online safety- ks2 - stamford green · 2) setting boundaries. 3) setting an example. (slides will...
TRANSCRIPT
Online Safety-KS2
Covered so far in Key Stage 1 Presentation:
1) Setting up your home network and devices.
2) Setting boundaries.
3) Setting an example.
(Slides will be made available on school website after the final presentation)
KS1Presentation Summary:
Checklist
• Be aware which devices go online and how they get online
• Password protect your WIFI network and beware using unknown networks
• Turn on the ISP filter
• Turn on Google Safesearch
• Install anti-virus, firewall and malware software
• Turn off Autoplay for videos
• Discuss dangers and issues with your children and decide your stance on Social Media
• Beware of metadata in photos
• Beware what you and your children are posting online
• Turn off in-app purchases
• Discuss how people on internet may not be who they pretend to be
• Password protect iplayer and similar services
• Set strong passwords
• Cover webcams when not in use and be vigilant when they are
• When setting up devices and accounts, consider giving false details but don’t lie about age
• Check out software and app reviews and trial them yourself if necessary
Key Stage 1 Presentation Summary:
Be aware how much your children are observing you.
• Are you:
1. using your phone during mealtimes?
Key Stage 1 Presentation Summary:
Be aware how much your children are observing you.
• Are you:
1. using your phone during mealtimes?70% of kids think their parents spend too much time on devices, and accuse them of double standards.
82% of adults say it is wrong to use mobiles whilst socialising but,
Key Stage 1 Presentation Summary:
Be aware how much your children are observing you.
• Are you:
1. using your phone during mealtimes?70% of kids think their parents spend too much time on devices, and accuse them of double standards.
82% of adults say it is wrong to use mobiles whilst socialising but, 89% of adults say they used their mobile during their last social gathering.
Key Stage 1 Presentation Summary:
Be aware how much your children are observing you.
• Are you:
1. using your phone during mealtimes?70% of kids think their parents spend too much time on devices, and accuse them of double standards.
82% of adults say it is wrong to use mobiles whilst socialising but, 89% of adults say they used their mobile during their last social gathering.
2. texting whilst walking or driving?
Key Stage 1 Presentation Summary:
Be aware how much your children are observing you.
• Are you:
1. using your phone during mealtimes?70% of kids think their parents spend too much time on devices, and accuse them of double standards.
82% of adults say it is wrong to use mobiles whilst socialising but, 89% of adults say they used their mobile during their last social gathering.
2. texting whilst walking or driving?Pedestrian injuries of 16-19 year olds have increased 25% in 5 years due to crossing roads whilst on smartphones.
Setting Boundaries
First mobile phone
Remember this:
Every parent who allows their child to have their own devices makes it significantly harder for the next to keep saying no.
You might genuinely feel your child needs a phone, but does it have to be a Smartphone?
Britain tends to give children phones early compared to most other countries and goes
straight in with a Smartphone.
Manage expectations
NOW
Make it clear that you will decide when they will get their first phone and
which model it will be.
Do children need to be in a WhatsApp group?
Problems encountered at our school:1) Rude or spiteful posts.
2) Late posts
3) Publicly breaking into smaller groups causing issues that continue at school.
3) Introduction of strangers into group.
We only know about these problems because some parents monitor their children’s usage and report concerns
to us.
How about:You are only allowed to use WhatsApp if I can check your account. If you’ve deleted anything or behaved inappropriately then you’re not allowed to use it.
Screen time
•Currently: no official guidelines in UK of how much screen time is healthy.
Frequent screen breaksMany experts believe it's more important to limit the stretches of time children spend in front of screens rather than worry about the total amount each day.Frequent breaks stop the brains from becoming over stimulated and combat screen addiction. Kids need to switch off without stress.
Experts suggest a limit of 40 minutes then an hour's break for under 10s.
Give kids a five-minute warning before their allotted time is up, and take away future screen time if they don't switch off.
