E-Safety: Conduct

Students behaviour in a virtual environment may sometimes be different to that of real life. The common belief is that the virtual life acted on the Internet is a place where social rules need not apply and people can act differently. Some students consider their attitude to be 'normal', 'what teenagers do', 'acceptable' as other act in the same manner. Do the students consider the impact of their actions? For example downloading illegal films which have not been released to general sale.  The money lost can have significant impact in terms of jobs and prosperity of the companies that make films. 

 

Commercial

Aggressive

Sexual

Values

Conduct

(Child as actor)

Illegal downloading,
Hacking,
Gambling,
Financial scams,
Terrorism

Bullying or Harassing anotherCreating and uploading inappropriate materialProviding misleading info/ advice

 

Illegal downloading

Illegal downloading is an issue that plagues many industries, it may seem a popular and common thing to do but downloading games, music, applications illegally can cost millions of pounds of lost revenue it can also cost the people who access these illegal items  financially. Internet Service Providers (Virgin, BT, Sky, TalkTalk, PlusNet and others) have made an agreement with representatives from the Motion Film and Music industries to provide warning letters, to the households who download illegal products. This historic agreement has come to be due to the Digital Economy Act in 2010, persistent downloading of illegal music, film or games could result in reduction in internet connection speed or full disconnection by the service provider if there is no change in attitude.

In spring next year (2015), a major multi-media education awareness campaign about the value of copyright and licensed entertainment will roll out and funding is being provided by government.

Copyright

 

Hacking

Instances of hacking are now a regular occurrence in today’s world. Not a week goes by without a knowing Hackers Group making an attempt to access secretive/sensitive data held by large organisations using vulnerabilities in their computer systems, the most common reason for a successful hack is due to a weakness in the usernames and passwords used at the targeted organisation. At St Peters we enforce complex passwords, requiring a minimum of characters, numbers, Capital and lower case letters for all users, whether students or staff.

Accessing other people’s accounts without their permission is against the law, we stressed the importance of not sharing passwords with friends, as friendships for children are likely to change throughout their time at St Peters. Hacking is often seen as requiring an advance understanding of computing, this is not the case. It does not require a great deal of knowledge, though any action performed by a hacker always leaves traces, like virtual footprints. If a person is found to be hacking they will be pursued by the police and sometimes from foreign police/security forces, depending which organisation has been hacked into.
In the United Kingdom, it is possible to break the law, by either accessing another person’s computer without their permission, altering information which is found on an illegally accessed computer or installing/ deleting applications or files. The Computer Misuse act 1990 enables judges to pass sentences varying from a maximum fine of £5000 to a 12 month custodial sentence.

There are different ways to prevent yourself to be a victim of hackers. Firstly have an up to date anti-virus, some hackers like to run viruses and other nasty pieces of software which can play havoc with your computer system. There are many different anti-virus software packages available to buy online or in a high street store, the prices of these can vary significantly and can cover multiple machines. There are also a number that are free such as AVG and AVAST. Remember an Anti-virus that is not kept up to date (minimum weekly) is just as useful as not having one.

Another way to keep your computer protected is to have a firewall running whilst you are connected to the Internet. A firewall looks at all the data that comes through the internet onto your computer, if something comes along which might not be expected then the firewall will isolate the piece of data and ask you what you want to do with it. Microsoft provide a basic firewall as part of their operating system Link. Having a firewall may sometimes cause you some annoyance, as it may constantly pick up some data traffic which you need and ask you what action to take. You can tailor the firewall to ignore specific data from an application by adding an exception. 

Gambling

It is a frightening fact that 2% of children between the ages of 11 – 14 have a gambling problem. Even more worrying is that there is little in terms of government funded support for children who have this addiction. Young children are experiencing gambling at a young age. The types of places where young children experience gambling is more often than not in a family environment such as an entertainment and/or a leisure space, for example amusement arcades, fast food outlets, cafes, and public houses.

GamCare continues to develop education and prevention strategies for young people to increase awareness and educate about the risks of gambling. GamCare have produced a website ‘Big deal’ aimed at teenagers to provide information, quizzes and videos about gambling and the dangers that come with it.

If you or your child feel that they need to talk to someone about Gambling GamCare provides an online chat service called Netline as well as a Chatroom. All discussion whilst using Netline is confidential.

GamCare have produce a self-assessment toolkit to see whether an adult has a gambling problem.

Financial Scams

 Online financial scams can take many different guises, from Online Dating (Romance) to work from home scams.  No matter the type of scam, they all involve the scammers encouraging you to give them your hard earned money.  The Action Fraud website set up by the UK Police is a site which not only identifies the manner different types of scams but also provide advice/support to victims and also provide you with means to ensure that you are protected. It is important to inform the police if you have been a victim but please use the Action Fraud number which can be found on the logo below

 Phishing

One Financial scam which is could cause some initial concern is when fraudulent email from your online Bank (NatWest, HSBC, Lloyds, Barclays etc.) arrives in your email inbox, informing you of some difficulty which their website is currently facing.  The email goes on to encourage the recipient of the email to reactivate your account within a certain time by following a link to a bogus website (made to look like your bank website) and provide your banking details. It is essential that you do not provide any information, if you were to enter your details, you will find that your bank account will have been emptied very quickly. This illegal trick is called ‘Phishing’. An example of an email can be found below.

