Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere.

Slides:



Advertisements
Similar presentations
Get. through back much go good new write out.
Advertisements

CVs & Telephone Skills Top Tips to remember …
Word List A.
Don’t be bullied, or be a bully.
ECEU300 Ethics in the Workplace Why talk about Ethics? Everyone is ethical, everyone knows how to behave at work. Everyone gets it about not stealing stuff.
Internet Safety May 2014 – KS3 AIMS  To find out what you know about staying safe online  To improve on your knowledge on internet safety  To be clear.
Internet Online Safety How to have FUN and Stay in Control.
Internet etiquette, or netiquette guides us in proper behavior on the Internet. There are widely accepted rules of behavior to follow when you're online.
Cyber bullying and internet safety Parents meeting: staying safe online.
S2 – COMMUNICATIONS UNIT
Perceptions of the Role of Feedback in Supporting 1 st Yr Learning Jon Scott, Ruth Bevan, Jo Badge & Alan Cann School of Biological Sciences.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
Opening a bank account.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
This PowerPoint presentation will show you how to use your productively and successfully.
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
Do’s and Don’t Of Web Design BY Julia Butterfield.
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
I have attached a file to this by selecting the paperclip on the bottom of the page.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
Child protection. This training will help you to understand your responsibilities when working with children as a volunteer or staff member understand.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
5th and 6th need this due to Aspire Monday and classes not meeting on Tuesday.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
All Party Parliamentary Group for
Step 2: Inviting to Challenge Group. DON’T! Before getting into the training, it’s important that you DON’T just randomly send someone a message asking.
Everything you need to know to successfully use THE SCIENTIFIC METHOD.
1. Go to 2. Complete the requested information.
Acceptable Use Policy==Safe and responsible users.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
One feature of social media networks that continues to puzzle me is the option to add your location. Using this feature will tell the whole wide world.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
 *  Facebook*  Twitter*  Instagram*  Texting!!!*  Snapchat  Ask.fm  There are new apps for faster texting but I have not explored them yet-
Cover Letter YOUTH CENTRAL – Cover Letters & Templates
© Nichola Wilkin Ltd Online Safety Quiz Start Quiz.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
School Violence Awareness How to Stop Bullying?. How to Stop Bullying §The Victim §The Bystander §The Bully.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
By: Julianna Leach.  PC Support Technician- They work on site and are responsible for in general maintenance.  PC Service Technician- Goes to customer.
E- SAFETY PRESENTATION By: Mohamed Fathy Tip 1Tip 2Tip 3Tip 4Tip 5 And the What is e safety.
Cyber safe!! Internet safety! Beware of strangers!!  If a stranger wants to get in contact with you ask your parents or the police what to do.  If.
Work Arbitrage  get paid helping others find work! Zero investment Work from home Immediate start Fast and easy Zero training or investment.
KS2 E-Safety assembly How to be smart and keep safe online.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
By: Alina. If I’m signing up for a job the people who might hire me have to search on the internet if I’m mature or capable of having a job because if.
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
Body System Here Enter group members names here. Save Your Work! This is a good time to start saving your work. Go to FILE, then Save As…, then change.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Cyber Info Gathering Techniques
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
Care and support for older people with learning disabilities
Fast Action Links extension A love letter to CiviCRM
Education – Partnership – Solutions
Ordering Healthy Food Online
Reporting personal data breaches to the ICO
Anti bullying Week VMG What does bullying mean to you?
INTERNET SAFETY Year 8 Assembly.
Online Safety! Created by Educational Technology Network
What’s wrong with this? Arrow 1 – anyone can see whats on your page – including pictures! Arrow 2 – anyone can add you – from anywhere in the world! Arrow.
It started with a list! Kieran Lamb SHH01 - LGF.
This is a template for a presentation that you can use to introduce your team to Harvest. You can customize the content of the slides. You’ll want to pay.
Presentation transcript:

Or… being a decent person

 It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere in the world – and can cause serious harm.  As IT professionals, you will be able to study the examples here, and produce a publicity item showing people how to behave ethically and morally using IT – and you’ll be able to be sure you’re doing that yourself, too…

 Exactly what you produce is pretty much up to you – it could be another presentation, or an information leaflet. As long as it is clear enough for you to use for revision, and it covers everything you need in the detail you need, then the medium is your choice. OK?  You need to explain – what each element means, and what can happen when things go wrong – to the customer, the employee, the organisation, the victim, and in the eyes of the law.

 Stuff you type into your phone or tablet or pc goes just where you want it – doesn’t it?  Ah. No. Not always. And while you might think you have no secrets from anyone, well… think again. EVERYONE has some things that other people don’t know. It’s often called minding their own business! So check out the links on the next slide, and put together your guide on what can happen if your data is poached…

 (a bit of a fiery group this, but their info is useful as long as you’re careful)  PI_abuse_can_expose_private_user_data_say_hackers (any Facebook users here?) PI_abuse_can_expose_private_user_data_say_hackers  (old but useful)  caught-snooping-on-citizen-data/ caught-snooping-on-citizen-data/4716  uks-8216patriot-act-web-monitoring- plan/4663?tag=content;siu-container (bothers me, this one…) uks-8216patriot-act-web-monitoring- plan/4663?tag=content;siu-container  And then – recently in the news – cookie control through and and  And any search for ‘keylogger’ is just too darn scary: look how easy it is to get this software! Check what it does!

And there’s more… Electronic surveillance goes further than keylogging: urveillance.htm urveillance.htm surveillance-solutions surveillance-solutions Lastly – tracking your cell/mobile phone… phone.html phone.html

Add your info into your work – a leaflet/presentation/audio recording?

 Hopefully you know not to text, or comment in ways that are just too pathetic to copy here. Hopefully you’re not one of those… well, what do you call them? There’s a current Net trend of ‘trolling’ (more on the next slide) which is pretty disgusting too.  Use the resources on the next slide to help you guide people on how to avoid being a victim, and what to do if they are bullied in this fashion…

  hAndRelationships/Bullying/DG_ hAndRelationships/Bullying/DG_  (an interactive resource that I think is pretty good – what do you think?)  x x    ges/CyberBullying.aspx ges/CyberBullying.aspx

Add your info into your work – a leaflet/presentation/audio recording?

 With the increasing use of ICT, employees are increasingly checked on and monitored. ◦ Staff here are checked in and out with their electronic tags, for example. ◦ Ambulance drivers are checked to make sure they don’t stop off at home without asking first ◦ Call centre staff are recorded to check they stick to the script and have no personal calls ◦ Just about every organisation – this school included – has an Acceptable User Policy for the kit which tells you that your Internet use is checked and that there are things you are just not allowed to do.  Check out the sources on the next slide to help you provide your thoughts and advice on dealing with being monitored

 ring-your-workers.html ring-your-workers.html  etail?itemId= &type=RESOURCES etail?itemId= &type=RESOURCES  /Theyre-watching-By employers-monitor-workers-Facebook- pages.html (hmph! Beware of sources like this – but still, they’re worth using – carefully!) /Theyre-watching-By employers-monitor-workers-Facebook- pages.html  workplaceprivacy15_CV_N.htm (same with this bunch!) workplaceprivacy15_CV_N.htm

Add your info into your work – a leaflet/presentation/audio recording?

 So what have you discovered?  What sources did you use that were NOT on the slides? (extra credit for any paper-based resources)  SPELLCHECK and get someone else to proof read it for you, to make sure it all makes sense to someone else…  Then send it in!