Games/Social Networking for Younger Children ....................................................... 79 Habbo............................................................................................................. 79 Club Penguin ................................................................................................... 79 Jacqueline Wilson ............................................................................................. 79 Moshi Monsters ................................................................................................ 80 Disney Superbia ............................................................................................... 80 © EyePAT Community Interest Company Version 4.0 2014 6 www.eyepat.org info@eyepat.org Using the Internet Safely SmileyTalk ...................................................................................................... 80 Yoursphere ...................................................................................................... 80 Stardolls ......................................................................................................... 80 Child/Parent Contracts on Internet Use .................................................................. 81 Example Contracts ........................................................................................... 82 Mobiles .............................................................................................................. 84 Mobile parental controls .................................................................................... 84 Sexting .............................................................................................................. 85 Advice for Schools and Professionals who care for young people ............................ 86 Bullying ............................................................................................................. 87 Happy People Don’t Bully .................................................................................. 87 Happy Kid’s Don’t Bully ..................................................................................... 87 Cyber Bullying ................................................................................................. 88 Instant Messaging/Text Messaging/e-mail harassment....................................... 88 Web Sites and Social Networking Sites ............................................................ 89 Sending Pictures through E-mail and Mobile Phones .......................................... 89 Impersonation .............................................................................................. 89 Sending Malicious Code.................................................................................. 89 Sending Porn and Other Junk E-Mail and IMs .................................................... 89 Blogs ........................................................................................................... 89 Stealing Passwords........................................................................................ 90 Internet Polling ............................................................................................. 90 Trolling ........................................................................................................ 90 How would you know if your child is being bullied ............................................. 90 I am an adult and I am bullying what can I do? ................................................ 91 I am a child and I am bullying what can I do? ................................................... 91 How would you know if your child was a bully ................................................... 92 Why should I do something ............................................................................ 92 How can you prevent or stop bullying .............................................................. 92 Grooming and online child abuse? ......................................................................... 94 Why child sex abusers like to use the internet to contact children? ......................... 94 What are children at risk of? .............................................................................. 94 Children at specific risk ..................................................................................... 95 Tips to keep your children safe on the internet..................................................... 96 What to do when abuse takes place? .................................................................. 97 Parental Controls and Privacy Settings ................................................................... 99 Communication - It’s an essential part of the process ........................................... 99 © EyePAT Community Interest Company Version 4.0 2014 7 www.eyepat.org info@eyepat.org Using the Internet Safely For filtering to Work ......................................................................................... 99 Overblocking ................................................................................................. 100 Technology.................................................................................................... 100 The 5 levels of filtering. .................................................................................. 100 Whitelist filters............................................................................................... 101 Blacklist filters ............................................................................................... 101 Webcams ...................................................................................................... 101 Filters - ISP [Internet Service Providers] .............................................................. 102 Filters - Routers ................................................................................................ 103 Netgear ........................................................................................................ 104 BT Homehub.................................................................................................. 105 Web blocking .............................................................................................. 105 Instant messaging....................................................................................... 105 Time limits ................................................................................................. 105 Email blocking ............................................................................................ 105 Social networking........................................................................................ 105 Program blocking ........................................................................................ 106 Usage reporting .......................................................................................... 106 Instant alerts.............................................................................................. 106 DrayTek ........................................................................................................ 106 Staff Internet Abuse - A real cost to your business ............................................. 106 Top 5 Personal Internet Uses for Employees ................................................... 107 DrayTek Web Content Filtering ..................................................................... 107 Filters - Device - Operating Systems .................................................................... 108 Windows 7 .................................................................................................... 108 To turn on Parental Controls for a standard user account ................................. 109 Setting up Windows Life Family Safety .............................................................. 111 Windows 8 .................................................................................................... 113 Apple Mac ..................................................................................................... 115 To create a user account:- ........................................................................... 115 Managed with Parental controls Accounts ....................................................... 115 Filters - Device - Commercial Software ................................................................ 116 Parental Control Software................................................................................ 116 The Utility Warehouse Packages ....................................................................... 117 My Secure PC from Utility Warehouse ............................................................... 118 Filters - Device - Tablet ..................................................................................... 120 iPAD Applying Safety Controls.......................................................................... 120 © EyePAT Community Interest Company Version 4.0 2014 8 www.eyepat.org info@eyepat.org Using the Internet Safely Disabling In-App Purchases on iOS and Android Devices ..................................... 123 Disabling In-App Purchases on Android Devices ................................................. 124 Filters - Device - Mobile ..................................................................................... 125 Mobile Phone Operators Parental Controls ......................................................... 125 iPhone Controls .............................................................................................. 129 Filters - iPod ..................................................................................................... 130 Filters - Device - Gaming.................................................................................... 132 XBox 360 - Parental Controls ........................................................................... 132 Xbox 360 Netflix ‘Just For Kids’ User Interface ................................................... 135 Wii Parental Controls ...................................................................................... 136 Filtering - Search Engines [Browser] .................................................................... 140 Firefox .......................................................................................................... 140 Firefox Family Safety ................................................................................... 140 Yahoo SafeSearch .......................................................................................... 141 Changing your SafeSearch filter .................................................................... 141 SafeSearch Lock ......................................................................................... 141 Google Chrome Family Safety .......................................................................... 141 Chrome......................................................................................................... 143 Bing Safe Search............................................................................................ 144 Internet Explorer 11 ....................................................................................... 145 Kid Safe Search Engines ................................................................................. 147 Microsoft and CEOP create child-friendly version of IE9 .................................... 147 Ranger Browser – A Safe Browser for a Child’s iPhone, iPad or Android .............. 148 Safari ........................................................................................................... 151 Filters - Applications ......................................................................................... 152 You Tube Safety Mode .................................................................................... 152 Use YouTube Privacy Settings ....................................................................... 153 History............................................................................................................. 154 Internet Explorer History................................................................................. 154 Deleting the History .................................................................................... 154 Google Chrome History ................................................................................... 155 In Private Browsing ........................................................................................... 157 IncognitoGone - overrides InPrivate Browsing .................................................... 158 Google Alerts .................................................................................................... 161 Tracking & Monitoring Software .......................................................................... 162 uKnowKids Software Review ......................................................................... 162 Screen Retriever Review and Installation ....................................................... 165 © EyePAT Community Interest Company Version 4.0 2014 9 www.eyepat.org info@eyepat.org Using the Internet Safely Facebook Monitoring Solutions for Parents ..................................................... 170 Mamabear Parental Monitoring App Review .................................................... 171 Internet Cookies ............................................................................................... 175 Passwords and Online Security - Top Tips............................................................. 176 Malware and Spyware [Scumware] ................................................................... 176 Malware Software ....................................................................................... 176 Spyware Software ....................................................................................... 176 Anti Virus and Parental Controls ....................................................................... 176 System Cleaners ............................................................................................ 177 WIFI in open space......................................................................................... 177 Passwords ..................................................................................................... 177 Homework Sites ................................................................................................ 178 Text and MSN abbreviations ............................................................................... 182 Dictionary of terms used in chat rooms ................................................................ 185 Dictionary of Sexting terms ................................................................................ 190 Internet Chat and Drug Lingo ............................................................................. 192 Emoticons ........................................................................................................ 193 Evidence - How to Save ..................................................................................... 196 From a laptop or computer .............................................................................. 196 From a Tablet ................................................................................................ 196 Android 4.0 (Ice Cream Sandwich): Hit the Power and Volume Down Button Simultaneously ........................................................................................... 196 From a Mobile ................................................................................................ 197 Use Your Phone's Built-in Shortcuts ............................................................... 197 Install an App for Screenshots ...................................................................... 197 Use the Android SDK ................................................................................... 197 Samsung Mini Phone ................................................................................... 197 © EyePAT Community Interest Company Version 4.0 2014 10 www.eyepat.org info@eyepat.org Using the Internet Safely Introduction About this Guide This Information Guide can be used as a stand alone book. However it has primarily been designed to work alongside the internet safety sessions EyePAT run. It contains information on how to use the internet safely. This guide is not definitive as things change very quickly on a regular basis. If you can think of any topics which are not covered, or have any ideas for inclusion please contact us by email on info@eyepat.org. About EyePAT EyePAT is a Not for Profit (CIC) Community Interest Company dedicated to keeping children, young people, vulnerable adults and adults safe online and free from bullying. All our profits go back into EyePAT in order to help us develop and deliver the online safety and anti-bullying training. Funds permitting we provide free workshops for specific groups. We have a team of unpaid Directors and Members see www.eyepat/aboutus. This team is made up of Head Teachers, Teachers, from primary, secondary, state and private schools. Members of the Police Force, Health Services, Financial and Marketing experts, all of whom provide their time and expertise free. Our current Chair is Mr Derek Thomas, Head Teacher, Murch Junior School. Penny Steinhauer is the Operations and Training Director and can be contacted on penny@eyepat.org. Eye PAT provide training for: Teachers and School Staff Care & Health Workers (Foster Carers, Social & Youth Workers, Nursery Workers and Childminders) Parents [Adopted and birth] Pupils Businesses and organisations We teach internet awareness of: Sexting Cyber bullying and Trolling Unsuitable content Violent Gaming Grooming Identity Theft Business and personal reputation We run anti-bullying workshops for Adults and Young People called: Happy People Don’t Bully [bullying in the Workplace] Happy Kids Don’t Bully [bullying in Education] We provide: This extensive Online Safety Guide © EyePAT Community Interest Company Version 4.0 2014 11 www.eyepat.org info@eyepat.org Using the Internet Safely Instructor Led Sessions Courses and materials to purchase and run yourselves Bespoke workshops Public speaking: We are happy to speak at events, conferences etc. online safety or bullying and normally only charge our travelling costs. TV and Radio Penny has appeared on a number of Radio programmes to discuss bullying and online safety, including BBC Radio 1 and Radio 5 Live. She has also been interviewed on TV to discuss specific news stories. This can be done in person or by telephone. Please contact penny@eyepat.org Contact Us This guide has been created by EyePAT Community Interest Company. Training sessions are run throughout the UK. If you are interested in running a session or require further information please get in touch. For current information check www.eyepat.org email info@eyepat.org or ring 01446 795055. Follow us on Twitter: @Eye_PAT Like our Facebook page: Eye PAT Internet Safety Please support our Facebook campaign: Block Online Porn for Kids Follow our blogs: antibullyingtraining.wordpress.com internetsafetytraining.wordpress.com The information in this guide has been sourced from a variety of sources. Last updated February 2014. Please Note: You have purchased this guide for personal use only. You are permitted to print copies for your personal use only. You are not permitted to print, duplicate, copy or sell the CD or make additional copies for any other reason. Additional copies are available from http://www.eyepat.org/BuyOnline. Whilst every attempt is made to ensure the information in this guide is accurate and up to date with the ever changing techno logy EyePAT cannot be held responsible for any subsequent changes. © EyePAT Community Interest Company Version 4.0 2014 12 www.eyepat.org info@eyepat.org Using the Internet Safely The Internet - an introduction The internet can be accessed by PC’s, laptops, tablets, mobile phones, games consoles, Kindle, etc. It is a wonderful and amazing tool for obtaining information about almost anything you want or need to know about. Children (and Adults) have at their finger tips the most extensive encyclopaedias available which can be invaluable in their studies. For most school children, they can register at their local library for online access to the Encyclopaedia Britannica which they can then access from home. It provides unequalled communication packages enabling children (and adults) to talk across not only countries, but continents for little or no cost. They can share pictures and speak live using webcams. They can view movies and listen to music. Monitored properly it is an extremely useful tool and is now almost an essential study tool. Schools (from primary upwards) and universities use it as part of their study programmes. For those parents who do not have their own computers, links to the internet facilities are normally available at libraries, cyber cafes etc. However, as the internet is open to everyone who has access, there are risks. Depending on the site you are on, eg Wikipedia, remember not everything you read on the internet is true – anyone can post anything – make sure you check your sources before taking information as fact. It is extremely rare for financial institutions like banks to contact you via email and if they do they never ask you to click on a link or provide your password or personal details. These are always scam [phishing] messages designed to get you to release data so they can access your bank account. Never respond to them. Never open attachments with a .exe tag or .zip unless you are 100% certain who has sent it. These files are regularly used to transmit viruses. Recently there have been a spate of messages purporting to be from the Inland Revenue saying you have a tax rebate. These are also scams, just very clever ones as the email address it is sent from is @hmrc.gov.uk. The earlier ones were easier to spot as they used @hrmc.gov.uk. Simple answer to this problem, never click on any link from anyone who is in any way suspicious. If you are unsure ring them to check and look their phone number up, don’t just accept the one on the web site. © EyePAT Community Interest Company Version 4.0 2014 13 www.eyepat.org info@eyepat.org Using the Internet Safely Stories known as “urban legends” and “virus threats” can be sent to you by e-mail by well meaning friends telling you to pass them on to everyone in your address book. Many of these are hoaxes. A good way to check before sending them on is to go to http://www.symantec.com/norton/security_response/threatexplorer/index.jsp. They list all the current threats and whether they are real or not. © EyePAT Community Interest Company Version 4.0 2014 14 www.eyepat.org info@eyepat.org Using the Internet Safely Online Terminology Digital footprint? A digital footprint is the data trail left by a person’s online activities including the use of TV, mobile phone, the World Wide Web, the internet, databases and other connected devices and sensors. Digital Footprints provide data on what you clicked on, searched for, Liked, where you went, your location, your IP address, what you said, what was said about you. This data can be used by companies and organisations to contact you online. It is used for behavioural targeting, behavioural economics, personalisation, targeted marketing, digital reputation, social influence and other social media or social graphing services. In social media, a digital footprint can refer to the size of a person's "online presence" measured by the number of individuals with whom they interact. It can have an enormous impact on people’s lives and for young people goes far beyond anything they can imagine. We need to help young people understand how to make good choices online and how to be responsible about their digital footprint. Shredding Shredding is a new internet craze where amateur singers sync their not-so-perfect vocals and playing skills with videos of well-known artists. A 'shredded' version of The Beach Boys’ classic ‘I Get Around’, uploaded by user Massbetelnut, has already attracted over 1.6million hits on YouTube. And the trend is spreading quickly, with takes on Metallica, Nirvana, Muse and even Michael Bolton popping up on the video-sharing site. Some of the videos have been online for months, but are now rapidly growing in popularity. The name refers to heavy metal-style guitar playing and the word’s literal meaning. Users strip the songs back to their bare minimum and then add an amusing twist, such as over-exaggerated handclaps, detuned guitar strums or vocals like cat fights. Ratting One thing you need to be specifically aware of is Ratting. One type of spyware becoming increasingly common is known as a RAT (Remote Access Trojan), which criminals can use to access your computer or mobile device to take control of it to obtain your private information or spy on you. This is known as ratting. RATs are usually downloaded invisibly with a program requested by you – for example a game – or sent to you as an email attachment. They can perform actions similar to legitimate software. RATs can be difficult to detect because neither do they usually show © EyePAT Community Interest Company Version 4.0 2014 15 www.eyepat.org info@eyepat.org Using the Internet Safely up in lists of the programs or tasks you are using, nor can you generally notice that they are affecting your device’s performance. RATs being used to take control of webcams is becoming increasingly common, with the objective of the resulting video or images being used for blackmail or other inappropriate purposes Photobombing The process of jumping into someone else’s photo. It is normally done just for fun. This is a classic example: Photoshopping Taking a photo and altering it using packages such as Photoshop. In this example Kenyan senator has been caught photoshopping a Nelson Mandela picture with Mohammed Ali and replacing Ali with himself. Photoshopping is often used in bullying as photos can be altered with malicious intent. Selfies Taking your own photo with a camera or mobile phone. Most teenagers seem to spend most of their time taking Selfies, both camera and video. This is probably the most famous selfie with David Cameron, Barrak Obama and Denmark's Prime Minister at Nelson Mandela's Memorial Service. See the films page on our website for a short film on fun Selfies. www.eyepat.org/films © EyePAT Community Interest Company Version 4.0 2014 16 www.eyepat.org info@eyepat.org Using the Internet Safely Why do we need to learn online safety? One of the big problems school’s face is getting parents to attend online safety events. They don’t turn up because they don’t understand how bad it is out there, but these are the parents who really need to be there, as they are often the ones whose children are at most risk! Putting things in perspective Latest figures released by BBC on 11th February 2014 - Internet Safety Day are: UK Safer Internet Survey results: 43% of parents of 11-15s have spoken to their child about online pornography 35% of parents of 11-15s have spoken to their child about sexting 67% of parents of 11-15s have spoken to their child about meeting strangers on the internet YoungMinds results: More than a third of under 18s have accessed porn on a smart phone or tablet. Almost half of people under 25 have watched porn on a mobile device. Of those, 21 per cent said they were disturbed by what they saw and 50 per cent said they were excited. The poll also shows more than half of 11-14 year olds who'd watched porn online said it had affected their relationships. BBC Learning results: A survey by BBC Learning shows that almost 1 in 5 children who use tablets or smartphones have been upset by something they've seen on them in the last year and almost half of these were worried by sexual content or 'rude things'. This is double the figure that parents thought - and the majority of children are using their tablets and smartphones alone. Two-in-five had experienced people being unkind about someone that they know, while a similar proportion had experienced unkindness themselves. Among children who had seen something to upset them on their tablet, almost half had been worried by 'rude things' and two-in-five by scary or violent content. A quarter had experienced bullying and a fifth were upset by contact from strangers. Prevalence of bullying was higher among children aged 13-16 than those aged 8-12. The internet is a wonderful tool Almost anything can be found on it. It has totally changed the way we both live and work. However it has brought with it many challenges which we did not have 10 or even 5 years ago and its essential we all learn how to keep safe online, whether to protect us personally or professionally or our families. © EyePAT Community Interest Company Version 4.0 2014 17 www.eyepat.org info@eyepat.org Using the Internet Safely Used safely and responsibly the internet opens up no end of possibilities. However it does not come without many problems. It has to be remembered the original design of the internet was as a communication tool for businesses so it was never built with the safeguards for private and family use. We are not scaremongering, neither are we prudish or puritanical. The internet was built as a totally open communication tool for professional adults, hence no restrictions. Its market was never children. This is what is out there: Unsuitable Sites If you do not apply the appropriate blocks, it is likely your children will encounter inappropriate materials this will damage or at the very least affect their minds. In October 2013 a programme was shown by Channel 4 called Porn on the Brain which, albeit on a small sample, showed proof that Porn Addiction is as real as Alcohol or Drug addiction. The study was undertaken by Cambridge University Neuroscience Department. Without restrictions anyone can access the most horrifying and horrendous violent and sexual images. They can link up to extremist sites and can join groups of likeminded individuals, whether they be anorexics, terrorists, drug users etc. To largely prevent this you can apply age appropriate parental controls which are now available from some ISP’s (Internet Service Providers), through some Routers and via Parental Control Software. Every family with children under the 18 should have these. See Page 99 . However applying controls is not enough. Communication between adults, teenagers and children is an essential part of the safeguarding process. Sexting Young people are involved in or have experienced Sexting and this is growing at an alarming rate. There is no “type” of young people who do this and there are many reasons they do it. Once an image has been sent control is lost. CEOP list this as one of the main problems. It now has its own name SGII (Self Generated Indecent Imagery). Bullying Nearly half (49%) of all school age children are now bullied, and 34% of children are being cyber-bullied. The problem is getting worse and bullying can have devastating consequences. Workplace bullying has doubled in the last 10 years and is costing the country £billions in lost productivity and staff absence. 1 in 3 adults now experience bullying and 80% of victims said the abuse had affected their physical and mental health. 33% had decided to take time off, or even left their jobs as a result. Trolling Is one of the latest sick trends. This involves sending or posting sick or abusive messages onto sites, often remembrance sites or social networking sites, of people who have died. It has also now extended and covers abusive messages sent to individuals, celebrities etc. One such example was at the Olympic Games of 2012, when Tom Daley was ‘trolled’ when he missed out on the medal, with people posting and tweeting messages saying “his dead father would be ashamed of him”! © EyePAT Community Interest Company www.eyepat.org 18 Version 4.0 2014 info@eyepat.org Using the Internet Safely There is nothing positive about trolling, however those that do it can have emotional or mental health problems. Grooming Is the one threat most parents are aware of. When it happens it can have devastating and far reaching effects and there is no doubt that the internet (especially Social Networking) has become an extremely useful tool for paedophiles to contact children. There is a lot of information in this guide on this subject. It is well to remember though that by far the vast majority of grooming takes place face to face rather than over the internet. Violent Gaming Gaming on the internet is brilliant, both for children and adults. The games can stretch and develop a child’s mind in many ways. However this can be bad as well as good. This is why games, like films have an age rating. Please don’t ignore these ratings. Violent online gaming is changing the behaviours and brain mapping of young people. Identity theft How many people display their date of birth on social networking sites? What is the first question, and sometimes the only one, you are normally asked to establish your identity? Identities can be stolen in many ways. As an adult you may not release private information easily, however are your children as aware? You can now be identified by face recognition software and from this there are very clever people who can access information you have entered on line. See our advice on Passwords on Page 162. Mobiles (Smartphones) and Tablets Are the norm, they now have internet access (with all the associated dangers), cameras and many apps. Most people have had photographs taken of them on mobiles which they don’t like. These images can now be passed around hundreds or thousands of people in a matter of seconds. The internet is here to stay and if you learn how to use it safely and teach your children the same thing, it is an amazing tool. Technology is not bad, it is the way it is used which can be bad. It is our future and we need to encourage people to use it. We just need to make sure we use it safely. In the same way as you need to learn to swim, ride a bike or drive safely you need to learn to use the internet safely. © EyePAT Community Interest Company Version 4.0 2014 19 www.eyepat.org info@eyepat.org Using the Internet Safely How can the internet affect your children? The following is a must read for anyone with children under the age of 16 and advisable for anyone with young people under the age of 25. It explains how our online behaviours can change our real world behaviour and how it can even change our brain development. You may need to read it 2 or 3 times to totally understand it, but please do so. It is most definitely worth it. This extract is taken from the Bryon Review – Children and New Technology by Dr. Tanya Byron, Consultant Clinical Psychologist – March 2008. To see the full report go to http://www.dcsf.gov.uk/byronreview/ It in turn is sourced from “Brain development in Childhood: A literature review and synthesis for the Byron Review on the impact of new technologies on children, by Mark H Johnson, MRC Scientific Team Leader, Profession of Psychology, Birkbeck, University of London. Director: Centre for Brain and Cognitive Development.” Brain development takes place throughout childhood, developing ‘neural networks’ connecting different parts of the brain together as it grows and a significant change in the amount of technology used during childhood, could potentially have a big impact on how the structure and function of the brain develops. A major concern relating to video game playing is whether children learn anti-social or violent behaviour from the games they play. How much could children learn from inappropriate content or behaviour online or in video games? This could be positive (learning how to care for animals from playing a zoo-keeping video game) or negative (learning how to victimise someone from playing a war game) and depends also on the context of the experience (e.g. playing violent games within a household where violence is the norm). Children’s expectations about the world may be changed by what they see or experience online or in games The implication is that if a child has had frequent experiences of playing a game, it is possible that the brain will set up an ‘expectancy’ to act in the real world in the same way that they act in their virtual world. However, whether this then generalises to their real world behaviour is unknown. One of the systems they use to make sense of other people’s actions is the “mirror neurone system”. One of the earliest findings from research into mirror neurones is that they are only activated when a human hand (versus a mechanical hand) grasps an object (Tai et al, 2004). When we think about how children might learn from what they see in a game or on the internet we need to consider whether the ‘agent’ (person or cartoon) on the screen is perceived as ‘human’ by the brain. As graphics become more real-life it is possible that these forms of learning, previously activated only by the real world, will be activated. The implication is that media that requires active responses (rather than simply passively viewing) is likely to have a more profound influence on the children’s development. This could be beneficial (hand-eye coordination skills) or negative (learning to use violence) – again, other factors