Digital privacy and security
Glossary
Cyberbullying
This is bullying with the use of any digital tools or technologies. It's repetitive in nature and aims
to scare, embarrass and anger victims. It can happen by peers, older children and adults that
users encounter online.
Cybercriminal
A person who engages in criminal activity by means of computers or the internet.
Digital misinformation / disinformation
This is the spreading of either false or inaccurate information, often deliberately sensationalised
to cause an emotional reaction. The spreading of this kind of information can have harmful
effects, such as encouraging racism and violence against minorities.
Digital privacy
Being able to go online and not having to worry about other people having access to your
personal information.
Grooming
This is when someone creates a friendship with a child in order to build trust. Their intention is
to then exploit or sexually abuse, either online or in person.
Hacking
Gaining illegal access to a digital device, such as a computer or smartphone, to get information
or money.
Identity theft
When someone steals your personal information and uses it to commit other crimes, such as
accessing your bank accounts, buying products or services online or accessing systems.
www.teachingenglish.org.uk
Internet scam
A plan to take advantage of someone through the internet or with software by lying to them or
hiding information.
Malware
Malicious software that can cause damage to systems. For example, viruses are a type of
malware.
Phishing
Sending an email that looks as if it comes from a trusted organisation in order to get someone's
personal information.
Private information
Information that is true for a specific person, such as your full name, telephone number and
passwords.
Sexting
This involves users creating their own sexualised messages or pictures, often at the request of
others. These are then often shared widely online, putting children at risk of further sexual
exploitation.
Spam
Unwanted email or messages sent to many people.
Spoofing
An online scam that Fake profiles are created to lure users and gain their trust.
www.teachingenglish.org.uk
Infographic – Phishing emails
www.teachingenglish.org.uk
Image description
Infographic about how to spot phishing emails
An image of an email, with Craig standing beside it.
To: [email protected]
From: National Bank <[email protected]>
Subject: Your account has been locked
Hello Dear,
Your account is being locked due to because unusual access online.
You will not be able to access your account until this process has been completed.
Please updating the latest account information in clicking following link
(https://perhiuhasf.com/cezayin/kdhoth.html#bBVuB8PPjy.swf)
There are tips on the image:
Tip 1 points to the recipient's email address.
Tip 2 points to the content of the email.
Tip 3 points to an image in the email.
Tip 4 points to the link in the email.
Tip 5 points to Craig, who is thinking.
www.teachingenglish.org.uk
Infographic – Cybersecurity strategies
Image description
Infographic about cybersecurity strategies for mobile devices
Keeping Your Mobile Device Secure
Four mobile phone images.
Image 1 shows a login screen. Tip 1 is pointing to this screen.
Image 2 shows Wi-Fi and location settings and privacy settings.
Tip 2 is pointing to the Wi-Fi and location settings on this screen. Tip 3 is pointing to the privacy
settings.
Image 3 shows British Council apps. Tip 4 is pointing to the apps.
Image 4 shows transferring information to the cloud. Tip 5 is pointing to this screen.
www.teachingenglish.org.uk
Poster – Discussing cybersecurity
www.teachingenglish.org.uk
Image description
1. Avoid sharing personal and private information
Don't share your email or home address or telephone number, or things like bank details.
2. Protect your devices with software
Install virus and malware protection on your device.
3. Regularly check for software updates
You can manually check, or set your device to remind you.
4. Recognise phishing scams
Don't open attachments or click links in emails from places you don't trust. Be careful doing
quizzes or entering competitions on social media.
5. Think before you click
Unknown websites and software from untrusted sources can contain software that can harm
your device.
www.teachingenglish.org.uk
References and further reading
The following links and resources explore the areas discussed in this module in more detail:
UNICEF's State of the World's Children 2017: Children in a Digital World report
www.teachingenglish.org.uk