You can give bonuses for good screen behaviour but be aware that this goes against the overall message of moderation so use it sparingly.
Night Time:
Don’t let children on devices in the run up to bedtime.
The light from devices keeps children (and adults) awake as the body interprets it as sunlight.
This makes sleeping afterwards very difficult.
Online Safety-KS2
Its very clear that many of the problems experienced in teenage years have their beginnings in Key Stage 2!
Get it wrong nowand you’re setting yourself up for
problems in future years!
DigitalLiteracy
Would we teach Road Safety
by ensuring children never encounter roads?
Similarly, we can’t ban, block and filter
our way to safety!
By trying to,
we risk just
postponing problems
to a future date.
Instead of thinking about dangerous apps and websites, think in terms of dangerous
behaviours.
Apps and websites are changing constantly!
But the principles remain the same!
Discuss with your child:
• the fact that people on the internet may not be who they claim to be
• that it is never too late to tell a trusted adult about concerns
• That anything posted online may be impossible to remove
• That they should post no photos or words that they wouldn’t be happy to show to a trusted adult
• That they should never meet up with anyone they meet online
Do you know which devices in your home are capable
of going online?
There might be morethan you think!
On every device:Turn location off when you aren’t
using it!
There’s nothing inherently wrong with the Location function.
It can be very useful.
Google Live Traffic works because Google are tracking the location of mobiles and therefore know the speed
they’re all moving.
Navigating using Google Maps allows you to be constantly
rerouted to avoid congestion.This can’t happen unless
Google knows your location.
The problem is that leaving Location Services permanently on allows others to track you.
Photos and social media posts may have location information logged.
Many people carefully avoid posting their address on websites, without
realising that its effectively already embedded in the photos
they’re posting.
There are some (legal) apps that allow people to
take a geographical area and look at
all tweets or Facebook posts from that vicinity.
There are countless cases where predators have studied posts and tweets to basically work out where young people live and who amongst them seem to be
particularly vulnerable.
Liverpool 3 Man Utd 1!
Get in!
Anyone got a tip for getting Ribena stains out of clothes?
Justin Bieber tickets come out tomorrow!I wish I had someone to go with!
Switching Location off is possibly the single most important thing
you can do to keep yourself safe!
Cyberbullying
(or just bullying!)
Your best defence against online bullying is knowing how
to perform a screenshot.
There is a button on every computer and often a
combination of buttons on Ipads and most phones that take a photo of the screen.
Often on computers it’s called PRINT SCREEN or something
similar, such as PRTSC.
Use this to capture any bullying or inappropriate
material.
Often Cyberbullies selectively delete
so that their comments are removed and the victim is made to
look like the perpetrator.
Consider this exchange:
Kate: Hello Peter.Peter: Hello Kate.Kate: What are you up to?Peter: Like I’m going to tell you! Stupid!Kate: What have I done wrong?Peter: You smell and everyone hates you.Kate: Don’t be unkind. I haven’t done anything to you!Peter: I’m going to make your life not worth living!Kate: You’re so horrible. Everyone thinks you’re horrible.Peter: Everyone thinks you stink!Kate: Please stop being horrible to me!Peter: Oh, please stop being horrible to me!Kate: You’re disgusting! I hate you!
After selective deleting by Peter:
Kate: Hello Peter.Peter: Hello Kate.Kate: What are you up to?Peter: Like I’m going to tell you! Stupid!Kate: What have I done wrong?Peter: You smell and everyone hates you.Kate: Don’t be unkind. I haven’t done anything to you!Peter: I’m going to make your life not worth living!Kate: You’re so horrible. Everyone thinks you’re horrible.Peter: Everyone thinks you stink!Kate: Please stop being horrible to me!Peter: Oh, please stop being horrible to me!Kate: You’re disgusting! I hate you!