such as the age and social context of the children would be important determining factors here. One of the key ways children learn about emotions, feelings and moral transgressions is by discussing feelings, emotions and behaviour (usually in the family context). It could have a detrimental impact if these discussions do not take place and are replaced by excessive exposure to potentially inappropriate material that is not then discussed. The nature of the experience during a video game might be very important in determining children’s subsequent behaviour; although quite what the long-term impact of this might be, or what other factors in the child’s individual make-up or experience modulate this learning mechanism, is unclear and needs to be considered. © EyePAT Community Interest Company Version 4.0 2014 20 www.eyepat.org info@eyepat.org Using the Internet Safely However, it does appear that violent content may lead to sustained learning about violent behaviour in children where violence is the norm (the game playing reinforcing and validating real world experiences). More research is needed to clarify this so that we can identify which children are more vulnerable. Other concerns about the role of harmful or inappropriate material in technology is how children use online or virtual information or experiences to develop a sense of self – the inner working model of ourselves which drives how we think and feel about ourselves and in turn affects how we behave (e.g. emotional regulation, impulse control, self monitoring). There is clear evidence of harm within the virtual world when vulnerable children with a poor sense of self and low self esteem are ‘seduced’ and flattered by others who represent themselves falsely within the virtual world (e.g. online predators pretending to be children) (CEOP, 2007). There are examples where the very vulnerable may access information and even persuasion by others which may encourage them or even lead them to harm themselves (suicide websites; pro-anorexia sites etc.). The online space can provide a supportive environment and de-stigmatise the discussion of mental health or emotional difficulties and enable those in distress to find sources of advice and support. However, what is clear is that there exists a significant probability of risk for some individuals with mental health and other vulnerabilities who engage with such material online. How does a child’s brain work Thinking about children’s age and stage of development is a useful way of establishing general guidance on how to support children’s internet and video game experiences. Children’s rate and profiles of growth vary enormously between each other so while it is possible make broad statements, there will always be variations with individuals. One potentially very important set of robust findings relates to the development of the front part of the brain – the ‘frontal cortex’ – the ‘intelligent’ part of the human brain. This is the part of the brain that enables us to plan and organise, to have conscious strategic control over our thoughts, feelings and behaviour and to choose between good and bad, fantasy and reality. It also plays a key role in enabling us to override, suppress or inhibit behaviours, such as unacceptable social responses. The frontal cortex develops throughout childhood and into early adulthood and therefore children with immature and developing frontal cortex structure and functioning are less efficient at reasoning because they have yet to develop their critical evaluation skills (how to judge information based on context), are worse at inhibiting irrelevant information and also do not regulate their social behaviours well. Moreover, there is recent evidence that adolescence (post puberty) is a time of enormous growth and development of the frontal lobes. One very important way to think about how to support children with the management of ‘harmful’ or ‘inappropriate’ material online and in video games is to look at the © EyePAT Community Interest Company Version 4.0 2014 21 www.eyepat.org info@eyepat.org Using the Internet Safely development of their frontal cortex. This is because the functioning of frontal lobes enables us to make sense of the world and make judgments about our behaviour and the behaviour of others, as well as differentiating between reality and fantasy. So when we think about ways of making children safer online and in their gaming – whether that’s through industry making the environments safer or parents being supported to use the tools available to them – it is as if we are stepping in to provide the necessary frontal cortex functions that enable children and young people to manage risks at different ages and stages of development. This approach acknowledges that children at different ages and developmental stages have varying abilities in making sophisticated judgments about information such as the credibility of a source or whether something is morally or socially appropriate. These systems are not in place in the brain during early childhood and develop over time into early adulthood. Just as we perform these functions for our children in the nondigital world, such as when helping them cross the road, we need to do this when they use the internet and play video games. What to do at what age? Pre-school is a time when children are still very much focused on the family and the home. Key to children’s development at this time is forming relationships with key adults. These children are more vulnerable to content e.g. violent, frightening, sexual or highly emotional as their ability to differentiate between reality and fantasy is very limited. It is imperative that their access to the online world and video games is robustly monitored and supervised. Their “technological diet” needs to be restricted, in terms of what they should access, watch, play, when, and for how long. 5-11 years - during this time children start school and begin to make bigger shifts in how they relate to others outside the family there frontal cortex is developing. They are learning what is right and wrong, learning about social rules and norms, sorting out reality from fantasy. They are still immature at self-regulation, and their ability to inhibit and control impulses and emotions is still well below that observed in adults. This is the time when children begin exploring websites beyond the boundaries originally set for them by their parents and also when they start playing a wider range of video games. Critical evaluation and self regulation skills are still relatively poor due to their underdeveloped frontal cortex, therefore adults need to provide support with these functions for the child – allowing them to explore but at the same time regulating, managing and restricting. Management of their media diet should start to change, moving from heavy control to management by supervision and increasing discussion about online and gaming behaviour. This enables the child to develop their own critical evaluation and self management skills as well as being supported when they cannot or, as in the case of the older children in this age band, choose not to. 11-14 years - The onset of puberty marks the beginning of a time during childhood which is characterized by lots of brain and behavioural change. Adolescence is often an unstable and emotional time when young people become vulnerable to the challenges presented by the hormonal, physical and mental changes taking place. During this time there is a significant drive for social interaction. The focus of the child’s social world changes from the home and family to the external world, to peers and idols. This may involve taking risks. Peer communication becomes a central part of adolescent behaviour due to this drive for social interaction as young people attempt to find their own sense of who they are in relation to others. There is some evidence that social networking sites © EyePAT Community Interest Company Version 4.0 2014 22 www.eyepat.org info@eyepat.org Using the Internet Safely offer teenagers a place to test various adolescent behaviours or to take ‘safe’ risks (Livingstone, 2008). Along with these changes comes an increased vulnerability to mental health problems and susceptibility to poor self-esteem. Young people at this age may become more vulnerable to messages about social acceptance including issues relating to body image – this is a time with a significant increase in problems such as eating disorders, low selfesteem or depression. There is an inherent drive at this age to seek out social experiences, access to age restricted material and experiences such as video games which are designed for adults These are more likely to be sought in the digital world as we restrict children’s and young people’s access to the outdoor, offline socialisation. There are biological drives and underpinnings to these changes in behaviour and we need to respect and allow those while, at the same time, putting in place protections for their vulnerabilities. In terms of adult input with the young person and technology, this is a time to move towards collaborative management. Young people may evade and rebel if parents are heavy handed at this stage. The aim is to protect them from some content or experiences whilst empowering them by discussing risk. 15-18 years old - This period is the last stage of what we consider ‘childhood’, when young people may still be the responsibility of their parents, but are also viewed as young adults. During this time, young people want to be seen as individuals and explore roles and identities with a degree of autonomy and are often able to do this independently. They can initiate and carry out tasks without supervision and can see themselves from the viewpoint of others. By this stage their brain functioning is extremely close to that of an adult and so they can master abstract thinking and develop theories to explain and make sense of things. There are no longer the inherent restrictions of brain development that lead to difficulties with evaluating information or making judgments. Indeed, young people at this stage are beginning to develop their own set of values and beliefs (which may be different from their parents). Effective online management at this stage will involve providing opportunities for them to explore and try different roles and identities while offering non-judgmental support in the form of talking, discussing and supporting. At this stage young people need to begin to make decisions for themselves and test things out while still having relationships in place with e.g. parents, family members or friends to support them if opportunities turn out to be too challenging. Interestingly, much of the innovation and development of the new technologies and games is done by people of this age. Conclusion When we teach our children to cross the road safely we do it in stages. 1. We hold their hand when they cross the road. 2. We teach them to think, look both ways and then cross. 3. When we see that they are starting to understand this we let them cross, walking beside us, without holding on to them. 4. Eventually we let them do it alone, maybe watching from a distance at first, but then unsupervised. And throughout this, the environment supports them with signs and expected behaviour from others in the community – the green man, zebra crossings, speed limits and other responsible adults. Going online and playing video games may be more complex and © EyePAT Community Interest Company Version 4.0 2014 23 www.eyepat.org info@eyepat.org Using the Internet Safely diverse than crossing the road, but it illustrates that we should change the nature of our approach and interventions End of extract from - Children and New Technology by Dr. Tanya Byron, Consultant Clinical Psychologist – March 2008. To see the full report go to http://www.dcsf.gov.uk/byronreview/ Internet Addiction Many thanks to Yoursphere.com for providing this information “Addiction to the Internet shares some of the negative aspects of substance addiction and has been shown to lead to consequences such as failing school, family, and relationship problems.” Go to www.eyepar.org/research to see the full study. We live in a much more connected world today than we did even five years ago. Today’s Smartphones are more powerful than computers were a decade ago. We’re constantly connected with each other, tweeting, posting, updating statuses and uploading photos, and we see the addiction to this social media everywhere. For children, however, they quickly get sucked into the idea that their online friends need to know what they’re doing or thinking at all times, and that this information is actually important. Social media is a participatory media where a site’s members create the content and/or push traffic to the site versus just consuming the content that’s put before them. Today’s popular social media sites aren’t only participatory, though, they actually put a heavy emphasis on features that promote instant gratification: Likes, thumbs up, +1’s, retweets and comments are all examples of this. Engaging in this behaviour almost becomes automatic for children and teens as they whip out their Smartphones every few minutes just to see if anyone has liked or commented on whatever they posted. Studies have shown that social media sites such as Facebook and Twitter can be more addictive than cigarettes and alcohol. A team from the University of Chicago’s Booth School of Business recently conducted a survey of 250 people which found that “the urges to keep on top of social networks and work were the hardest to resist” and “In contrast alcohol and tobacco prompted much lower levels of desire despite their reputation for being addictive.” Wilhelm Hofmann, the leader of the team, suggests people may fail to resist social media so much because there is no obvious or immediate downside to checking services like © EyePAT Community Interest Company Version 4.0 2014 24 www.eyepat.org info@eyepat.org Using the Internet Safely Twitter or Facebook. He does warn that these services can ultimately be a huge drain on users’ time, however. The big downside to today’s popular social networking sites is that they encourage children to engage in repetitive, unoriginal activity in exchange for rewards such as Likes and comments. The activity doesn’t stimulate them; it instead feeds into an attentionseeking state of mind. To help minimize the chances of Internet addiction affecting your children, we recommend: 1. Keeping laptops/computers in the family room and away from the bedroom, especially at night. Not only will this set the boundaries for when and where it’s OK to use the computer, it allows you to monitor and regulate the amount of time your child spends online. 2. Making time for outdoor activities. Establishing a healthy balance of online time with outdoor time is a great way to minimize Internet addiction. Being outdoors with family and friends reminds children that there’s more to life than status updates and tweets. 3. Computer monitoring is a parental responsibility. Some people call it helicopter parenting, others call it spying, but the bottom line is parental monitoring software helps ensure that your child is having a safe and positive experience online. © EyePAT Community Interest Company Version 4.0 2014 25 www.eyepat.org info@eyepat.org Using the Internet Safely Inappropriate Sites Much is written about porn sites and the very real effects they have on young people. Porn Addiction is now a recognised addiction. On-line porn has become far more extreme in the 5 years since we started raising awareness of it. Parents and carers need to visit these sites in order to understand exactly what their children are viewing and how this can impact on their sexual attitudes and expectations. It will not be a pleasant experience as very little of it can now be considered erotic. To sum it up, it makes 50 Shades of Grey look like Disney. Porn Sites Very few adults actually realise the level of depravity of online porn accessible without restriction to any age group. These sites include various genre’s including “Mother & Daughter”, “Anal When She is Drunk”, “Outstanding Teen Sex Skills”. Sites regularly visited by young people include PornHub, JuggWorld. Viewing Inappropriate Images on Mobiles Young people can and do access content from the internet and TV wherever they are, and without parental or teacher supervision. Young people use them at school to view pornography and other inappropriate sites. Parents fear porn on children's mobiles Daily Telegraph - 10th October 2012 More than two-fifths of parents are worried that their children can access unsuitable content online on their mobile phones, research has found. 95 per cent of 11-13 year olds have a mobile phone, according to new research According to a new survey, more than half of all children get their first mobile phone before the age of 11 but almost a third of parents are unaware of online safety tools that can prevent their children from seeing inappropriate content, such as pornography, gambling or other adult material. Though mobile networks do automatically block access to adult content via their own networks, the Wi-Fi capabilities on modern smartphones mean that children often do have access to inappropriate material. Forty-two per cent of parents said they were concerned about their children's access to unsuitable material, according to a survey for Phones4U. One in eight said they felt they had no control over what their child accesses online on their phone, while only one in 16 parents had the same concern about their child's computer access. © EyePAT Community Interest Company Version 4.0 2014 26 www.eyepat.org info@eyepat.org Using the Internet Safely The research comes just weeks after a senior board member of the UK Council for Child internet Safety [UKCCIS] warned that social networks "cannot be trusted to protect children online". John Carr called for closer regulation of online brands by external organisations such as Ofcom of in the wake of "scandals" such as the exposé of sexualised content on children's social network Habbo Hotel. Suicide Sites Young people leading up to or going through puberty can have violent mood swings. It can be a time when they contemplate suicide for a variety of reasons. The most common reason young people take their lives is as a result of being bullied. Bullying affects nearly half of all school children. Unfortunately the internet can be used to investigate suicide methods. This is an example of a site young people can easily find. Eating Disorder Sites There are many sites out there to encourage anorexia and bulimia. There are also sites to support people who are victims of eating disorders. It has flourished on the Internet, mainly through tight-knit support groups centred around web forums and, more recently, social network services such as Tumblr, Xanga, LiveJournal, Facebook and Myspace These groups are typically small, vulnerable, partly hidden and characterized by frequent migrations. They also have an overwhelmingly female readership and are frequently the only means of support available to socially isolated anorexics © EyePAT Community Interest Company Version 4.0 2014 27 www.eyepat.org info@eyepat.org Using the Internet Safely Members of such support groups may: Endorse anorexia and/or bulimia as desirable (84% and 64% respectively in a 2010 survey Share crash dieting techniques Coach each other on using socially acceptable pretexts for refusing food, such as veganism Compete with each other at losing weight, or fast together in displays of solidarity. Commiserate with one another after breaking fast or binging. Advise on how to best induce vomiting, and on using laxatives and emetics. Give tips on hiding weight loss from parents and doctors Share information on reducing the side-effects of anorexia Post their weight, body measurements, details of their dietary regimen or pictures of themselves to solicit acceptance and affirmation Suggest ways to ignore or suppress hunger pangs These sites can also be called thinspiration sites. Sites include: http://perfectioninana.webs.com/tipsandtricks.htm http://www.myproana.com/index.php/blog/946-skinnywarriors/ Drug Sites The internet is an information tool and it contains lots of information of how Not to Do Drugs as well as information and blogs from people who have tried and liked drugs. Two sites you may want to check out are: http://www.talktofrank.com http://www.interdope.com/amazing.htm Terrorist Sites These are readily available with little research. I found Wikipedia gave me a good starting point, by listing all the terrorist organisations on the US State list with links to their websites. Very good for those wishing to find out more and research other religions and cultures. An easy stepping stone for those who wish to find out more about specific groups. Snuff Movies A snuff film is a motion picture genre that depicts the actual murder of a person or people, without the aid of special effects, for the express purpose of distribution and entertainment or financial exploitation. These films are illegal as are Child Abuse images, but there are available on the internet and can be shared on peer to peer networks. © EyePAT Community Interest Company Version 4.0 2014 28 www.eyepat.org info@eyepat.org Using the Internet Safely Blogging As with all internet activities there is nothing wrong with blogging as long as it is done safely and without causing harm or distress to others. These are 2 of the most popular blogging apps. Tumblr is especially popular with young people and is used as a form of social networking. Tumblr In contrast to other blogging platforms like WordPress, Typepad or Blogger, Tumblr is a streamlined blogging platform that adds creating and sharing (“re-blogging”) photo, video and audio blog posts. Of course, users can post traditional blog articles, but what attracts the younger crowd is the ability to create somewhat of a collage of photos, videos and quotes that represent their individuality. As with Facebook both adults and children can join the Tumblr community WordPress WordPress is a free and open source blogging tool and a content management system (CMS) based on PHP and MySQL, which runs on a web hosting service. Features include a plug-in architecture and a template system. WordPress is used by more than 18.9% of the top 10 million websites as of August 2013. WordPress is the most popular blogging system in use on the Web, at more than 60 million websites. It was first released on May 27, 2003. As of February 3, 2014, version 3.8 had been downloaded more than 16 million times. © EyePAT Community Interest Company Version 4.0 2014 29 www.eyepat.org info@eyepat.org Using the Internet Safely Apps A mobile app, short for mobile application or just app, is application software designed to run on smartphones, tablet computers and other mobile devices. There are thousands and thousands of them, some of which are excellent and some not so. Some apps are free, but the majority have to be bought. Do beware of the ones which have ongoing costs through buying things for a few pence here and there. These can add up and become expensive. Also beware if you have a Kindle Fire. Once your card details are logged with Amazon on the device, you can continue to download anything without further recourse to the card. Useful if used properly, can be very expensive if abused by children and young people. StaySafe http://www.staysafeapp.com/ StaySafe Personal safety tracker app is your personal guardian. The app notifies your emergency contacts by email or text message if you don't check-in safely after working, socialising or travelling alone, providing your exact GPS location so that help can find you quickly. The mobile app contains location based tracking, and has a timer which counts down from the time you have stated that you will be alone, say 20 minutes. The location tracking updates in real-time as you change location, so if you are walking or getting into a taxi alone it will track your route. The app automatically triggers an SMS text or email to be sent instantly to your emergency contacts, containing details of your location. StaySafe Business provides personal protection for lone working employees. Our smartphone app tracks location in real-time enabling lone workers to check-in safely after working. The online Hub receives alerts and provides detailed location mapping for employers. For SME’s and large organisations. Staysafe has been recommended to us by parents who have used it to keep a track on their children. Parental Controls is an application that provides parents and guardians simple options to restrict access to specific BlackBerry functions, features and applications such as the Browser and Text Messaging. You can track your child's movements online with this app from Spare Backup Inc. Website account required. UK users: www.mycellguardian.co.uk © EyePAT Community Interest Company Version 4.0 2014 30 www.eyepat.org info@eyepat.org Using the Internet Safely Mobiflock My Life is a free smart device protection service, or upgrade to Mobiflock My Child for parental control services (30 day free trial!) and protect your kids from online threats such as cyberbullying, accessing inappropriate content, sexual harassment & sexting. Mobiflock My Life (free!) Remotely locate and lock a missing device Remotely delete device information Block unwanted contacts. Midon7, proactive safety. After your 15 days trial your app will reverse to Midon7 FREE version. The family safety tracking app for mobile can monitor your children’s whereabouts and cell phone activities to keep them safe. A few which have been recommended by Anne Shooter and David Thomas for very young children include. My First Numberjacks Cost £1.49 A Charlie Brown Christmas Cost from £1.99 Thomas & Friends: Engine Activity Fun Cost: Free Drawing Together Cost: £1.49 DipDap Cost: £1.99 © EyePAT Community Interest Company Version 4.0 2014 31 www.eyepat.org info@eyepat.org Using the Internet Safely Adventure Time Super Jumping Finn Cost: £1.49 Others include BBC i-player Cost: Free ITV Player Cost: Free - but still makes you watch the adverts! The VoiceUK Cost: Free © EyePAT Community Interest Company Version 4.0 2014 32 www.eyepat.org info@eyepat.org Using the Internet Safely Social Networking A social networking site is an online forum where people can chat online (talk by broadcasting messages to people on the same forum in real time) and now increasingly chat by video link using webcams (Facebook for example). Sometimes these venues are moderated by having people patrol the venue, watching for disruptive or otherwise undesirable behaviour. The sites are varied and are used by children, young people and adults. Some have a very adult theme and should not be used by children. It is quite alarming how much personal information both children and adults will record on their sites and share out with people. Many give away their date of birth, their e-mail address, their phone number and even their address. Unfortunately many children will put photographs up thinking they ‘look cool’, when in fact these photographs are a paedophile’s dream. To have a site on for example Facebook you should be 13. However no checks take place and, clearly this age limit does not work. Most social networking sites operate a friends or buddy list where other members ask to be your ‘friend’ and the number of ‘friends’ you have are listed. Unfortunately with many children, quantity is more important than quality and some children gauge their popularity by the number of friends they have, irrespective of who these ‘friends’ are. Hoax sites are also common. This is where a site is set up by one person or a group of people, pretending to be someone else. This occurs with celebrities (always check celebrity official web pages for links cyberbullies where fake sites can be set up in either a child or a teacher’s name paedophile who then ‘makes friends’ with other pupils in order to see their personal information. Picture Messaging Snapchat and Instagram are the current favourites with young people. Many are leaving Facebook as they are starting to relate to it as a site their parents use! They take an image and can then edit it either by adding text or ink drawings onto the image and then forward it on to people on their list. Instagram allows people to take pictures and videos, apply digital filters to them and share them on a variety of social networking sites such as Facebook, Twitter, Tumblr and Flickr. They can also record and share videos lasting up to 15 seconds. Instant messaging Examples include: KIKMessenger, WhatsApp Messenger, FacebookMessenger, MessengerWithYou, BBM (Blackberry Messenger) Instant messenger is one of the most popular ways of chatting for young people. Often known as IM, this involves two or more people being online at the same time, and is different from chat rooms, because the people involved can only chat to people who are on their contact list. Young people often feel that they can talk more intimately in this environment, and often use their own text style language to do so. Instant messaging is now available through Facebook, but is not currently available through many of the sites for younger children. However this is changing and you do need to check out each individual site your child goes on. © EyePAT Community Interest Company Version 4.0 2014 33 www.eyepat.org info@eyepat.org Using the Internet Safely Some sites such as Club Penguin and Moshi Monsters use a system of postcards where messages can be left. See Page 35. Chat Rooms Chat Rooms are for a group of people to chat online. They do not need to be friends, they just enter the chat room site and start talking. More often than not, you have no idea who you are actually talking to as most people use pen names rather than their real identity. Chat rooms are usually areas where people meet to chat as they would in the real world in a youth club or bar. Young people love them because they are often unrestricted and they can be exciting places to meet old and new friends. Although chatting online can be great fun, young people can sometimes find themselves in situations where they can feel out of their depth. Video Messaging This is where you chat using the webcams to talk on camera rather than typing. On some of the sites you chat with “Friends” you have chosen, Facetime, Google Chat, Facebook, Skype, however on others Chatroulette, Pinkroulette, Tinychat and Stickam, you can randomly chat to anyone on line. Discussion groups They are similar to chat rooms, but do not take place in real time, you post messages and then wait for responses. They are often used by groups of like minded people to swap ideas and thoughts. Many professional people use these to share information or get answers. © EyePAT Community Interest Company Version 4.0 2014 34 www.eyepat.org info@eyepat.org Using the Internet Safely Messaging Far cheaper than texting. They have to be used on a mobile phone or tablet. Be aware however that all of these messaging systems can leave the young person open to cyber bullying and grooming. KikMessenger is extremely popular and is one which protects the users privacy by using usernames, not phone numbers. This does protect children, but it can also create a shield to protect people who bully! Top 15 Social Networking Sites 1 | Facebook 800,000,000 - Estimated Unique Monthly Visitors 2 | Twitter 250,000,000 - Estimated Unique Monthly Visitors 3 | LinkedIn 200,000,000 - Estimated Unique Monthly Visitors 4 | Google Plus+ 150,000,000 - Estimated Unique Monthly Visitors 5 | Pinterest 140,500,000 - Estimated Unique Monthly Visitors 6 | Tumblr 110,000,000 - Estimated Unique Monthly Visitors 7 | Flickr 67,000,000 - Estimated Unique Monthly Visitors 8 | VK 65,400,000 - Estimated Unique Monthly Visitors © EyePAT Community Interest Company Version 4.0 2014 35 www.eyepat.org info@eyepat.org Using the Internet Safely 9 | Instagram 50,000,000 - Estimated Unique Monthly Visitors 10 | MySpace 26,500,000 - Estimated Unique Monthly Visitors 11 | Tagged 20,500,000 - Estimated Unique Monthly Visitors 12 | Meetup 17,500,000 - Estimated Unique Monthly Visitors 13 | Ning 13,000,000 - Estimated Unique Monthly Visitors 14 | MeetMe 10,500,000 - Estimated Unique Monthly Visitors 15 | ClassMates 10,000,000 - Estimated Unique Monthly Visitors Other Apps/Social Networks used by Young People WhatsApp Messenger WhatsApp Messenger is a smartphone messenger available for Android, BlackBerry, iPhone, Windows Phone and Nokia phones. WhatsApp uses your 3G or WiFi (when available) to message with friends and family. With WhatsApp you can send and receive messages, pictures, audio notes, and video messages. First year FREE! ($0.99/year after) © EyePAT Community Interest Company Version 4.0 2014 36 www.eyepat.org info@eyepat.org Using the Internet Safely KikMessenger KikMessenger has 19 million users! It's the fast, simple, and personal smartphone messenger that connects you to everyone Kik say they are hands-down the fastest, most reliable smartphone messenger available. And with sent, delivered, read, and typing notifications, your conversations will come to life. You can send messages, pictures, videos, sketches and more. Your Kik username - not your phone number - is your Kik Identity, so they say you can keep complete control of your privacy. KikMessenger can connect with other social apps like Instagram, SocialCam, and Viddy. Messenger WithYou Allows unlimited chatting with all your Messenger Contacts. The app is FREE and there is no charge for sending & receiving messages! Key features include: Chat with Windows Live Messenger (MSN) and Yahoo Messenger contacts Chat with contacts whether they are connected on mobile, Tablet, PC or even Xbox Bump You Bump two phones together to share photos, contacts, and apps! You can Bump photos from your phone to your computer! go to http://bump on your computer web browser. Ping Ping! is a instant messaging client for the iPhone that looks and feels like the built in iPhone SMS client. It aims to provide free iPhone to iPhone (and iPod touch on wifi) messaging. Once you’ve download the (currently free) app and selected a username, you can invite/find friends and family you know own an iPhone or iPod touch, and you’re ready to go. Once you’ve started a conversation, the application works just like the SMS client except it’s free, instant and works internationally at no extra cost (aside from your international roaming costs that is). © EyePAT Community Interest Company Version 4.0 2014 37 www.eyepat.org info@eyepat.org Using the Internet Safely Touch You can message your friends through chats and, share photos. It works on Blackberry, i-Phone and Android. has b BBM You share your pin or unique barcode to connect with friends. You can chat, share stories, pictures, videos and more with individual contacts or groups of friends instantly. Even share app experiences with BBM-connected apps These are some of the apps which are available with BBM. I found these by searching for Parental Controls under BBM. Snapchat Software which deletes images after 10 seconds. It has become one of the most popular forms of social communication amongst young people. Whilst it can be used to send any picture, it can be used for Sexting and for bullying. Research conducted in the UK has shown that, as of June 2013, half of all 18 to 30-year-old respondents (47 percent) have received nude pictures, while 67 percent had received images of "inappropriate poses or gestures. Media Group Ltd. Retrieved 21 July 2013. Snapchat's blog responded to the speculation regarding the retrieval of its app's images: If you’ve ever tried to recover lost data after accidentally deleting a drive or maybe watched an episode of CSI, you might know that with the right forensic tools, it’s sometimes possible to retrieve data after it has been deleted. So… you know… keep that in mind before putting any state secrets in your selfies :) Since Snapchat was launched to automatically delete images, new Apps have been created to capture the Snapchat images before they are deleted, such as SnapWebChat or Snap Save. There are even websites which purport to display leaked Snapchat images. One is called http://snapchatleaked.com/. One thing is clear - if you send any image on Snapchat never assume it cannot be saved or passed on. © EyePAT Community Interest Company Version 4.0 2014 38 www.eyepat.org info@eyepat.org Using the Internet Safely Snapchat runs on tablets and mobiles. Snapchat is an app that allows users to take a photo and share it with someone for up to 10 seconds. When the allotted time is up, the photo is permanently deleted. If the recipient tries to take a screenshot of the photo, the sender is notified. Faceparty Not to be confused with Facebook, Faceparty is open to members aged 16 and above. It is definitely aimed more at the adult market, rather than younger people. This site should be added to the blocked list on your Parental Control software if you have children. Friendster An online community with more than 90 million members worldwide, Friendster uses friend networks to locate and stay in touch with old friends and connect with new people. Users, who are a minimum of 16 years old, create basic online profiles featuring name, gender, age, relationship status, zodiac sign, location, hometown, and “member-since” date. Profiles are personalized with photographs, school information, occupation, hobbies and interests, employers, favourite books, movies, music, television shows, and an “about me” and “who I want to meet” section. Search boxes allow users to locate friends by name, school, hometown, keywords, age range, gender, and affiliations; friends are approved by the individual, as well as © EyePAT Community Interest Company Version 4.0 2014 39 www.eyepat.org info@eyepat.org Using the Internet Safely personal testimonials featured on the profile. Within Friendster, users can create blogs, e-mail other members and join interest groups. MSN Messenger MSN Messenger is a popular site with preteens and young teens. It was originally set up as a messaging service for university and college students (as Facebook was) but is now widely used by a much younger audience. You can chat in real time, use the webcam and share pictures. © EyePAT Community Interest Company Version 4.0 2014 40 www.eyepat.org info@eyepat.org Using the Internet Safely Video Messaging With all these applications you chat with a video link. This of course can be brilliant when talking to family or real friends, but opens up a whole load of possibilities when talking to people you may not know so well. Parents who give their children smartphones and tablets need to be aware of this. There are a number of other Video Calling packages out there but these are just a few of them. Facetime (Apple) You can make video calls to iPad 2, iPhone 4, the new iPod touch, or another Mac. from your Mac. You don’t need to set up special accounts or screen names. All you do is find the entry in your contacts and tap the FaceTime button. When you are talking to the person you can tap the FaceTime button any time you like on the screen. The person at the other end has to accept the invitation before the video call commences. Google Chat This is Google’s alternative to Facetime. If your friend doesn't have a camera next to their name in your chat list, you can invite them to download the voice and video chat plug-in from the Video & more menu in a chat window. Even if your friend doesn't have a video camera, you can still have a voice chat or a 1-way video chat. Facebook You can now make Video calls via Facebook and chat to any of your friends who are online. You will need a webcam. Most laptops have them inbuilt and the modern ones have amazing clarity. If you are using a PC you will need to buy a webcam if you do not already have one. Although you will be able to hear someone through your device speakers you will need a microphone so they can hear you. Most laptops have them inbuilt, however if you don’t have one you need to buy a headset. You will need to install the “plug in” to start the process, however this is very simple to do. Facebook uses the Skype technology to do this. This means that if you have children you need to be aware they could be doing this. Open your Facebook account © EyePAT Community Interest Company Version 4.0 2014 41 www.eyepat.org info@eyepat.org Using the Internet Safely Go to Chat and click on the Camera symbol (see below). Your PC or laptop will take you through the process to install it. If this box comes up select allow. It will keep coping up each time you make or received a call unless you select Do not show me the warning for this program again. The receiver will hear a ringing sound and will be prompted to answer the call. You will see this. Likewise if you hear a ring tone you will be prompted to answer the call. Note: Make sure you have a headset attached and set up so you can hear and speak to the person. © EyePAT Community Interest Company Version 4.0 2014 42 www.eyepat.org info@eyepat.org Using the Internet Safely Skype Skype has 600 million users. It was bought by Microsoft in May 2011 for £5bn. Microsoft is paying a big price for the right to embed Skype in its other consumer platforms such as 'Windows', 'Microsoft Office' software, email service 'Hotmail', and the search engine 'Bing' It is a free program which enables you to speak to another Skype user over the internet, anywhere in the world and at any time, for nothing. Skype to Skype users can also make video calls and use instant messaging for nothing. You can also use Skype to make ordinary phone calls to landlines or mobiles but there is a charge. Depending on your package, these calls can still be much cheaper than others offered on the open market. You will need speakers and a microphone to use it, and if you want people to see you, a web cam. To get the Skype program, just type in Skype in your search engine or type in www.skype.com in the address bar of your browser and press the enter key. This will take you to Skype’s home page. Follow the instructions. Chatroulette.com and Pinkroutlette.com Like the other sites these involve the use of web cams and online written chat. Unlike the others you are linking with total strangers and you are not given the option to accept or request each interaction. © EyePAT Community Interest Company Version 4.0 2014 43 www.eyepat.org info@eyepat.org Using the Internet Safely They are basically communication sites with no rules and no control. You have to have a web cam and this has to be enabled to use them. You log in and dial, you are connected with anyone at random and you can keep clicking on next until you find someone you want to talk to. Unfortunately many children go on these sites and some repeatedly. There are no controls, they are not suitable for children, and it is used by many perverts who like to be watched, often by the children. These sites should be added to the blocked list on your Parental Control software if you have children. Tinychat.com This is advertised via Facebook. It’s aimed at teens and its instant live chat with cameras and is totally uncontrolled. There are a lot of kids on there, but there are also a lot of older people or perhaps you might call them perverts! This site should be added to the blocked list on your Parental Control software if you have children. Stickam http://www.stickam.com/ Launched in 2005, Stickam claim to be the pioneer of the live interactive web broadcasting space and have the largest live community online. Anyone with a camera and an internet connection can instantly broadcast LIVE to the world from a computer or mobile device. Whether you want to videochat live with friends or broadcast a show live to thousands of fans, Stickam provides the tools -- and the audience. © EyePAT Community Interest Company Version 4.0 2014 44 www.eyepat.org info@eyepat.org Using the Internet Safely STICKAM FEATURES: Broadcast your live video feed to the world Add your Stickam player to your website, blog, or Facebook page HD streaming supported Multiple guest camera support Mobile broadcasting and viewing support White label, fully customizable API, virtual “velvet roping” and pay-per-view options are available STICKAM BY THE NUMBERS: 9 Million Registered Users 6 Million Unique Monthly Visitors 3 Million Daily Page Views 3 Million Streams Viewed Daily Long Average Stay of 20 minutes -- Stickam is sticky! 20,000+ Views Per Hour For Shows Featured on the Stickam homepage – unlike a lot of live streaming sites, Stickam can bring an audience to you! Named the “Top Video Destination for Teens” by Nielsen. Safety - in their words Our goal is to offer the Stickam social networking community a service where friends and family can interact within the guidelines set forth in our Terms of Service. Although the Stickam service offers features for reporting and filtering content that violates our Terms of Service or is otherwise deemed inappropriate, there is no assurance you will not encounter such content while using Stickam. © EyePAT Community Interest Company Version 4.0 2014 45 www.eyepat.org info@eyepat.org Using the Internet Safely Geo-Social Apps - Hook Up Apps The new way to connect people! Geo-Social Apps use GPS technology to track the whereabouts of the people interacting on their site. With Geographical Positing System (GPS) when visiting a foreign city they will tell you where the landmarks etc. are, users can meet new people, and can get familiar with many unfamiliar things. Using the location-planning feature in some apps users can search and visit nearby stores and restaurants. You can rate as you visit the location, share opinion and post pictures for others. You do need to be aware however that their purpose is to link up with total strangers in your vicinity regardless of where you are in the world. Like all forms of social networking, when used responsibly they can enable you to meet new people, when used irresponsibly they can put you in all sorts of danger. Examples of these types of social networking apps include: Full Circle FullCircle is an app which brings people together based on their location in real time. It is a mobile portal which integrates location awareness with social networking, enabling mobile device users to identify and interact with other registered Full Circle members based on their physical proximity, interests and preferences - quickly, easily, and free. FullCircle has added the dimension of enabling users to easily create location aware groups or communities surrounding an interest be it social or business. From within these groups, members can identify other group members nearby, send a broadcast message to the group, and use mapping to observe group clusters. They claim to have strong privacy protections..They allow members to create their own "location based networks". Tango Cost: Free. A Canadian based social network. Uses video chat, has only one privacy setting, public or private. The app tracks the location of the user and gives them lists of other profiles in the locality. I have seen it being used to groom a young child. The matter has been reported to CEOP. The child in particular was approached by 2 men, one in his 30’s the other in his 50’s who went through all the classic grooming actions of sending her online flowers, making friends with her and then progressing the sexual imagery, sexual video calls throughout the night and threats that they would finder her kill her if she did not do what they said and told anyone. © EyePAT Community Interest Company Version 4.0 2014 46 www.eyepat.org info@eyepat.org Using the Internet Safely Pickloc Pickloc allows users to create virtual bulletin boards based on a current location. Future visitors to the location are then able to see the locationspecific board, as well as add their own notes. While Pickloc worked as intended to allow user interaction with the usercreated boards, there was something lacking that would otherwise make it even more social: Facebook integration. From version 1.4, Pickloc allowed you to share your posts and locs (bulletin boards) on your Facebook wall. While the core functionality is the same, now your Facebook friends will be able to easily see your Pickloc postings, even if they are not yet users of the app. WEKHO It is a social networking and geo-location based app for Apple devices that helps you find new people and places using local maps. WEKHO allows you to share and view photos, videos, audio notes, and other social networking stuff with the people around you. Visit any area in the city and make it yours! © EyePAT Community Interest Company Version 4.0 2014 47 www.eyepat.org info@eyepat.org Using the Internet Safely Anonymous social networking There has been an increase in the number of anonymous social networking sites. The issues regarding these sites are that by their very nature, they can be used to post nasty or malicious messages online. There is a specific problem within schools, where pupils are using these sites to bully their peers. Honesty Box Is an application within Facebook. It allows you to ask questions and it allows people to post anonymous comments about you. The fact that messages can by posted anonymously leaves it wide open to be used by people who wish to post nasty or bullying messages. Schools are increasingly reporting that this is one of the applications being used in bullying. Formspring Formspring (formerly formspring.me) is a question-andanswer-based social website, launched in November 2009. The site allows its users to set up a profile page, from which anyone can ask them questions. The questions and their given responses are then published on the user's profile page. The questions can be asked with a user's name hidden, or they can be visibly sent from another Formspring account, according to the asker's preference. Users can however choose to disallow anonymous questions, and have the ability to block selected people from asking further questions, even if the asker has remained anonymous. The site also allows users to link their accounts to many popular social networking and blogging websites, including Facebook, Twitter, and Blogger. On February 9, 2011, Formspring announced on its blog that it was approaching 22 million registered users. Little Gossip This site appears, gets closed down and then appears again. As at October 2013 it was up again. Its only purpose is to spread malicious anonymous gossip and there is nothing positive about it. © EyePAT Community Interest Company Version 4.0 2014 48 www.eyepat.org info@eyepat.org Using the Internet Safely Spillit The only purpose of spillit.me appears to be to put yourself up there for criticism, which begs the question, why are so many young people setting up accounts. It brings to mind the Oscar Wilde quote “There is only one thing in life worse than being talked about, and that is not being talked about”. By default the public search option is on and you can turn it off. These are the questions you can ask about yourself. The questions are all predetermined. Unfortunately they don’t seem to have the most obvious one “Why have I set up an account here - do I want to be bullied?”. So not to be deterred we used the option to create our own question You appear to have the choice as to how anonymous you want your bullies sorry contacts to be and can choose from these options. © EyePAT Community Interest Company Version 4.0 2014 49 www.eyepat.org info@eyepat.org Using the Internet Safely As the site is obviously aware that you are going to get a shed load of abuse they make you accept this disclaimer if you accept anything other than the high level so they cannot be held responsible. It does give you an opt out however: In case it is not obvious, our recommendation is that unless you would like to receive abuse don’t set up an account with Spillit. © EyePAT Community Interest Company Version 4.0 2014 50 www.eyepat.org info@eyepat.org Using the Internet Safely Social Networking - Privacy and Parental Settings Friends, Contacts or Strangers The key issue for protection from cyberbullying and grooming is who your friends are, who are contacts and acquaintances and who are strangers. There are many ways to define the differences but these may help. Friend Contact Stranger •Share private photos •Share secrets •Enjoy being with them •Meet or talk regularly •Talk freely about happy, funny or sad events in your life. •Someone you trust •Someone whose values you generally agree with or accept. •Know their name and what they look like but probably not much about their personal life •Talk primarily online •Don't spend face-to-face leisure time with them •Talk generally but not about personal matters •Perhaps someone in your school year, work or social activities who you don't 'hang out' with. •Someone whose values you are uncertain about. •Don't know outside social media •Never meet up with on purpose in real life •Know little or nothing about them •Perhaps friend of someone you know. •Someone whose values you don't know. Most systems have privacy controls to protect you from individuals outside your accepted friends list, however they work on the basis that you are willing to share all your information with those you accept as they are your friends. We need to get the message out that having many friends on say a Facebook page is not a popularity contest. Popularity is about having real friends, not contacts, acquaintances, strangers or hangers on. Business people using social media have lots of contacts because they want to use social media to promote their business. It is a form of marketing and in this situation its fine, as long as they treat their social media as a business tool. Individuals who want to use social media to publish personal information should just link with their real friends and family or they are leaving themselves open to abuse. If you would not leave the front door unlocked and allow total strangers to rifle through your home, your family albums, your private documents why would you allow them to do so on social media? In Facebook language a Friend is really a contact. Calling them friends can lull you into a false sense of security. Look at your list of ‘friends’. Would you really share all your personal information with these people if you met them face to face? © EyePAT Community Interest Company Version 4.0 2014 51 www.eyepat.org info@eyepat.org Using the Internet Safely If you have over a hundred “friends” on Facebook you can work on the basis that: 10% like you 80% dont care either way 10% don't like you Facebook has no safety provisions for those under 13 as they should not be on there. It treats under 18’s as minors and by default sets everything to “friends of friends”. This is some protection, but once they reach 18 these settings can be opened up. If however they have lied about their age to join when under 13, these could be opened up much earlier. Dictionary of Social Networking Terms: Posting - writing something into either your wall or a friend’s wall. Now called timeline. Chat - instant private chat which does not appear on the wall. You can chat to many people at the same time Account Settings - where you change your email address or password Privacy Settings - where you change what different people can see Friend - contacts whom you have accepted to see all your information 1. Facebook With Facebook there are 4 buttons to the right which provide access to: 1. Your name gives you access to your Profile which includes your timeline (posts) and your friends amongst other things 2. Home - which gives you access to everyone else’s posts 3. The padlock which shows your Privacy Settings 4. The spike wheel which is your Account Settings To access your account settings In the top navigation bar click on the Settings Icon [spikey wheel] and then choose Account © EyePAT Community Interest Company Version 4.0 2014 52 www.eyepat.org info@eyepat.org Using the Internet Safely Note – If the young person is aged 13 to 18 and if they have told the truth about their age, Facebook will apply the child settings, which basically mean that no one can see their profile unless they have accepted them as a friend. However Facebook only works out the person’s age from the date of birth they have given. Children under 13 cannot set up an account unless they lie about their date of birth Changing your Privacy Settings In the top navigation bar click on the padlock and you will see the Privacy Shortcut. The options available are: Who can see my stuff? This includes all posts, pictures etc. Who can Contact Me? How do I stop someone from bothering me? Who can see my Stuff? You can choose between Public - everyone irrespective if you have accepted them or not Friends - everyone your have accepted onto your friends list Friends except acquaintances © EyePAT Community Interest Company www.eyepat.org 53 Version 4.0 2014 info@eyepat.org Using the Internet Safely Only Me Custom Within customise you can choose Specific People or Only Me for info you wish to keep private. Any other sub list including Close Friends etc. Note: It calls contacts ‘friends’ even though you may never has spoken to them in your life. Who Can Contact Me This only determines who can contact you and ask you to be their “friend”. We recommend Basic Filtering for adults and Strict Filtering for vulnerable adults, young people and children. © EyePAT Community Interest Company Version 4.0 2014 54 www.eyepat.org info@eyepat.org Using the Internet Safely Receiving Messages Facebook now separates your messages into two groups. 1. Those who you have accepted as Friends 2. Those who you are not connected to You can receive messages from both. Click on the Message Icon on the left of the blue bar. Messages are now stored separately. For messages from those you have accepted as friends click on Inbox For messages from those who are not on your Friends list click on Other Block Someone - quick method Click on the Padlock on the right of the Blue Bar Click on How Do I Stop Someone from Bothering Me Enter their name or email in the box provided © EyePAT Community Interest Company Version 4.0 2014 55 www.eyepat.org info@eyepat.org Using the Internet Safely Categorising, Reporting, Blocking, Unfriending Friends Friends can be categorised individually which can take some time if you have many friends. Click on your Profile [your name] Select the box containing your friends. This will be in the left panel, but you may have to scroll down. Click on the word Friends at the top of the box Select a friend and hover over the From here you can choose to: o Make them Close Friend or Acquaintance o Report or Block them o Unfriend them Select the required option by clicking on it. button. More Privacy Settings Facebook has a double system of privacy settings, basic ones which are easily accessible via the padlock and more detailed ones which can be accessed by clicking on See More Settings With Facebook you can have a very secure site. It is just up to you who you allow to access it and who you accept as your friends. © EyePAT Community Interest Company Version 4.0 2014 56 www.eyepat.org info@eyepat.org Using the Internet Safely If you find a person you have accepted as a contact is contacting you either by message or posts, in a way you are unhappy with you can Unfriend, Block or Report them. Facebook takes privacy very seriously. Please note, if the person is under 13 and Facebook is aware of this fact, they will delete the account, irrespective of whether they have done anything wrong, as they should not be on Facebook. Timeline and Tagging Settings Blocking You can block anything People, Invitations, Apps etc. © EyePAT Community Interest Company Version 4.0 2014 57 www.eyepat.org info@eyepat.org Using the Internet Safely Photo and Photo Albums Perhaps the section you need to be most careful about is photographs. Remember photographs can be taken from your web site and distributed. Perhaps you may not wish your work colleagues or acquaintances to see certain pictures. Most of these options are fairly obvious, however the privacy settings for photo’s are more hidden. Individual Photos Click on the picture or Album Click on the downward arrow beside the picture - see below Choose the group you wish the picture to be seen by. © EyePAT Community Interest Company Version 4.0 2014 58 www.eyepat.org info@eyepat.org Using the Internet Safely Photo Albums With a photo album, there is another step in the process: Select Albums Double click on the Album Click on Edit Click on the downward pointing arrow under Privacy Choose who you wish to see the album © EyePAT Community Interest Company Version 4.0 2014 59 www.eyepat.org info@eyepat.org Using the Internet Safely Changing your Account Settings This is where you control what is going on with your Facebook Pages. To access click on the Account Settings icon [spikey wheel] Is someone logging onto your Facebook account without you knowing? This is covered by Account Security. We would suggest you switch this one on. It will let you know if anyone accesses your Facebook account from a new computer or mobile. It could alert you to bullying before it even gets going and you can immediately change the password. Stopping someone from logging onto your Page You can go one stage further by setting a pin which has to be entered in order for someone to log into your account. Click on Login Approvals © EyePAT Community Interest Company Version 4.0 2014 60 www.eyepat.org info@eyepat.org Using the Internet Safely Password - Changing your Facebook password Never give your password to, or allow anyone to see you logging onto your Facebook account. Once they have your password they can do anything to your account and you can’t do anything about it, other than change your password, as long as they haven’t already changed it and blocked you out. If so contact Facebook directly. If you think someone has hacked into your Facebook account either by guessing or seeing your password, you need to change it. This is especially important for children as they will often allow their friends to see them typing in their passwords and then this information can be passed on. One of the most common forms of cyber bullying is to hack into someone’s account and start sending out nasty or untrue messages. To access click on the Account Settings icon [spikey wheel] Click on the General Type in your old password Type in your new password Type in your new password again. Don’t cut and paste. The purpose of typing it in twice is to make sure you have it right. © EyePAT Community Interest Company Version 4.0 2014 61 www.eyepat.org info@eyepat.org Using the Internet Safely Blocking Facebook There is free software which you can download called FB Limited. You can use it to block Facebook for certain periods of time, say during work or study hours. www.facebooklimited.com. We have not tried it, but in theory it sounds good. 2. Twitter The most likely form of abuse you will receive from people on Twitter will be from those who follow you. Unlike with other social networking sites, on Twitter they choose to follow rather than asking to follow. Whilst you cannot stop someone from saying things about you on Twitter, you can block them from contacting you. 1. Log into Twitter using your email address and password 2. Click on Me 3. Click on Followers and then click on the downward facing arrow next to the Settings Icon [spikey wheel] 4. This will then list a variety of options from which you can choose, one of which is Block and another is Report. Please remember Threatening Behaviour and Harassment are illegal. If you are being bullied in this way, save all the evidence. See Page 196 © EyePAT Community Interest Company Version 4.0 2014 62 www.eyepat.org info@eyepat.org Using the Internet Safely 3. LinkedIn You are less likely to receive abuse or inappropriate messages via LinkedIn. It is primarily a social network for professional and business people. However evidence shows that an increasing number of children are moving to LinkedIn as they feel safe. 1. To access your privacy settings log in as normal 2. Click on your image icon on the right and choose Privacy & Settings Options are available to change who sees what. If you have any issues with any individual you can always “uncontact them” 1. Choose Network then Contacts 2. Go to the persons profile and under the More button select Remove Connection. © EyePAT Community Interest Company Version 4.0 2014 63 www.eyepat.org info@eyepat.org Using the Internet Safely 4. Google+ With Google+ you allocate your contacts into Circles [groups]. You can then change or alter the contact. You can create your own Circles of say Close Friends, School Friends etc. 1. Log into to your Google+ Account 2. Click on the Settings Icon [spikey button] This allows you to administer who can contact you. 5. PinInterest Rather like with Twitter and Google+ you Follow or Unfollow People on PinInterest. 1. To access your settings click on your name ad then choose Settings You can set up email notifications for any activities involving your account. You can de-activate your account. © EyePAT Community Interest Company Version 4.0 2014 64 www.eyepat.org info@eyepat.org Using the Internet Safely To report a pin a. b. c. d. e. Click on it to view its full size Hover over the pin until the flag appears at the bottom Click the flag Choose reason for report Click Report Pin. To report a person a. b. c. d. Go to their profile Hover over flag to right of profile info Choose the reason for your report Confirm that you want to report. To report a comment. a. b. c. d. Click on the pin to view its full size Hover over the flat to the right of the comment Click Flag Comment. Choose reason for Report and click Flag Comment. If you report someone, they will not be notified that you have reported them and they can use their Pin Interest account normally unless they are found to have violated terms and services, the Pins or Boards may be removed, restrict the use of their account or disable the account. 6. Tumblr Tumblr keeps things simple. The only information they ask of you during sign up is your name, email and password. However, as soon as you hit start you’re asked to type in your age, and if you type in anything below 13 Tumblr rejects your registration. This means, and as Tumblr’s Terms of Service makes clear, children 12 and under are not allowed on Tumblr. If cyberbullying or any kind of online harassment becomes an issue, Tumblr makes it easy to report and block a specific user and/or their Tumblr blog. What parents need to know And because of Tumblr’s compilation style of blogging, you can literally find anything from art and crafts ideas to hardcore porn, and equally as easy. © EyePAT Community Interest Company Version 4.0 2014 65 www.eyepat.org info@eyepat.org Using the Internet Safely All of that being said, finding pornography on Tumblr is no different than finding it on Twitter or Facebook. A simple tag search for “porn”, “sex” or “adult” results in a stream of pornographic images and video that any Tumblr user can see and share. Despite it being a creative outlet for young minds, the fact remains that Tumblr is not for children. Websites like Facebook, Twitter and Tumblr can only go as far as requesting their age during registration; it’s in your hands to educate your child about following the rules, whether it’s in school, on the soccer field or online. I can hear a child saying: “Dad, I don’t use Tumblr for all these things you’re worried about. My friends and I don’t go looking for that stuff you mentioned. Don’t worry so much!” Don’t fall prey to these comments. The fact of the matter is, Tumblr, like many websites, blog platforms and social networks, does not have the content filters or oversight in place to ensure a healthy experience for your child. For your teens, it might help to create a dialogue about their activity on Tumblr – find out what they post, who they follow, and if necessary, create an account of your own and follow them. Let them know you know what kind of content is available to them in the Tumblr community and how inappropriate content, regardless of where it’s coming from, can often times lead to malicious applications and computer viruses. If you feel that blocking Tumblr altogether is necessary in your home, there are several options available to you: How To Report People On Tumblr 1. First of all, try to always keep the hate message that this person/blog has sent you. This is a proof that you can send to Tumblr just in case they ask for it. 2. Sent an email to abuse@tumblr.com including the user’s name and screenshots of the harassment message © EyePAT Community Interest Company Version 4.0 2014 66 www.eyepat.org info@eyepat.org Using the Internet Safely 7. Flickr What if I don't want everyone to see my photos? Every photo has its own privacy settings. You can make a photo available to everyone (that's public, and includes people visiting the site who aren't Flickr members); make it visible only to your friends, your family, or both your friends and family; or keep it completely private. Bear in mind that you can always see every image in your own photostream. You can set a default privacy setting for every photo you upload. Changing the privacy level of any photo ("public" --> "friends", or "friends" --> "family") will change the image file name. This ensures that any photo truly becomes private. Please note that this will "break" any photo that has been blogged elsewhere as the image file will have a new URL. Setting privacy levels on my photos? You can specify the privacy level as you upload photos using the form or Uploadr or by email). You can choose: Public, Visible to friends, Visible to family, or Private. You can also set a default privacy level for all your uploads. To change the privacy levels on photos you've already uploaded, you have two options: 1. Change the privacy level in the Owner settings section under the Privacy heading on the right of the photo page, or 2. Batch them in Organizr, then click Permissions and select Who can see, comment, tag? Privacy Uploading by Email With their upload system, you can add a little bit of text to your Flickr email address to set privacy levels as you upload. These permissions will override the default upload permissions you set.. Let's say your magic email address is foo13bar@photos.flickr.com. Then you could use: foo13bar+friends@photos.flickr.com - Visible to friends foo13bar+family@photos.flickr.com - Visible to family foo13bar+ff@photos.flickr.com - Visible to friends and family foo13bar+private@photos.flickr.com - Only visible to you foo13bar+public@photos.flickr.com - Visible to everyone Tip: Save the addresses you use frequently to your address book so you can email on the fly. Can anyone leave a comment? Most of the time, yes -- any Flickr member can leave a comment unless you say you don't want them to. In your account area you can specify default settings for what you'd like most of the time. You can change the setting for individual photos. © EyePAT Community Interest Company Version 4.0 2014 67 www.eyepat.org info@eyepat.org Using the Internet Safely Please note, adding an image to a group will override your comment preferences and allow people in the group to add notes and comments. I've uploaded photos and made them public. Where do they show up? All sorts of places! One page shows you all the photos uploaded to Flickr: http://www.flickr.com/photos/ Your photo will also show up for your contacts, in a special list that shows them all photos uploaded by their contacts: http://www.flickr.com/photos/friends/ Photos on this page will also be governed by your relationships to your contacts and how you set privacy on a photo. For example, you upload a photo and set it to be visible to your family. Your contacts who you marked as family can see that photo. Other Flickr members can't. Your public photos will show up in tag pages, too. And if one of your photos is really interesting, it might show up on the Explore page! Can I make a public photo private again? Yes. The privacy setting you associate with a photo is completely flexible. You can show or hide any photo anytime you like. Note: Changing something from public to private will remove favourites that have accumulated. This is because a favourite is like a bookmark, and if you change the privacy so someone no longer has access, they shouldn't be able to view it any longer. http://www.flickr.com/help/faq/ 8. VK VK is the second biggest social network service in Europe after Facebook. It is available in several languages, but particularly popular among Russian-speaking users around the world, especially in Russia, Ukraine, Azerbaijan, Kazakhstan, Moldova, Belarus, and Israel. Like other social networks, VK allows users to message contacts publicly or privately, create groups, public pages and events, share and tag images, audio and video, and play browser-based games. As of January 2014, VK had at least 239 million accounts. VK is ranked 23 (as of November 25, 2013) in Alexa's global Top 500 sites and is the second most visited website in Russia, after Yandex. According to eBizMBA Rank, it is 8th most popular social networking site in the world. As of January 2014 VK had an average of 55 million daily users. 