E-safety stands for electronic safety. E-safety is being safe on your electronic devices. It's not just with the internet, it's also with mobile phones and game consoles. Some ways to be e-safe are to have a fire wall, use anti viral software and take control of your e-mails. You can block all spam messages and never talk to strangers on line.
When you're online somewhere public, remember not to save your logon. This will prevent others from logging onto your account.
Don't leave a computer unattended for others to get to. They may figure out your username, send rude messages, gather personal information about you or change your password.
To find out how much you know about e-safety try these fun games at:
Scams are often in the form of pop-ups or spam emails. Many of the scams try to lure you in by telling you that you have won something, such as a cash prize or a free holiday. If you receive any messages that ask you for your full name, address, phone number, fax number or any financial details, it's most likely a scam. The best way to protect yourself from spam emails and pop-ups, is to never give out any personal information on the web.
Websites that are safe to put your personal details or financial details into, either have https, at the beginning of the website (the 's' standing for secure) or have a gold padlock at the end of the web address.
How to Protect Yourself Against Scams
* Never open an email if you don't recognise the sender
* Never click on any links contained in a spam email or pop up
* Never provide any personal or financial details to anyone. Remember websites that are secure have an 's' in https or the padlock symbol)
If you give someone, even someone you know, your personal or financial details, they may create accounts, possibly hack into your existing accounts and purchase items online.
Viruses can be found commonly in spam emails, pop-ups and some chain letters . You should never open spam or emails from people you don't know. Viruses are programs that can compromise your information on computers, steal passwords and usernames or permanently damage your computer. If you come in contact with a virus you should tell your parents immediately.
Many people use internet sites that require usernames and passwords, from role playing games to internet banking. No matter what site you use, it is always important to properly secure it with a strong username and password.
Good usernames should never give any hints about who you are, especially on sites that allow you to communicate with other users. Never make your username the same as your password. Some good examples of usernames are:
You also need to make sure that your username is appropriate, imagine introducing yourself to your parents by it, to make sure that it puts out a good image. Some examples of bad usernames are:
If you put out the wrong image with your username, people can make assumptions about you, that you might not want them to make.
You should always secure your online accounts with strong passwords, otherwise people can hack into them and lock you out. If you don't properly secure your email account, people can hack into them and send rude messages, and you would get the blame. Some adults might use internet banking, if they don't secure their accounts, people can siphon out all their money! Some good passwords to use are random combinations of letters and numbers, or something no one knows. Some bad passwords are really predictable things, like your name, username or birthdate.
What is Social Networking?
Social networking is a fun and good way to chat to people. It allows you to stay in touch with people that you may not see every day, such as friends and relatives. Some popular social networking sites are Facebook, MySpace, Twitter, Bebo, Omegle, MSN and Moshi Monsters. These sites are growing in popularity and there's alot of them, but do you know how to be safe using them? And are you revealing more than you want to?
There are lots of risks using these sites and they are becoming a big target for preying cyber-criminals. These people can abuse the sites and gather personal information about people from the sites.
These sites are used by everyone, particularly young people. There are a lot of risks for young people using them, like cyber-bullying, exposing personal details, stalking and at an extreme, grooming.
For adults, however, the risks are things such as loss of privacy and having their identity stolen. Adults can be victims of cyber-bullying and stalking too.
Protect Your Privacy
it's easy to avoid these risks and enjoy the sights by following these sensible guidlines.
* Anyone can see what you post unless you set your profile to private. If you are using a social networking site you should look at your privacy settings. Sites like facebook let you control, who sees what on your profile. Do not post or give-away personal information, like your phone number, address or your full name.
* Never accept a friend request from someone you don't know in real life.
* Pick a username that is appropriate and doesn't give away your full name.
* Use a strong password to make sure nobody can guess it and don't tell it to anyone.
* Think to yourself before you put up a picture or post, will this cause embarrassment later?
* Learn how to use your privacy settings, so no strangers can access your profile, don't know how to? Ask a friend who does.
