Technology & Anonymity

Slides:



Advertisements
Similar presentations
Are you being a safe and successful digital citizen? E-safety
Advertisements

Public Relation.  While NAWS has no specific position on Facebook. NA as a whole has a clearly defined outline for the use of Internet technologies.
The Importance of Social Media. Some facts and statistics: Nearly 1 out of every 5 minutes online is spent on social media Facebook reached 1.11 billion.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Welcome to the Brookdale Community College Online Employment System Applicant Tutorial.
1 Welcome to the Colgate University Online Employment System Applicant Tutorial.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Are you being a safe and successful digital citizen?
COMMUNICATION IGCSE ICT 0417 Section 9.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Social Media and Our Guiding Principles NCRSC 2012.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Welcome to the University of Florida Online Employment System Applicant Tutorial.
Welcome to the Alaska Statewide System Online Employment System Applicant Tutorial.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Information guide.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
 Facebook  Twitter  MySpace  Windows LiveSpace.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
1 Understanding Anonymity Al-Anon Family Groups’ World Service Conference Anonymity Task Force.
How to set up an account- Non-Technical Aimee Lilley.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Internet Safety 101! Instant Messaging Social Networking Sites (i.e. Facebook) Sending personal Information Sending pictures online Talking to strangers.
Do’s and Don’ts / Myths and Facts.  We are responsible. Anonymity Press Films Radio TV Internet.
PROFESSIONALISM AND SOCIAL MEDIA Created by: Bedig Galladian.
Digital Citizenship How to use the internet to learn and have fun How to stay in control How to report Karen Bentall, LibrarianAnne Terwilliger, Counselor.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Online Reputation A guide for children aged 7+
E Safety – Managing your online presence
Gosbecks E-Safety Guide
How to be Kind Online A guide for children aged 7+
Safe Surfin’ on the Internet
Acceptable Use Policy (Draft)
Welcome to our E – Safety Open Evening.
Creating your online identity
Understanding Anonymity
How To Be Safe On The Internet
Spring 2016 F r e n c h L a b O r I e n t a t I o n.
Netiquette and Online Safety
WRITE MARKETING COPY and EXECUTE TARGETED S
Social Media Marketing: A Strategic Approach, 2e
Information Security Footprint.
My Digital Footprint BY:CHRISTINA SATO.
HELLO! Hello! I am not your mother’s telephone….
Digital Citizenship and Social Media
Putting Our New Traditions Workbook to Work – Tradition 1 Unity
The Social Networking revolution
R E A D What is cyber bullying? Hall
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Move this to online module slides 11-56
WRITE MARKETING COPY and EXECUTE TARGETED S
Digital Citizenship EIT, Author Gay Robertson, 2017.
Ethics Communication Channels
ICT Communications Lesson 3: Internet Life and Privacy
Helping teachers connect instantly with students and parents
Understanding the Principles of Business Communication
Promoting Your Gutsy Walk
Personal Safety Online
Internet Safety – Social Media
Dave H. NWTA 66 Delegate Panel 66
Online Safety: Rights and Responsibilities
Establishing a Tripod Account
American Government Welcome to 6.06!
Midwest Region OUTREACH WORKSHOP October 28, 2017
Alateen Training Module IV Dealing with Challenges in Alateen
Facebook Basics Patricia Edie 20 June 2019.
Presentation transcript:

Technology & Anonymity Do’s and Don’ts / Myths and Facts

Tradition Eleven We are responsible. Internet Press Anonymity TV Films Radio TV Internet According to Tradition Eleven, as Al-Anon members, we are responsible for our own anonymity and of others’, including A.A. members. Therefore, the intent of this presentation is not to educate members on how to use technology. Instead this presentation is a resource for members to guard their identity when using technology. Tradition Eleven: Our public relations policy is based on attraction rather than promotion; we need always maintain personal anonymity at the level of press, radio, films, and TV. We need guard with special care the anonymity of all AA members. CLICK

Al-Anon & Technology Technology is changing at a rapid pace, introducing multiple new ways to interact with each other. As technology evolves, Al-Anon is finding ways to incorporate it, while being mindful of our tradition of anonymity. As technology evolves and becomes more social, Al-Anon can welcome and adapt to the changes. However, our principle of anonymity does not change. As we embrace new technologies, we need to make sure that we also keep our tradition of anonymity intact. CLICK

About this Presentation On-line technology is diverse. It is constantly changing. Presentation is a resource for members. Al-Anon recognizes the diversity of on-line technology use within our fellowship and that concerns about using it is a personal preference.