1. Log into your account and go to My Settings and then Privacy: © EyePAT Community Interest Company Version 4.0 2014 68 www.eyepat.org info@eyepat.org Using the Internet Safely You can change who can see your: Profile Posts Contact 9. Instagram How do I report something for abuse or spam? You can report a photo or video right from the app or when viewing it on the web. To report a post: 1. Tap "..." below the post 2. Tap Report Inappropriate 3. Select why you're reporting the post How do I block or unblock someone? To block or unblock someone: 1. Go to their profile by tapping name or username at the bottom of the app and searching for their 2. Tap (iPhone) or the three dots (Android/Windows Phone) in the upper-right corner of their profile 3. Tap Block User or Unblock User What can I do if someone is impersonating me on Instagram? Instagram takes safety seriously. If you're being impersonated, please submit a report and make sure to provide all of the requested info, including a photo of your government-issued ID. Help on applying privacy settings to Instagram is available from http://help.instagram.com/ © EyePAT Community Interest Company Version 4.0 2014 69 www.eyepat.org info@eyepat.org Using the Internet Safely 10. MySpace Once you have logged in: Click on Home / Settings / Privacy Click on Notifications To change the password If you need to change the password for any reason, take the following steps: Click on Homes / Settings / Profile / Password and follow the instructions to change your password. © EyePAT Community Interest Company Version 4.0 2014 70 www.eyepat.org info@eyepat.org Using the Internet Safely MSN Messenger This was an extremely popular instant chat option, especially amongst secondary school children. It is no longer as popular but we felt it would be helpful to show how to change your password, which can be essential if the account has been hacked, either professionally or by someone watching the person sign in. Changing your MSN Password Click on your name and Choose Account Settings Choose Password from the list on the left. Enter the new password twice and then press save. Skype Profile Settings To edit or change details on your profile, click on the Skype / Profile / Edit Your Profile. © EyePAT Community Interest Company www.eyepat.org 71 Version 4.0 2014 info@eyepat.org Using the Internet Safely Important things to be aware of: Public parts of your Skype profile can be seen by all other Skype users Do not put details in your profile that you do not want to be publicly available You do not have to fill in your profile if you do not want to You can change your profile at any time. Privacy Settings To get to the Privacy Settings in Skype you must log in via the link from your Desktop or from your Programs, you do not appear to be able to log in from the website. In Skype, from the menu bar, click Skype > Privacy. The Privacy Settings panel is displayed. From here you have control over who can access you for what. If you find people you do not wish to speak to are trying to contact you, you can block them. © EyePAT Community Interest Company Version 4.0 2014 72 www.eyepat.org info@eyepat.org Using the Internet Safely To change the password If you need to change the password in Skype for any reason, take the following steps once you have logged in: Click on the Skype Menu at the top of the screen and select the Change Password option © EyePAT Community Interest Company Version 4.0 2014 73 www.eyepat.org info@eyepat.org Using the Internet Safely Enter the current password Enter the new password Re-enter the new password to confirm Click on the Apply button © EyePAT Community Interest Company Version 4.0 2014 74 www.eyepat.org info@eyepat.org Using the Internet Safely Internet & DVD Gaming Many children have games consoles, computers, laptops, tablets and smartphones. These technological wonders open up hours of fun and because they can link to the internet, allow all sorts of opportunities to communicate with friends ... and strangers. But do you know what your child is doing in this virtual world? Are you parenting them in the same way you would perhaps in real life situations? Would you know what they are doing? Some of the new technology and terminology can baffle parents and carers. It can also alarm them with frequent stories in the media about spam, online grooming, cyberbullying and video messaging. It's hard to protect children when you aren't as familiar Gaming consoles such as X-box and Playstation enable multiplayer gaming - this is where multiple people can play the same game at the same time over the internet. In multiplayer games, players either all compete against each other, or team up to achieve a common goal such as defeating an enemy that can consist of either a computer or human players. The good Playing games online can be a fantastic pastime for young people, and gives parents a wonderful opportunity to play along with their children, so they can understand what they are playing and how to help keep them safe. Gaming is great fun, and can be a place where young people play and chat with each other. Gaming can be escapism from the stress of school and exams and can develop and stretch children’s minds. Gaming chat is normally focused solely on the game, and young people will swap user names to ensure that they can get to the next levels so they can learn to work as a team with other children. Gaming can be a fun way for children to learn computer skills. The bad Children can be affected by the adult content of some games, for example extreme violence or sexual behaviour. © EyePAT Community Interest Company Version 4.0 2014 75 www.eyepat.org info@eyepat.org Using the Internet Safely There are some young people who engage in risky behaviour (sometimes for the thrill or the challenge) to obtain cheats or knowledge to progress within a game. Adults with a sexual interest in children will encourage them to engage in ‘inappropriate’ behaviour for rewards, including sexual acts via a webcam or sex chat. We need to be aware that studies suggest what we do in our lives changes the way we think and our brain mapping and there is no positive research to support excessive online activity. Gaming is no exception and violent and/or prolonged gaming can potentially alter our brain mapping and our behaviours. This is most relevant to children but also applies to adults. Gaming classifications Games have an age rating similar to that for films. Shops are restricted from selling games to underage children, however they are often bought by elder siblings and then passed on. Do make sure you match the age rating of the game to the age of the child playing it. However much the child or young person enjoys playing it, it is important to understand what affect it could be having on them. Video game ratings using the Pegi (Pan-European Game Information) system have become legally enforceable in the UK. Retailers that sell titles with ratings of 12, 16 or 18 years to children below the age limits will be subject to prosecution. In addition to the age ratings, packaging will also feature diagrams warning if the title includes bad language, drugs, discrimination, fear, gambling, sex, violence or online gameplay with other people. Violence Bad Language Fear Sex Drugs Discrimination Online Gambling Online Game Violence Games are rated for 12-years and over if they include non-graphic violence to human or animal characters, a slightly higher threshold of violence to fantasy characters or significant nudity or bad language. Games are rated 16-years and over if the depiction of violence or sexual activity looks the same as it would do in normal life. Drug and tobacco references also trigger the age limit. Games are rated 18-years and over if there is a "gross" level of violence likely to make the viewer feel a sense of revulsion. The PEGI website will contain up to date information and can be found at http://www.pegi.info/en/index/ © EyePAT Community Interest Company Version 4.0 2014 76 www.eyepat.org info@eyepat.org Using the Internet Safely Available Games There are millions of games out there and it would be impossible to list them all here so we have given details of a few more popular ones. There are many sites offering simple and free games for your children to play and many of the social networking sites include gaming. Be aware that whilst many of these sites appear to be free, you often find you are “giving the opportunity” to buy credits using a credit card. A number of them also have a free and a subscription option which has many more features. There are some brilliant, fun and sometimes educational games out there however, remember that the gaming your children do can affect their behaviour and brain development. Games have an age restriction rating, not just as a guide, but to try and prevent young children from playing games which they are too young to be able to deal with. Please see Page 76 for information on gaming classifications. We personally have heard many stories of young children developing violent behaviour in school, and when traced it often went back to games they were playing at home, perhaps ones they had borrowed from their older siblings. If you want to find out about a specific game, you can either Google it or look at a site which sells and gives reviews of games. One such site is http://uk.ign.com/. Older Online Games © EyePAT Community Interest Company Version 4.0 2014 77 www.eyepat.org info@eyepat.org Using the Internet Safely Violent Games World of Warcraft – has very strict controls – you can’t swear, use racist comments etc. It is taken seriously by some players. Its a fun game – fantasy violence, no blood, no gore, all elves, goblins, dragons etc. Free up to level 20 then you have to pay for membership Eve – it’s very difficult and advanced so suitable for experienced game players – It’s advertised as 14+ but needs high level of gaming experience. Its About space ships, intergalactic battles, no blood, no gore. Free Runescape – Its free but you can pay for membership for exclusive features. Fantasy adventure – goblins dragons etc . No blood no gore! Grand Theft Auto – for X Box - violent - imagine a hard hitting gangster movie. It is an 18+ game. There are movies much worse, but has a higher level of violence with lots of blood. Don’t get to dismember people, but you can shoot and knife them. Call of Duty – War Game. Xbox, PlayStation, PC. Play online with others and talk to them in realtime. Who you play with depends on privacy settings you set. Can play on family settings and it will only allow you to play with others with family settings. Else it can be quite vile. Groups can fit into 3 basic categories, includes 30+ experts, 18-20+ having a good time – [but beware can be drunk], Ages 12-15 who can be pretty vile, swearing, throw tantrums etc. Realistic human images. You are the soldier and you have to kill people! Dead Space 3 – 18+ game. Not aimed at children. Horror survival game. It is terrifying. Essentially you are a stranded miner in outer space stuck on a spaceship full of aliens, mutants etc. which you have to kill. Lots of blood and gore. Realistic human images. Resident Evil – 18+ game – really not aimed at children. Again can be pretty scary. Basically a zombie survival game. You control characters who are trying to survive zombies. Very human images. Lots of blood – can be gory at times. Mortal Kombat – fighting game – 18+ - banned in the early 80’s due to way violence was perceived. Typical fighting, punching, kicking – has fatality moves which can be quite horrific. Example one character called Sub Zero move is to freeze them and then shatters them into a thousand pieces and he’s one of the nicer ones! Some sexually charged characters, but no sex. God of War18+ game – you are the demi god Kratos, your family was killed and you go around killing the other gods. Open sex scenes – soft porn. Quite graphic violence. You fight the hydra and cut its head off. The Witcher – 18+ has a very graphic sex scene, soft porn – fantasy dragons, magic etc. © EyePAT Community Interest Company Version 4.0 2014 78 www.eyepat.org info@eyepat.org Using the Internet Safely Games/Social Networking for Younger Children There are a number of sites aimed at primary school children where the children can interact with other characters. There are many of these sites, ask your children to tell you about the ones they or their friends use, and then check them out. If you need help, ask your child to help you. Habbo In Habbo the children create their own character (Avatar) and then go around the online hotel talking to the other avatars. There can be many thousands of children online at any one time. This is an example of the chat going on in one of the clubs. Our character is standing on her own not talking to anyone, but we can still see all the chat going on in the room. Habbo has been flagged as a high risk site for young children and a number of high street retailers are now refusing to stock the gift cards. Club Penguin With Club Penguin the child’s avatar is a penguin. They do not engage in live chat, but they can leave post cards for the other penguins. With all these games it is possible for anyone to set up an account. This can be a really good game to play with your younger children. Jacqueline Wilson Jacqueline Wilson is a children’s author. This is popular with the younger children as they can send chat. It is aimed at the 6-11 market. The kids can play games, talk to each other (only after messages have been checked for content), enter competitions, set up book groups etc. Web address is http://www.jacquelinewilson.co.uk/ © EyePAT Community Interest Company Version 4.0 2014 79 www.eyepat.org info@eyepat.org Using the Internet Safely Moshi Monsters With over 50 million Moshi Monsters already adopted by children this is an extremely popular site for young children. They can ‘chat’ with friends and play games. However beware, some children have had messages left asking them their “real name” “what school they go to” etc. Disney Superbia There are two ways to make friends in Superbia. Children can find real life friends by asking them what their Share Code is and adding them to their game, or they can make friends by visiting other people’s houses. Superbia claim they keep children safe and as this is a Disney product one hopes that this is the case. They claim that there is no way people you don’t know can contact the children directly within the game. SmileyTalk SmileyTalk is a relatively new package. It is probably the safest social network for young children simply because there is no free typing. The children choose questions and answers from lists. Within SmileyTalk there are no language barriers. The child selects the question or answer in their language and it is automatically translated into the recipient child’s language. Yoursphere Yoursphere.com is the kids' social network that's a destination for imagination offering members a uniquely engaging age-appropriate online experience. Yoursphere.com is approved by the Privacy Vaults Online Safe Harbor of the FTC for it's online privacy and safety practices. Stardolls According to Stardolls they are the largest online community for girls who love fashion, making friends, shopping, decorating and being creative! It has a facility to leave messages and it is also used by older children. We have seen some quite spiteful messages left! © EyePAT Community Interest Company Version 4.0 2014 80 www.eyepat.org info@eyepat.org Using the Internet Safely Child/Parent Contracts on Internet Use A good way of agreeing Internet use with your children is by drawing up a contract. Both parents and children need to make a commitment. The contract needs to be drawn up with both you and your child’s agreement and signed by both the child/children and the parents. If you have more than one child you may, depending on their age difference, need more than one contract. If the child lives in separate family homes [perhaps due to divorce or separation] the contracts need to be applied in both homes and should have similar objectives. Here are some guidelines on setting up a contract. 1. Identify the key issues with your children on the internet. These obviously will be: specific to your children’s age, interests and time spent on the Internet. specifically to keep them safe from viewing inappropriate sites, cyber bullying, grooming and identity theft. apply to any items they can access the internet from, laptop, home PC, mobile phone, tablet, gaming machine etc. An example with a younger child may be: You must let Mum or Dad know whenever you are going to log onto Club Penguin / Moshi Monsters etc. Explain to your children that this is because bad people might want to contact them, pretending to be other children. In your parents contract it might read Mum or Dad promise to spend at least 15 minutes after school, 3 days a week, playing with you on Club Penguin. For an older child it may be: You will accept the age restriction software we have loaded onto your machine and will apply by the restrictions. If you find you are unable to do your homework/research due to these restrictions you will come to us. Explain to them that not all the information on the internet is ok for them to see and could hurt them in one way or another. In your parents contract it might read. If you are unable to do your homework/research, we promise to spend time with you on the internet helping you with this research. 2. Be clear and concise when identifying each issue. Its important there is no chance of a child or teenager being able to say, they © EyePAT Community Interest Company Version 4.0 2014 81 www.eyepat.org info@eyepat.org Using the Internet Safely didn’t understand what was meant. 3. Agree and list what the rewards and consequences will be when your child either follows the rules or chooses to break them. We suggest they are called Trust Points. These privileges and consequences should be natural and logical. In other words, when possible, set a consequence that is related to the misbehaviour. Be sure you, the parent, are willing and able to apply the rewards and consequences that you set or your contract will be worthless. Don’t just consider materialistic rewards. Many children favour time with their parents, both on and off line as a reward. For example: For younger children. If you comply with this for one week/month, we will take you to the park for one hour at the weekend. If at any time you do not comply with this, we will add ‘your favourite site’ to the banned list of web sites for 1 day/week/month. For older children If you comply with this for one week/month you will earn our trust and we will extend your daily internet access by half an hour. If at any time you do not comply with this we will reduce your internet access by half an hour. 4. Set a date that the contract may be revised and/or negotiated. Let the child/teenager know that he/she may earn more or fewer privileges based on their behaviour until that renewal. If they can be trusted you can trust them more. Talk to them about privileges they may want to earn in the future. 5. VERY IMPORTANT – Make sure anyone else involved in parenting your child is party to this agreement and are willing to enforce the contract.. If parental figures do not agree on some of the items, revise them until you come to an agreement. Example Contracts If you search the internet you will find layouts for contracts. However it can be fun for your children to design their own. They can: Cut and stick or draw pictures Word Art or create special writing Paint or colour it in The most important thing is the content. It needs to say what the children will do and also what the parents will do. © EyePAT Community Interest Company Version 4.0 2014 82 www.eyepat.org info@eyepat.org Using the Internet Safely They have both a child and a parent contract. Remember for this to be effective both you and your child need to agree the terms. Alternatively you can use the EyePAT contracts which can be downloaded from www.eyepat.org/contracts. Ideas for Parents I promise to listen to what my child’s wants I promise not just to say no without thinking I promise never to be annoyed if my child tells me about any problem they are having on the internet. I promise we will work together and solve any problems I promise to get to know my child’s online friends just as I know their other friends I promise to listen if my child tells me if they are planning to meet an online friend and to always go with them I promise not just allow my child to use the computer or internet regularly as a means for me getting some peace and quiet I promise to play games on the computer with my child I promise to help them with their online homework I promise to get to know the sites my child uses. If I do not know how to I will get my child to show me These rules will be stuck on the computer so everyone remembers them Ideas for young people We will decide as a family when I can be online and what I can do. I won’t do anything else without asking permission first I will use the internet sensibly and not do anything that hurts other people I will not give out any personal information such as address, phone numbers or school details without asking my parents first I will not give out my password to anyone except my parents (especially not to my friends) I will ask my parents about any messages I do not understand I will never send anyone my picture without asking my parents first I will tell my parents if I find anything which makes me feel uncomfortable I will never agree to meet any of my online friends without asking my parents first. I will not reply to any messages that upset me or make me feel uncomfortable. If I do I will tell my parents straight away I will help my parents understand how to have fun and learn things online and teach them anything they would like to know © EyePAT Community Interest Company Version 4.0 2014 83 www.eyepat.org info@eyepat.org Using the Internet Safely Mobiles Most mobiles are now Smartphones and have gone way beyond being used just for telephone calls and text messages. They are used for messaging, emails, apps, cameras and online activities. They are increasingly replacing the computer and are now the most common method of internet access for young people. They are now changing from phones to phone watches! Mobile parental controls All mobile phone providers offer free parental control services which limit the content children can access via the mobile network to items suitable for under 18s. However, they may not always be automatically switched on. Check with your service provider that the parental control settings are switched on, and ask for them to be switched on if they are not. This is particularly important if the phone was used by an adult before. Many mobiles can use Bluetooth to send messages, photos and videos between phones. However, this means that other people are able to send unwanted messages which parental controls can’t stop. But, you can turn Bluetooth on and off using the mobile handset or you can stop other people being able to access your phone without your permission. Instructions on how to do this should be contained in the handset manual. If you need help, ask your service provider. It is important that you discuss using Bluetooth with your child. Young people often take photographs and videos of themselves (Selfies) and each other on their mobile phones but they should be very careful how they then share these images. Embarrassing or inappropriate photos/videos could easily be passed between phones and put online. Once sent or put online, control over the images may be lost and they could end up in the hands of strangers. Photographs or videos may also be used to fuel bullying or harassment. Chatrooms are popular with children and young people and while mobile providers’ own chatrooms aimed at children may be moderated, others might not be. Discuss with your child which sites they are visiting, what’s OK to post and what behaviour is acceptable. Visit the http://www.chatdanger.com/ website for more information and advice on this. If your child has a profile on a social networking site they may access it on their mobile phone. Ensure they know why it is important to allow their personal information only to be shared with people they know in the real world. Most of the larger social networking sites specify a minimum age of 13 for all members. For those sites that are aimed at younger children, parental consent and confirmation of the child’s age will usually be required. Check the minimum age requirement for users – ask your child which sites they visit to make sure they’re visiting sites appropriate for their age. Ofcom http://consumers.ofcom.org.uk/2009/10/parental-controls-for-mobile-phones/ © EyePAT Community Interest Company Version 4.0 2014 84 www.eyepat.org info@eyepat.org Using the Internet Safely Sexting Sexting is texting but with a sexual message. It can consist of just text messages but it also often involves intimate photographs. Children as young as 11/12 are Sexting and the latest statistics show that 38% of young people are participating. Often it involves sending photographs to boys/girls with whom they are currently in a relationship, or would like to be in a relationship with. What these young people forget is that once they send a photograph or message to someone else they have lost control over it. Very often these messages and especially photographs are sent on by the recipient to their mates who “have a good laugh”. This can be devastating for the sender and it is very important that children realise what can happen. Taking these pictures is nothing new. Many adults have taken provocative pictures to share with their partner. The big difference now is that instead of being hidden in a shoe box in the attic or back of the wardrobe, they now get published online. One high profile star to become a victim was Vanessa Hudgens (Gabriella from High School Musical). In 2007 at the age of 19 she sent some nude pictures of herself to her then long term boyfriend Zac Efron (Troy in High School Musical) but the pictures ended up on the web and are still there for anyone to see. They will be there for many years to come. Jessica Logan was only 1 year younger. Sexting is not new, but it is becoming more prevalent amongst younger people. One tragic case was Hope Witsell was just beginning the journey from child to teen. The middle-school student had a tight-knit group of friends, the requisite poster of “Twilight” heartthrob Robert Pattinson and big plans to become a landscaper when she grew up. But one impetuous move robbed Hope of her childhood, and eventually, her life. The 13-year-old Florida girl sent a topless photo of herself to a boy in hope of gaining his attention. Instead, she got the attention of her school, as well as the high school nearby. The incessant bullying by classmates that followed when the photo spread put an emotional weight upon Hope that she ultimately could not bear. Hope Witsell hanged herself in her bedroom © EyePAT Community Interest Company Version 4.0 2014 85 www.eyepat.org info@eyepat.org Using the Internet Safely One of the big problems is what to do if you receive or become aware of sexting messages. In the UK it is illegal to be in possession of or to distribute child abuse images. A child abuse image is a picture of a person under the age of 18 in a naked or obviously sexual pose. How do these laws fit in with images being taken by the children of themselves and then sent on. One thing is clear, you are breaking the law if you have indecent images of children under the age of 18 on your phone or any phone in your name, however they got there. If as an adult these images are on your phone or a phone owned by you, you are in possession of child abuse images. Never send on or show these images onto anyone. To protect the child you should hand the phone over the Police or to the Head Teacher of the school the child attends, or if appropriate, to the Child’s Parents, if you know them, and advise them that the images are there. You do not under any circumstances show the images to them. If you are not willing to do this, then immediately delete the images. If your son or daughter receives an image like this they should immediately delete it, they could potentially be prosecuted if they do not. The way the law stands at the moment, as a Parent you should also delete it. The Schools in particular need to be careful as personal equipment is likely to be involved. It is not recommended that anyone in school should look at a pupil's phone without the parents being there. Schools should have a policy for reporting incidents. Many LAs use the flowchart in the Becta AUPs in context publication. If they are concerned at all, they should contact their LA for advice (they all have a LSCB - local safeguarding children's board) or contact the Police. Parents and Teachers should talk about the issues with pupils about the serious consequences of doing this. Preventing it happening is the top priority. If a child brings their phone into school with an image someone else has sent them the schools need to follow the ‘Dealing with an Incident Flowchart’. If these images are published on the web it could need reporting to the IWF sexual photographic images of children under 18 are illegal. These are not child pornography pictures as some sites refer to them - they would be classed as child abuse. There is a dictionary of Sexting terminology on Page 190 For more information on Sexting or SGII see the CEOP website www.ceop.gov.uk. Advice for Schools and Professionals who care for young people Up to date information of how to deal with Sexting (SGII) incidents is available on our website www.eyepat.org/sexting. This topic is also covered in detail in the EyePAT Training Workshops for Teachers, Social Workers, Foster Carers and Childminders. © EyePAT Community Interest Company Version 4.0 2014 86 www.eyepat.org info@eyepat.org Using the Internet Safely Bullying Bullying is on the increase. Social media, texting and online messaging has meant the bully no longer has to be physically strong or ‘brave’ to bully. They don’t have to have followers to make them feel safe in a group, they can now operate alone and if they wish anonymously. We can help the victims to deal with the bullying and there is a lot of much needed help and support available for this. However few people think of helping the Bully. Bullies bully for a reason and if we can help them deal with that reason and stop bullying then we won’t have the victims. If we recognise that the bullies, not the victims, are the ones with the problems then the power of the bully is diminished. Happy People Don’t Bully Think about it. Do you know one happy person who bullies. There are lots of unhappy people who don’t bully and there are lots of ok’ish people who don’t bully, but happy people never bully. They have no reason to. So - if you bully it is because you are unhappy. The target is just the person the bully uses to pick on. The reasons for the bullying are nothing to do with the target, it is the bullies problem. EyePAT run workshops for adults called Happy People Don’t Bully. We also run a Happy People Don’t Bully for Parents which complements our Happy Kids Don’t Bully programme for children. Workplace bullying has doubled in the last 10 years and is costing the country billions of pounds in lost productivity and staff absence. 1 in 3 adults (34%) now experience bullying and 80% of victims said the abuse had affected their physical and mental health. 33% had decided to take time off, or even left their jobs as a result. Apart from the mental anguish this causes what cost is there to society and to our national purse. How much more effective would businesses and organisations be if they did not have to contend with bullying? If you would like to find out more about the workshops we run for businesses, corporations and organisations please get in touch. info@eyepat.org or 01446 795055. Happy Kid’s Don’t Bully Everything we say about people who display bullying behaviours applies to children. However with children the statistics are even worse. Nearly half (49%) of all school children will be bullied. We have children taking their lives because they cannot deal with it. We have young people growing up into damaged adults because of it. If you would like to know more about the workshops we run in schools please get in touch info@eyepat.org or 01446 795055. © EyePAT Community Interest Company Version 4.0 2014 87 www.eyepat.org info@eyepat.org Using the Internet Safely Cyber Bullying Cyber Bullying is social terror by technology ... and it’s on the rise. Next to viewing “unsuitable” images, it is the second most likely thing to affect your child. When a child of any age, up to 18 is threatened, harassed, or humiliated via the use of technology --- this is Cyber Bullying. Cyber Bullying is not illegal but harassment and threatening behaviour is. If it is consistent or physically threatening, you can and should report it. However please bear in mind, the problem is so great the police are inundated and are struggling to deal with the number of cases. If the cyberbullying stems from the school, go first to the school and then if necessary, through them to the Police Schools Liaison Officer. Cyber Bullying makes it easier for bullies because they are not face to face with their victim(s). One of the worst things about cyber bullying is that it is 24/7 – there is no escape. 15% of Teachers are subjected to cyber bullying. This can have a whole host of effects on the teacher personally, their class and the school. This social online terror is sent through e-mail, Mobile Phones, social networking sites, pager text messages, instant messaging, web sites and online personal polling web sites. It is normally, but not always, done by children, deliberately and repeatedly and is used by an individual or group with the intention of harming other children and teens. Children use technology to talk to their friends and make new ones. While most children use the Internet responsibly, others are using all of this technology to terrorize and Cyber Bully! Cyber Bullying is the perfect way for bullies to remain anonymous. So anonymous, the bully thinks he has no fear of punishment. However this is not the case. Most bullies do not realise that in fact they can be traced. Children and teens bully online in various ways: Instant Messaging/Text Messaging/e-mail harassment This includes: Sending hateful or threatening messages to other children © EyePAT Community Interest Company Version 4.0 2014 88 www.eyepat.org info@eyepat.org Using the Internet Safely Sending death threats using text messaging, photos and videos Ganging up on their victim in text wars or text attacks. They send hundreds or thousands of text messages to the victim's cell phone or other mobile device. Creating a screen name which is very similar to another child's name but adding or removing an extra letter. Then they use this name to say disparaging things to other users whilst posing as the other person. Web Sites and Social Networking Sites Children can post photos, videos and all kinds of personal information (such as phone numbers, address, etc.) which could endanger the child who is the victim. Sending Pictures through E-mail and Mobile Phones Mobile phones allow children to send pictures to each other. Pictures are received directly on the phones and could end up in everyone's picture library. Children often take photos of someone in a locker room, bathroom or dressing room and post it online or send it to others on Mobile Phones. They send these via mass e-mail to others. Some of these photos could include nude or degrading pictures of their victims. E-mails like that get passed around to hundreds of others - ending up everywhere in cyberspace. Remind your child that any image they send on their mobile can be changed and shared online, and that once they have sent an image they have lost control of it. Ask them if they would like it posted on the school notice board. If they don’t, don’t send it! Impersonation Posing as the victim, Cyber Bullies may post erotic or suggestive messages in a group's chat room posing as the victim - inviting an attack against them. They give the name, address and phone number of the victim to make the hate group's job easier. They might even send a message to someone saying hateful or threatening things while masquerading as the victim. They often alter a message actually from the victim, making it seem that they have said something horrible. Sending Malicious Code Children can send viruses, spyware and hacking programs to their victims to destroy their computers or spy on their victim. If the Cyber Bully uses a Trojan Horse program they can potentially control their victim's computer remotely, and do whatever they want. Sending Porn and Other Junk E-Mail and IMs Cyber Bullies may sign their victims up for numerous e-mailing and IM marketing lists which creates mass e-mails for the victim. They can even sign them up for porn or adult dating sites. Blogs These online journals are a way for children to damage other children’s reputations or invade their privacy. Sometimes children set up a blog or profile page pretending to be their victim and saying things to humiliate them. © EyePAT Community Interest Company Version 4.0 2014 89 www.eyepat.org info@eyepat.org Using the Internet Safely Stealing Passwords - Children can steal the password and lock the victim out of their own account. - Children may use another child's password to change his/her profile and write sexual, racist and disparaging remarks about that person. - Children may steal another child's password and chat with others pretending to be the other child. They can say mean things to this person's friends or other people. - Children can give or sell the password to a hacker to hack into the victim's computer - Children can coerce their friends into giving them their passwords by threatening not to be their friend if they don’t. Internet Polling A perfect way for children to create more rumours! Asking Who's a Bitch? Who's Not? And children poll to answer by voting. Trolling This involves the posting of hateful or vindictive messages on notice boards normally posthumously, or following a specific incident. The terms is also used when for example, during the Olympics 2012 Trolls tweeted and posted messages on social networking to Tom Daley saying he had let his dead father down but not getting a medal in the pairs diving. How would you know if your child is being bullied With physical bullying there are often physical signs, bruises, ripped or dirty clothes, damaged book bags or books. However with cyber bullying there are no such signs. 