Page 12 - 2.1
P. 12

JIMINY SELF-HELP HANDBOOK   12


               sure who receives this data. Many people tempted by the offer of a quick loan or an attractive job
               decide  to  send  copies  of  identity  documents  to  an  unknown  person.  This  is  very  dangerous  and
               irresponsible. You can never be sure what can happen with such copies later. They may be processed
               in a manner inconsistent with  the Data General Data Protection Regulation (GDPR of  the EU), or
               transferred between employees of financial institutions. This results in the risk of losing control over
               personal documents with sensitive data. You should make your learners aware of this.

               What about cybersecurity?

               Until they do not experience it, learners may not be aware of cyberbullying, prone to harassment or
               hate speech that can unfortunately be spotted more frequently across the Internet. This fact makes it
               crucial to caution learners on how to identify and combat potential acts of cyberbullying.
               According to the Cambridge Dictionary cyberbullying is “the activity of using the internet to harm or
               frighten another person, especially by sending them unpleasant messages”.

               Although it is not possible to entirely eliminate or prevent from cyberbullying,  identification and
               reaction are crucial steps.

               Common examples of cyberbullying include hate speech (direct through private messages, in emails
               or on chats, but also across social media or websites) or publication of private information without
               the consent of that person (these can be pictures, videos or any type of data).

               What a victim of cyberbullying can do is report the activity to the provider of the service where such
               a behaviour took place, speak directly to the attacker, ignore the acts, ask for assistance from a trainer,
               block the attacker in online communication or report to the police. The type of reaction will depend
               on the type, frequency and impact of cyberbullying on the individual, but in any case, such a behaviour
               should not be ignored. The following section will support in the prevention of cyberbullying instances.



               Basics of Device and Internet Safety
               Let's start with the absolute basis, which means checking and introducing safety measures to the
               digital device you or your learner is using to connect to the Internet. Only then can you be certain that
               any suspicious online activity is not the result of a faulty or unprotected device.

               Protection before going online
               In  this  respect  you  should  have  an  antivirus  and  antispyware  program.  If  your  computer  is  not
               equipped  with  them,  install  them  immediately  and  instruct  your  learners  as  well  (some  Internet
               Providers offer them for free). At the same time, you must be aware that no antivirus program gives
               100%  certainty  that  we  have  not  downloaded  anything  harmful  from  the  Internet.  It  may  have
               happened that we have found this type of threat, which is not detected by our program.
               With antivirus software, an important element is to enable real-time scanning. This feature allows
               antivirus software to automatically scan files and programs located on the computer, downloaded
               from the Internet and installed at the time for viruses. In this way, you avoid fighting against viruses
               that have already infected the device.

               It is also worth remembering about the possibility of running a manual scan. Manual scanning of your
               computer with antivirus software allows to detect threats that have not been identified during the
               scan in real time.  Running a quick scan with the default settings is usually a few clicks. You can also
   7   8   9   10   11   12   13   14   15   16   17