 What should I do to protect myself from Phishing?

 NatWest Bank provide a very useful guide to ensuring that you do not fall victim to Phishing

  • Check the email address - Is it the same as the email address you usually receive emails from, or just similar.

 Check the email subject line - anything along the lines of "There is a secure message waiting for you", "Security Alert", "System Upgrade" and so on should be treated as suspect.

  • Check the message title - if it reads 'Dear Customer' or 'Dear Valued Customer' or if isn't personalised at all, then you should be suspicious. Phishing emails will not usually include your name.
  •  Be wary if the email asks you to click on a hyperlink or a button to download a file. Wording such as 'verify your account or password' or 'update your security details' should be viewed as suspicious – they are likely to take you to a copycat website where you may be prompted to enter personal details which can be used to commit fraud.
  •  Be suspicious of any message that creates a sense of urgency, such as 'If you don't respond within 48 hours, your account will be suspended'.
  • A legitimate company will not create a false sense of urgency.
  •  Check the grammar and spelling for mistakes or inconsistencies.

 The following banks provide the following guidance to their customers

  • Ignore emails claiming to be from Barclays that ask for your Online Banking details. They often ask you to follow a link to a site and enter your security/log-in details.
  • Barclays does not send emails asking you for your security or other personal information.

 Always make sure that you see your personalised image when you receive an e-mail from us; any message we send to you includes your anti-phishing image. Your personalised image is known only by us, so you can be sure that any message containing your image is legitimate. If you ever receive an e-mail without your image, do not open any attachments or click any links in the e-mail.

Terrorism

 The Internet can be a fantastic medium to communicate. It has been used by many families to keep in contact with love-ones or family members abroad, bringing people closer together. It is also a way to share information, individuals can have their own video channels, which can be used for a wide range of purposes such as reviewing the latest technology to come to TVs or to share views or beliefs.  Terrorists have started to use the internet to share videos, plan attacks or build up hate. The recent ISI videos which have been commended worldwide had been published on the internet to generate a media frenzy. Most recently after the brutal murder of Rigby, it has been reported that one of the killers had communicated his desire to carry out “in the most graphic terms” an Islamist jihadi attack on social media. There is currently a great deal of debate on how to restrict potential/actual terrorist from communicating on the internet. The following articles will provide a greater insight on how the government are planning to deal with Terrorists using the Internet.

Telegraph - Police to 'patrol' Facebook and Twitter for terrorists under EU plan

The BBC - Downing Street presses ISPs over 'jihad reporting' button

The Daily Mail - Cyber border controls to stop extremist videos hosted abroad being accessed in the UK to prevent young Brits being radicalised

 

Bullying/Harassing others

 CyberBullying

 A Cyberbully is when a person or a group of people uses the internet, mobile phones, online games or any other kind of digital technology to threaten, tease, upset or humiliate someone else. This can be done in a number of ways, using writen language, photographs, videos or voice recordings. 

Cyberbullying happens for many of the same reasons as any other type of bullying, but it may be even more appealing because it can be done anonymously. Stopbullying.gov describes two kinds of people who are likely to bully: those who are popular and those who are on the social fringes.

Popular children may bully because:

  • They see it as a way to stay popular.
  • Hurting others makes them feel powerful.

Children who are less socially successful may bully because:

  • It helps them cope with their own low self-esteem.
  • They think it will help them fit in with their peers.
  • They have trouble empathizing with those they hurt.

Here are some additional reasons people may do their bullying online:

  •  Anonymity—Cyberbullying allows bullies to avoid facing their victims, so it requires less courage and provides the illusion that bullies won’t get caught.
  • Ignorance of the consequences—The National Council on Crime Prevention reports that in a survey of teenagers, 81% said they believe others cyberbully because they think it’s funny. Because they don’t see their victims’ reactions in person, cyberbullies may not realize how much damage they are doing.
  • Social pressure—Some cyberbullies may think their behavior is normal and socially acceptable, especially when friends egg them on.

 

Creating and Uploading Inappropriate content

 Sexting

 

 SnapChat

Snapchat

'Revenge Porn'

The practice of distributing explicit photographs of an ex-partner without their consent – and has vowed to prosecute offenders under existing laws.

Many cases can be dealt with under existing legislation, including the Malicious Communications Act 1988, the Communications Act 2003 and, in the worst cases, the Sexual Offences Act 2003. Cases involving minors can be dealt with under the Protection of Children Act 1978.

News article:  Revenge pornography 'can and will' be prosecuted, vow CPS lawyers

Providing misleading information/ advice

Slander