Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
This week is anti-bullying week.
Using internet and cell phones safely
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
Digital Citizenship Lisa Burch ED 505. Nettiquete on Social Media Sites What is it? How we handle ourselves when interact on sites such as Facebook, Twitter,
Do you know how to keep yourself safe?
By Nathan McCann. Blogs  
A Guide for Getting Started
Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
General Purpose Packages
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Internet Safety Tips By K. Pisarik. The district’s AUP (Acceptable Use Policy) requires that you: 1.Only log on to computers when a teacher is supervising.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Social Networking Guide Or the web is not a private place.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Keep your software updated Use anti-virus Install Firewall Create copies of safety of important files. Be careful when you make reception of content.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
E-Safety for parents and carers Highfield Community Primary School.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Communicating safely and appropriately online
Internet Safety Grade 5.
Working to Keep our Children Safe in a World Filled with Technology
Appropriate Use of Technology
Internet Safety – Social Media
Communicating in the IT Industry
European Computer Driving Licence Syllabus version 5.0
Online Safety Evening 2019.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files. Backup your blog data. Keep your blog private and visible only to users you choose. Don’t agree to meet up the person you only know from blogging. Keep your identify information safety. content/uploads/2015/01/Blog.jpg

wikis Use wikis safety online Create your own account with strong password(Don’t make a group account for many people to share). Setting up the privacy for your account(invite friends or open to the public). Be careful when using wiki to communicate and exchange information (avoid to tell anyone about your personal safety data). Do not violate copyrights(Do not just copy and paste things, unless give the reference).

podcasts There are some tips to make your podcast account secure online. Pick up a fake username(not to use your real name) Create the strong password with different mix symbols, numbers or letters. If it connects to your Face book, Google or account, make sure your set up your Face book profile, Google profile and account safety. (criminal have been known to collect information about password by use social media networking sites). Don’t give your personal information to anybody.

Video conferencing Setting up a strong password when you register to the video conference device and change regularly. Blocked the unwanted users. Never give your account detail. Never give your home address that can easily find you. Use firewall protection when using online chat.

Storing personal information Storing personal information online safety: Being aware of the virus Use strong password to protect your computer and data Don’t use your password as like your mother’s maiden name or your pet’s name. Be careful when you give your information to someone like your phone number or address. Make sure you keep your online data safe and secure, store in the appropriate place with password protection.

Safely viewing digital content Download an antivirus software to look up for the content you are viewing. Always use the secure sites. Don’t open the link if you don’t trust.

Safety upload digital content Not to upload the inappropriate content. Setting up the privacy on your sites to who can see your contents.

Data protection regulations The Eight Data Protection Act Principles The act contains eight “Data Protection Principles”. These specify that personal data must be: 1. Processed fairly and lawfully. 2. Obtained for specified and lawful purposes. 3. Adequate, relevant and not excessive. 4. Accurate and up to date. 5. Not kept any longer than necessary. 6. Processed in accordance with the “data subject’s” (the individual’s) rights. 7. Securely kept. 8. Not transferred to any other country without adequate protection in situ. content resource:

firewalls Make sure you have installed a firewall in your computer. Make sure it is up to date. Turn your firewall on all the time.

Backups Safety back up your data online: create a strong password to your account. Encrypt your data when back up online. Back up your data regularly.

Secure sites Make sure you are using the web page address begin with Check for ‘lock ‘icon on your browser. certificate.PNG

Why blogs are an effective communication channel for sharing information Blogs are an effective communication channel for sharing information because blog can share your moment, life or business information. We can upload texts, pictures, audios or videos to the blog. We can share ideas and comments on other people posts and get the positive feedback and opinions. Users can talk over and give instant respond over blog platform. Blog is very convenience now as we can log in to the blog anywhere if we have internet connection. We can log in to the blog over the computer, smart phone or iPod etc. Blog is effective. For example. When we sharing the course work to the blog. We can invite class mate and tutor to give us a review. So that they can leave their comments or feedback on your blog.