Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.

Slides:



Advertisements
Similar presentations
1 drt 6455 eCommerce Law lesson 8 – IT and web 2.0 associate professor faculty of law university of montreal university of montreal chair in e-Security.
Advertisements

Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Are you being a safe and successful digital citizen? E-safety
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
Keeping Your Child Safe on the Internet
Technology SafeKEY.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Internet Online Safety How to have FUN and Stay in Control.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
The Internet.
This week is anti-bullying week.
How to keep your kids safe online
Using internet and cell phones safely
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Personal Integrity and Björn Nilson Personal Integrity  Integrity vs Personal Integrity  Definition(s)  Physical and mental.
Facebook me! Online social networking as part of libraries’ web presence? This research is not affiliated with or sponsored by Facebook. Kim Holmberg Information.
ISTEP Sping 2009 Brent Howard ESD 101 Technology Integration Specialist
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
Are you being a safe and successful digital citizen?
INTERNET SAFETY FOR STUDENTS
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
 By: Mallory Mayert & Brooke Atkins.  Introduction Introduction  Why This Topic? Why This Topic?  Harmful Effects Harmful Effects  How to Choose.
What if I told you that a random stranger has access to…
Digital Citizenship Project
Let’s talk about Internet Safety!
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Internet Safety. The Now Generation! Cyber-bullying Why? “A day in the life of a student has changed”
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
Controlling Your Social Networking Privacy Settings Stay safe online!
 Facebook  Twitter  MySpace  Windows LiveSpace.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Ms. Park.  Q&A: What are some Internet safety tips you already know?
Staying Safe Online A Practical Guide for Middle School Students.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
“Taking care of myself while surfing the Internet” Children’s Experiences & eSafety Rules.
Cassidy Culligan Digital Citizenship Project ED 505.
Internet Survival Tips for Kids and Teens
Internet Safety Tips.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Social Networking and College Classrooms Some Thoughts for Instructors Kem Saichaie & Leighton Christiansen Des Moines Area Community College 27 February.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
T HINK ! Before You Post A lesson on Internet Safety Source:
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Mrs. Blue 4 th -5 th Grade. Why do I need to learn about internet safety? Even though you can’t always see it, there are dangers that.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
EULAs END USER LICENSE AGREEMENTS. What is a EULA?  a legal contract between a software application author or publisher and the user of that application.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Social Networking Advice for Teenagers
Student User Agreement and Policy 2022
Presentation transcript:

Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual Property SectionTechnology Specialist

AGENDA Social Networking and Your Digital Dossier How to Avoid: Career Pitfalls Online Predators Identity Theft (P2P) Viruses & Spyware

Social Networking

Digital Dossier

How Do You Contribute to Your Digital Dossier? Social Networking Social Networking Creating & Collaborating Online Creating & Collaborating Online Other Thoughts? Other Thoughts?

Facebook User Agreement By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.

How Might Others Contribute to Your Digital Dossier? 33,139,666 Views (10/27/09)

What are Possible Consequences of the Content That Makes Up Your Digital Dossier?

Career Pitfalls… The Future is in YOUR Hands! One in five employers search social networking sites before hiring One in five employers search social networking sites before hiring One-third of those said they found information that caused them to toss out potential candidates One-third of those said they found information that caused them to toss out potential candidates Universities and colleges are also searching sites when reviewing applications Universities and colleges are also searching sites when reviewing applications Many teachers, administrators, and coaches are also reviewing these sites Many teachers, administrators, and coaches are also reviewing these sites Who is Looking at Your Digital Dossier?

Who Else Might Be Looking at Your Digital Profile?

Who Have You “Friended” Lately? “Yeah baby, I’m 6’1, tan, fit, washboard abs…”

How Can You Find Out What Is In Your Digital Profile?

Safety Tips for Safe and Responsible Social Networking

Protect Your Privacy & Reputation Use the privacy protection features to limit who can view your profile. Use the privacy protection features to limit who can view your profile. But remember private does not mean PRIVATE. But remember private does not mean PRIVATE. This profile is set to private. This user must add you as a friend to see his/her profile. view more This profile is set to private. This user must add you as a friend to see his/her profile. view more Private = Limited Access!

Even if you use privacy protection features, don’t post material that could… Allow a stranger to find you in Real Life Allow a stranger to find you in Real Life Attract a dangerous stranger Attract a dangerous stranger Be used by a cyber-bully to torment you Be used by a cyber-bully to torment you Damage your reputation, friendships, or future opportunities Damage your reputation, friendships, or future opportunities Cause harm or distress to another by contributing to others “digital dossier” Cause harm or distress to another by contributing to others “digital dossier”

Protect Your Privacy If someone posts inappropriate material about you on their profile, demand that it be removed. If not, tell a trusted adult or file a complaint. If someone posts inappropriate material about you on their profile, demand that it be removed. If not, tell a trusted adult or file a complaint. Recognize that personality quizzes and contests are techniques to obtain your personal information for advertising. Recognize that personality quizzes and contests are techniques to obtain your personal information for advertising.

Be Selective Be selective about who you add as friends Be selective about who you add as friends Block anyone who… Block anyone who… Communicates rudely Communicates rudely Sends “overly friendly” messages Sends “overly friendly” messages Wants to talk about sex Wants to talk about sex Does not fit your values Does not fit your values File a complaint if you receive harmful communications with social networking provider or cybertipline.com File a complaint if you receive harmful communications with social networking provider or cybertipline.com

Safe and Responsible Computing

Identify Theft-P2P

Identify Theft: The P2P Problem

P2P Example: Limewire

How do sensitive files get exposed? My Documents = Shared Folder  Music  Movies  Corporate Files  Personal Files PC Network Drive P2P file sharing programs “index” PC and Network Drives and expose them to anyone with access to the WW P2P

Files are shared unintentionally “Though it appears that filesharing has been disabled for all folders by clicking on the “Deselect All” button, the program continues to surreptitiously share the Downloads folder”

P2P-Ways to Protect Yourself Be careful about what “permissions” you have set up. Be careful about what “permissions” you have set up. Avoid sharing your own files and say no to any offers to install such software. Avoid sharing your own files and say no to any offers to install such software. Even then, there is no guarantee you will not experience problems as a result of having the software on your computer. Even then, there is no guarantee you will not experience problems as a result of having the software on your computer.

Viruses & Spyware P2P downloads can result in viruses & spyware-BotNets P2P downloads can result in viruses & spyware-BotNets Be careful of game cheat sites Be careful of game cheat sites Use Anti-Virus Software and keep updates current! Use Anti-Virus Software and keep updates current!

Conclusion

Keep Your Life In Balance Communicating with friends online can strengthen your friendships, but make sure you also spend time with your friends in Real Life. Communicating with friends online can strengthen your friendships, but make sure you also spend time with your friends in Real Life.

Be a Leader If you see someone who is making bad choices or is in danger…. Talk with the person about your concerns. Talk with the person about your concerns. Be a model for positive and productive online choices. Be a model for positive and productive online choices.

Questions?