E-mail for Al-Anon Related Communications DØN’TS DO Don’t use an e-mail address that contains your last name, address, or phone number. Don’t use your work e-mail. Do establish e-mail addresses for service members that avoid the use of personal names. (e.g., treasurer@your_area.org) Avoid using an e-mail address that can identify you. Work e-mails are owned by the company and may be subject to review by employers. CLICK

E-mail for Al-Anon Related Communications DO Do use blind carbon copy (Bcc). When sending an e-mail to more than one person, send the e-mail to yourself and use the blind carbon copy (Bcc) field to enter all other e-mail addresses. Do model the principle of anonymity to the individuals who receive your e-mails. CLICK

Alateen Chat Rooms MYTH FACT Inappropriate communications can occur in an Alateen Chat Room. Members can only chat when two Alateen Group Sponsors are present to monitor communications. Alateen Chat Rooms are moderated by two certified Alateen Group Sponsors to provide guidance and ensure a safe environment. No personal information is exchanged. E-mail addresses are used for registration purposes only. CLICK

Al-Anon Web Sites We are completely anonymous on the Web. MYTH FACT We are completely anonymous on the Web. Web searches may reveal personal information about us. The fact is, Web searches on our name, address, e-mail address, or phone number may reveal additional personal information about us and our family. CLICK

Al-Anon Web Sites MYTHS FACTS Anyone can visit an Al-Anon Web site and if your personal information is there, they can access it. Make passwords unique to your area. If you post something to an Al-Anon Web site, only Al-Anon members will see it. Password-protected sites are safe. Password-protected Web pages on an Area site keeps the page from being found in an Internet search. CLICK

Al-Anon Web Sites Don’t use your full name on Web site documents. DØN’TS DO Don’t use your full name on Web site documents. Don’t use an uncommon first name. Do use only first name, position title, or pseudonym. Don’t use your full name on flyers, newsletters, and other documents posted on Web sites. If you have an uncommon first name, don’t use it on any documents posted to the Web site. Do create position specific e-mails for all AWSC members, create a personal e-mail account that does not disclose identifying information, or create and use a group e-mail account. Don’t use an e-mail address that includes last name or employer/business information on Area Web sites, flyers, newsletters, and other documents posted on Web sites. Do use your first name, first name and initial, or position title. (e.g., Jane, Jane X., Area Chair, or Jane Area Chair). Do use a pseudonym or position title. CLICK

Al-Anon Web Sites DØN’T DO Don’t use your personal phone number or address on documents. Do use Area office, AIS, or LDC information when a phone number or address is necessary. Don’t use your personal phone number or address on flyers, newsletters, and other documents posted on Web sites. Do use Area office, AIS, or LDC phone number when a phone number is necessary. Indicate callers should leave a message and call will be returned. Do use the Area office, AIS, or LDC address and arrange to pick up mail or have it forwarded to you. CLICK

Al-Anon Web Sites DØN’TS DO’S Don’t post flyers, newsletters, and other documents without review. Don’t assume you are safe on a password-protected Web site. Do review flyers, newsletters, and other documents when posting. Do use these precautions when posting on a password-protected Web site. Do review flyers, newsletters, and other documents for information that may compromise someone’s identity before posting on an Area Web site. Don’t post flyers, newsletters, and other documents on the Web site without considering anonymity issues. Don’t assume you are safe on a password-protected Web site. Do use these precautions when posting on a password-protected Web site. CLICK

Members Photos Online Don’t use full-face images. DØN’TS DO Don’t use full-face images. Don’t identify a person in photographs . Do make sure the background of the photo doesn’t expose a member before posting. Don’t reveal photographs of full-face images of anyone identified as a member of Al-Anon, Alateen, or A.A. in any publication form, including Internet social media sites. Don’t identify a person as an Al-Anon, Alateen, or A.A. member in photographs. Do look at the backgrounds in photographs and confirm that other members or the location are not identifiable. CLICK

Social Media MYTH FACTS Clicking “Like” or “Follow” on any Al-Anon social media site means I am a member of Al-Anon. “Liking” or “Following” simply means you like the message. Your comfort level should be considered first. Simply “Liking” or “Following” any of Al-Anon’s or Alateen’s social media sites such as Facebook or Twitter doesn’t imply affiliation. It simply means you support the message. It is important to respect your comfort level to “Like” or “Follow” Al-Anon’s social media sites. “Liking” Al-Anon’s Facebook page is a matter of an individual’s personal preference. CLICK

Social Media Don’t identify yourself as an Al-Anon member. DØN’TS DO Don’t identify yourself as an Al-Anon member. Don’t divulge the identity of Al-Anon or A.A. members. Do share what you’re comfortable with, without using the word Al-Anon. Don’t identify yourself as an Al-Anon member, or the identity of other Al-Anon or A.A. members when posting on any social media site. Remember Tradition Eleven: Our public relations policy is based on attraction rather than promotion; we need always maintain personal anonymity at the level of press, radio, films, and TV. We need guard with special care the anonymity of all A.A. members. CLICK I’m a member of Al-Anon.

Social Media DO Do support Al-Anon’s public outreach efforts through the use of social media. “Liking” or “Following” Al-Anon’s social media can have a ripple effect. When you “Like” or “Follow” a page or post without identifying yourself as a member, you share that information with your social media friends. This helps broaden Al-Anon’s message of hope to others. CLICK

Thank you for your participation in our presentation and your efforts to apply Tradition Eleven! Remember, our tradition of anonymity applies to our identity whenever communicating with anyone outside our fellowship. When communicating within our fellowship, members can choose the degree of anonymity they wish to have.