1. Check your child’s body language when they receive a text, are they happy or depressed. Do their shoulders drop as if in anticipation of reading something they don’t want to see. 2. Keep an eye for changes in a child’s appetite. A child under stress will often either stop eating or comfort eat. 3. For the same reason, have they started to complain regularly about feeling sick. 4. Has the child suddenly started not wanting to go into school, or hang around with their mates. 5. Is the child shutting down e-mails/social networking sites when you walk into the room. 6. Has the child become withdrawn and stopped talking about their friends or their day. 7. If you are a parent and are concerned you can check the child’s incoming and outgoing text messages. It is obviously up to you as a parent to decide whether you do this with your child’s knowledge or consent. If you child has deleted their messages, ask why? 8. If you are concerned, speak to your child’s teachers. Ask them if they have noticed anything different in their behaviour. 9. Set your Google Alerts with your child’s name. See Page 161. www.eyepat.org 90 © EyePAT Community Interest Company Version 4.0 2014 info@eyepat.org Using the Internet Safely I am an adult and I am bullying what can I do? Get the help you need to deal with the issues which are causing you to bully so you can stop. In the workplace go to your HR Department and ask to speak to a counsellor. Go to your GP and ask them to refer you to a counsellor. Explain to them what has caused you to bully. Why Do I Bully? Are you unhappy with your job or your life and taking it out on others? Do you enjoy the sense of power when you hurt someone's feelings? Do you think those people you bully deserve to be picked on because they are inferior to you? Were you bullied in the past and are now getting your own back? Are you bullying your spouse or partner and your children? Whatever the reason, we know that people who bully others do not function as well as those who have good relationships with their families, friends and colleagues. You may not even be aware of the hurt and suffering you are causing, but the reality is that you need to change your behaviour. Some suggestions: Think before you act or speak - a delay of even 10 seconds can help you to temper your behaviour Ask yourself if you would like to be treated in the way you are treating others Tell yourself that you do not need to bully - you can be nice Apologise if you bully someone. If you can't bring yourself to say sorry at first, then write a note Give yourself time - it takes a while to break the habits of a lifetime If the bullying is related to your job, change jobs If something in your life is making you miserable and causing you to act like a bully, then make a decision to tackle the problem These are some websites which may help you. http://www.kidscape.org.uk/advice/step6a.shtml http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bullying/ DG_10031375 http://www.youthoria.org/home/life/relationships/relationshipsbullying/1239707769.175/ http://www.experienceproject.com/groups/Am-A-Bully/117245 I am a child and I am bullying what can I do? Speak to your school or a teacher and ask them to help you. Talk to an adult you can trust and ask them to help you. This could be a parent, a brother or sister, a relative or a family friend. © EyePAT Community Interest Company Version 4.0 2014 91 www.eyepat.org info@eyepat.org Using the Internet Safely If you are in care, talk to your Foster Carer, Social Worker or Guardian. Contact CyberMentors, NSPCC or ChildLine and ask them to help you. Details of all these organisations are available on www.eyepat.org/help. Remember - Happy Kids Don’t Bully. There is a reason you are bullying and it is this reason you need to deal with and get help with. How would you know if your child was a bully This is more difficult, but the sad fact is that all bullies are somebody’s children. A couple of things you might look for or do are: 1. Open up a line of communication for the child to talk to someone about issues which affect them and how they deal with them. Remember Happy Kids Don’t Bully. 2. Check if they suddenly buy a secondary ‘pay as you go’ mobile phone as to why? Hiding behind non registered numbers is a favourite tool for a bully. 3. Keep an eye on their social networking and the things they are posting online. 4. Think if they have recently started saying really nasty things about someone, either in general or more specifically within their groups of friends. Why should I do something Remember threatening behaviour and harassment are both illegal. Posting information on social networking sites is considered in law to be publishing. If you or your child is bullying the police can get involved and you/they could be charged. Under British Law you could find yourself being sued for damages for libel if you publish defamatory untrue information about someone. How can you prevent or stop bullying There is not one quick fix to stop cyber bullying in the way you can with blocking web pages and sites. Here are some suggestions which you may find useful. You are the parent and as such it is up to you to decide how, when and where your children can use technology. Especially as you are normally the one paying the bill! If you give your child a mobile phone, it is a good idea to make it clear at the outset, what the conditions are for your child to have this phone. If you give your child access to a PC/Laptop and the Internet, it is again up to you, as the parent, to agree the timings, content and location of that access. One good way is to draw up a contract with your child at the outset, so the rules are easily understood by both you and your children. Things you can do are: For Adults 1. In work - ask your workplace to run an EyePAT Happy People Don’t Bully Workshop to help the bullies to stop. 2. If you are being bullied in work talk to someone. Do not keep it to yourself. If possible go to your HR Department. If it is a line manager, go to a senior line manager. © EyePAT Community Interest Company Version 4.0 2014 92 www.eyepat.org info@eyepat.org Using the Internet Safely 3. If the bullying is via a social networking site, report it to them. They should take action. 4. If it threatens physical violence or is life threatening contact the police. 5. Talk to someone you know or if needs be contact organisations who can help you deal with the issues like the Samaritans. 6. Never erase anything – it may be needed as evidence, 7. Above all, remember bullying is all about the bullies problems, not about you. For Children and Young People 1. At school - ask the school to run an EyePAT Happy Kids Don’t Bully Workshop to help the bullies to stop. 2. Do not allow a child to have a laptop with wireless internet. Make sure they can only access the internet when in your sight. 3. Teach children not to open or read messages from cyber bullies. Pass them onto you and just store them as evidence. 4. Talk to the child now and tell them they can always talk to you. If you think they may not for whatever reason, find another family member/friend who they may be able to talk to. 5. If the child is cyberbullied, go to the school immediately. Some schools are better than others in taking action, especially if they consider the bullying to be taking place “out of school”, but they need to be informed. 6. Tell the child they can contact www.cybermentors.org.uk. They provide online mentors for children who have been bullied and give your child someone to talk through their experiences with. 7. Go online to http://www.beatbullying.org/ they provide invaluable help and advice. 8. Go online to www.anti-bullyingalliance.org.uk. They are an alliance of over 60 organisations who work together to stop bullying. 9. Contact your local anti-bullying groups. Try typing your local town/city name into your search engine followed by “anti bullying”. This should give you a result. You could always ask the local schools, or ring the Local Council. 10. If the bullying is via a social networking site, report it to them. They should take action. 11. If it threatens physical violence or is life threatening contact the police. Each school should have a school liaison officer. Ask the school for their name and contact them. 12. Never erase anything – it may be needed as evidence © EyePAT Community Interest Company Version 4.0 2014 93 www.eyepat.org info@eyepat.org Using the Internet Safely Grooming and online child abuse? Adults who want to engage children in sexual acts, or talk to them for sexual gratification will often seek out young people who are looking for friendship. They will often use a number of grooming techniques, including building trust with the child through lying, creating different personas and then attempting to engage the child in more intimate forms of communication including compromising a child with the use of images and webcams. Child sex abusers will often use blackmail and guilt as methods of securing a meeting with the child. The reality is that children leave themselves so open online, paedophiles no longer have to work that hard to make contact. At a workshop for foster parents and children’s home staff, we were told by the Manager of a Children’s Home that some children in care actively promote themselves online in order to attract potential paedophiles. Their very sad reasoning is “that to be wanted by a paedophile is better than not being wanted at all”! It also needs to be recognised that young people who spend excessive hours playing online to the exclusion of other activities, may not develop the social skills necessary to meet friends and can resort to using the computer for this. There was a case in 2009 of a young man of 22, who had spent most of his life on his PC and perhaps had not developed the necessary skills to meet girls of his age. In this particular case he ended up abducting a (willing) 13 year old girl. When his parents were questioned about his disappearance their response was “he doesn’t go out he’s always up on his computer”. He was sentenced for 6 years for child sex offences and had to sign the sex offenders register. This is not beginning to suggest that every child who spends hours on the internet is going to become violent or a paedophile and it is possible that in this case his online behaviours made no difference as he was sexually attracted to young girls. Why child sex abusers like to use the internet to contact children? Child sex abusers find the internet an easier place to participate in a range of child sexual abuse activity including contact with children due to its anonymity. They will often lie and pretend to be younger than they are, or people other than themselves. They set up bogus email accounts and chat personas to mask their identity online. It is very easy to do – you can set up an account on these chat rooms calling yourself anything and using any email address to engage in conversations. During our initial research, to find out how easy it was, one of our team, a man in his late 50s, set himself up as a 15 year old girl called Petra. There were no checks and no come backs. For information we did delete the account unused! What are children at risk of? There are a number of actions which these adults will engage in online. These include: Swapping child abuse images in chat areas or through instant messaging with other adults or young people and forming networks with other child abusers to share tips on how to groom more effectively and how to avoid being caught. Swapping personal information on children that they have collected with other abusers. Seemingly unrelated and disguised questions can be asked, for example © EyePAT Community Interest Company Version 4.0 2014 94 www.eyepat.org info@eyepat.org Using the Internet Safely – “I hate living in Newtown, it’s the pits, nothing to do – what’s it like where you live?” – followed by “my school uniform is brown and yellow – it’s so yuk, what’s yours like?” The groomer knows where the child lives and just by checking out school websites for the area to see uniform colours, what school the child goes to, and so it goes on! Participating in online communities such as blogs, forums and chat rooms with the intention to groom children, collect sexually explicit images and meet them to have sex. Children at specific risk Certain groups of children are more at risk than others. Some children will be more secretive about who they are meeting. They are also, in some cases, more likely to elect to meet someone in private, so they cannot be seen. Some groups of children and young people who will be at more risk are those who intend meeting someone if they: are from a different religion are from a different culture whom their family may not approve of are gay, bi-sexual or transgender have not developed a trusting relationship with their carers live within a family where parental alcohol or substance abuse is common are estranged emotionally from their parents and siblings are from a different social background whom they know their parents would not approve of These groups of children need to put separate plans in place to ensure their safety. Never meet anyone in private, the risk of doing so, is far greater than any risk of being seen. If necessary go somewhere you are unlikely to see anyone you know, but never a private place. Take the mobile phone number, car registration number of any person you are meeting and text it to someone you trust. Let them know the time you are meeting the person and text them when you leave. Expect the person you are meeting to do the same with you. They also need to be safe, but never assume that because they are going through the motions of doing this that they are genuine. Openly in front of the person you are meeting, take their picture and text it to someone. If the person you are meeting is not genuine, they are unlikely to allow you to do this. If at all possible take someone with you as a chaperone, or if you know someone who runs a coffee shop, restaurant, pub or bar meet there. If you leave with the person, give a note to the person at the shop with the person’s details. They do not have to sit with you, they can just be in the vicinity. If you are gay and you don’t want your friends or family to know yet, don’t tell them the real reason you are meeting the person, but do tell them who they are and where you are going. View the person via web cam so you can at least see that the person who you are talking to is who they say they are. Do not however agree to do or say anything on camera, other than general conversation. You may be being filmed or recorded. © EyePAT Community Interest Company Version 4.0 2014 95 www.eyepat.org info@eyepat.org Using the Internet Safely Tips to keep your children safe on the internet 1. Know what your children are doing online and who they are talking to. 2. Ask them to teach you to use any applications you have never used. 3. Talk with your children about limiting access to approved Web sites and the hours spent online. 4. Sit with them when they’re online - play online games with them especially when they interact with other people. 5. Ask an elder sibling to supervise them if you can’t. 6. Keep the computer(s) in a communal area of the house, where it is easier to monitor what your children are viewing. 7. Help your children to understand that they should never give out personal details to online friends - personal information includes: Their messenger ‘addy’, email address, Mobile number Pictures of themselves, their family or friends - if your child publishes a picture or video online - anyone can change it or share it. Their name, age, sex, home address, phone numbers, Your bank details, pin numbers, passwords and user names. 8. Never ever share passwords with friends. Friends can think it’s funny to log in as you and send out messages pretending to be you. It happens quite regularly! They can also purposely or inadvertently pass them on. 9. If it is necessary to supply details for registration, or to buy something, your children should always ask for permission and help from you. 10. If they want to subscribe to any services online, use a family email address to receive the mail, or use yours. 11. If your child receives chain/spam/junk email & texts, remind them never to believe them, reply to them or use them. They will not lose all their friends and develop spots overnight if they don’t forward them on to 10 other people! 12. It's not a good idea for your child to open files from people they don't know. They won't know what they contain - it could be a virus, or worse - an inappropriate image or film. 13. Help your child to understand that some people lie online and that therefore it's better to keep online mates online. They should never meet up with any strangers without an adult they know and trust. 14. Teach your child to always ask anyone who contacts them on-line to switch on their web cam so they can see who it is, or ring them over the phone so they can check that they are really talking to the person they think they are. If you can’t see or hear them, how do you know it’s them? 15. Warn your child that some children may think it’s amusing to goad your child into saying bad things about someone else on a chat site, knowing that the target is sitting with them and reading everything as it is typed. © EyePAT Community Interest Company Version 4.0 2014 96 www.eyepat.org info@eyepat.org Using the Internet Safely 16. Let your child know that it's never too late to tell someone if something makes them feel uncomfortable. 17. Teach young people how to block someone online and report them if they feel uncomfortable. 18. Think seriously about using internet filtering software, walled gardens and childfriendly search engines. Use your browser's controls where these offer varying levels of security for each family member. Details of this are available from Page 99. 19. Check out the child protection services from your internet service provider, for example, do they filter for spam? If not, ask them why they don’t. 20. Children love to ‘chat’, but make sure they only use moderated chatrooms. Monitor the chatrooms they are using and encourage them to introduce you to their online friends. No one should visit private areas of chat rooms. All chat rooms visited should be moderated and child friendly. 21. Extreme caution should be taken if your children should arrange to meet someone they have met via the internet. You or another responsible adult must be present and always ensure the meeting is in a public place. It may be totally genuine and the start of a new friendship, however it may not be! 22. Encourage your children to tell you if they feel uncomfortable, upset or threatened by anything they see online. If they receive frightening or bullying emails, or any spam with unacceptable content they should tell you. It is not their fault that they have received them and they must always feel confident in talking to you about anything which makes them unhappy. 23. Suggest to your younger children that they use child friendly search engines like Yahooligans, AskJeeveskids. To find out what is currently available type ‘child friendly search engines’ into your internet browser. 24. Most schools will now have an Acceptable Use Policy for use of the internet (including emails) within school. This should be made available to you, as parents. You will also probably be asked to sign a consent form for your child to use the internet in school. Ask the school for a copy and use it for guidance. 25. Surf the web together. Talk with your children. Go online with your children and become part of their online life. Communication is the key to safe surfing. Involve your children in writing your own family code of acceptable Internet use. Remember that what is acceptable for a teenager is not necessarily alright for a primary school child so get their input. 26. To keep up to date (with your children) on emerging technologies register on www.thinkuknow.co.uk/parents What to do when abuse takes place? It obviously depends on the circumstances, however for serious offences including abuse, consistent or threatening bullying or grooming: Teach your children to protect their friends and report what has happened. Alert the school head, social services or the police. Go to the Eye PAT web site www.eyepat.org and look at the Help page. It contains lots of useful links. Use the CEOP Report Abuse button. It’s on the government Child Exploitation and On Line Protection web site. http://www.ceop.gov.uk/ © EyePAT Community Interest Company Version 4.0 2014 97 www.eyepat.org info@eyepat.org Using the Internet Safely Report the person to the chat site A child who is bullied can contact www.cybermentors.org.uk or www.bulliesout.com for support and guidance Go online to www.childnetinternational.org.uk You can also contact Childline (0800 1111). Children will be counselled, adults will be given advice on what to do. For less serious offences – say someone accessing your child’s MSN and sending out messages Change the password for MSN – or get a friend to do it if you are away and don’t have internet access. Send a message out to all your child’s friends telling them their account has been hacked and to ignore any messages they have received. Get your children to tell you if a friend starts sending strange messages. Get your child to ring them or you ring their parents. Encourage your friends to ask their children to do the same. Let the school know. For less serious offences – say someone setting up a hoax or FAKE chat room account. Try to access the account, through any invite, and post a notice on the wall to say it is a fake account. Block that account from accessing any parts of your account. Contact anyone who has accepted a friends request and advise them that it is a hoax account. Contact the chat room site and ask for the account to be removed – it could take some days. Monitor it until it is removed. Remember it could be a child doing it for a laugh, or it could be a paedophile trying to get the children to disclose personal information. © EyePAT Community Interest Company Version 4.0 2014 98 www.eyepat.org info@eyepat.org Using the Internet Safely Parental Controls and Privacy Settings The 1st thing to get clear in your mind is what filter is what. What sits where and what does the terminology mean. The average number of internet enabled devices in houses in 2014 is said to be 13! This includes: Desktop computers Laptops Tablets Mobile Phones Gaming Machines Internet TV Mobile Watches Long gone are the instructions to keep the computer or laptop in a central place! There is talk about forcing the industry to enable all the internet disabled devices in the home to run under one single filtering / control system. However this is not going to happen within the next year or so, so for the time being parents need to look at all the alternatives. Communication - It’s an essential part of the process When setting up any kind of filtering software, it is a good idea to talk to your children, about what they want to use on the internet and why. Explain to them why you are using the filters. Remember a child can always visit a friend’s computer which may not have the same filters, so education needs to play a key part in their protection. Eye PAT does however strongly encourage the use of filters, both for time, so children cannot use their laptops or PCs at night unsupervised, and more importantly cannot be watched if they have inadvertently left their webcam online. For filtering to Work Before deciding what filtering to choose you need to ask these questions: Will it work with the age range of my children?. We suggest you use the film classifications think this through. What is ok for a 15 year old to see may not be suitable for a 9 year old If the oldest is say 15 and the youngest 5, you will need separate accounts for them with different filter levels on each. One setting will just not work. Time Controls - Do you want to be able to restrict access at night and perhaps at other times? Children do go online in the middle of the night without their parents knowledge. Online Time - Do you want to be able to restrict the length of time per day and perhaps per session the child is online? Virus Control - do you need it combined or do you have a separate package? Ease of use - who is going to set it up? © EyePAT Community Interest Company Version 4.0 2014 99 www.eyepat.org info@eyepat.org Using the Internet Safely Overblocking This can be as detrimental as under blocking as it can lead to the frustration of removing the filters altogether, or at the least stopping people being able to access the sites they need to. There is a lot of work being done to address this currently. Over or underblocking will occur if the solution you choose does not fit the ages of your family. Technology There are 2 key areas you need to consider: Safety inside the home Safety in public spaces or friends houses. To ensure that you are safe in both, you will probably need to apply different types of filters to different devices. It is imperative you have good anti virus software on your PC. If children or young people have access to the laptop/PC it is also imperative that you install a good parental control software. There are lots of packages available out there. The 5 levels of filtering. 1. ISP or Internet Service Provider. All the main ISPs [Virgin, BT, Sky, TalkTalk etc. have to provide free filters. © EyePAT Community Interest Company Version 4.0 2014 100 www.eyepat.org info@eyepat.org Using the Internet Safely 2. 3. 4. 5. Router - this is the box which brings the internet connection into your home. Device - this is the desktop, the tablet, the mobile etc. The Search Engine - Google, Bing, MSN etc. The application - YouTube, StarDolls, Facebook, Call of Duty Make sure the solution you choose fits your needs or the needs of your family. In your research you may hear the terms Whitelist and Blacklist filters. Whitelist filters Lock every website and you then actively permit certain sites. We would never recommend giving a very young child internet access, without “whitelist” filters. You then have complete control about the sites they can access. Blacklist filters Categorise young people by age and block sites they deem inappropriate for that age group. Allow all other sites. Webcams Nearly all laptops and many desktops have webcams. One specific risk with a webcam if used in the bedroom is they can then be seen getting changed, or ready for bed. To protect children from being watched at night you can apply time controls to their internet access via either Parental Control software or Routers. © EyePAT Community Interest Company Version 4.0 2014 101 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - ISP [Internet Service Providers] This is the Internet Service Provider the person you pay the bill to for your broadband. Due to a lot of pressure the large ISP providers all now provide free filters. In October 2011 the four main UK ISPs, in consultation with the government and the UK Council for Child Internet Safety agreed to a code of practice regarding adult content filters. . A side-effect of ISPs offering free parental control solutions is that the UK market for such software will basically be decided by the choices of ISPs. Of the five main ISPs, three offer McAfee as their parental control software. Those who currently provide it free are BT, Virgin, TalkTalk, Sky, Orange, O2. Some have developed their own, others like Orange use McAfee. For details and instructions on how to set them up, contact your ISP Provider or visit http://www.eyepat.org/howto to see the set up videos. © EyePAT Community Interest Company Version 4.0 2014 102 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Routers Options are: BT Home Hub Linksys Wireless-G Broadband Router with SpeedBooster 802.11g Linksys E2000 Advanced Wireless-N Router Netgear Wireless-N 300 Router with DSL Modem Cisco Linksys X3000 review ZyXEL P-334WT Broadband Wireless Router VigorPro 5510 UTM Firewall with Anti-Virus & Anti-Spam If your router is not on this list check with the supplier. You can start by searching online! Reason to Block Example Unsuitable Adult material for children Undesirable Time wasting sites for employees Dangerous Malware or virus-ridden web sites Fraudulent Confidiential data leaving your network Routers can be programmed to restrict access times – this way you can determine how much time and between what times - your child can access the internet. It makes it very difficult for kids to get round it as the programming is on the router not the PC. You can have one administrator account with access to everything. This is of course provided they cannot guess the password! You can set the controls for PC’s, laptops and gaming machines. Mobiles, iPAD’s and tablets normally have their own GPRS (Internet) connection, but some do run through the house router. If you need help, again we suggest you go to your local IT supplier. Do be aware there is a potential risk of children overriding this as they can use the hard reset (which is a pin into a pin hole) and there are lists of the default passwords for all routers circulating on Google. There is also package out there called Routerpassview which will actually retrieve the password which has been set up for the router, from the config. backup file which has been stored on the machine. Bear in mind, there is no such thing as total security as shown when Gary McKinnon hacked into over 90 US Military computer systems! All you can do is the best you can. © EyePAT Community Interest Company Version 4.0 2014 103 www.eyepat.org info@eyepat.org Using the Internet Safely Netgear NETGEAR Wireless-N 300 Router (WNR2000) Netgear is working with Open DNS to use filtering technology in their router. There are no additional fees or subscriptions required. NETGEAR’s Live Parental Controls enable parents and businesses to restrict access to unsafe websites and filter inappropriate content. Rather than install and manage parental control software applications on individual computers and other Internetconnected devices, customers set the rules on the router, which can be managed remotely. Therefore, these powerful network-based parental controls not only protect personal computers but also mobile wireless devices such as the PSP™ and iPod Touch™, and gaming consoles such as the Wii™, when connected to the wireless home network. Additionally, the Live Parental Controls go beyond blocking inappropriate content to include anti-phishing protection, complementing the customer’s existing Internet security software to prevent phishing scams. Live Parental Controls enable customers to set up filters to block content according to more than 50 categories, including social networking sites, pornography, violence and others. Additionally, these settings can be specified on a per-user, per-time basis. That is, certain sites or content can be blocked for certain people at certain times of the day. For example, a parent can block social networking sites on their child’s computer during the day and then free it up for use in the evening when their homework has been completed. Live Parental Controls are immediately available on new NETGEAR Wireless-N 300 Routers (WNR2000). Installation is made simple by following the instructions on the Smart Wizard installation CD included with the product. Customers can also visit http://www.netgear.com/lpc for an installation tutorial and additional product information. NETGEAR’s Wireless-N 300 Router is backed by a one-year warranty and 24/7 technical support. Shop around as costs vary, however internet sites sell it for between £40 and £75. Additional product information and photos can be found at http://www.netgear.com/Products/RoutersandGateways/WirelessNRoutersan dGateways/WNR2000.aspx. © EyePAT Community Interest Company Version 4.0 2014 104 www.eyepat.org info@eyepat.org Using the Internet Safely BT Homehub BT do provide Parental Control software. Always check for their latest information on www.bt.com. Just type Parental Controls into the BT Search Box. These are the main features of BT Family Protection and what each of them allows you to do: Web blocking Select the categories of websites that will be blocked or allowed for each user Create a list of custom keywords to block Set the filtering of YouTube videos Instant messaging Select which instant messaging applications you allow Log instant message conversations that your children have through MSN Instant Messenger, AIM (AOL Instant Messenger), Yahoo! Instant Messenger and ICQ Instant Messenger applications Time limits Set limits on how long a child is allowed online each day Set a daily schedule that specifies what time of day a child is allowed to be online Email blocking Filter email so your children can only exchange emails with addresses that you approve Social networking Monitor inappropriate and vulgar words posted on social networking sites, blogs, forums and other sites Enter private information that you wouldn't want posted online and get alerts if this information makes it on to the internet © EyePAT Community Interest Company Version 4.0 2014 105 www.eyepat.org info@eyepat.org Using the Internet Safely Program blocking Take control of applications, file transfer protocols, and communication protocols that use the internet such as instant messengers, email, FTP, and peer-to-peer file sharing Add custom programs that BT Family Protection will either block completely, or monitor their usage Usage reporting See what websites were visited and blocked, instant messenger conversations, and any programs that have been used online Instant alerts Select a sensitivity level and be notified instantly by email, text message, or phone when a user tries to access banned websites DrayTek DrayTek's Web Content Filtering (WCF) facilities enable you to protect your network and your users from web content according to your preferences. As DrayTek WCF is performed by your router - your point of entry to the Internet - it is far more difficult to circumvent than software solutions installed on each client/PC and applies to guest PCs too (laptops etc.). Blocking/filtering can be selective for certain users or groups too, so that, for example, managers can have less filtering imposed than other users and time schedules can apply these content filtering for specific time periods only. Staff Internet Abuse - A real cost to your business The Internet provides your business with an effective, useful and often essential facility. Your staff can use it to find quick answers, liaise with customers, send and receive emails and many other productive tasks. Unfortunately, the Internet also provides the opportunity for misuse. DrayTek products can help you restrict, control and monitor staff Internet usage. Staff using your Internet facility for time-wasteful activities are costing you. Even more importantly these activities can put your businesses computers and network at risk. A recent survey of 10,000 employees indicated that 44% admitted to spending time on the Internet for personal use, for up to 2.1 hours per day. Most staff are responsible and prudent with their Internet use and we always recommend a suitable AUP (Acceptable Use Policy) to be in place so that staff or any users of your systems know what they are and aren't permitted to use the computers for. This AUP can be re-inforced by DrayTek routers which can block specific content (either at certain times only or all times) and also block potentially harmful file/code © EyePAT Community Interest Company Version 4.0 2014 106 www.eyepat.org info@eyepat.org Using the Internet Safely types from being installed by rogue web sites. There are some staff who will make severe abuse of the Internet facilities - spending literally hours on personal matters or social networking sites. Top 5 Personal Internet Uses for Employees Personal Email: Hotmail, Gmail, Yahoo etc. Instant Messaging: MSN, AOL, Yahoo etc. Social Networking: Facebook, MySpace etc. Buying: Using Amazon, Ebay etc. Multimedia : YouTube, iPlayer etc. It's easy to let a 'quick visit' become a prolonged stay without realising and losing track of time. All of the above activities can be immensely time consuming and addictive. What doesn't quite make the list but could be even more serious in its consequences is adult or illegal material being accessed in the workplace, as well as the higher likelihood that such sites are infected with malware which will then get onto your business network. There is also the potential to 'innocently' download software and install it on local PCs, unwittingly introducing spyware or Trojans onto your network. DrayTek Web Content Filtering DrayTek Web Filtering allows you to block web content in three main ways: 1. By matching keyword / specific sites 2. By web site category (Subject to Subscription) 3. By digital content type 4. IP Filtering (Actually part of the firewall, along with many other security features.) Features 1,3 and 4 above are included with the router. Feature 2 is included but requires an annual subscription to the external server which keeps a real-time constantly updated database of web sites. More details of that later. 