
DIGITAL
SAFETY

Cyber Bullying
How to deal with bullying on social media
There are many things you can do to prevent online bullying. Firstly, you can report the behavior on the site- most social networks will have the option to report comments, posts, messages or a user to the app for inappropriate behavior, when you do this you should be as descriptive as possible so the network can carry out a full investigation. The next step you should take is to block the user. If possible block them across all social networks and messaging services so they cannot swap services to continue the harassment/bullying. You should also ensure that you tell someone about this. Our wellbeing team are available to discuss issues such as these. You can access their details by clicking here.
What is cyberbullying?
Cyberbullying is any form of bullying that takes place online or through smartphones and tablets. This mainly takes place on social networking sites, messaging apps, gaming sites, and chat rooms.
Harassment - This is the act of sending offensive, rude, and insulting messages and being abusive. Nasty or humiliating comments on posts, photos, and videos on social media sites, chat rooms, and gaming sites.
Denigration – This is when someone may send information about another person that is fake, damaging, and untrue. Sharing photos of someone to ridicule, spreading fake rumors and gossip. The photos can also be altered for bullying.
Flaming – This is when someone is purposely using extreme and offensive language and getting into online arguments and fights. They do this to cause reactions and enjoy the fact it causes someone to get distressed.
Impersonation – This is when someone will hack into someone’s email or social networking account and use the person's online identity to send or post vicious or embarrassing material to/about others. They may also create fake accounts to cause hurt and humiliation.
Outing and Trickery – This is when someone may share personal information about another or trick someone into revealing secrets and forward it to others. They may also do this with private images and videos.
Cyber Stalking – This is the act of repeatedly sending messages that include threats of harm, harassment, intimidating messages, or engaging in other online activities that make a person afraid for his or her safety. The actions may be illegal too depending on what they are doing.
Exclusion – This is when others intentionally leave someone out of a group such as group messages, online apps, gaming sites, and other online engagement.

Scams and In-game Purchases
How to prevent in-app purchase fraud on gaming applications
How can you stop fraudulent in-app purchases? It’s challenging, particularly when assessing new users with no purchase history.
We use a combination of machine learning and graph network analysis to identify when new accounts are a fraud risk. Here’s what to look for to stop fraudster purchases:
Is the account linked to a Facebook, Google or other social media account? If no, it’s likely to be more high-risk.
Does the account have a linked email? If yes, what is the email quality score? Low-quality emails with a high number of digits are riskier.
Have you seen the device before? If it is a new user, there should not be any existing accounts linked with the device.

Identity Theft
Types of Identity theft
Identity theft comes in many different forms. This can include;
Being tricked into sharing personal data, via email, text, phone call or letter. This is applicable to friends as family who may state they can be trusted as well as total strangers.
Theft or unknown access to important documents such as ID, bank statements, tax returns.
‘Shoulder Surfing’ - people looking over your shoulder when you are entering private informetion such as a password or bank details
Signs of Identity theft
Not receiving letters or other correspondence – suggesting that a criminal has given a different address in place of your own.
Receiving credit cards which you did not apply for.
Denial of credit for no apparent reason.
Receiving calls from debt collectors or companies about things you have not bought.
Unrecognisable entries on your credit history.
You have recently lost or had stolen important documents such as your passport or driving license.
When buying or selling, you get complaints about non-delivery of or non-payment for goods you are not aware of.
You see entries on your bank, credit or store card statement for goods you did not order.
You cannot log into a site using your normal password (because a criminal has logged in as you and changed it).
Prevention
Do not share account information with friends, family or other people.
Ensure you always have effective and updated antivirus/antispyware software running.
If possible, arrange for paperless bills and statements.
File sensitive documents securely, and shred those you no longer need – preferably with a cross-cut shredder.
Never share private information data in response to an email, text, letter or phone call unless you are certain that the request is from a legitimate source.
Always beware of people looking over your shoulder when you are entering private information on a computer, smartphone/tablet or ATM.