Kate: Hello Peter.Peter: Hello Kate.Kate: What are you up to?Peter: Like I’m going to tell you! Stupid!Kate: What have I done wrong?Peter: You smell and everyone hates you.Kate: Don’t be unkind. I haven’t done anything to you!Peter: I’m going to make your life not worth living!Kate: You’re so horrible. Everyone thinks you’re horrible.Peter: Everyone thinks you stink!Kate: Please stop being horrible to me!Peter: Oh, please stop being horrible to me!Kate: You’re disgusting! I hate you!
Peter: Hello Kate.Kate: You’re so horrible. Everyone thinks you’re horrible.Peter: Oh, please stop being horrible to me!Kate: You’re disgusting! I hate you!
Peter: Hello Kate.Kate: You’re so horrible. Everyone thinks you’re horrible.Peter: Oh, please stop being horrible to me!Kate: You’re disgusting! I hate you!
OriginalScreenshot kept as evidence
Lessons to Learn:
1) Don’t retaliate to bullying.
2) Use screenshots to capture other people being mean, even if they later delete it.
3) Remember that other people might use screenshots on material you place online.
Using Social Media!
Be careful what you post!
Posts may be quickly shared and may still be available to view –even when you believe they are
deleted!
Children at Stamford Green are lovely, kind, tolerant and
considerate, but are we being fair as a society?
Are we, as a society, making it very hard for children (and adults) to know where the line is actually
drawn?
At Stamford Green, any use of language that could in any
way be taken as being homophobic is
taken very seriouslyand dealt with appropriately.
But…...
Whilst on air in 2006, Chris Moyles described
a ringtone as ‘gay’.
Following an investigation, the BBC Board of Governors declared that Moyles had done nothing wrong as the word gay "was often now used to mean 'lame' or 'rubbish'. This is a widespread current usage ... among young people".
The Inbetweeners consistently use the term.
Use language like that on Twitter or Facebook
and you could risk prosecution or make yourself unemployable!
Children need to realise that severe consequences could follow
from themselves using language and ideas that they might see everyday
on mainstream media.
We’ll be coming back to Social Media later when we deal with
privacy.
Unknowing use of Webcams:
In the KS1 presentation, we discussed the need to
cover webcams when they’re not in use.
Some malware is designed to take control of people’s
webcams without them even realising it.
If your webcam is covered up then it can’t be revealing
anything.
The same is true for mobiles but hasn’t happened on the same scale-
probably because many mobiles are in a case or placed facing up or down.(Top left phone safer than top right)
Intentional use of Webcams:
KS2 and older is when children might entertain the idea of posting
inappropriate pictures voluntarily.
(There have actually been cases nationally of KS1 children posting
naked pictures online!)
The Law is very clear on this and not necessarily what you might
think!
Children are not allowed to put naked images of themselves on the
internet. If they do then they are guilty
of……
Children are not allowed to put naked images of themselves on the
internet. If they do then they are guilty
of……
Paedophilia!
A child will have committed paedophilia offences if:
1) they put indecent pictures of other children online.
2) they put indecent pictures of themselves online.
Nationally, there have been cases of boys putting pictures of their
older girlfriends online.
Legally, they’ve still committed paedophilia offences.
(As would the girl have done if it were the other way round)
Different countries have tried different strategies to avoid criminalising children but none have found an answer.
In this country, there are calls for cases to be logged but not to be recorded as a crime if all parties were consensual, but guidelines
still aren’t definitive.
As things stand, children may still get a criminal record for life if they post
indecent pictures of themselves or others online.
So placing embarrassing material online can get you prosecuted and can easily lead to humiliation and embarrassment if it is shared.
Another reason not to do it is…
Sextortion
This is where criminals blackmail victims who have been previously tricked into sharing
material online.
SextortionNormally victims believe they’re sending material
to a love interest of a similar age but this is faked.
As soon as the criminals have gathered incriminating media they then start blackmailing –
often either demanding money, or forcing the victim to do even more extreme acts to avoid their
previous ones being shared.