1. Keyword Matching In Keyword Matching you can specify a list of either banned (blacklist)) or permitted sites (whitelist). The DrayTek method is 'object' oriented, which means that you create lists of keywords or sites, can then group them and then apply them into specific user groups or time periods Using a blacklist, all sites would be accessible by your users except those that match the keywords you specify. This would be useful, for example where there are specific sites known to be causing disruption or time wasting in your organisation such as social networking or webmail. The example below would allow access to all sites except the ones listed: Their website is www.draytek.co.uk. Search the site for “Parental Controls”. © EyePAT Community Interest Company Version 4.0 2014 107 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Device - Operating Systems Windows 7 To provide filters Windows links the person’s account to Windows Life Family Safety. Unless you are happy for everyone who uses the computer to have the same level of access you firstly need to create an account for each person. Click on the Start Button Select Control Panel Under User Accounts and Family Safety Choose Add or Remove User Account Click Create a New Account [see below] Enter the name for the account and then press Create Account © EyePAT Community Interest Company Version 4.0 2014 108 www.eyepat.org info@eyepat.org Using the Internet Safely To turn on Parental Controls for a standard user account Click on the account Click on Set Up Parental Controls If you're prompted for an administrator password or confirmation, type the password or provide confirmation. Rechoose the Account You will now be promoted to log into your Windows Live Family Safety Account. Enter your Username and Password If you do not have an account click on Don’t Have a Microsoft Account - Sign Up and fill in the appropriate boxes. © EyePAT Community Interest Company Version 4.0 2014 109 www.eyepat.org info@eyepat.org Using the Internet Safely Once signed in you may need to revert to the Set Up Parental Controls screen [see above} and click on Child again. Either way this box will appear. Choose the account to monitor and click on Next You will be asked to match the child with a family safety member. If one does not exist create a new one. Do not choose the adult. © EyePAT Community Interest Company Version 4.0 2014 110 www.eyepat.org info@eyepat.org Using the Internet Safely Click on Save Setting up Windows Life Family Safety This is the next stage in the process. All you have done in Windows is to apply the Family Safety setting to the Child’s Account. You now need to apply the setting for the child / children within Windows Live Family Safety. Click on the Family Safety Website link [see above]. This will take you onto the appropriate web page. Choose the child’s account. © EyePAT Community Interest Company Version 4.0 2014 111 www.eyepat.org info@eyepat.org Using the Internet Safely Apply the relevant settings within each box. Carefully check each box out. When you have finished click on the icon to return to another account. To log out click on your name to the right of the screen and choose Sign Out. © EyePAT Community Interest Company Version 4.0 2014 112 www.eyepat.org info@eyepat.org Using the Internet Safely Windows 8 The same process applies for Windows 8 as Windows 7. It is just the steps look different because of the different layout or graphics between the two. Move your cursor all the way to the right in the Windows 8 Desktop, and then select Settings [spikey wheel] when the Charm bar appears Select Control Panel from the options under Settings Click on Family Safety where it appears over on the left in the Control Panel. © EyePAT Community Interest Company Version 4.0 2014 113 www.eyepat.org info@eyepat.org Using the Internet Safely Click on Manage settings on the Family Safety Website Login to the family safety account using the same user password as is on your computer. Click View activity report on the user you want to set up parental controls for. Click on Web Filtering and select Turn on web filtering to filter what the user can access on the Internet. Select the Designed for Children option and click Save. © EyePAT Community Interest Company Version 4.0 2014 114 www.eyepat.org info@eyepat.org Using the Internet Safely Apple Mac To create a user account: Choose Apple Menu / System Preferences and click Accounts Open Accounts preferences Click the Lock icon to unlock it and type an administrator name and password Click the Add [+] button below the list of accounts Choose a type of account from the New Account pop-up menu Administrator - an administrator can create, delete and modify accounts, install software and change system settings. Standard - standard users can install software for their own use and change settings related to their accounts but can’t administer other accounts Managed with Parental Controls - for these accounts the administrator can restrict access to applications and inappropriate content and limit the amount of time users can use the computer. Sharing Only - sharing only users can access shared files but can’t log in or change settings on the computer Group - a group account contains other user accounts and is used for setting privileges for shared files. Enter a Name for the account. A short name is generated automatically. If you want to use a different short name, enter it now. [After the account has been created you can’t change the short name]. Enter the Account Password in the Password and Verify fields and then enter a Hint to help the user remember the password. Click Create Account Managed with Parental controls Accounts Under this type of account you can limit almost everything, from programs that can be used, internet sites, whether or not they can print, burn CD/ DVD’s, films, downloads, browsing and apply time limits. It is simply a matter of clicking the boxes that you’d like to allow access to. © EyePAT Community Interest Company Version 4.0 2014 115 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Device - Commercial Software There are a number of software packages available on the market to help you monitor what your child(ren) can look at and do on the internet. They range in their functionality from: Reading every email sent or received Seeing both sides of every chat or message they take part in Seeing every webpage they visit and how long they stay there Blocking access to inappropriate sites Seeing every keystroke they type in on their computer Controlling when they can use the computer and what programs they can use Being notified when any specific words you select are used in any communication Filters are updated regularly and automatically when they are logged on, irrespective of which computer is used, e.g. home desktop, own laptop, etc. These are some which are recommended: © EyePAT Community Interest Company Version 4.0 2014 116 www.eyepat.org info@eyepat.org Using the Internet Safely The Utility Warehouse Packages To purchase a broadband package visit www.utilitywarehouse.co.uk/G35815. If you need any help with this call us on 01446 795055 or contact us on info@eyepat.org. © EyePAT Community Interest Company Version 4.0 2014 117 www.eyepat.org info@eyepat.org Using the Internet Safely Note: To help fund the work we do on online safety and anti-bullying, EyePAT CIC receives a donation for every householder or business who signs up for any of the Utility Warehouse packages. My Secure PC from Utility Warehouse To order go to : www.telecomplus.org.uk/G35815 or http://www.eyepat.org/mysecurepc As part of their ‘Broadcall’ package, Utility Warehouse offer MySecurePC. MySecurePC provides a comprehensive range of tools to provide all-round protection against internet threats such as spam, viruses, and hackers. It's also really simple to install! Once installed, MySecurePC is hassle free, helping to ensure that your computer is safe from all the threats of the internet. It automatically protects your computer in the following ways: Parental Control - Allows parents to restrict which websites can be accessed and also limit internet use to specific times of day, giving you complete control and peace of mind. Anti-virus - Detects and removes all known viruses, with automatic updates. Firewall - Protects your computer against hackers. You are in control of who can access your computer and data. Anti-spyware - Constantly checks and removes any malicious software which may have become installed on your computer. Anti-spam - Monitors all incoming e-mail and automatically transfers any suspect e-mails into a spam folder for you to view at your leisure. Internet customers can try the service free for 30 days by visiting 'the Clubhouse', © EyePAT Community Interest Company www.eyepat.org 118 Version 4.0 2014 info@eyepat.org Using the Internet Safely available at www.utilitywarehouse.co.uk/clubhouse. Customers will need to unsubscribe if they do not wish to continue with the service after the 30 day trial. At the expiry of the free trial, MySecurePC costs the following: Number of Licences Cost per month 1 3 5 8 16 24 £3 £4 £7 £10 £17 £25 © EyePAT Community Interest Company Version 4.0 2014 119 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Device - Tablet Tablets Connect to the internet via the broadband. The filters which are applied at the ISP or Router level will therefore apply in the same way to the tablet as they do to a PC or laptop. As with a laptop however, when you use the tablet in public spaces or via someone else’s Broadband, those restrictions will apply. Currently parental filters in public places are purely voluntary. McDonald’s do have them, but many places like coffee shops offer unlimited unfiltered WIFI. If using a Dongle then the filters on this will apply. It is important to remember that filters may need to be applied at more than one source. iPAD Applying Safety Controls The iPad is a hand held computer which connects to the internet. This means parents should take the time to understand the iPad’s parental controls and how to set them. Taking a few minutes to apply the correct controls can be invaluable for your children. The process is fairly simple and very similar to that of the iPhone and the iPOD Touch You can always use RangerBrowser instead. See Page 148 Find the Settings button on your home screen Find the General tab on the left side. Click the Restrictions option At the top of the screen click Enable Restrictions. This will bring up a password box. As this is your first time, you’ll need to think of a code and enter it twice to confirm. Note we suggest you use the same code for all these applications. Note Don’t forget this password. It’s your only way to turn restrictions on and off on the © EyePAT Community Interest Company Version 4.0 2014 120 www.eyepat.org info@eyepat.org Using the Internet Safely iPad. If you forget, the only way to bypass it is by resetting your iPad to the factory settings. You have the option to disable or enable a number of apps and allowances: Safari – (the Apple Internet Browser), YouTube, installing apps, etc. Switching these apps to the off position will actually remove them from the iPad’s homepage—meaning your children won’t be able to access them until you switch them back on. Some suggestions: Safari – Turn this off if you don’t want your child browsing the web. Safari doesn’t have a content filter, so unless you’ve installed a third-party, kidfriendly web browser, it is advisable to switch this to off. YouTube Safety mode isn’t available, so it is safer to switch this to off. Installing Apps with this switched on children can download apps and you could well receive unwanted bills from Apple. Scroll down on the same page. You can choose the type of content you allow to be downloaded, installed or viewed on your iPad, as well as the option to disable in-app purchases. © EyePAT Community Interest Company Version 4.0 2014 121 www.eyepat.org info@eyepat.org Using the Internet Safely The recommended setting for these is Off. In-app purchases – these are actual purchases made inside any app that’s downloaded to your iPad. eg If your son or daughter decides that they want to buy £100 worth of gold coins in a game they can. Note - if you’ve ever bought an app in the App Store your iTunes account is probably linked to your credit card. You can also limit the kind of content that gets downloaded or played on your iPad. This is done by selecting the rating for each type of content. Music – setting the Explicit setting to OFF disables all explicit purchases in the iTunes Store and stops explicit songs that your child may already have on their iPad being played Movies The recommended setting for this is G or PG TV Shows The recommended setting for this is G or PG Apps The recommended setting for this is 4+ or 9+ depending on the age of your children. Note These settings are based on your children being under 11. If the children are older then adjust the settings accordingly. © EyePAT Community Interest Company Version 4.0 2014 122 www.eyepat.org info@eyepat.org Using the Internet Safely Disabling In-App Purchases on iOS and Android Devices Many thanks to Yoursphere.com for providing this information In-app purchases can pose one of the biggest headaches for parents whose children have Smartphones or tablets. If you assigned your credit card to your child’s Smartphone, you probably didn’t give it much thought. By why would you? They don’t have their own credit card, so it only made sense. But what parents usually don’t realize about these devices is that their child has easy access to three different types of mobile apps out there: Free Paid-for “Freemium” The first two are self-explanatory, but freemium is a word that’s new to a lot of people, and it essentially means that the app is free to download and free to use, for the most part, but the user has the option to make purchases from within the app. These purchases are tied directly to your credit card account, making the entire purchasing process rather easy and fast for even the youngest child. Months later, the unsuspecting parent takes a look at their credit card statement only to find a £5 charge here, a £10 charge there and a few more £1 charges from a company they’ve never heard of. At this point, of course, it’s a day too late, but that doesn’t mean you can’t prevent it from happening again. Below is a guide that shows you how to quickly disable in-app purchases in an Apple or Android mobile device, including Smartphones and tablets. Please share it with other parents who you think would benefit from it. Tap the Settings icon Tap General Tap Restrictions and then Enable Restrictions © EyePAT Community Interest Company Version 4.0 2014 123 www.eyepat.org info@eyepat.org Using the Internet Safely Enter a PIN and re-enter to confirm Now, scroll down and turn off in-app purchases Disabling In-App Purchases on Android Devices 1. Open the Google Play Store app 2. Press the Menu button and then choose Settings 3. Scroll down a bit and under User Controls select Set or Change PIN 4. Enter a PIN and press OK 5. Re-enter the PIN 6. Check the box that says Use PIN for purchases Now you can take comfort in knowing that your child is enjoying their smartphone without having to worry about an unexpected credit card bill or them seeing content that you don’t approve of. Technology should be enjoyed by all of us, especially our children, but only when parents are involved and proactive! © EyePAT Community Interest Company Version 4.0 2014 124 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Device - Mobile Mobile Phone Operators Parental Controls Links to videos showing how to apply parental controls are available from the EyePAT website http://www.eyepat.org/howto Check out the websites for these operators for more up to date information. At the time of writing February 2014 ......... They have developed a system called Content Lock which helps prevent children from accessing 18-rated material. Content Lock has three settings: On; Moderate and Off. All mobiles, USB sticks and data cards are sold with Moderate Content Lock already applied, free of charge. With Content Lock on, you won't be able to access any unmoderated [and interactive] user generated sites, chatrooms and 18-rated material from the internet, t-zones (our downloads portal) and third party shortcodes. Moderate Content Lock still restricts access to all 18 rated material, but allows most social networking sites such as Twitter and unmoderated user generated content sites such as Youtube, Flickr etc. Types of websites that can't be accessed when Content Lock is on, include: Unmoderated social networking sites, Unmoderated chatrooms, Sites with persistent bad language, Visual material of a sexual nature, Horror content, Extremely violent content Tip: Your child may also receive content directly from other people, for example in text messages or picture messages. We can't filter any of that privately sent content. You should therefore discuss with your child the types of content you'd be unhappy for them to receive or share with others. How to apply Content Lock Children are at high risk of coming into contact with inappropriate content when they are given a second hand phone where Content Lock has been turned off. If you give a TMobile phone to a child, it's your responsibility to make sure Content Lock is turned on again before you give it to them. You can find out whether Content Lock is on or off on your phone by either, calling 1818 or by calling Customer Services on 150 or from My T-Mobile. If you find that Content Lock is off and you want to turn it on before giving the phone to your child, you can do this simply by texting STRICT to 879. To switch to Moderate Content Lock .i.e give your child access to Youtube, Twitter and other similar content, but not 18 rated content, text MODERATE to 879. How to remove Content Lock Moderate Content Lock is automatically applied to all our devices however, you can ask to have Content Lock removed if you can prove that you're over 18. There are various simple ways by which you can you can verify your age and remove Content Lock Call 1818 from your T-Mobile phone and enter in your credit card details, Enter your credit card details in the web page that appears when you access a site blocked by Content Lock. Login to My T-Mobile and remove Content Lock (pay monthly customers only) Visit a T-Mobile store with a proof of ID such as a. driving licence, credit card or passport Or call 150 © EyePAT Community Interest Company Version 4.0 2014 125 www.eyepat.org info@eyepat.org Using the Internet Safely If Content Lock is turned off using a credit card, a £2 charge is applied and then recredited immediately to that credit card. The transaction will appear on the card holder's next credit card statement as 'Content Lock Removed' Three Parental control on your child’s phone. They protect under-18s from adult content, so they’ve made sure that all phones on their network can restrict access to websites and phone services that contain content that is inappropriate for people under the age of 18. You might want to consider this if you're concerned about your child accessing age inappropriate content on their phone. The restrictions are applied by Three so your child won't be able to remove them. If your child has a Pay As You Go phone, adult content will automatically be filtered on their phone. If your child has a Pay Monthly phone, they'll automatically be able to view adult content unless you choose to block it by setting up an adult filter on their phone. Once it's been set up, the filter can only be removed by someone aged 18 or over Accessing adult content on your phone. They’re working with the BBFC to make sure that adult content can only be accessed on phones if you’re aged 18 or over. Certain websites will be filtered for anyone under 18. How to change your filter settings. You can block and unblock adult content on your phone by giving us a call or adjusting your settings yourself. 1. Go to mobile.three.co.uk on your phone. 2. Select My3 account. 3. Select Account security. 4. Select Update adult filter settings. 5. Enter your PIN. If you haven’t got one, you’ll need to set up a PIN in your My3 account. 6. Switch your adult filter settings to on. You can turn it off again whenever you want. 7. Select Save. Mobile Parental Controls mean that adult content such as pornography, gambling and violent games is filtered out when you use the internet on your phone. This is designed to help protect under 18s from accessing inappropriate content and is turned on by default on all phones. If you want to turn it off, you can do this by calling us on 08700878751. Its important to remember that Mobile Parental Controls will only apply to websites accessed over our mobile network. If you connect the phone to your home broadband using wireless then you can use their online security service HomeSafe™ , which lets you control the types of websites the household can access, across every single device that connects to your home broadband. Its free and set up through My Account . © EyePAT Community Interest Company Version 4.0 2014 126 www.eyepat.org info@eyepat.org Using the Internet Safely There is also lots of advice to help you keep you and your family safe online in http://www.talktalk.co.uk/security/. Parental Control is a service they offer to help parents protect their children while they're online. It restricts internet access on a mobile to sites which are suitable and interesting for children. To turn Parental Control on or off Call 61818 to control web access on your mobile or use the online service Call 1300 to keep your phone location private 'Location based services' are mobile phone services which depend on information about the location of a mobile in order to work. For example, when you're lost, you use Streetmap. And on O2 Active, there's a service to help you find the nearest cashpoint. Although it might seem like a useful idea to be able to track where your child is via their mobile, it can actually bring with it certain risks. It means that any third parties, whether they have any harmful intentions or not, are able to find out the whereabouts of a child's mobile - and potentially, its owner. When you buy your child a new mobile phone or pass down a used one, you should check the location based settings on the phone by dialling 1300, an automated response number. You'll then be able to select from a menu of four different privacy settings. To have maximum privacy for your child, select option 4. You can then check and change this setting as often as you like, by dialling 1300 from the mobile. Please note: if there's ever an emergency and the police need to track down a person's phone, they will be able to request that the location based settings be switched back on, regardless of which setting has been selected. Call 61018 to block 18+ content on your mobile We respect our customers' freedom to choose what material they access. But equally, we want to help protect children from seeing things they shouldn't. So our approach to controlling access is strict. You should check your child's phone is set at the right level by phoning the Age Verification automated service on 61018. Just dial the number and follow the prompts. This is especially important with a 'hand-me-down' phone, which could have been switched to the 18+ setting by its previous owner. For further details go to: http://www.o2.co.uk/support/generalhelp/howdoi/safetycontrolandaccess/p arentalcontrol Vodaphone – Content control and Vodafone Guardian Content control protects younger customers from seeing inappropriate pictures and internet content on our network. They automatically put it in place on their devices to protect from: chat and dating services, erotica, gambling and violent games To remove it for the first time they need to check you’re over 18, and after that it’s easy to add or remove it again – say if you lend it to someone under 18. Vodafone Guardian is their free Android app to help parents protect their children as they use their phones – with even more control than our content control. © EyePAT Community Interest Company www.eyepat.org 127 Version 4.0 2014 info@eyepat.org Using the Internet Safely For further details go to http://help.vodafone.co.uk Orange – New ADSL Value Added Service content filtering from Orange internet can block access to known sites that promote objectionable content and approve a list of sites for children to enjoy. Blocked Categories include IWF-Restricted Categories, Adult/Mature Content, Illegal Drugs, Illegal/Questionable Sites, Intimate Apparel/Swimsuit, Nudity, Personals/Dating, Phishing, Pornography, Proxy Avoidance, Sex Education, Sexuality/Alternative Lifestyles, Spyware Effects/Privacy Concerns, Spyware/Malware Sources, Violence/Hate/Racism, Weapons You can choose the categories you want to block by entering your Parental Control username and password. Full details are available on: http://www.orange.jo/sites/residential/English/MyAccount/internet/Pages/p arentalControl.aspx Virgin - If you’re a Virgin Media customer, you don’t need to buy parental controls software because it's included in their Virgin Media Security product. Virgin Media Security lets you filter and block more than 550 million websites based on how suitable they are to your child, and it constantly updates to stop any unsuitable sites slipping through the net. Firstly, you will need to create a Windows User Account for each person in your home. This will then be used to configure Virgin Media Security to fit the age of your children. You might choose a more relaxed profile for your older child, for example. You can also set up a profile with no restrictions for the adults in the house..) You can also stop your kids using the web at certain times (perhaps when it’s past their bedtime) or specific sites (like Facebook and YouTube) when they’re meant to be doing their homework. More details available on: https://my.virginmedia.com/discover/broadband/your-broadband/protectfamily/parental-controls/ © EyePAT Community Interest Company Version 4.0 2014 128 www.eyepat.org info@eyepat.org Using the Internet Safely iPhone Controls iPhones, as with nearly all mobile phones have internet access. This needs to be controlled in the same way as any other internet enabled device. Here are a few things you can do. However you still need to phone the service provider (whom you pay) and ask for Parental Controls to be applied to the phone if it is being used by a child. You can always use RangerBrowser instead. See Page 148 Go into the phones Settings Go to the General Tab Scroll down and look for the tab called Restrictions. If it says Off change it to Enable Restrictions. At the top, click on Enable Restrictions. Create a password and don’t forget it as there’s no way to retrieve it. Disable any functions such as YouTube. This removes the icon completely from the iPhone’s screen. Note Re-enabling these functions is as simple as following the same steps, re-entering your password, and turning the functions back on. Passwords – it’s a really good idea to create one sophisticated password but easily remembered password for all your children’s devices. It must be one they cannot guess. It should contain capitals and lower case and numerals © EyePAT Community Interest Company Version 4.0 2014 129 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - iPod Just about everything safety related is managed from the Settings App. Tap it and select the menu called “General”. From the General menu, scroll down to the option called “Restrictions”. When you click this you’ll be asked for a password. Create one, don’t share it, and don’t forget it. Now you’ll be at the Restrictions page. This is essentially your Parental Safety Controls Dashboard. Here you can do several things, including: Remove/restore certain apps from the device. Set restrictions for the App Store. Set content restrictions for videos and music. The first thing to do is switch Location to “off”. No one needs to know where your child is in real life! Next disable Safari since it doesn’t allow you to set content filters. If you want to allow your child to access the Internet, download one of these browsers: K9 Web Browser Ranger Browser AVG Family Safety Browser © EyePAT Community Interest Company Version 4.0 2014 130 www.eyepat.org info@eyepat.org Using the Internet Safely With the new browser installed turn off the YouTube app since there’s no way to set a filter there which forces you to rely on the web version of YouTube via the mobile browser. Finally turn off the ability for your child to install apps without your permission. Turning this off removes the App Store button from the Touch entirely. From here you can now set the content restrictions for movies, TV shows and music. Note that setting the Explicit setting to OFF makes it so any explicit songs that your child may already have on their iPod become unavailable. It also disables all explicit purchases in the iTunes Store. There is also the option to set the age restrictions for downloading apps from the App Store, but this is somewhat useless as it still allows your child to see the adult apps and read the description. They are only prevented from downloading it to their iPod. © EyePAT Community Interest Company Version 4.0 2014 131 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Device - Gaming XBox 360 - Parental Controls Due to Xbox’s success it attracts cyberbullying, Sexting, grooming, and inappropriate communication. XBox is great but it is also used by people who would like to harm your children. So its important to activate Xbox’s Family Setting safety controls to keep them safe. There are 2 key things a parent needs to do when allowing their children to use an XBox. a) Make sure their child doesn’t post any Information online which could result in them being traced or found. b) Take responsibility for their child’s safety by setting the Xbox Family Setting safety controls. 1. On the main dashboard, go to the tab called My Xbox 2. Then scroll over to the box called System Settings 3. Click on Family Settings 4. Click on Console Controls Each category is explained in detail below. Do each one in turn. © EyePAT Community Interest Company Version 4.0 2014 132 www.eyepat.org info@eyepat.org Using the Internet Safely Console Controls & Game Ratings Choose the game rating 5. Recommended Setting for children is G or PG Console Controls Video Ratings For DVDs 6. Recommended Setting for children is G or PG Unrated DVDs (family DVDs are not rated) 7. Recommended setting for children is Allowed Console Controls XBOX Live access - allow or block altogether. Blocking prevents your child from using ANY Xbox Live feature, i.e. online gaming, Netflix, Zune, and chatting with friends. 8. Safest setting for very young children is Blocked, however this may be too restrictive for older children. Suggest Allowed but only with parental supervision. Console Controls XBOX Live Membership Creation allows you to block or allow people from creating new memberships on the console. Console Controls Restricted Content 9. If you are unlikely to change previous settings: Recommended setting Hide Restricted Content If you want easy access to change settings using password Recommended setting Show All Content © EyePAT Community Interest Company Version 4.0 2014 133 www.eyepat.org info@eyepat.org Using the Internet Safely Console Controls Family Timer Set weekly and daily time limits for children logging into their Xbox accounts. 10. Highly recommended – research has shown excessive gaming does change children’s behaviour. Console Controls Set Pass Code 11. Set a password – very important Use a password you will remember but the children can’t guess. Select Done button and Yes, save changes Its all done! Note: If you set a family timer, you should immediately see a pop-up which shows a countdown. Note: You can test the family settings by running a game that exceeds the rating you specified. If the game is rated higher than you allowed you’ll see a pop-up asking for the pass code. © EyePAT Community Interest Company Version 4.0 2014 134 www.eyepat.org info@eyepat.org Using the Internet Safely Xbox 360 Netflix ‘Just For Kids’ User Interface Many thanks to Techcrunch for providing this information Netflix is making it even easier for kids to bypass channel surfing and search for their favourite shows and characters, with an updated app for the Xbox 360. The latest version of Netflix’s Xbox 360 app, brings its increasingly popular ‘Just For Kids’ user interface to the gaming console. Netflix’s Just For Kids UI debuted nearly a year ago, offering its younger users an easier way to find and watch their favourite shows. Unlike Netflix’s usual user interface, which highlights movie box art and descriptions, Just For Kids is character-centric, so that toddlers can navigate what they want to watch based on which popular characters most appeal to them, whether it be Dora The Explorer or Spongebob Squarepants. Since introducing the UI on the web, Netflix has been busy porting it to other devices, such as the Nintendo Wii, PlayStation 3, Apple TV… and now the Xbox. For the Xbox 360, the updated app is a clear win, as it will mean even more media consumption on the game console. Microsoft seems to be pushing the Xbox more as a media hub than a game console these days, so grabbing the attention of a home’s youngest users is one way to solidify its place in the living room. © EyePAT Community Interest Company Version 4.0 2014 135 www.eyepat.org info@eyepat.org Using the Internet Safely Wii Parental Controls If your Wii connects to the internet you need to set the parental controls to keep your children safe. It’s your choice whether you tell the children you have done this, but children don’t always like parental controls and some do try and get around them. Quietly setting it up beforehand means the children may not realise they are there. These step by step instructions should make it easy to do. What to do: 1. Turn on the WII and from The Wii Menu, select the Wii button 2. Select Wii Settings. 3. Click the blue arrow on the right to access Wii System Settings 2.1 4. Select "Parental Controls" and Yes. 5. Click Ok 3 times to begin setup. 6. Input a PIN number then select OK. Your pin number must be secret but something you will easily remember but not easily guessed (avoid birthdays your children know them!) 7. Enter the PIN number again and select OK. 8. Select a secret question and click OK. Again make sure the children can’t guess it. 9. Enter the answer and select OK. 10. Select Game Settings and PIN then The Highest Game Rating. © EyePAT Community Interest Company Version 4.0 2014 136 www.eyepat.org info@eyepat.org Using the Internet Safely 11. Use the blue arrow to scroll through the ESRB ratings. See below for a description of the settings. 12. Select the desired rating restriction and OK. 13. Select Confirm. Select Other Settings and OK. This allows you to restrict settings to: Internet access © EyePAT Community Interest Company Version 4.0 2014 137 www.eyepat.org info@eyepat.org Using the Internet Safely spending Wii Points in the Wii Shop user-to-user communication Wii News Channel. Restricting the features: Recommended restriction setting is Yes. The Internet Channel – Allows the use of the Wiii to browse the Internet. We would not recommended this for young children. Do they really need it from their Wii? Suggested restriction setting is Yes. The Wii Shop Channel – This is where Wii users can purchase Wii points with their credit card, and then use those points to buy downloadable games (old Nintendo games, Wii games, etc) or applications like Netflix *. Recommended restriction setting is Yes. User-to-user communication – Pretty much exactly what it sounds like. Restricting this is a good idea as the Wii allows your children to chat with other Wii owners (strangers) via text or voice. This is not safe for young children. Recommended restriction setting - No The News Channel Note: Some features will not appear until the Wii Console is connected to the Internet. 14. Once all selections are made, select Confirm. 