E-safety

Description

How to stay safe online
Lucy Corlett
Mind Map by Lucy Corlett, updated more than 1 year ago
Lucy Corlett
Created by Lucy Corlett about 5 years ago
7
0

Resource summary

E-safety
  1. Never share personal information online

    Annotations:

    • Personal information includes things like passwords, addresses, full names and dates of birth
    1. If you suspect someone has got hold of your personal information, report them and tell an adult. If it is a password, change it immediately.
    2. If you receive messages from someone you don't know in real life, don't reply to them
      1. Never talk to anyone online that you don't know in real life

        Annotations:

        • You don't know anything about them. Some people lie about themselves online to try to get people to like them, so always be careful about who you speak to
        1. Definitely don't arrange to meet up with anyone you only know online
        2. Instead, you should block them and tall an adult
        3. If you receive nasty messages from someone online, don't retaliate. Screenshot it, report the person and/or tell a trusted adult
          1. If you suspect someone is being cyber-bullied, you can tell an adult or speak to them about it. Never try to deal with it yourself.
            1. Try not to be the person sending nasty messages. If something happens to upset you, tell an adult. The worst thing you can do is to be mean back.
            2. If you see something online that makes you uncomfortable, report it.
              1. Some sites have a whistle symbol you can press. This should report the content
                1. If the site you're on doesn't have a report button, thinkuknow does. You could also tell an adult.
                  1. Examples of inappropriate content
                    1. Any message that seems to be threatening or malicious
                      1. If you suspect someone online is impersonating someone else
                        1. Any personal information (yours or someone else's
                      Show full summary Hide full summary

                      Similar

                      Types and Components of Computer Systems
                      Jess Peason
                      Input Devices
                      Jess Peason
                      Output Devices
                      Jess Peason
                      Computing
                      Kwame Oteng-Adusei
                      Pack of playing cards answer
                      Karl Taylor
                      Code Challenge Flow Chart
                      Charlotte Hilton
                      E-mails
                      Lucy Corlett
                      Passwords
                      Mr A Esch