What is E-Safety?
E-safety can cover a wide variety of issues and topics, sometimes more than you'd think!
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
A catfish is someone who assumes a false identity in order to pursue an online relationship. The term comes from the 2010 film about a man who believes he is in a relationship with a young woman but discovers he is being hoaxed. A catfish may have many attractive pictures on their profile and accounts on popular social networking and deating sites. They aim to start an online relationship with someone that can be very intense and seem very personal, and in some cases can lead to identity theft, fraud and other scams.
For more information, please click here
The Child Exploitation and Online Protection Centre, which works to identify threats to children and young people - particularly involving sexual exploitation, grooming and abuse - and to act in order to stop and prosecute offenders.
You can report any of these activities, whether you're experiencing them yourself or are worried about a friend, at the CEOP website, by clicking the eye icon in the top right hand corner of the website. To visit the website, click here
It's extremely quick and easy to support a number of terrific charities and causes online, and a fantastic way to help many worthy appeals and campaigns.
Sadly, criminals and fraudsters realise they can exploit the kindness and generosity of people who donate to these causes, and are skilful at doing this online. To find out how to protect against this type of scam, please click here
Clickjacking is where malicious coding is hidden beneath apparently legitimate buttons or icons, or under any clickable content on a website. This can happen on a legitimate website that's been hacked, or on a spoof version of a popular site, which users are tricked into using via links or emails.
The scam can take place on numerous browsers and uses varying techniques. It can be common on Facebook, especially when clicking to view video or picture content, and this can enable your account to be accessed - with false status updates and spam links being posted and your details stolen.
To find out more about online security, click here
Cloud computing is where software, programs and applications you would normally install on a regular PC or office system are instead delivered via the Internet. It's also known as "hosted software" or "hosted applications." You can also use cloud computing to rent space in a data centre and use their servers. The most popular use of Cloud computing is to provide online drives to save content, which can be accessible via any device as long as it has an Internet connection.
To find out more about using Cloud drives, please click here
Copycat websites are those offering services that are usually provided by an official body - e.g. the government or local council - but which are not official or legitimate.
They usually charge a premium rate for the services and offer no benefit to the customer. They use SEO (search Engine Optimisation) techniques and various tricks so that they achieve higher positions on search engines, often ranking them higher than the official site and making themselves look authentic with similar copycat design, font, and so on.
To find out more about avoiding copycat websites, please click here
Everything and anything posted on the Internet - whether text, images, multimedia and other forms of content - is and can be copyrighted.
Anything created or made by an individual is considered their rightful property, and this includes online content of any type or description. It doesn't have to be registered - as soon as it's produced, it is deemed as belonging to that person.
It can get really complex figuring out what you can and can't use, and it can get you into trouble if you use something you aren't allowed to as you can be fined - and the fines are unlimited in their amounts, meaning you could have to pay thousands and thousands of pounds for copying or reproducing copyrighted material without permission. Please click here to learn more.
Creative Commons can be used to allow creators of various types of work and media to voluntarily share their work with others. Sites like Wiki use a creative commons licence to allow people to share and distribute work.
The author of the work can licence people under creative commons to use the work and the licence will state any conditions on using and sharing the work; for example, you may need to attribute the work. When you click on an image on a site like Wikipedia, if licenced under the creative commons licence it will tell you how you can use the work.
For more information about this, click here
Cyberbullying is any form of bullying which takes place online, through any device that connects to the Internet. It can take place via text message and email, over Instant Messenger, and through posts, tweets, hashtags and groups on any social networking sites - including Facebook, Twitter and Ask FM. It can take place on blogs and forums with trolls posting dergoatory comments, and during online gaming. It can consist of rumours, derogatory names, abusive comments, posting inappropriate and nasty pictures, fake profiles and identity theft - and even rape and death threats.
We can help you deal with cyberbullies here at college.
Visit our Student Support team, or speak to your tutor or a trusted lecturer/ member of staff. For help and support from the college, please click here
You can also report cyberbullying to the police on 101 (to report the incident to Avon and Somerset Police), or if you have received immediate threats to your safety, please phone 999.
For more information on cyberbullying, please click here
This is where an individual can be stalked and harassed via the Internet, in conjunction to or instead of real-life stalking. It is deeply upsetting and just as dangerous and threatening.
It is a reportable offence, and can be reported to the police - either online, or by calling 101.
If you have been threatened or feel you are at risk of immediate danger, call 999.
You can be cyberstalked by either strangers or people who are known to you - for example, ex-partners/ boyfriends/ girlfriends. They find information about you via your online profiles and identity - even sometimes intimate details about your personal life and your current location.
For more information on cyberstalking, please click here