15. Select Settings Complete to save the changes. * Note: The Netflix app is not disabled or filtered by any of these Parental Controls. The restrictions you set on game ratings do not affect the content which can be streamed on Netflix. Netflix has separate parental controls for this, which you can access through your Netflix account. © EyePAT Community Interest Company Version 4.0 2014 138 www.eyepat.org info@eyepat.org Using the Internet Safely Go to Netflix.com, log in, and then click on the link in the top right corner called Your Account & Help. Scroll down to the Preferences box and click on the link called Change Parental Control Setting. From here you can select the restrictions that best suit your family. © EyePAT Community Interest Company Version 4.0 2014 139 www.eyepat.org info@eyepat.org Using the Internet Safely Filtering - Search Engines [Browser] Firefox Open Firefox Click the Firefox tab in the top left corner. Scroll over Options and then select Options from the menu. The Options window will display. Click the Privacy tab. Here, you’ll need to do a few things. First, check the box that says Tell websites I do not want to be tracked. Then, under the History section, select Use custom settings for history from the drop down menu. This will allow you to customize your settings for cookies and web browsing history. Here are the settings that Yoursphere.com recommend. Firefox Family Safety There are no inbuilt Parental Filters or Controls It is done by the same Add on as used by Google - Web Filter Pro © EyePAT Community Interest Company Version 4.0 2014 140 www.eyepat.org info@eyepat.org Using the Internet Safely Yahoo SafeSearch The Yahoo SafeSearch feature is designed to filter out explicit, inappropriate and adult-oriented content from Yahoo Search results. Here's how to change your SafeSearch settings. Changing your SafeSearch filter Sign in to Yahoo. In the search box, enter a search and click Search. Mouse over the gear icon . Click Preferences. Next to "SafeSearch," select an option: Strict - no adult content Moderate - no images or video Off - do not filter results Click Save. Are you are unable to turn off SafeSearch? There are two possibilities: You may be signed in to a Yahoo Account that's registered as an under-18 account. You may need to contact your Internet Service Provider (ISP) for further details. SafeSearch Lock SafeSearch lock can be activated when you're signed in to your Yahoo Account. To disable it, you'll need to be signed in, and pass an extra verification step confirming that you're over 18 years of age. Google Chrome Family Safety Like Firefox, Google Chrome uses an add on called WebFilter Pro. To download it for Chrome go to https://chrome.google.com/webstore. © EyePAT Community Interest Company Version 4.0 2014 141 www.eyepat.org info@eyepat.org Using the Internet Safely WebFilter Pro can make web browsing safer by restricting access to: pornography adult social networks violent content online gaming websites gambling websites drug related websites any site that threatens your computer’s security (scams, malware, spyware, viruses, etc) Chrome Set Up Process Once you’ve installed WebFilter Pro from this link, simply click on the icon in the top right corner of your browser. 1. Choose Settings and click the box called Enable Password Protection. 2. On the drop down, click Sign Up and follow the steps to register your email address. The whole point of this process is to password protect your settings so you and only you can change them in the future. 3. After you’ve checked your email and clicked the activation link, go back to the Settings page and begin adding a check mark to anything you want blocked on your Chrome browser. © EyePAT Community Interest Company Version 4.0 2014 142 www.eyepat.org info@eyepat.org Using the Internet Safely 4. The restrictions do a very good job of blocking exactly what they need to block. On top of these settings, you also have the option of blocking (or allowing) specific websites as you or your child come across them. All you have to do is click the little icon in the top right corner and make your selection. 5. When you’re done, the last thing you need to do is switch WebFilter Pro to Kids mode under Settings. Doing this will password protect all the changes you’ve made to the block list, as well as the basic settings. Chrome Open Chrome Click the wrench icon in the top right and select Options. Click on Under the Hood on the left navigation panel. In the Privacy section, click the Content settings button. © EyePAT Community Interest Company Version 4.0 2014 143 www.eyepat.org info@eyepat.org Using the Internet Safely The Content Settings menu will appear. Here you’ll want to make sure that your settings match the screenshot below, at minimum. Bing Safe Search (Bing isn’t the best option for families since you can’t lock SafeSearch). Go to www.bing.com and you’ll see the homepage. Click the gear icon in the upper right hand corner (Outlined in red in the screenshot below). Clicking the gear icon will take you to Preferences page and from there you can set up your search filters. © EyePAT Community Interest Company Version 4.0 2014 144 www.eyepat.org info@eyepat.org Using the Internet Safely When you’re done setting up Safe Search click the yellow Save button in the upper right hand corner. Unfortunately, you cannot save your Safe Search settings for Bing since the settings aren’t tied in any way to your user account. Internet Explorer 11 A browser is an application that lets you view web sites on the internet. The most popular one at present is Internet Explorer. It has security and privacy options that can be set by users, but the options differ slightly, depending on which version of Internet Explorer you have on your computer. To find out which version you have on your computer: Open Internet Explorer Click on the Help Menu option at the top of the screen Select the About Internet Explorer option Open Internet Explorer Open up Click on the Tools Menu and select Internet Option Click on the Content tab Select Family Safety © EyePAT Community Interest Company Version 4.0 2014 145 www.eyepat.org info@eyepat.org Using the Internet Safely If you wish or need different members of the family to have different levels of access you need to apply them to different accounts. From here you can create accounts. You can also do this from your Control Panel within Windows. Follow the instructions given in this box. © EyePAT Community Interest Company Version 4.0 2014 146 www.eyepat.org info@eyepat.org Using the Internet Safely Kid Safe Search Engines Google is a search engine, as is Yahoo, Bing etc. etc. There are some search engines specifically designed for children. They filter out sites which some parents and teachers might find inappropriate for children. This usually includes sites which deal with explicit sexual matters, porn sites, violence, hate speech, gambling and drug use. Bing appears to have built in some security settings. Test them out using words which you think may bring up inappropriate sites. For those of you who have attended an Eye PAT awareness session, use the word you learnt during the session. It is a good test. Microsoft and CEOP create child-friendly version of IE9 By James Trew posted Feb 7th 2012 https://www.thinkuknow.co.uk/parents/ie9/ To protect very young minds from the perils of the internet Microsoft teamed up with CEOP (Child Exploitation and Online Protection Centre) to create a special kid-friendly version of its IE9 browser. Access to key CEOP pages are baked right in, and there are dedicated tabs for the thinkuknow.co.uk information site and, of course, Bing. Additional security comes via a Jump List that lets parents and carers set the age group of their child and prevents them from seeing unsuitable content. It's only available on Windows 7, and you'll need to prevent your curious children from using any other browser, but at least it's extra peace of mind at no extra cost. © EyePAT Community Interest Company Version 4.0 2014 147 www.eyepat.org info@eyepat.org Using the Internet Safely SafeSearch for Kids is the child friendly search engine where safe search is always 'on', powered by Google. The safe browsing feature allows your kids to safely surf the web with a much lower risk of accidentally seeing illicit material. http://www.askkids.com/ Ask Jeeves For Kids - http://www.ajkids.com/ KidsClick! - http://www.kidsclick.org/ Yahooligans -http://www.yahooligans.com/ (For chidren aged 7-12) CBBC - http://www.bbc.co.uk/cbbc/find/ Ranger Browser – A Safe Browser for a Child’s iPhone, iPad or Android You can download all versions of the Ranger Browser app, from http://www.mobsafety.com/. Note : This product has been tested and recommended by Yoursphere in the USA. Yoursphere are a reputable and recognised organisation. They wrote these instructions. Whatever a child is viewing on that iPad or Android phone should be safe and age-appropriate. Kids now often know more than their parents when it comes to technology, but we still need to parent online in the same way we do offline. The only way to ensure a safe and age-appropriate experience is by placing predetermined limits and filters on these devices. Ranger Browser is a free app available in the Apple App Store and Android Marketplace (for some Android devices). The app replaces the standard mobile web browser (i.e. © EyePAT Community Interest Company Version 4.0 2014 148 www.eyepat.org info@eyepat.org Using the Internet Safely Safari on the iPhone or iPod) and packs much better safety features and monitoring tools. Up front, Ranger Browser: Keeps a record of all visited websites so parents can view them later Has five different levels of filtering Offers both a white list and black list function that allows parents to allow/block specific websites Plus, the ability to set time limits on Internet access Yoursphere tested Ranger Browser on a third generation iPod Touch and found that the application does what it claims to do. Installation and setting up the parent account was all very straightforward and simple, but here are some written instructions which may help. 1. Download the app and register as a parent. You can download all versions of the app at the Mobsafety website. 2. Make it the default browser on whatever device it’s on. On an Android, the quickest way to do this is by opening the Ranger Browser app > Settings > Set as default browser. If a popup box shows up listing the browsers on the device, check the “Use this action by default” box and then choose Ranger Browser. To set the default browser on an iPhone, iPod Touch or iPad, you’ll need to disable the Safari app through the Restrictions menu, which you can learn to do here. Then, simply put the Ranger Browser app icon in its place. Step 3 – Once you’ve done that, head back to www.mobsafety.com and log in with the username and password that you set up in step 1. From here, you can access your child’s browsing history and set filters and time limits. © EyePAT Community Interest Company Version 4.0 2014 149 www.eyepat.org info@eyepat.org Using the Internet Safely You can also customize each predetermined setting as you see fit. To test the application we set the content filtering to “Medium” and visited several non-child friendly sites. All were blocked as seen below. What really amazed our team was how the parent dashboard is updated in real time, so you can see what your child is viewing as they’re viewing it on their smartphone or tablet. The Time Limit function also worked very well, although it would be nice to have a slider that allows you to set more specific time limits. Currently, you can only choose hours © EyePAT Community Interest Company Version 4.0 2014 150 www.eyepat.org info@eyepat.org Using the Internet Safely and not minutes, so if bedtime is at 9:30, you can only set the Internet access to cut off at 9 or 10. Overall, the application works wonderfully, and we didn’t encounter any bugs or crashes while testing. If your children use a smartphone or tablet and you’re interested in keeping them safe on the web, Ranger Browser is definitely worth looking into. And best of all, it’s free! Safari Open Safari Click the Tools icon in the top right corner and click Preferences From here, click the Privacy tab and select the Block cookies from third-parties and advertisers radio button. © EyePAT Community Interest Company Version 4.0 2014 151 www.eyepat.org info@eyepat.org Using the Internet Safely Filters - Applications You Tube Safety Mode YouTube does a fairly good job of removing inappropriate content on the site. But with the millions of videos being uploaded and viewed every day there are risks. for their children. YouTube's Safety Mode is an added safeguard to filter out videos that some parents may consider inappropriate YouTube Safety Mode is a simple process; if it’s not done right it can easily be undone. 1. Go to the computer that your kids use and visit YouTube.com. 2. Clicking the Sign In button in the top right corner. 3. You need to have a Google Account in order to do this. A Google Account is easy to set up and can be done using your normal email address. Once this is set up you can use it for any Google Accounts. Note - Make sure you do not click the option to ask Google to remember your log in and password, otherwise you children will be able to use it. 4. Scroll to the bottom of the homepage and look for Safety Off 5. Click On and Save and lock safety mode on this browser Doing this will ensure that, even if you’re logged out, Safety Mode will stay on © EyePAT Community Interest Company Version 4.0 2014 152 www.eyepat.org info@eyepat.org Using the Internet Safely Note: Safety Mode only stays locked on one web browser on that particular computer user account. You will need to repeat this for each child’s account. Use YouTube Privacy Settings Stop Cyberbullying on YouTube. You can prevent people from embedding your video on other websites by disabling video embedding and you can disable commenting. It is the commenting which allows the majority of cyber bullying to take place. Turn this off and you have gone a long way to preventing it., You can choose from one of the three privacy settings: Public – Anyone can search for and view your video Unlisted – Only those people with a link to your video can watch it Private – You choose who can view the video You must first of all have an account. If not create one. Open your Account Upload your Video Click on Basic Tab and choose Private Click on Advanced Tab and remove ticks from Comments and Embedding Choose via Syndication whether you wish the Video to be able through Mobile and TV. © EyePAT Community Interest Company Version 4.0 2014 153 www.eyepat.org info@eyepat.org Using the Internet Safely History Internet Explorer History One way of keeping track on what sites have been looked at is to use the History Option. To find History click on View, then choose the Explorer bar Choose History You will see a list of days and weeks, similar to below. Click on any one of these and you will see the sites visited that day provided: o they have not been deleted o InPrivate Browsing has not been used. Deleting the History It is extremely easy to delete the history. All you need to do is press the right hand mouse button over any link and choose delete. It is therefore by no means a fool proof way of tracking web sites which have been viewed and technologically savvy kids will know exactly how to do it. It can be useful however to see where younger children have © EyePAT Community Interest Company Version 4.0 2014 154 www.eyepat.org info@eyepat.org Using the Internet Safely been. Be aware, if your kids know how to use it, they can see where you have been – especially to track Christmas present shopping! One thing which may help, if you know your kids have been online and there is no history, you know they have been deleting it. Google Chrome History Go to the right of the screen and click on the Icon with the 3 orange lines Choose Settings Click on History on the left of the screen © EyePAT Community Interest Company Version 4.0 2014 155 www.eyepat.org info@eyepat.org Using the Internet Safely Tips on using the History page You can easily clear items from the History page. Use the search box at the top of the page or the address bar to search your history. To see the pages you've visited in your current browsing session, click and hold down the forward and backward arrows next to address bar. To see your most frequently visited sites, open the New Tab page. If you are signed in: choose Settings from the bottom right of the screen select Web History © EyePAT Community Interest Company Version 4.0 2014 156 www.eyepat.org info@eyepat.org Using the Internet Safely In Private Browsing InPrivate Browsing is probably one of the worst inventions by Microsoft when it comes to child safety! Its purpose is that if you use someone else’s PC or a public PC in a Library or Internet, then you can turn it on so it does not leave a trail. However unfortunately it also applies to your PC. To turn it on click on Tools in the Internet Explorer Toolbar. Select InPrivate Browsing Click on a new tab and the following will appear. You can see that InPrivate is turned on in the title bar. type in the name of your web site, anything you enter using this browser window will not show in the history. When you start InPrivate Browsing, Internet Explorer opens a new browser window. The protection that InPrivate Browsing provides is only in effect during the time that you use that window. You can open as many tabs as you want in that window, and they will all be protected. However, if you open another browser window, that window will not be protected. To end your InPrivate Browsing session, close the browser window. While you are surfing using InPrivate Browsing, Internet Explorer stores some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However, at the end of your InPrivate Browsing session, this information is discarded. The following table describes which information InPrivate Browsing discards when you close the browser and how it is affected during your browsing session: © EyePAT Community Interest Company Version 4.0 2014 157 www.eyepat.org info@eyepat.org Using the Internet Safely Information How it is affected by InPrivate Browsing Cookies Kept in memory so pages work correctly, but cleared when you close the browser. Temporary Internet Files Stored on disk so pages work correctly, but deleted when you close the browser. Webpage history This information is not stored. Form data and passwords This information is not stored. Anti-phishing cache Temporary information is encrypted and stored so pages work correctly. Address bar and search AutoComplete This information is not stored. Automatic Crash Restore (ACR) ACR can restore when a tab crashes in a session, but if the whole window crashes, data is deleted and the window cannot be restored. Document Object Model (DOM) storage The DOM storage is a kind of "super cookie" web developers can use to retain information. Like regular cookies, they are not kept after the window is closed. IncognitoGone - overrides InPrivate Browsing All the major Web browsers offer private browsing options that make it difficult if not impossible to monitor a user's browsing history. While such features are great for responsible adults, they don't always sit well with another group of responsible adults: those responsible for children. Parents are responsible for what their children do online, yet private browsing features like Google Chrome's Incognito mode make in particularly hard for them to keep an eye on their kids in cyberspace. IncognitoGone is a free tool that disables private browsing in Chrome and Internet Explorer. In Firefox it only disables the visible private browsing option, though, meaning that users who know the keyboard shortcut can still access the feature. Before you run IncognitoGone, please understand that its effects are permanent and can't be undone. © EyePAT Community Interest Company Version 4.0 2014 158 www.eyepat.org info@eyepat.org Using the Internet Safely Cnet downloaded, extracted, and ran IncognitoGone, which opened with a small box containing four buttons, one each for Chrome, IE, Firefox, and Safari. We only had the first three installed, so the Safari entry was greyed out. Before we ran IncognitoGone, they opened each browser to verify its private browsing feature. In Firefox, that involved clicking Start Private Browsing on the Start button menu. In Chrome, it's done by opening a new Incognito window. IE's feature is called InPrivate Browsing, and it's found on the Safety menu. They disabled the feature in each browser. IncognitoGone warned us that the change was permanent before we proceeded. When we opened IE, InPrivate Browsing was gone from the Safety menu. The new Incognito window command was inactive in Chrome's controls. However, not only was the feature still available in Firefox, but so was the menu entry. For concerned parents or anyone who has a compelling interest in preventing incognito Web browsing on a PC they control, IncognitoGone is a boon. We don't recommend it for individuals who might want to re-enable private browsing later on since that's made difficult to do, by design. Use with caution. Read more: Incognito Gone - CNET Download.com http://download.cnet.com/Incognito- Gone/3000-2132_4-75651404.html#ixzz2SoSjHiDE This review is from the Cnet website, a program downloading site . © EyePAT Community Interest Company Version 4.0 2014 159 www.eyepat.org info@eyepat.org Using the Internet Safely © EyePAT Community Interest Company Version 4.0 2014 160 www.eyepat.org info@eyepat.org Using the Internet Safely Google Alerts One key way to keep tab on what is being said about you, your company, or your family is via Google Alerts. This will not let you know what is being said inside a Facebook account, but it will let you know if anything is being published elsewhere. Google – ‘google alerts’ The following screen will appear Create your first entry, if you do not have a Google Account you will need to verify your e-mail address. Once you have entered your one alert you should then be taken to the following screen where you can create New Alerts or delete existing alerts. E-mails will then be sent to you automatically every time one of your search items is mentioned. These alerts can be used for any subject you wish. © EyePAT Community Interest Company Version 4.0 2014 161 www.eyepat.org info@eyepat.org Using the Internet Safely Tracking & Monitoring Software Again there are many products out there. EyePAT is not affiliated to any of these companies and we only recommend on merit. You can always find a list of software available through Google or consumer magazines such as Which can be a productive source. As most systems are now international and it is common to make purchases on your credit card in foreign currency there are no restrictions to the source of the protection software. uKnowKids Software Review Many thanks to Yoursphere.com for providing this information uKnowKidsis a new web-based monitoring system for your child’s Smartphone and social network accounts. The testing team used the “Premier” subscription which provides comprehensive monitoring on Facebook, Twitter and MySpace, as well as Androidpowered Smartphones and Blackberry devices. Subscription prices vary depending on how many children you want to monitor, extra features and technical support. Setup The Team tested the uKnowKids monitoring system with a Facebook profile, Twitter account, and Android-powered Smartphone. Syncing the social networks requires, the parent, to know their child’s usernames and passwords. Inputting this information is all you need to sync Facebook and MySpace to uKnowKids. For Twitter and Android/Blackberry Smartphones, however, you will need to install an application called FamilyConnect. FamilyConnect establishes a link between the Smartphone and/or Twitter account and the uKnowKids software. We delve a little more into this syncing process later in the review, but we’re fairly confident that parents won’t encounter any problems with this initial setup. © EyePAT Community Interest Company Version 4.0 2014 162 www.eyepat.org info@eyepat.org Using the Internet Safely When you enter your child’s info during the setup process (name and birth date) uKnowKids does a great job of detecting any other social networks that they may be a part of. That said, with the exception of Facebook, Twitter and MySpace, monitoring these other networks through the uKnowKids software isn’t an option. Monitoring - uKnow’s monitoring capabilities are where the software really shines. Once accounts and phones are synced up, parents can view private messages, news feeds, texts and phone call history to see who their child is friends with and who they’re talking to. No need to worry if your child normally accesses Facebook, Twitter or MySpace from a mobile device – uKnowKids monitors their profile, regardless of the device they access it on. Depending on how you filter the information using the Notifications toolbar (shown here on the right), parents can view communication exchanges that uKnow deems suspicious or inappropriate. Furthermore, not only can parents view “possible adult contact” when there is communication with someone who has publically indicated that they are over 18, but uKnow gives parents the ability to monitor a specific contact as well as a full exchange of communication between their child and that contact. Communication trends are displayed on the dashboard as well. And though these trends are a better representation of the most active users in the social networks that you’re tracking, it’s still a great way to see who your child’s Facebook or Twitter friends are, the type of conversations that they’re having, and ultimately, the conversations that your child is exposed to. In the end, all of this information allows parents to have a fully-prepared conversation with their child about their online posts, the people they consider “friends”, or perhaps a specific exchange of text messages. For the parents who don’t have time to log in every day, uKnow sends out a daily comprehensive overview of what their child or teen did that day. © EyePAT Community Interest Company Version 4.0 2014 163 www.eyepat.org info@eyepat.org Using the Internet Safely Family Locator (GPS tracking) The GPS locator is just another layer of monitoring that uKnow offers parents. Granted you have the FamilyConnect app installed on your child’s smartphone and their GPS turned on, uKnow can track your child’s last known physical location. From what we could tell, uKnow updates Family Locator several times a day. Syncing uKnowKids is, in a lot of ways, a very reliable monitoring system that can assist parents in their daily conversations with their child. However, there is one compromising imperfection that we feel parents should know about, and it has to do with the FamilyConnect app that was mentioned earlier. On Twitter and Smartphones, this app can very easily be uninstalled by your child. On a Smartphone, FamilyConnect is treated like any other app, right there on the phone’s interface or application list. On Twitter, you can see what it looks like in the screenshot below. © EyePAT Community Interest Company Version 4.0 2014 164 www.eyepat.org info@eyepat.org Using the Internet Safely The team uninstalled the apps on both Twitter and the Smartphone hoping to receive some sort of email notification from uKnow, but we received nothing, even 24 hours later. Please note: Hiding the FamilyConnect app on Twitter or the Smartphone would make uKnowKids a spyware monitoring system, which it is not. That said, our review isn’t meant to imply that the folks at uKnow should make the apps invisible to your child. Our intention is only to make it clear to parents who read this review that, like with all monitoring software, a consistent dialogue with your children is absolutely necessary when using uKnowKids. If you notice that monitoring of their Twitter account of Smartphone has stopped, you can directly address the matter with your child. Screen Retriever Review and Installation Many thanks to Yoursphere.com for providing this information ScreenRetriever,is a monitoring program which allows parents to record and remotely view their children’s computer screen in real time. The program lets you “check-in” on your children from time to time without having to be right over their shoulder. Yoursphere found ScreenRetriever to be a well-rounded program; it does what it claims to do and they didn’t encounter any bugs or problems. A couple of things to note, though: The software needs to be installed on your computer and your child’s computer. The software only works when your computer and your child’s computer are on the same computer network (router). During their testing with ScreenRetriever, they came across a few aspects of the setup process that some parents might find tricky, so below is a how-to guide. Installation 1. Go to www.screenretriever.com and click on the Free Trial button © EyePAT Community Interest Company Version 4.0 2014 165 www.eyepat.org info@eyepat.org Using the Internet Safely 2. On the Free Trial page enter your email address in order to download the program. After you click the Submit button the program will download automatically. 3. Once the program is downloaded open it up and it will ask you to create a password and enter an email address. This password is for you to know, not your child. It grants access to the entire ScreenRetriever Control Panel. If your child knows the password, they can disable the program on their computer. 4. ScreenRetriever will then ask if you want to “view” this computer from other computers on your wireless network. Before you proceed, know that ScreenRetriever needs to be installed on YOUR computer and YOUR CHILD’s computer in order for it to work properly. So… When installing on your computer, choose No. © EyePAT Community Interest Company Version 4.0 2014 166 www.eyepat.org info@eyepat.org Using the Internet Safely When installing on your child’s computer, choose Yes. 5. The same goes for the next pop up. On your computer, choose Don’t allow viewing of this computer On your child’s computer, choose one of the first two Allow viewing of this computer 6. The next pop up asks if you would like to record the computer’s activity. Whether you’re installing on your computer or your child’s, they recommend choosing no for now. You can always choose to record after ScreenRetriever has been installed on both computers. (guide below) Now that you’re done with the installation, and assuming you’ve followed the same steps on your child’s computer, you need to know about the Control Panel. Control Panel To start the remote viewing of your child’s computer click the Screen Retriever Control Panel icon on your desktop. Here, you can control all available functions, including screen recording and live viewing. Live Viewing 1. Click the Allow/Disallow viewing on this computer button that is outlined in red below. © EyePAT Community Interest Company Version 4.0 2014 167 www.eyepat.org info@eyepat.org Using the Internet Safely This will take you to a menu where you can choose the computer(s) you want to view. Remember, you can only view computers that are on the same wireless network as your computer and have the software installed on them. This is the only way the ScreenRetriever software works. 2. Click the Add button on the lower left-hand corner of the menu. 3. On the next screen, choose the computer you wish to add. Then click the View button which is on the lower left-hand corner of the menu. © EyePAT Community Interest Company Version 4.0 2014 168 www.eyepat.org info@eyepat.org Using the Internet Safely There should now be a small window that shows you exactly what your child is doing on their computer. You can choose to make the window larger or smaller by using the S and L buttons that are on the upper left hand corner of the window. Recording 1. If you wish to record your child’s computer activity to view at a later date, you will need to go on your child’s computer, open the ScreenRetriever Control Panel there, and click the Start/Stop recording this computer button which is highlighted in yellow in the screenshot below. 2. This will take you to a menu that allows you to start, pause, and stop recording. To stop recording, either you can go back to your child’s computer and click the Stop button (shown below), or you can wait for the memory limit you set to be reached (also shown below). © EyePAT Community Interest Company Version 4.0 2014 169 www.eyepat.org info@eyepat.org Using the Internet Safely To view the recording, you will need to go back to your computer, open up the Control Panel and choose the Play recordings button. Though set up can be lengthy, ScreenRetriever is a great way to keep an eye on your child’s online activities. Issue with webcams can be avoided altogether if your child knows you can tune in whenever you want—an approach you might find useful if your son or daughter is fond of video-chatting sites TinyChat or Stickam. Facebook Monitoring Solutions for Parents With thanks to Yoursphere.com for this article ZoneAlarm Social Guard – Software program We have not tested this product but assume that as it is PC based not mobile then it should work. Please let us know if this is not the case. penny@eyepat.org. The Good: Social Guard is a software program that you must install on your computer. Once you’ve downloaded it, installed it and synced your child’s account, the software constantly runs in the background scanning your children’s profiles. (Note: Your child is not limited to accessing Facebook on that specific computer. Social Guard successfully monitors your child’s account no matter where or what device they access Facebook from.) Social Guard’s parental monitoring solution was the most comprehensive one we tested. Not only does it flag concerning language and tell you why it was flagged, but it checks for dangerous links, it looks for evidence of cyberbullying, and it even looks at the age gaps between your child and the people they’re talking to [note from EyePAT - only problem here is who tells the truth about their age on Facebook!]