SextortionPolice have recently warned that this
crime has risen dramatically in the last year.
Often humiliating material is sent to everyone the victim knows if they don’t keep obeying the criminals.
Body Image:
Body Image:In Year 5 we look at body image and stereotypes in the media.In particular we look at the use of Photoshopping images to make people look flawless.
This isn’t a uniquely online problem, but it’s something to be aware of, given that:1) Role models for children are increasingly online.
Youtubers are now followed, rather than traditional role models.
2) So many online images have been manipulated.
This might be something that you might like to discuss with older children.
Privacy!
So what if my data
is harvested?
Sextortion:
We said that criminals often threaten to send humiliating
material to everyone the victim knows….
Sextortion:
We said that criminals often threaten to send humiliating
material to everyone the victim knows….
How are the criminals aware of who the victim knows?
You’ve
probably
heard of:
Phishing:
Phishing is where millions of people are sent the same email, eg regarding changes at Barclays Bank. Most
have no account there and so recognise the email as a scam. However statistically, the details will be correct for a small percentage of people who might be tricked by it.
Phishing has evolved into….
Spear Phishing:
Spear Phishing is when scam emails are specifically targeted at individuals. Scammers know exactly
where potential victims bank and know their personal details and so they their scam emails are highly targeted .
In the American election (and possibly in other major world elections)
highly targeted adverts were used to swing the election.
Rather than trying to sway votes, evidence shows that data was harvested and then used to make
people apathetic – in other words to persuade your opponent’s voters that there’s no point in voting
for anyone.
Some companies specialise in using harvested data to support the selection process for
jobs or education courses.
A university might have 1000 applicants for 500 places for example.
They might:• select the 100 most promising applicants themselves, • reject the 100 least promising applicants themselves
• hand over the other 800 applications to companies that will check suitability on grounds such as ability with money, social media usage.
On a recent course, a policeman told of how his daughter is quite a high level synchronised swimmer who had been told that she needed to maintain an extensive social media profile for sponsorship reasons.
He was aware that one of the checks done by companies was to establish the proportion of photos on your social media that contained flesh colour!
He suggested parents actively working with children to build a social media profile specifically for the purposes of looking good in interview situations.
In the news this week…
Spanish Premier League equivalent LaLiga brought out their app which gave fans pictures and match facts.
Experts soon realised that it was sending back all the audio from your house whenever matches were on so that LaLiga could identify anyone watching illegally.
Facebook have been criticised for using their powerful analysis
tools to identify children who appeared to feel they’d done
badly in their exams.
This information was used so that they could be targeted by….
British Army Recruitment
How do we give away our data?
Sharenting:
• Can inadvertently reveal children’s data which increases their risk of being scammed.
• Can hinder children’s chances of getting jobs or onto courses if it puts them in a bad light!
How else do we give away our
personal information and
data?
An example of a Social Media
company’s
terms and conditions:
There are over 5000 words in Instagram’s Terms and Conditions.
A British legal firm was recently asked to make these terms and conditions understandable to children.
Instagram’s actual Terms and Conditions
Instagram’s Terms and Conditions
Instagram does not claim ownership of any Content that you post on or through the Service. Instead, you hereby grant to Instagram a non-exclusive, fully paid and royalty-free, transferable, sub-licensable, worldwide license to use the Content that you post on or through the Service, subject to the Service's Privacy Policy, available here http://instagram.com/legal/privacy/, including but not limited to sections 3 ("Sharing of Your Information"), 4 ("How We Store Your Information"), and 5 ("Your Choices About Your Information"). You can choose who can view your Content and activities, including your photos, as described in the Privacy Policy.
Do you understand them?
This is the translation into language children
might understand.
Do they seem fair?
Technically, no one under the age of 13 should be on any social
media platform.
This is due to America’s Children’s Online Privacy Protection Act (COPPA)
COPPA made it illegal for companies to harvest
information on under 13 year olds and so for ease many companies adopted this
worldwide.
