Skip to main content

Home/ Digiteen/ Group items tagged policy

Rss Feed Group items tagged

Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
 Lisa Durff

Social Media Policy - YouTube - 1 views

  •  
    David Hopkins posted this youtube on his blog http://www.dontwasteyourtime.co.uk/social-network/social-media-policy/ from Australia
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Kristin Hokanson

The Innovative Educator: World's simplest online safety policy - 2 views

  •  
    THis is a great article to help you think about online safety
Kelby W

Online Privacy: Using the Internet Safely | Privacy Rights Clearinghouse - 0 views

  •  
    Knowing how to use the internet will help us be a little more private and keep our identity a little more safety.  "The Internet enables us to improve communication, erase physical barriers, and expand our education. Its absorption into our society has been extraordinary.  It touches nearly every part of our lives from how we apply for jobs and where we get our news, to how we find friends.  A few Web sites have virtually replaced some things, like the encyclopedia and the phone book.  But with acceptance comes a decrease in skepticism.  You may assume that the same laws or societal rules that protect your privacy in the physical world apply to the digital world as well.  But the Internet remains largely unregulated and the policies governing it underdeveloped.  Laws concerning online privacy are still being developed. To date, the U.S. Supreme Court largely has taken a hands-off approach to regulating the Internet and online privacy in favor of free speech.  However, the federal government is increasingly interested in regulating the Internet, for example through child pornography and gambling laws.  One important thing to keep in mind when relying on the law to protect you is that if U.S. law is broken in another country, prosecuting the criminal may prove difficult or impossible. "
Sylvia Marie Roldan

Campus IT Policies: Responding to Inappropriate Use of Computing and Network Resources - 0 views

  •  
    Consequences of inappropriate netiquette at college/university level
Vicki Davis

France Says Google Privacy Plan Likely Violates European Law - NYTimes.com - 0 views

  •  
    The French data protection authority said Tuesday that Google's new privacy policy appeared to violate European Union law, raising the stakes in a showdown with the company only days before it planned to put the new system into effect.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Steve Madsen

Public Sphere | Kate Lundy - 0 views

  •  
    An Australian politician sets up mechanisms for the public to participate in discussions that have political importance.
  •  
    A "Public Sphere" is a space that "…through the vehicle of public opinion it puts the state in touch with the needs of society" [2]. This kind of engagement in public policy is a great way to represent different views and harness a broad range of expertise, particularly on topical issues of the day.
Merritt D

Dealing with Cyberbullying: 5 Essential Parenting Tips - - TIME Healthland - 0 views

  •  
    Cyberbullying is a big part of many adults' parental lives. There are many cases of cyberbullling and they are getting more serious every day. Essential Parenting tips: 1.) Make sure your kids know cyberbulling is wrong 2.) Take interest in your kids' online behavior 3.) Check school policies on cyberbulling 4.) Set guidelines about cell-phone use 5.) Help your children respond appropriately if they are cyberbullied Elizabeth Englander, author of Understanding Violence and Jonathan Singer, at the Temple University of Social Work (I agree with a couple tips but some might be crossing the line between protecting their kids and taking over their online life.
Julie Lindsay

Technology Improves And The Internet Expands But School Acceptable Use Policies Still L... - 3 views

  •  
    The most enlightened and relevant article I have read for a long time on how to approach using digital technologies in schools that references the work of Scott McLeod as well.
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Haley M

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
William H

1_Tuunainen.pdf (application/pdf Object) - 0 views

  •  
    Abstract Online social networking offers a new, easy and inexpensive way to maintain already existing relationships and present oneself to others. However, the increasing number of actions in online services also gives a rise to privacy concerns and risks. In an attempt to understand the factors, especially privacy awareness, that influence users to disclose or protect information in online environment, we view privacy behavior from the perspectives of privacy protection and information disclosing. In our empirical study, we present results from a survey of 210 users of Facebook. Our results indicate, that most of our respondents, who seem to be active users of Facebook, disclose a considerable amount of private information. Contrary to their own belief, they are not too well aware of the visibility of their information to people they do not necessarily know. Furthermore, Facebook's privacy policy and the terms of use were largely not known or understood by our respondents.
Kellie C

'Culture' Clash - WSJ.com - 0 views

  • In Israel's capital yesterday, Mitt Romney "added one more flat note to the image of the Republican presidential hopeful's gaffe-prone international foray," the Christian Science Monitor claims. In the New York Times account, Romney "offended Palestinian leaders . . ., thrusting himself again into a volatile issue while on his high-profile overseas trip."
  •  
    This online journal talks about some things Mitt Romney said that might relate or is about culture clashes.
Haley M

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
Mary Westbrook

Technology addiction disrupts teenage learning - 0 views

  • Despite school policies restricting mobile phone usage, students use the phone frequently, with the majority making calls from the toilets.
  • Over 60% of the respondents admitted to being “very” or “quite” addicted to the internet, while over 50% are addicted to their mobile phones. The report also revealed that students spend, on average, 1-2 hours a day on social network sites.
1 - 20 of 25 Next ›
Showing 20 items per page