Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged e-privacy

Rss Feed Group items tagged

Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
yc c

Amazon Kindle - Wikipedia, the free encyclopedia - 0 views

  • Kindle devices may report information about their users' reading data such as last page read, annotations, bookmarks, notes, highlights, or similar markings to Amazon.[132] The Kindle stores this information on all Amazon e-books but it is unclear if this data is stored for non-Amazon e-books.[133] There is a lack of e-reader data privacy — Amazon knows who the user's identity, what the user is reading, whether the user has finished the book, what page the user is on, how long the user has spent on each page, and which passages the user may have highlighted
Anne Bubnic

BUDD:E - (Primary Grades) - 1 views

  •  
    Budd:e Primary introduces e-security basics to stay smart online, including privacy, password creation, protecting personal details, virus scanning, secure websites, copyright and scams.
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Anne Bubnic

Don't Hit That 'Delete' Button!: Email Archiving - 0 views

  • The FRCP now treats electronic documents no differently from paper-based documents," explains John LoPorto, executive vice president of sales and marketing for electronic archiving and security provider Privacy Networks. So should corporations, organizations, or schools ever have to participate in a court case involving federal violations such as copyright infringement, sexual harassment, unsafe work environments, or fraud, their e-mails will be considered as possible evidence. "Hence the need to save e-mail," says LoPorto.
  •  
    In response to new federal rules mandating organizations retain their electronic documents, districts are using outside providers to archive their in-house e-mails.
Anne Bubnic

Student Sues her Coach for violating her privacy rights on Facebook. - 0 views

  •  
    A former high school cheerleader is suing her former coach and the school district for $100 million after the coach allegedly read personal e-mails, WAPT-TV reported. The student filed the federal lawsuit after she said her coach got into her Facebook account and read the messages. One of the e-mails was between the student and another cheerleader and had profanity.
Jess McCulloch

Keeping students cybersafe! « On an e-journey with generation Y - 0 views

  •  
    As we are pioneers in cyberspace, cybersafety is a concern that is being refined and evaluated all the time - trying to balance transparency with privacy, allowing students some freedom, yet protecting them and ensuring their safety at all times. This article provides a review of what was done with a class of students over a year's time to teach them digital citizenship and cybersafety.
Anne Bubnic

BUDD:E (Secondary Grades) - 0 views

  •  
    Budd:e Secondary explores advanced e-security topics, including: creating content, file-sharing, pop-ups, privacy, sharing, scams, spam, spyware, malware, phishing, online transactions and computer viruses. Includes videos and teacher resources.
Anne Bubnic

ReadWriteThink: Online Profile: Learning Beyond the Classroom - 0 views

  •  
    n this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

ReadWriteThink: Creating A Safe Online Profile - 0 views

  •  
    In this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

Teachers and Facebook: Privacy vs. standards - 0 views

  • An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
  • She now faces possible firing for listing “teaching chitlins in the ghetto of Charlotte” among her activities.
  • e district allows teachers to post personal information online, but had to take action because it affected the teacher's ability to interact with students and parents. She called the comments racially insensitive or offensive to students at Thomasboro Elementary School, where she teaches.
  •  
    An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
Anne Bubnic

How Privacy Vanishes Online, a Bit at a Time - 1 views

  •  
    If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address? Probably not. Yet people often dole out all kinds of personal information on the Internet that allows such identifying data to be deduced.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
buyglobalshop

Buy Verified Coinbase Accounts - 100% active and safe - 0 views

  •  
    As cryptocurrency picks up more standard acknowledgment, stages like Coinbase have gotten to be well known choices for buying, offering, and putting away computerized monetary standards like Bitcoin and Ethereum. One imperative angle of utilizing Coinbase is the confirmation prepare that clients must go through in arrange to get to full account highlights. A confirmed Coinbase account gives extra security measures and get to to highlights like higher buying limits and the capacity to exchange reserves to outside wallets. Buy Verified Coinbase Accounts What is a confirmed Coinbase account? If you're modern to the world of cryptocurrency exchanging, you may have listened approximately the significance of having a confirmed Coinbase account. But what precisely does it cruel to have a confirmed account on Coinbase? In straightforward terms, a confirmed account on Coinbase is one that has experienced a careful confirmation handle to affirm the personality of the account holder. This confirmation prepare is in put to guarantee the security of the stage and to comply with different administrative requirements. Buy Verified Coinbase Accounts Having a confirmed Coinbase account not as it were gives included security to your account but too opens extra highlights and benefits. With a confirmed account, you can purchase, offer, and exchange a more extensive assortment of cryptocurrencies on the stage. Furthermore, having a confirmed account may moreover make it simpler to store and pull back reserves from your account, as a few installment strategies may as it were be accessible to confirmed clients. In this article, we will dig more profound into what it implies to have a confirmed Coinbase account and how you can go almost confirming your possess account. How do I confirm my Coinbase account? To guarantee the security of your account and comply with administrative prerequisites, Coinbase requires its clients to confirm their characters. Confirming your account is a basi
1 - 16 of 16
Showing 20 items per page