Far from what was intended, companies frequently use this law as a get out.
They clearly aim their products at children,
but when criticised they say that children shouldn’t be using their
products anyway.
GDPR legislation has just given Europeans a far bigger say in how
their data is used.
Use the opportunity to genuinely look and see how companies you use
are using your data!
Your ISP is not allowed to make money from your data – although
Trump has just changed that in
America!
Apart from your ISP though,
almost everyone else will be harvesting and
selling your data!
My Yahoo email account recently asked if
I was OK with them sharing my data with partners.
When I looked, the companies Yahoo
wanted to share my data with were….
The record that I’ve seen so far is the Daily Mail website.
Casually clicking on their ‘Got it’ button shares your data with 839 different companies.
Constantly deleting cookies
helps to minimise how much data you are giving
third parties.
(It might also make safety settings default back to less secure options though so be careful.)
Beware of the permissionsyou’re giving your apps:
These are the permissions for one of the apps
on my phone:
Which app has all those permissions?
The torch!
A torch doesn’t need to know exactly where I am,
who my friends are and what I’ve watched
online!
Summary:
• Uninstall any apps you don’t use!
• Check an app’s permissions carefully before downloading. Does it need to have the access that it’s asking for?
• Try to find alternatives that ask for less access to personal data.
The absolute giants at hoovering up your
personal data are Facebook, Google and
Twitter.
To the point where Apple’s next operating system will actively block Facebook to
protect its users.
https://www.wired.com/story/download-facebook-data-how-to-read/
To download the file of data that Facebook has on you:Go to your Facebook settings.
At the bottom of the General tab, you should see an option to Download a copy of your Facebook data.
After opting in, you'll receive two emails, one acknowledging that Facebook received your request, and another that includes the file when it's ready.Depending on how much content you've posted to
Facebook—including photos, videos, text posts, and other forms of media—it might take some time for
the file to be prepared.
Your Facebook data is likely to be filled with surprises!
Over the weekend, some Android users were shocked to learn that Facebook retained their entire call and SMS history
– even when not conducted through Facebook.
This is how you review and delete
your data from Google.
Keeps a record of every app
you’ve ever used and all
searches made.
Keeps a record of
your calendar
and contacts.
Keeps a record of all voice searches
made.
Keeps a record of
all YouTube Searches
made.
Keeps a record of
all YouTube videos
watched.
Keeps a record of
everywhere you’ve been!
If you’ve never reviewed it before then you’ll probably be surprised by how
much you’ll find!
I would suggest turning everything off
unless you have a good reason not to.
You might have to leave certain controls on, for example, to allow
Alexa to work –this ‘forced consent’ where you’re
not really free to choose is currently being contested under
GDPR.
Have you seen what Twitterknows about
you?
Go to ‘Settings’ ‘privacy’ and then
‘Your Twitter Data’ .
You’ll discover lots of
information about yourself!
They’ll probably know the house you live in.
Your car insurance details.
Your hobbies.
Where you go on holiday.
Your building and contents insurance
details.
How to check whether you’ve given permission for
companies to read your emails:
https://myaccount.google.com/intro/security-checkup/3
In Summary:
1) Your data is constantly harvested and used to build profiles on you (and your children?)
2) Applicants for jobs and courses are increasingly judged on Instagram photos, Twitter profiles, Tweets, emails, blogs, likes, dislikes, searches.
3) A wide range of scams and blackmail attempts are made possible by data harvested from data breaches or freely given to apps.
4) GDPR gives us new rights to see how our data is used and ask for it to be edited or deleted.
And finally………
It’s not all bad!!!
The reason for all these things dropping?
The reason for all these things improving?
Today’s children aren’t getting drunk in parks or bus stops – they’re choosing to
stay safely indoors with their parents.(even if they are permanently attached to their
phones and tablets)
Despite everything we’ve covered today, we’ve got a lot to be grateful for!