Page 12 - 2.1
P. 12
JIMINY SELF-HELP HANDBOOK 12
sure who receives this data. Many people tempted by the offer of a quick loan or an attractive job
decide to send copies of identity documents to an unknown person. This is very dangerous and
irresponsible. You can never be sure what can happen with such copies later. They may be processed
in a manner inconsistent with the Data General Data Protection Regulation (GDPR of the EU), or
transferred between employees of financial institutions. This results in the risk of losing control over
personal documents with sensitive data. You should make your learners aware of this.
What about cybersecurity?
Until they do not experience it, learners may not be aware of cyberbullying, prone to harassment or
hate speech that can unfortunately be spotted more frequently across the Internet. This fact makes it
crucial to caution learners on how to identify and combat potential acts of cyberbullying.
According to the Cambridge Dictionary cyberbullying is “the activity of using the internet to harm or
frighten another person, especially by sending them unpleasant messages”.
Although it is not possible to entirely eliminate or prevent from cyberbullying, identification and
reaction are crucial steps.
Common examples of cyberbullying include hate speech (direct through private messages, in emails
or on chats, but also across social media or websites) or publication of private information without
the consent of that person (these can be pictures, videos or any type of data).
What a victim of cyberbullying can do is report the activity to the provider of the service where such
a behaviour took place, speak directly to the attacker, ignore the acts, ask for assistance from a trainer,
block the attacker in online communication or report to the police. The type of reaction will depend
on the type, frequency and impact of cyberbullying on the individual, but in any case, such a behaviour
should not be ignored. The following section will support in the prevention of cyberbullying instances.
Basics of Device and Internet Safety
Let's start with the absolute basis, which means checking and introducing safety measures to the
digital device you or your learner is using to connect to the Internet. Only then can you be certain that
any suspicious online activity is not the result of a faulty or unprotected device.
Protection before going online
In this respect you should have an antivirus and antispyware program. If your computer is not
equipped with them, install them immediately and instruct your learners as well (some Internet
Providers offer them for free). At the same time, you must be aware that no antivirus program gives
100% certainty that we have not downloaded anything harmful from the Internet. It may have
happened that we have found this type of threat, which is not detected by our program.
With antivirus software, an important element is to enable real-time scanning. This feature allows
antivirus software to automatically scan files and programs located on the computer, downloaded
from the Internet and installed at the time for viruses. In this way, you avoid fighting against viruses
that have already infected the device.
It is also worth remembering about the possibility of running a manual scan. Manual scanning of your
computer with antivirus software allows to detect threats that have not been identified during the
scan in real time. Running a quick scan with the default settings is usually a few clicks. You can also