Facebook can be safe if you use it responsibly and use the privacy settings correctly. Facebook gives you control over what you post or share. Who can see certain things but not see others, like certain photo albums or posts. It also gives you the ability to completely block people so you don't come up when they search your name. Always make sure that you know everyone in real life, that is on your friend list. Predators use these sites to 'groom' young people by pretending to be someone else.
What is Cyberbullying?
Cyberbullying is when a preteen or teenager is targeted by another child using mobiles, gaming consoles, computers or anything that is a digital interactive console. It may be a threatening or offensive email, text message, phone call or post on a website. Posts on web sites can be embarrassing photos or videos taken and posted without permission.
The ways children can cyberbully another child is only limited to the childs imagination and access to technology.
Children have physically injured one another and some have even committed suicide after having been involved in a cyberbullying incident.
Cyberbullying is usually not a one time communication, often it is repetitive and persistent. Sometimes it can be a group of children targetting another.
Cyberbullying might get so out of hand that the cyberbully is criminally charged. If the child is too young to face these charges they will be charged with a child offence. Alot of the time cyberbullying does not go that far, but most parents try to get the bully charged.
To prevent cyberbullying, children need to be educated and taught how to respect others at a young age. A good, fun way to educate children about cyberbullying is to have a go on Budd:e. Budd:e is a program on the internet.
The web address for this website is:
What to do if you are being Cyber bullied
* Ignore the person/s who are bullying you
* Block or ban the bully/bullies
* Save the evidence
* Set up new accounts
* Tell a trusted adult
Have You Ever Cyberbullied Someone?
Answer the following questions to find out:
1. Signed on with someone else's username and password to collect information about them or post inappropriate items?
2. Teased or threatened someone in a SMS, IM or on a social networking site?
3. Not told someone who you really are online?
4. Forwarded or posted something that might be personal without asking?
For more information go to...
Mobile phones are a powerful tool for bullies, using a mobile phone they can bully you anytime, anywhere, and it's nearly impossible to get away from. Bullies feel more confident bullying you over texts or calls because they can't see your face and the damage that their words are doing.
Never give your number to someone you do not know in real life. When giving your number to someone, make sure the person knows not to give your number to anyone else without your permission. They may give it to someone that you do not know or want to have your number.
Never post your number online! If you do, everyone and anyone has access to your number. You may find yourself getting abusive, sexual and bullying texts or calls from all types of people.
If you are getting bullied, DO NOT reply to any nasty texts and do not answer any calls, if you recognise the number as the bullies or don't recognise it at all. You should have all the numbers you need to know saved into your phone, such as family and friends, so that you know when to answer a call.
If you are being bullied, tell a parent or trusted adult. You should never have to deal with being bullied on your own.
Changing your number is a good option if you can not stop the texts or calls.
An online predator is an adult internet user who uses social networking sites, chat rooms, instant messaging, email and text messages to chat to and form a relationship with a child. They are also known as sexual predators and paedophiles. They generally pretend to be someone they are not, they can take on many personalities. Some online predators have been known to pose as several people at once to talk to one potential victim. The predator can send a message pretending to be any sex, age or personality. Sometimes predators will even pose as the same age and sex as their intended victim, to get more information about the victim and become closer to them. The same predator may approach the same victim, many times as different personalities, trying to learn as much information about them as possible and trying to win their trust.
Online predators will try very hard to persuade their victims that they are honest, caring and who they think they are. They will talk the same way, about similar topics and pretend to have the same interests. They will spend a large amount of time, trying to make their intended victim, like and trust them. Predators computers have been found to have details of victims likes and dislikes, appearance, interests, hobbies, common online times and daily schedules, as well as other personal information.
Often online predators are attempting to eventually meet their victim in real life. Thousands of predators, however, just operate online, getting their victims to send sexually explicit photos, video footage or use a web cam. Others use the phone and internet and get their victim to engage in sexually based conversations with them. It is important to be aware of and protect yourself against all types of online predators.
How to protect yourself
* There is no easy way to tell if someone on the internet could be a predator.
* That people are not always who they say they are online
* Do not talk to people online unless you've met them in person first.