. Like the other © EyePAT Community Interest Company Version 4.0 2014 170 www.eyepat.org info@eyepat.org Using the Internet Safely products in this review, email notifications are sent to you when concerning language is detected. In addition, you can add specific words that you want the software to flag. The Bad: This package is unable to get around the Facebook password requirement. So yes, during set up, Social Guard requires you to enter your child’s Facebook email and password in order to sync it with the program. On the other hand, if your child changes their Facebook password or deletes their account, you will be sent a notification. It’s also worth noting that, since Social Guard is a software program and not web-based, you can only access it from the computer you installed it on. Mamabear Parental Monitoring App Review http://mamabearapp.com Thank you to Yoursphere.com for this article We have not tested this product but assume that as it is PC based not mobile then it should work. Please let us know if this is not the case. penny@eyepat.org. Computers, smartphones, satellites and massive data networks have made this process easier and more convenient (and some cases more challenging) than we could have ever imagined. Traditional parenting techniques, like having an open dialogue with your children, meeting their friends’ parents and knowing who their teachers and coaches are should never fall by the wayside, but as parents in the 21 st century we also have a responsibility to adapt to the ever-changing world of technology. Mamabear attempts to make this adaptation just a little bit easier for you and your children. © EyePAT Community Interest Company Version 4.0 2014 171 www.eyepat.org info@eyepat.org Using the Internet Safely Setup You can download the app by searching for Mamabear in the App Store. The initial download and set up needs to take place on your iPhone (or iPad), not your child’s. The application will require you to set up a parent account and username/password for your child’s account. Next, you’ll want to download the app again, but this time on your child’s iPhone. As soon as you input their username and password, a link is created between the app on your iPhone and the app on theirs. If you’ve disabled location tracking on their iPhone for you will need to turn it back on in order for Mamabear to work properly. That being said, however, you can still leave the Camera’s location services turned off. See the image below. GPS Tracking The monitoring feature of Mamabear allows you to see where your child is at any given time by using the GPS tracker on their iPhone—the same technology that gives you turnby-turn navigation on your typical smartphone. What’s really neat is you can set up alerts that let you know when your child has reached a specific location, or if they leave a specific location before a predetermined time. Aside from the tremendous safety advantages of this feature, setting alerts can be a great way to make sure your older teens aren’t playing hooky from school or soccer practice. Though this feature worked really well during our testing, delivering real-time, accurate location alerts, we found ourselves wanting a way to set a radius around the designated address as a way to limit the number of alerts we were getting. As it stands, Mamabear sends you an alert every time your child ventures out of the exact designated address. © EyePAT Community Interest Company Version 4.0 2014 172 www.eyepat.org info@eyepat.org Using the Internet Safely Facebook and Speeding Alerts (teens) If your teen uses Facebook, Mamabear can track their activity. Just like the GPS locator, you can set alerts for when they add new friends, use inappropriate language, and when their account shows signs of them being the target of bullying. This tool worked very well during our testing, making it one of the more impressive features of Mamabear. As an added bonus, Mamabear utilizes the iPhone’s accelerometer to let you know if your teen is in a speeding car, which, by all means and purposes is a very useful feature, but kind of makes me question the intended audience of the app itself. Everything from design to functionality makes Mamabear seem like it’s targeted toward parents with younger children, making this feature seem like something they shoehorned in to attract a wider audience. © EyePAT Community Interest Company Version 4.0 2014 173 www.eyepat.org info@eyepat.org Using the Internet Safely Emergency Contact Shortcuts The emergency features of Mamabear are less robust but no less functional. Mamabear displays three buttons on the child’s phone: “Come Get Me”, “Call for Help”, which sends an emergency alert to all guardians, and “Call Mama”, a phone call shortcut to mum. These three buttons are really the only thing your child has access to on their version of the Mamabear application; the rest of the features work quietly in the background on the parent’s side. Configuring and using this part of the application is very easy, allowing even a panicked child to easily get the help and assistance they need as fast as possible. The phone numbers that are assigned to the buttons are setup when the application is initially downloaded on the parent’s phone, so no extra work is needed. You can try Mamabear free for 30 days, so test it out for yourself to see if it’s right for your family! © EyePAT Community Interest Company Version 4.0 2014 174 www.eyepat.org info@eyepat.org Using the Internet Safely Internet Cookies Thank you to Yoursphere.com for this explanation If you’re like most parents, the first time you heard of Internet cookies you probably wondered to yourself, ‘what the heck are cookies? Well, simply put, cookies are small, often encrypted (protected) text-only files that reside on your web browser or computer’s memory. In a nutshell, cookies are used to make your web-browsing experience a little more convenient by remembering things like where you left off, addresses, account numbers, username and encrypted passwords, and other specific preferences. But cookies can also be used to track specific web analytics or a user’s navigation through a particular website. There are two different types of cookies, first-party and third-party, each serving their own purpose. First-party cookies are cookies issued by the website you’re actually visiting. These cookies serve the function mentioned above: saving usernames, language preferences, and other specific preferences to make your browsing experience more convenient. Take Amazon.com as an example. As you’re browsing the site, you can add things to your cart and continue shopping. This works because Amazon places a temporary cookie on your web browser so it remembers what’s in your cart. Without it, the cart will be empty as soon as you navigate to a new page within Amazon. First-party cookies, for the most part, are harmless as they typically do not contain any personal information about the user. Third-party cookies, on the other hand, are issued by an entity like an ad network or a marketing firm. These companies can place third-party cookies on online advertisements as a way to track and analyze your personal interests or browsing habits. This information allows ad networks to deliver more relevant ads to the user. As you can imagine, this is where things can get hairy with user consent, ‘do not track’ regulations and online privacy concerns. The WSJ put together a really nice video that explains exactly how this works. Like I touched on in the How to Easily Block Ads on Your Child’s Computer article, it might not sit well with you that marketing firms are using cookies to track your child’s web browsing preferences. If that’s the case, you can follow these steps to disable cookies on their/your family’s web browser. © EyePAT Community Interest Company Version 4.0 2014 175 www.eyepat.org info@eyepat.org Using the Internet Safely Passwords and Online Security - Top Tips There are 4,500,000 pieces of virus, scumware etc. out there for PC’s For Androids - talking about 1,000,000 pieces within the next 12 months For iPAD there are free pieces of antivirus but still has problems Malware and Spyware [Scumware] These products will remove Trojans, spyware, malware and basically anything which is trying to do damage to your computer. We recommend you run them weekly Malware Software It is also a good idea to load Malware Software. It does what it says, removed Malware from your PC/laptop which has been downloaded without your permission. A free one we use is Malwarebytes Spyware Software We would also suggest you remove Spyware. There is a free version of this also. Anti Virus and Parental Controls Must be set up per user per device (unfiltered public WIFI) This must be installed on each and every computer and tablets. They should run daily and need to be set up. Accounts must be set up for the children. © EyePAT Community Interest Company Version 4.0 2014 176 www.eyepat.org info@eyepat.org Using the Internet Safely System Cleaners Adults need to use to keep computer clean from what kids have been doing. Kids may also use to hide tracks from what they have been doing. Try CC Cleaner or PC Tools WIFI in open space they can access your computer Always click Public - never home or office - gives a little more protection Passwords You need 5 different ones for: 1. 2. 3. 4. 5. Banking - credit cards and anything involving personal details Online shopping Social Media - similar but different per social media site For your business work - online forums etc. Throwaway - does not matter if someone gets hold of it. Do not use the name of your children, your pets or other names which people who know you, or who look you up on Facebook, can guess. © EyePAT Community Interest Company Version 4.0 2014 177 www.eyepat.org info@eyepat.org Using the Internet Safely Homework Sites The internet is fantastic for homework research. Here is a list of sites we have gathered which may help. Due to the time we live in, we have to state that whilst we have looked at all these sites we cannot be held responsible for their content. These were all sites which have been suggested to us as being particularly good. Super Maths World, http://www.supermathsworld.com/ Online resources for teachers - http://www.echalk.co.uk/ (this requires payment) https://www.samlearning.com/ (this also requires subscription by school) http://www.bbc.co.uk/schools/bitesize/ free from BBC, http://www.wjec.co.uk/index.php?nav=105 for past exam papers www.froguts.com – dissect a frog without having to touch it! www.wikipedia.com – answers for anything, however anyone can post. Make sure you verify the answers. As a guide Wikipedia is good for finding out general information, but as almost anyone can post on it, it is essential to verify information. Another general site which gives access to many other sites is http://www.thebigproject.co.uk/kids/ The following is a list of sites suggested to us from Marlwood School Site. At the time of writing we checked all the sites listed and these were still live sites. Web sites do however frequently close. We obviously cannot be held responsible for the accuracy of any information on the sites. Key Stage Art and Design Website Addresses www.npg.org.uk www.nationalgallery.org.uk Business Education Website Address Key Stage www.businesstudiesonline.co.uk 4&5 www.tutor2u.net 5 www.bized.co.uk 4&5 www.spideybiz.co.uk 4&5 www.s-cool.co.uk 4&5 www.bbc.co.uk 4&5 © EyePAT Community Interest Company Version 4.0 2014 178 www.eyepat.org info@eyepat.org Using the Internet Safely D & T Website Address Key Stage www.engagerevision.co.uk - subscription site 4 www.technologystudent.com 3/4 www.s-cool.co.uk 4 www.bbc.co.uk/bitesize 3/4 www.nutrition.org.uk 4 www.foodafactoflife.org.uk 4 www.food.gov.uk 4 English Website Addresses Key Stage www.bbc.co.uk/schools/ks3bitesize/english 3 www.bbc.co.uk/schools/ks3bitesize/english/reading/index.shtml 3 http://www.edufind.com/index.php 3 http://www.cgpbooks.co.uk/pages/home.asp (sells books but has some online data) 3&4 Geography Website Addresses Key Stage www.bbc.co.uk/gcsebitesize/geography 4 www.s-cool.co.uk 4 www.revisioncentre.co.uk/gcse/geography 4 www.geographypages.co.uk/revision.htm Mathematics Website Addresses Key Stage www.bbc.co.uk/schools/ks3bitesize/maths 3 www.mymaths.co.uk (subscription site) 3 www.channel4.com/learning/microsites/M/mathszone/index.shtml (scroll down for this one – mathszone is on lower part of page) 3 www.waldomaths.com Music Website Addresses Key Stage www.bbc.co.uk/gcsebitesize/music 4 www.tonalcentre.org 5 © EyePAT Community Interest Company Version 4.0 2014 179 www.eyepat.org info@eyepat.org Using the Internet Safely Key Stage French Website Addresses www.linguascope.com (subscription site) http://www.reallyusefulfrench.co.uk/ http://www.wildfrench.co.uk/ http://www.atantot.com/ http://www.quia.com/ http://www.espanol-extra.co.uk/ http://www.linguacentral.co.uk/ http://www.zut.org.uk/index.html (subscription site) http://www.frenchinaclick.com/ (subscription site) http://www.sunderlandschools.org/mfl-sunderland/ http://www.alienlanguage.co.uk/alienlanguage/index.htm GERMAN http://www.klar.co.uk/ (subscription site) KS4 http://www.languageskills.co.uk/index.html (subscription site) http://www.yjc.org.uk/ http://www.bbc.co.uk/schools/gcsebitesize/german/ http://www.gcse.com/german/speaking.htm http://www.revisioncentre.co.uk/index.html http://www.s-cool.co.uk/gcse/german.html PE Website Address Key Stage www.teachpe.com 4&5 www.bbc.co.uk/schools/gcsebitesize/pe 4 Psychology Website Address Key Stage www.bps.org.uk 5 www.s-cool.co.uk 5 www.psycport.com 5 www.psychlotron.org.uk 5 © EyePAT Community Interest Company Version 4.0 2014 180 www.eyepat.org info@eyepat.org Using the Internet Safely Science Website Address Key Stage www.bbc.co.uk/gcsebitesize/science 3 http://www.docbrown.info/ 3 http://lgfl.skoool.co.uk/keystage3.aspx?id=80 3 http://www.dbeducation.co.uk/ (subscription site) 3 Chemistry http://www.webelements.com/ http://www.docbrown.info/ http://www.chemguide.co.uk/ 4 http://antoine.frostburg.edu/chem/senese/101/index.shtml 5 http://www.chem.qmul.ac.uk/iupac/ http://www.le.ac.uk/spectraschool/ © EyePAT Community Interest Company Version 4.0 2014 181 www.eyepat.org info@eyepat.org Using the Internet Safely Text and MSN abbreviations Word or Phrase Abbreviation(s) Account acc Address addy At the moment atm Be right back brb Be back later bbl Be back soon bbs Because cuz, bcuz, bcz, bcos, bc, cos, coz or bcoz Best friend or Boy friend bf or b/f Best friend(s) for life bffl Best friend(s) forever bff By the way btw Can't be assed cba Comment me back cmb (usually used for social networking sites) Definitely def Don't worry dw Forever 4eva or 4evr For your information fyi Friend frend or frnd Got to go g2g or gtg Have a nice day H.A.N.D. Hold on hld on or h/o Homework hw, hwk or hmwk How are you hru I don't care idc I don't know idk I do what I want idwiw I love you ily, luv u, ilu, or luv ya If I recall correctly or If I remember correctly iirc In my opinion imo In my humble opinion imho Jokes jks Just for laughs jfl © EyePAT Community Interest Company Version 4.0 2014 182 www.eyepat.org info@eyepat.org Using the Internet Safely Word or Phrase Abbreviation(s) Just joking – only joking Jj - oj Just kidding jk Just to let you know jtlyk or j2luk Know kno or noe Kiss my teeth kmt Kiss my ass kma Laugh out loud or lots of laughs lol Lots of love lol Laughing my ass off lmao Laughing my fucking ass off lmfao Laughing quietly to myself lqtm Message (as in a text message) msg Never mind nm or nvm (depending on context used) No problem np No thank you no tnk u, nty, no ty Nothing much nm Obviously ovvi or obv Of course ov cors or ofc Oh My God omg or (comically) zomg Parents over shoulder pos Please plz or plez Probably probz, prbly, prolly, or prob Love <3 or luv Peace pce, pece, or \/ (V sign) Right rite Rolling on the floor laughing (out loud) rofl(ol) Rolling on (the) floor laughing my ass off roflmao or rotflmao See you/see you later cya, cu, or cya/cu l8er/l8a Shut the fuck up stfu Something sth, s/t, or sumthin Son of a bitch sob Sorry sry, "soz", or "sori" Talk to you later ttyl Tata for now ttfn says ses or sez Text txt Text back txt bck or tb © EyePAT Community Interest Company Version 4.0 2014 183 www.eyepat.org info@eyepat.org Using the Internet Safely Word or Phrase Abbreviation(s) Thanks Thnx, thanx, thx, or fnx Thank you ty or "thnk u" Thank you very much tyvm Tomorrow tom, 2moz, 2moro, 2mrw or 2mara To be honest tbh Welcome Back wb What Wa, wat, wut, wht, or wha Whatever w/e or wateva, watevs © EyePAT Community Interest Company Version 4.0 2014 184 www.eyepat.org info@eyepat.org Using the Internet Safely Dictionary of terms used in chat rooms Word Definition Word Definition ! Indicates, " have a comment" CYA 1. See Ya. 2. Cover Your Ass. $0.02 Throwing in your two cents' worth. CYAL8R See You All Later. ? Indicates, "I have a question" DIIK Damned If I Know. <arching eyebrows> Indicates the speaker arches eyebrows DIKU? Do I Know You? <chuckle> Indicates the speaker chuckles DIY Do It Yourself . <frown> Indicates the speaker is frowning DK Don’t Know <g> Grin DLTBBB Don't Let The Bed Bugs Bite. <grin> Indicates the speaker is grinning dotgov A government official (from the .gov ending of government domain names). <smile> Indicates the one writing the message is smiling DTRT Do The Right Thing <smirk> Indicates the one writing the message is smirking DWIMC Do What I Mean, Correctly. <wink> Indicates the one writing the message is winking DWIMNWIS Do What I Mean, Not What I Say. 501 An excuse that's full of holes. ESAD Eat Sh** And Die AAMOF As A Matter Of Fact ETLA Extended Three Letter Acronym. ADN Any Day Now F2F Face To Face AFAIC As Far As I'm Concerned. FCFS First Come, First Served AFAIK As Far As I Know FISH First In, Still Here. AFAIR As Far As I Remember FITB Fill In The Blank AFJ April Fool’s Joke FOAD F*** off and die AFK Away From the Keyboard FOAF Friend Of A Friend AISI As I See It. FS For Sale ANFAWFOS And Now For A Word From Our Sponsor. FTASB Faster Than A Speeding Bullet. ANFSCD And Now For Something Completely Different … FTF Face to Face. A-OLs Administrators On-Line. Administrators who police on-line services. FTL Faster Than Light. AS Another Subject. FUBAR Fouled Up Beyond All Repair ASAP As Soon As Possible FUBB Fouled Up Beyond Belief. ATSL Along The Same Line. FUD Fear, Uncertainty and Doubt AWC After While, Crocodile FURTB Full Up Ready To Burst - describing hard drive. AWGTHTGTATA Are We Going To Have To Go Through All This Again?. FWIW For What It’s Worth AWGTHTGTWTA? Are We Going To Have To Go Through With This Again? FYA For Your Amusement AYOR At Your Own Risk. FYI For Your Information B4N Bye For Now GA Go Ahead BAK Back At Keyboard GAL Get A Life BBFN Bye Bye For Now GD&R Grinning, Ducking and Running BBIAB Be Back In A Bit. GD&RF Grinning, Ducking, and Running Fast. BBIAF Be Back In A Few (minutes) GD&WVVF Grinning, Ducking, and Walking Very, Very Fast © EyePAT Community Interest Company Version 4.0 2014 185 www.eyepat.org info@eyepat.org Using the Internet Safely Word Definition Word Definition BBL Be Back Later GDW Grin, Duck and Weave. BBR Burnt Beyond Repair. GF Girl Friend. BCNU Be seein’ you GFN Gone For Now. BEG Big Evil Grin. GFR Grim File Reaper. BF Boy Friend. GIWIST Gee, I Wish I’d Said That BFN Bye For Now. GLGH Good Luck and Good Hunting. BION Believe it or not. GMTA Great Minds Think Alike BOT Back On Topic. GOWI Get On With It. BRB Be Right Back GTSY Great To See You. BRS Big Red Switch. H&K Hugs and Kisses. BTA But Then Again HAK Hugs And Kisses. BTAIM Be That As It May. HHIS Hanging Head In Shame. BTHOM Beats The Hell Outta Me. HHO 1/2 K Ha, Ha, Only Half Kidding. BTOBD Be There Or Be Dead. HHOJ Ha Ha Only Joking BTW By The Way HHOK Ha Ha Only Kidding BWL Bursting With Laughter. HHOS Ha Ha Only Serious BWQ Buzz Word Quotient. HHTYAY Happy Holidays to You and Yours. BYE? "Are you ready to say goodbye?" If so, the other person replies "BYE" HOYEW Hanging On Your Every Word BYKT But You Knew That HSIK How Should I Know. BYOB Bring Your Own Bottle HTH Hope That Helps! BYOM Bring Your Own Mac IAAA I Am An Accountant. C&G Chuckle and Grin. IAAL I Am A Lawyer. CADET Can't Add, Doesn't Even Try. IAE In Any Event. CID Crying In Disgrace. IANAA I Am Not An Accountant. CMIIW Correct Me If I’m Wrong IANAL I Am Not A Lawyer (but ) A disclaimer which is usually followed by a legal opinion CO 1. Conference. 2. Company. IAW In Accordance With CSG Chuckle, Snicker, Grin. IBTD I Beg To Differ. CU See You IC I See CU2 See You, Too. IIABDFI If It Ain't Broke, Don't Fix It. CUL See you later IIRC If I Remember Correctly CUL8R See You Later IIWM If It Were Me . . . (or) If It Were Mine . . . . CULA See You Later, Alligator IJWTK I Just Want To Know CWYL Chat With You Later. IJWTS I Just Want To Say IKWUM I Know What You Mean NIMBY Not In My Back Yard. IMA I Might Add NINO 1. Nothing In, Nothing Out. 2. No Input, No Output. IMAO In My Arrogant Opinion NOYB None Of Your Business. IMCO In My Considered Opinion NP No Problem. IME In My Experience NQA No Questions Asked. IMHO In My Humble Opinion NTIM Not That It Matters. IMNSHO In My Not So Humble Opinion NTIMM Not That It Matters Much. IMO In My Opinion NTW Not To Worry. IMPOV In My Point Of View. NTYMI Now That You Mention It. © EyePAT Community Interest Company Version 4.0 2014 186 www.eyepat.org info@eyepat.org Using the Internet Safely Word Definition Word Definition INPO In No Particular Order O Over (completion of communication) IOW In Other Words OATUS On A Totally Unrelated Subject. IRL 1. In Real Life (chat). 2. Industrial Robot Language. A high-level language used for the programming of industrial robots. OAUS On An Unrelated Subject. ISS I’m So Sure OBO Or Best Offer ISSYGTI I’m So Sure You Get The Idea! OBTW Oh, By The Way ISWIM If (you) See What I Mean OIC Oh, I See ITFA In The Final Analysis. ONNA Oh No, Not Again. ITSFWI If The Shoe Fits, Wear It. ONNTA Oh No, Not This Again. IWALU I Will Always Love You. OO Over and Out (end of communication) IWBNI It Would Be Nice If OOTC Obligatory On-Topic Comment. IYFEG Insert Your Favorite Ethnic Group (for ethnic jokes) OTF On the Floor (laughing) IYSWIM If You See What I Mean OTFL On the Floor Laughing JAM Just A Minute OTL Out To Lunch. JAS Just A Second. OTOH On The Other Hand JIC Just In Case OTOOH On The Other Other Hand. JMO Just My Opinion. OTT Over The Top; too much JSNM Just Stark Naked Magic. OTTH On The Third Hand. JTLYK Just To Let You Know . OTTOMH Off The Top Of My Head. k Okay OWTTE Or Words To That Effect. KHYF Know How You Feel. PABG Packing a Big Gun. KIBO Knowledge In, Bullshit Out PDS Please Don't Shout. (Shouting in chat mode is typing all in capital letters, which is considered rude.) Example: PLEASE DON'T SHOUT. KISS Keep It Simple, Stupid. PLOKTA Press Lots Of Keys To Abort. KIT Keep In Touch. PMBI Pardon My Butting In. KMA Kiss My Ass. PMF 1. Pardon My French. 2. Pure Freaking Magic. KWIM Know What I Mean? PMFBI Pardon Me For Butting In KYFC Keep Your Fingers Crossed PMFJI Pardon Me For Jumping In L Laugh PMIGBOM Put Mind In Gear, Before Opening Mouth. L8R Later PMJI Pardon My Jumping In LABATYD or LAB&TYD Life's A Bitch And Then You Die. PNCAH Please, No Cursing Allowed Here LJBF Let’s Just Be Friends POSSLQ Person Of Opposite Sex Sharing Living Quarters. LLTA Lots and Lots of Thunderous Applause. ppl People LMAO Laughing My Ass Off. PTMM Please Tell Me More LMHO Laughing My Head Off . R U THERE? Are you there? LOL Laughing Out Loud RAEBNC Read And Enjoyed, But No Comment. LSHMBA Laughing So Hard My Belly Aches re 1 Hello again; regreet 2 In regard to LSHMBH Laughing So Hard My Belly Hurts. rehi Hi again LTHTT Laughing Too Hard To Type RHIP Rank Has Its Privileges. LTNS Long Time No See RL Real Life (an abbreviation used in MUDs and chat) LTNT Long Time, No Type. RLCO Real Life Conference. © EyePAT Community Interest Company Version 4.0 2014 187 www.eyepat.org info@eyepat.org Using the Internet Safely Word Definition Word Definition LTS Laughing to Self. ROFL Rolling On Floor Laughing. LUWAMH Love You With All My Heart. ROFLASTC Rolling On Floor Laughing And Scaring The Cat. LY Love You. ROFLGO Rolling On Floor Laughing Guts Out. MLA Multiple Letter Acronym. ROFLMAO Roll On Floor Laughing My Arse Off. MOF Matter Of Fact. ROTF Rolling On The Floor MOTAS Member Of The Appropriate Sex ROTFL Rolling On The Floor Laughing MOTD Message of the day ROTFLAHMS Rolling On The Floor Laughing And Holding My Sides. MOTOS Member Of The Opposite Sex ROTFLOL Rolling On The Floor Laughing Out Loud MOTSS Member Of The Same Sex RRQ Return Receipt Request. MTF more to follow RSN Real Soon Now MTFBWY May The Force Be With You. RSVP Respondez S'il Vous Plait French for "please reply"; a notation often found on invitations MYOB 1. Mind Your Own Business (chat). 2. A small business accounting package from Best!Ware. RTBM Read The Bloody Manual NAVY Never Again Volunteer Yourself. RTFAQ Read The Frequently Asked Questions NBD No Big Deal. RTFF Read The Freaking FAQ. NFW No Friggin' Way!. RTFM Read The F------ Manual. A gentle suggestion to users who ask questions they could have answered themselves NHOH Never Heard Of Him/Her RTM Read The Manual NIH Not Invented Here. RTSM Read The Silly Manual. RTWFQ Read The Whole Friggin' Question. TPTB The Powers That Be RYFM Read Your Friendly Manual TRDMC Tears Running Down My Cheeks. RYS Read Your Screen. TSR Totally Stupid Rules. S Smile TTBOMK To The Best Of My Knowledge SAPFU Surpassing All Previous Foul Ups. TTFN Ta Ta For Now SCNR Sorry, Could Not Resist. TTKSF Trying To Keep a Straight Face SEC Wait a second TTUL Talk To You Later. SETE Smiling Ear To Ear. TTYAWFN Talk To You A While From Now. SFLA Stupid Four Letter Acronym. TTYL Talk To You Later SICS Sitting In Chair Snickering. TYCLO Turn Your CAPS LOCK Off (Quit Shouting). SLM See Last Mail. TYVM Thank You Very Much SMOP Small Matter of Programming. UOK Are You OK? SNAFU Situation Normal: All Fouled Up WAEF When All Else Fails. SO Significant Other WB Welcome Back SOL SH** Out Of Luck WDYMBT What Do You Mean By That?. SOS 1. Same Old Stuff. 2. Help!. WDYT What Do You Think? SOW Speaking Of Which. WIBAMU Well, I'll Be A Monkey's Uncle. SUFID Screwing Up Face In Disgust. WIBNI Wouldn’t It Be Nice If SWIM See What I Mean? WMMOWS Wash My Mouth Out With Soap. SWL Screaming With Laughter. WNOHGB Where No One Has Gone Before. SYS See You Soon. WOA Work Of Art. TAF That's All, Folks!. WOTAM Waste Of Time And Money. TAFN That’s All For Now WRT With Regard To, or With Respect To © EyePAT Community Interest Company Version 4.0 2014 188 www.eyepat.org info@eyepat.org Using the Internet Safely Word Definition Word Definition TANJ There Ain’t No Justice WT Without Thinking. TANSTAAFL There Ain’t No Such Thing As A Free Lunch WTB Want To Buy TARFU Things Are Really Fouled Up. WTF What The F***? TBYB Try Before You Buy. WTG Way To Go! TDM Too Darn Many. WTGP Want To Go Private? TFS Three Finger Salute (Ctl-Alt-Del). WTH What the hell? TFTHAOT Thanx For The Help Ahead Of Time. WTTM Without Thinking Too Much. TFTT Thanks For The Thought. WYGISWYPF What You Get Is What You Pay For TGAL Think Globally, Act Locally. XOXOXO Kisses and hugs THX Thanks YABA Yet Another Bloody Acronym TIA Thanks In Advance YAOTM Yet Another Off-Topic Message. TIC Tongue In Cheek YAUN Yet Another Unix Nerd TINWIS That Is Not What I Said. YGLT You're Gonna Love This .... TNSTAAFL There's No Such Thing As A Free Lunch. YGTI You Get The Idea? TNTL Trying Not To Laugh YGWYPF You Get What You Pay For TNX Thanks YIU Yes, I Understand TNXE6 Thanks A Million ("E6" means 10 to the 6th power = a million) YIWGP Yes, I Will Go Private TOBAL There Oughta Be A Law. YKYARW You Know You're A Redneck When . . .. TOBG This Oughta Be Good. YMMV Your Mileage May Vary (or your experience could be different) TOY Thinking Of You. © EyePAT Community Interest Company Version 4.0 2014 189 www.eyepat.org info@eyepat.org Using the Internet Safely Dictionary of Sexting terms Our apologies if you find some of these offensive. Unfortunately this is the nature of the subject. It is important that you know what your children may know. 8 Oral sex 9 Parent Alert 1337 Elite 143 I love you 182 I hate you 459 I love you 1174 Nude club 420 Marijuana ADR Address ASL Age/Sex/Location banana Penis CD9, Code 9 parents are around DUMDo You Masturbate? DUSL Do You Scream Loud? FB F*** Buddy FMLTWIA F*** Me Like The Whore I Am FOL Fond of Leather GNOC Get Naked On Cam GYPO Get Your Pants Off IAYM I Am Your Master IF/IB In the Front -or- In the Back IIT Is It Tight? ILF/MD Love Female/Male Dominance IMEZRU I Am Easy, Are You? IWSN I Want Sex Now J/O Jerking Off KFY or K4Y Kiss For You kitty Vagina KPC Keeping Parents Clueless LMIRL Let's Meet In Real Life © Eye PAT Community Interest Company Version 4.0 2014 190 www.eyepat.org info@eyepat.org Using the Internet Safely MOOS Member Of The Opposite Sex MOSS Member(s) Of The Same Sex MorF Male or Female MOS Mom Over Shoulder MPFB My Personal Fuck Buddy NALOPKT Not A Lot Of People Know That NIFOC Nude In Front Of The Computer NMU Not Much, You? P911 Parent Alert PAL Parents Are Listening PAW Parents Are Watching PIR Parent In Room POS Parent Over Shoulder -or- Piece Of Shit PRON Porn Q2C Quick To Cum RU/18 Are You Over 18? RUH Are You Horny? S2R Send To Receive SorG Straight or Gay TDTM Talk Dirty To Me WYCM Will You Call Me? © Eye PAT Community Interest Company Version 4.0 2014 191 www.eyepat.org info@eyepat.org Using the Internet Safely Internet Chat and Drug Lingo Lingo to warn of Parental Monitoring POS Parent Over Shoulder PAW Parents Are Watching PIR Parent In Room PAL Parents Are Listening P911 Parent Alert KPC Keeping Parents Clueless Internet lingo of social or sexual nature WYCM Will You Call Me? HAK Hugs And Kisses ASL Age/Sex/Location ILU or ILY I Love You MorF Male or Female KOTL Kiss On The Lips KFY Kiss For You SMIM Send Me an Instant Message MOOS Member(s) Of the Opposite Sex SMEM Send Me an E-Mail ADR Address WUF Where Are You From? LMIRL Let's Meet In Real Life WYRN What's Your Real Name? Similar to Internet lingo, drug nomenclature can be cryptic. Parents can monitor for drug use by learning popular drug lingo and asking questions. A few examples of popular drug lingo are listed below; a database containing more than 2,300 street terms is also available. Marijuana Lingo Pot–Grass–Dope–Weed–Bud–Mary Jane–Ganja–Whacky Backy Alternative names for Marijuana Kind Bud An expensive and potent strain of marijuana Blunt Marijuana rolled into a Philly Blunt or similar type of cigar Bong A large water filtered pipe for smoking marijuana Prescription Drug Pharming Raiding medical cabinets to trade and consume prescription drugs to get high Robotripping Drinking cough medicine to get high (comes from the brand name Robitussin) Lean Drinking prescription cough syrup mixed with painkillers and soda O Oxycontin Tweaking High on amphetamines Blue Boogers Snorting Adderall or Ritalin © Eye PAT Community Interest Company Version 4.0 2014 192 www.eyepat.org info@eyepat.org Using the Internet Safely Emoticons Word Definition Word Definition Word Definition =^D Big grin 8-o Shocked 8 Infinity =^* Kisses 8-O Astonished 8-# Death :( Sad 8-P Yuck! \_/ Empty glass :.( Crying 8-] Wow! ~/ Full glass :| Bored, sad 8-| Wide-eyed surprise ]:-) Happy devil }: [ Angry, frustrated 8 :-) Wizard ]:-> Devil 8-) Wide-eyed, or wearing glasses 8-[ Frayed nerves; overwrought ][ Back to back :-D Laughing :' Crying ^5 High five :-( Frown :'( Crying `:-) Raised eyebrow (-: Left-handed smile, or smiley from the southern hemisphere :'-( Crying d :-o Hats off to you! >:) Little devil :'-) Tears of happiness {} No comment :-{) Smile with moustache :*) Clowning |( Sleepy (on late night email message) :-{)} Smile with moustache and beard :+( Got punched in the nose |-( Sleepy, struggling to stay awake, or sleeping badly :-/ Wry face :,( Crying |-<> Puckered up for a kiss :-# My lips are sealed; or someone wearing braces :- Male |-D Big laugh :-@ Screaming :-'| Sniffles |-O Yawn >:-< Angry :-* Kiss |-{ Good grief! :/) Not funny :-, Smirk |-| Asleep () Hugging :-6 Exhausted |I Asleep ((())) Lots of hugging (initials or a name can be put in the middle of the one being hugged) :-9 Licking lips |^o Snoring * Kiss :-< Very sad [] Hug +<:-| Monk or nun :->< Puckered up to kiss [[ ]] Hug Insert a name in the brackets of the one who is being hugged, as: [[Marcia]] :**: Returning kiss :-> Smile of happiness or sarcasm }-) Wry smile :-& Tongue-tied :-C Astonished }{ Face to face :-? Licking lips, or tongue in cheek :-I Pondering, or impartial ~ :-( Steaming mad :( ) Loudmouth, talks all the time; or shouting :-M Speak no evil ~:-( Flame message ^^^ Giggles :-P Sticking out tongue ~~:-( Especially hot flame message {{ }} Hug; the one whose name is in the brackets is being hugged Example: {{MJ}} :-Q~ Smoking ~:-\ Elvis P* French kiss :-V Shouting ~:\ Elvis %(|:-) Propeller-head :-Y Aside comment ( 8(|) Homer :-) Classic smiley :-] Smiling blockhead; also sarcasm 7:) Ronald Reagan ;-) Winkey :-[ Unsmiling blockhead; also criticism 7:^) Ronald Reagan =O Surprised :-c Very unhappy >-< Furious :-O Open-mouthed, surprised :-d~ Heavy smoker ?( Black eye -) Tongue in cheek :-e Disappointed ?-( Black eye © Eye PAT Community Interest Company Version 4.0 2014 193 www.eyepat.org info@eyepat.org Using the Internet Safely Word Definition Word Definition Word Definition ;P Wink with a raspberry :-f Sticking out tongue @== Atomic bomb >=^ P Yuck :-i Wry smile or half-smile @>--->--- A long-stemmed rose :-Q Tongue hanging out in disgust, or a smoker :-j One-sided smile @}->-- Rose :P Sticking out tongue :-k Puzzlement B:-) Sunglasses on head Q:-) College graduate :-l One-sided smile M-) See no evil :-X My lips are sealed; or a kiss :-o Surprised look, or yawn M-), :X, :-M See no evil, hear no evil, speak no evil 8) Wide-eyed, or wearing glasses :-p Sticking tongue out M:-) A salute :[ Bored, sad :-p~ Heavy smoker O8-) Starry-eyed angel :* Kiss :-r Sticking tongue out O 8-) Starry-eyed angel :) Smile :-s What?! O:-) Angel ;) Wink :-t Unsmiley O :-) Angel =X My lips are sealed :-x Kiss, or My lips are sealed O+ Female :-J Tongue in cheek :-{} Blowing a kiss O-> Male !-( Black eye :-| Indifferent, bored or disgusted X-( Just died !-) Proud of black eye :-| :-| Deja vu [:-) Wearing a Walkman #-) Wiped out, partied all night :-|| Very angry [:-] Square head #:-o Shocked :-} Mischievous smile [:-| Frankenstein $-) Won the lottery, or money on the brain :-~| A cold [:] Robot %*} Inebriated :/i No smoking [:| Frankenstein %+{ Got beat up :> What? [:|] Robot %-) Dazed or silly :@ What? ~= Lit candle, indicating a flame (inflammatory message) %-( Confused :C Astonished ~== Begins a flame (inflammatory message) %-6 Brain-dead :X Hear no evil ~:o Baby %-| Worked all night :^D Happy, approving ~~:[ Net flame %-{ Ironic :`-( Shedding a tear ~~~~8} Snake %-} Humorous or ironic :x Kiss ~~~~~8} Snake %\ Hangover :e Disappointed IOHO In Our Humble Opinion ') Winky :~-( Crying ///\ Laughter '-) Winky :-~) A cold ( <> .. <> ) alienated (( )):** Hugs and kisses :{ Having a hard time 5:-) Elvis (:& Angry :~) A cold >- Female (:- Unsmiley :~/ Confused 12x@>--->-- A dozen roses (:-& Angry ;( Crying 2B|^2B To be or not to be (:-( Unsmiley ;-( Angry, or got a black eye >-> Winking devil (:-) Smiley variation ;-D Winking and laughing >>:-<< Furious (:-* Kiss <:> Devilish expression +O:-) The Pope (:-\ Very sad <:-> Devilish expression -= Snuffed candle to end a flame message (::()::) Bandaid, meaning comfort <:-( Dunce -=#:-) Wizard (:| Egghead <:-) Innocently asking dumb question 0:-) Angel *-) Shot to death <:-| Dunce >:-) Mischievous devil *<|:-) Santa Claus, or a clown <:| Dunce >:-< Mad © Eye PAT Community Interest Company Version 4.0 2014 194 www.eyepat.org info@eyepat.org Using the Internet Safely Word Definition Word Definition Word Definition *<:-) Santa Claus =):-)= Abraham Lincoln >:-> Very mischievous devil +:-) Priest =:-) Punk, or hosehead >-) Devilish wink +<:-) Religious leader =====:} Snake >:-( Annoyed © Eye PAT Community Interest Company Version 4.0 2014 195 www.eyepat.org info@eyepat.org Using the Internet Safely Evidence - How to Save Without evidence it makes it extremely difficult for the police to investigate and reports of online abuse. So, whatever you do don't delete any messages which are either threatening or ask for any sexual actions or arrangements to meet. Keep a diary note making a note of the dates, times and any other details including who was involved, what happened and who may have witnessed it. From a laptop or computer To copy screen images from your computer follow these 5 step instructions. 1. Make sure the message is on your screen. 2. Press the Print Screen button (on most Computers this will appear as PRTSC) 3. This will take a copy of whatever is on your screen at that moment 4. Open Word, PowerPoint or Outlook. If you don't have one of these you can use Notebook 5. (Notebook can be found under Start/All Programs/Accessories/Notebook) 6. Use the Paste function to copy it into the document/file you have open. 7. This can be done by using: any of these three options: Ctrl + V, or Edit/Paste or Press the right hand mouse button and choose Paste. Save the document using File/Save or Ctrl+S. Don’t forget to name it! You now have a record of what was on the screen. From a Tablet Android 4.0 (Ice Cream Sandwich): Hit the Power and Volume Down Button Simultaneously Google introduced a screenshot-taking feature (which Apple's iOS already had) finally with Ice Cream Sandwich, Android 4.0. If you have Android 4.0 or later, you can take a screenshot of your device by pressing the power button and the volume down button at the same time. It might take a little bit of trial-and-error to master that simultaneous pressing. (I find that holding the buttons down for at least more than a second together avoids the annoying situation when your phone simply turns off the screen or lowers the volume.) You'll find the screenshots in your Gallery under a Screenshots folder. © Eye PAT Community Interest Company Version 4.0 2014 196 www.eyepat.org info@eyepat.org Using the Internet Safely From a Mobile Use Your Phone's Built-in Shortcuts Some phones come with screen grabbing utilities built-in. Many Samsung devices, such as the Galaxy SII and Galaxy Note, for example, let you press the power and home button together to take a screenshot and place it in your Gallery. To find out if your phone has a screenshot tool, either check the manual or do a simple Google search for "[name of phone] take a screenshot]" There might also be a device-specific app you can download to take screenshots and also do more with those images of your screen. For example, Screen Capture Shortcut Free works with some Samsung devices and lets you take captures after a delay or when you shake your phone. For other devices. search the Google Play Store for the name of your device and "screenshot," "screengrab," or "screen capture." Install an App for Screenshots If you don't have ICS or your phone doesn't have a built-in screenshot feature, you can try an Android app that does or doesn't require rooting your Android device. (Rooting gives you more control over it, so you can do things like tether your phone to serve as a modem for your laptop (without the onerous fees) or give a third-party app permission to take a picture of your Android phone's screen.) No Root Screenshot It doesn't require root, and it allows you to take screenshots via a widget, annotate screenshots, and more. It's $4.99, but there's a free trial available. If your device is rooted, you can use a custom ROM (e.g., Cyanogenmod) which has a "capture screenshot" option when you long-press the power button. An alternative is to use one of the many apps available that will let you take a screen grab. aScreenshot is a free one and AirDroid, which wirelessly manages your Android device, also lets you take screenshots of your Android device--wirelessly, even, through your computer's web browser. Use the Android SDK Finally, you can take screenshots of any Android device by installing the Android SDK from Google on to your computer. The Android SDK is a software development kit used by developers to create and test Android apps, but it's freely available to everyone. To use the Android SDK, you'll need the Java SE Development Kit, Android SDK, and possibly USB drivers for your device (found on the manufacturer's website). Then you plug in your phone, run the Dalvik Debug Monitor (DDMS.BAT file), and click on Device > Screen Capture... in the Dalvik Debug Monitor menu. It's kind of a clunky way to take screenshots, but if nothing else works or you have the Android SDK set up anyway, it's easy to use. http://mobileoffice.about.com/od/phonesformobileworkers Samsung Mini Phone Hold down Home + Power button at the same time and the screen shot is saved to your gallery. © Eye PAT Community Interest Company Version 4.0 2014 197 www.eyepat.org info@eyepat.org Using the Internet Safely Please remember, this is an Internet Safety Guide The internet is a wonderful tool It is our future and Communication is the most effective way to keep people safe © Eye PAT Community Interest Company Version 4.0 2014 198 www.eyepat.org info@eyepat.org Using the Internet Safely © Eye PAT Community Interest Company Version 4.0 2014 199 www.eyepat.org info@eyepat.org Using the Internet Safely www.eyepat.org info@eyepat.org 01446 795055 © Eye PAT Community Interest Company Version 4.0 2014 200 www.eyepat.org info@eyepat.org
Similar documents
2012-13 Eye PAT Training Guide v 3
Internet Explorer History ...................................................................................... 43 Deleting the History................................................................
More information