Image

Archive for Internet Safety

Cyber /Text bullying

Cyberbullying can involve unwanted text messages, chats, phone video recordings or web posts being used to threaten, abuse or harm someone. It...’s similar to physical and/or verbal bullying, but it uses technology instead and social media.
Cyberbullying, like all bullying, is difficult emotionally on the victim. Incidences can be hard to prove and it is normal for people to find it difficult to work up the courage to report it.If you are experiencing this form of bullying, it’s vital you don’t suffer in silence and that that you seek support to deal with this. Also, if you have witnessed cyberbullying, it’s important that you take action and help that person to address the problem.

Read the Office for Internet Safety's Guide to cyberbullying, which includes information on when and how to contact service providers if you are being cyberbullied.

What to do if you're being bullied online -Beat cyberbullying

Don’t reply to the messages, invitations (to applications), and photos.

Save the evidence (photo/email/video/web post, etc) as proof.

Tell a trusted person/adult, such as a close relative, a family friend, a teacher, health professional or a youth worker.

Contact a free confidential support service such as Samaritans - telephone 1850 609090. Childline
For UK: www.childline.org.uk/ For ire: https://www.childline.ie/

Report the bullying to the police or Gardaí.

Report the bullying to the technology providers such as the mobile phone company, web host or website owner. Find out how to report bullying or problems here.

Check out this information on staying safe online.

Text bullying – Beat text Bullying

Texting is cheap, easy and can be great for flirting or avoiding a long conversation that sucks up credit. Unfortunately it can also be used to harass, bully, intimidate and frighten people.

If you receive a text which that frightens, insult, threaten, mocks you or those important to you or make you feel uncomfortable this might indicate you are being bullied.

Email, social networks like Facebook/Twitter and phone calls can be used to harass in the same way.

It is illegal in Ireland, UK and many countries to bully or harass someone by text, phone, Internet or email and if the harassment is getting out of hand you should report it to the police or Gardaí. There are agencies which can support you with this such as victim support.

If you’re being bullied by texts:

Don't stay quiet about the bullying. Tell a friend, your parents, a teacher or someone who will be able to help you and give you support. By seeking support about the bullying, the advice and help you receive , will improve the situation for you.

Ignore and don’t reply to the messages. If the person does not receive a reply from you hopefully they will get bored and stop harassing you.

Don’t delete and retain the messages, you can use them as evidence for reporting the crime.

Report the bullying to the police or Gardaí and your phone company so that the right authorities and organisation are aware of the problem and can give you a new phone number or caution the person harassing you.

ChildLine

www.childline.org.uk

ChildLine 0800 1111: get help and advice about a wide range of issues, talk to a counsellor online, send ChildLine an email or post on the message boards.

Internet Safety

Here are some internet safety tips:

  • Don't give out your personal information unless you are absolutely sure that it is safe.
  • Be careful with providing credit card information online.  Work with reputable sellers that have secure shopping facilities (these links start with https not http). These sellers use secure servers which receive and store your personal information in encrypted form, so that if anyone intercepts your transaction, they won't be able to decode the data and get your details.
  • Avoid using the internet for private communication (including shopping) on public computers
  • On a public computer, other people might be able to view what you've been browsing or even retrieve your personal details after you have finished.
  • The computer could have a keystroke logger, which is a program that records what you type.
  • Use secure logins and passwords.  Don't use anything obvious like your name or the names of your family members or the word “password”.  Don't write the login details down. Use a combination of words, letters and symbols in your passwords Come up with a password and then test it on Microsoft's password checker

Secure passwords

  • Don’t use common nicknames, birthdays, memorable dates and pet names
  • Create passwords that are unique and that include letters, numbers, symbols and random capitalizations.
  • Don’t share passwords.
  • Don’t use the same password for everything

Email

  • Delete suspicious emails
  • If you don’t recognize the sender, delete the email
  • Use a spam filter on your email if possible.
  • Never respond to an email asking for your username and password

Phishing

  • Phishing is an electronic attempt (usually email) by criminals to acquire sensitive information, such as usernames, passwords and credit card details, by pretending to be a legitimate entity like PayPal, eBay or an online bank.
  • Be careful:
  • Watch out for “phishy” emails asking the recipient to “confirm” personal information.
  • Don’t click on links within emails that ask for your personal information. Criminals use these links to lure people to phony Web sites that impersonate real. Hover over the link and look at the destination link closely in the bottom bar of the window. To check whether the message is really from the company or agency, call it directly or go to its Web site (use a search engine to find it).
  • Beware of “pharming.” Pharming is a virus or malicious program secretly planted in your computer that hijacks your Web browser. When you type in the address of a legitimate Web site, you’re taken to a fake copy of the site without realizing it. Be aware of how your browser is behaving. Run antivirus software if you're suspicious of anything.
  • Never enter your personal information in a pop-up screen. Use browser pop-up blockers.
  • Only open email attachments if you’re expecting them and know what they contain.
  • If someone contacts you and says you’ve been a victim of fraud, verify the person’s identity before you provide any personal information.

Spam

Junk e-mail or spam is unsolicited bulk email. Spammers send unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Some estimates indicate that 80 to 85% of all the email in the world is spam. Because e-mail is an extremely cheap mass medium, and professional spammers have automated their processes to a high extent, spammers can make money even if there is an extremely low response rate to the email. In general, spam is bad because it wastes people’s time and uses extreme amounts of bandwidth on computer networks. Spam can also be offensive in nature to the recipients.

Learn the basics of Internet safety

 

  • Children use a variety of online services, and each of these services can have different safety concerns. However, there are some basic tips which you can employ no matter how your children use the Internet.
  • Keep the computer in a high-traffic area of your home.
  • Establish limits for which online sites children may visit and for how long.
  • Remember that Internet technology can be mobile, so make sure to monitor mobile phones, gaming devices, and laptops.
  • Surf the Internet with your children and let them show you what they like to do online.
  • Know who is connecting with your children online and set rules for social networking, instant messaging, e-mailing, online gaming, and using webcams.
  • Continually dialogue with your children about online safety.