topamax 50 mg side effects

It’s your life & you’re in Control

What are you doing online?

What you do online affects your whole world …it’s your life and you’re in control…. Find out about how you can protect yourself and stay safe…

Cyber bullying

Cyber bullying involves the use of information and communication technologies to support deliberate, repeated actions by an individual or group intended to embarrass, humiliate or intimidate their victim.

“Cyber bullying feels as bad as bullying – in fact, sometimes it feels worse”

Things you can do to avoid being a victim of cyber bullying:

  1. Do not reply to a bully
  2. Change your privacy settings
  3. Click the REPORT abuse button or flag
  4. Block the bully
  5. TELL a trusted adult
  6. Collect evidence
  7. KEEP mobile phone messages
  8. Print emails and social networking conversations
  9. Get help from Cyber C3  Help page

Schools or parents can make a difference and the problem does not need to escalate if reported.

Reporting makes the technology safer for you to use, and shows you can handle it

What do I do if my friend is being cyber bullied?

  1. Help stop the cyber bullying!
  2. Stand up and speak out! Tell a trusted adult.
  3. If you see or know about cyber bullying happening to a friend, support them and report the bullying. You’d want them to do the same for you.
  4. Don’t forward on messages or pictures that may be offensive or upsetting to someone. Even though you may not have started it, you will be part of the cyber bullying cycle.
  5. Remember to treat others as you would like to be treated when communicating online.

What does cyber bullying look like exactly?

  1. Abusive texts and emails,
  2. Imitating others online in a negative way,
  3. Excluding others online specifically to hurt their feelings,
  4. Tagging others inappropriately,
  5. Posting unkind messages or inappropriate images on social networking sites,

The Differences between real life bullying and cyber bullying

While cyber bullying is similar to real life bullying it also differs in the following ways:

  1. It can give the bully a sense of being anonymous,
  2. It can be difficult to escape,
  3. It is invasive,
  4. It can occur 24/7,
  5. You can be targeted while at home,
  6. It can have a large audience-sent to many people at once e.g. posted on a public  forum,
  7. You don’t get a chance to respond immediately,
  8. People don’t immediately see the consequences of the bullying,
  9. It can cause permanent harm.

Sexting

Sending provocative or sexual photos, images, messages or videos using a mobile phone or posted online.

Sexting may seem funny or flirty but there are serious social and legal consequences, particularly if you’re under 18.

Sharing hot photos or text messages may seem fun and harmless, but you could be breaking the law by sending, receiving or forwarding pictures.

Once you’ve sent a picture or message, it’s out of your control and could turn up anywhere, any time and any place.

There’s no such thing as safe sexting—it can be used by others for cyber bullying, cyber stalking or sexual harassment.

Be careful who you trust—that photo is forever but is he/she?

Once images and messages are sent they can often spread rapidly. If images are posted online it can be almost impossible to remove them or to control access to them.

How do I protect myself from the complications of sexting?

Sharing hot photos or text messages may seem fun and harmless, but you could be breaking the law by sending, receiving or forwarding pictures

  1. Manage your own messages and images,
  2. Think before you send or post—it could be online forever,
  3. Delete any sexting you receive,
  4. Don’t forward anything on—you’re just as guilty,
  5. Set your privacy settings—some things were never meant to be shared,
  6. Remember that a relationship breakup is no justification for sexting,
  7. Be careful of what and who you photograph—consider the feelings of others,
  8. Report to a trusted adult,
  9. Get help from Cyber C3  Help page.

Online activity: Protecting your digital reputation

  1. Your online information may be permanently seen by people you don’t know.
  2. You are not anonymous online, even if you are password-protected.
  3. Once online, it could be there forever.
  4. When you share online you may be sharing with people you do not know.

Are you safe on social networking sites?

  1. Set your profile to private,
  2. Limit your friend list to people you know or trust,
  3. Don’t friend ‘randoms’,
  4. Remove nicknames,
  5. Remove mobile phone numbers,
  6. Remove suburb/town if you have added your surname.

How do I keep safe online?

  1. What happens online affects you in the real world—protect your digital reputation.
  2. Your personal details are valuable—don’t share them without a good reason.
  3. Spams and scams exist – look out for fakes.
  4. Update your security and use pop-up blocker.
  5. Stop before you click – do you know where you’re heading?
  6. Treat your phone as your wallet—don’t give strangers access to it!
  7. Maintain a balance in your life between offline and online.
  8. Stop and think before you check in – geo-locators tell strangers where you are.
  9. When you share online you may be sharing with people you do not know.
  10. Your digital footprint is what you do online—data is collected when you share. Information online but also when you enter your contact details, post photos or post a blog.
  11. Think before you post.
  12. Think before you send.
  13. What information will you share and who will you share with—are they really who they say they are?

Geo-locators

Not everyone needs to know where you are.

  1. Smartphones have a built-in feature called geo-location that pin-points your exact location which can be published online.
  2. Think twice before you check in and tell the world where you are.
  3. Go into phone settings and switch off location services on your handset.
  4. Location services make it easy to access any information and any person anywhere in the world, so it’s easy to forget about protecting yourself and staying safe online.
  5. Set rules for yourself about your own activities, Geo-locators that:
    1. attract unwanted contact,
    2. reveal your whereabouts,
    3. share your details to those ‘nearby’,
  6. Who knows where you are? Every time you ‘check in’ from your smartphone, you’re giving away information about where you go, what you do and when you do it … and you may not like who is interested.

Safer Internet Day

Safer Internet Day is a day to celebrate how children and adults can learn from each other when they meet online in social media networks and systems...Read more

It's your life & you're in Control

What you do online affects your whole world, it’s your life and you’re in control, Find out about how you can protect yourself and stay safe. Read more

Educational Partners

Knews cant update. Please, check user database permisions. (You must allow ALTER TABLE). (ver. 1.0.5) Table 'uae1215601361509.wp_knewsautomated' doesn't exist sql: ALTER TABLE wp_knewsautomated ADD COLUMN submit_time varchar(5) NOT NULL DEFAULT '00:00'