Unsolicited Images
Sending images
You may have been tempted in the past to send naked pictures or videos of yourself, perhaps to a friend’s mobile, on a web cam, or on social media.
Some people call this “sexting”, “cybersex” or “sending a nudie”. This makes it sound exciting and fun. It can feel really private too.
But sexting is never private. All images can be saved or ‘screengrabbed’ by the person receiving it – even if you think you are using a private network or a temporary message app like Snapchat.
Once a photo is shared online, you have lost all control of it and it will be virtually impossible for you undo. Even if you change your mind and delete the photo you uploaded, other people may have already shared or copied the image. This puts you at risk of abuse or exploitation by others.
If you or someone you know has already sent a naked picture there is still help you can receive. If you feel concerned about the safety of your image the best thing you can do is speak to someone you trust such as a member of the wellbeing team. Sharing one of these photos without permission is a criminal offence so if your picture is shared you can get whoever shared it into a lot of trouble.
Receiving unwanted images
Lots of people find in their lifetime they receive unwanted inappropriate images. This is often from complete strangers and the best course of action is to block and report the user to protect yourself and hopefully protect others. You may also receive these pictures from someone who you do know, in this case you may feel awkward after seeing them in person but you need to remember that you have done nothing wrong. If you now feel unsafe around them and cannot communicate with them you should find someone you trust to speak about this to find the best course of action for yourself.

Child Grooming
What is grooming?
Grooming is when someone builds a relationship, trust and emotional connection with a child or young person so they can manipulate, exploit and abuse them.
Children and young people who are groomed can be sexually abused, exploited or trafficked.
Anybody can be a groomer, no matter their age, gender or race. Grooming can take place over a short or long period of time – from weeks to years. Groomers may also build a relationship with the young person's family or friends to make them seem trustworthy or authoritative.
Types of grooming
Children and young people can be groomed online, in person or both – by a stranger or someone they know. This could be a family member, a friend or someone who has targeted them – like a teacher, faith group leader or sports coach. When a child is groomed online, groomers may hide who they are by sending photos or videos of other people. Sometimes this'll be of someone younger than them to gain the trust of a "peer". They might target one child online or contact lots of children very quickly and wait for them to respond.
The relationship a groomer builds can take different forms. This could be:
a romantic relationship
as a mentor
an authority figure
a dominant and persistent figure.
A groomer can use the same sites, games and apps as young people, spending time learning about a young person's interests and use this to build a relationship with them. Children can be groomed online through:
social media networks
text messages and messaging apps, like Whatsapp
email
text, voice and video chats in forums, games and apps.Whether online or in person, groomers can use tactics like:
pretending to be younger
giving advice or showing understanding
buying gifts
giving attention
taking them on trips, outings or holidays.
Groomers might also try and isolate children from their friends and family, making them feel dependent on them and giving the groomer power and control over them. They might use blackmail to make a child feel guilt and shame or introduce the idea of 'secrets' to control, frighten and intimidate. It's important to remember that children and young people may not understand they've been groomed. They may have complicated feelings, like loyalty, admiration, love, as well as fear, distress and confusion
If someone reveals abuse
If someone talks to you about grooming it's important to:
listen carefully to what they're saying
let them know they've done the right thing by telling you
tell them it's not their fault
say you'll take them seriously
don't confront the alleged abuser
explain what you'll do next
report what the child has told you as soon as possible.
Effects of grooming
Grooming can have both short and long-term effects. The impact of grooming can last a lifetime, no matter whether it happened in person, online or both.
A child or young person might have difficulty sleeping, be anxious or struggle to concentrate or cope with school work. They may become withdrawn, uncommunicative and angry or upset.
Children, young people and adults may live with:
anxiety and depression
eating disorders
post-traumatic stress
difficulty coping with stress
sexually transmitted infections
pregnancy
feelings of shame and guilt
drug and alcohol problems
relationship problems with family, friends and partners
