Skip to main content

Home/ Digiteen/ Group items tagged protecting

Rss Feed Group items tagged

Merritt D

Attorney General Talks Online Safety With Students - Local News Story - KIFI Idaho Falls - 0 views

  •  
    Attorney General Talks to Middle School and High School students about online safety and sends home a DVD to take home to their parents to help guide them to social media and Internet lingo dictionary to help protect their children form online predators. Quote: "We live in a digital age. There are things facing our children/students that give them a lot more opportunities as well as a lot more challenges that they have to be prepared to deal with,"**and parents need to be prepared as well to be able to better protect their children*** Jefferson County Superintendent Dr. Ron Tolman said. ***add by me***
Merritt D

How to be a better Cyber Citizen and stay safe online - Fort Lauderdale Parenting Teens... - 0 views

  •  
    How do your teens treat their friends - online? Teaching our kids and teens respect starts from a young age, however when it comes to technology, parents need to understand it is just as important to continue the lesson of respect digitally.
  •  
    How to be a cyber citizen and stay safe online are major topics in this day and age. Many people (not just teens) need to learn that respect should be carried into the digital world. Ten ways to be a better cyber citizen: 1.) Understand the technology available to protect you and your family's digital identity 2.)Consider using a personal security device when going online 3.)Use antivirus and antispyware software 4.)Teach family & friends about the importance of strong passwords 5.)Get involved in your child's online life 6.)Report cybercrime 7.) Protect your home or small business Wi-Fi network 8.) If you're a parent, consider parental control systems for Internet access on 3G mobile phones 9.) If your bank does not provide a smart bankcard, know the other safe ways to shop online 10.) Don't share information with web sites you don't trust
Johnny H

Copyright Website - 0 views

  •  
    "Copyright protects creative expression that has been reduced to a tangible form, such as a book, piece of recorded music, computer program, screenplay, painting, photograph, or motion picture." this website tells what copyright is and what it protects and tells the difference between copyright, trademark, and patent by using a Vin diagram
Brandon P

Game app teaches kids social networking safety - TODAY Tech - TODAY.com - 0 views

  • to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying
  • “It’s never too early to talk to kids about safe online behavior, particularly when accessing social networks,”
  • “Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices.”
  •  
    Application that teaches kids social networking safety.
  •  
    help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying "It's never too early to talk to kids about safe online behavior, particularly when accessing social networks," says Lynette Owens, director of Trend Micro Internet Safety for Kids & Families. "Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices."
  •  
    "The free mobile app BeSeen - launched in partnership with Web Wise Kids, a nonprofit specializing in Internet safety - is a single-player game that replicates a social networking site where players create a profile and travel through a condensed school year. To earn rewards, the player must make positive choices when presented with challenging social situations and solve puzzles along the way. The game is designed to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying"
WestR WHSB

Photography Copyright Protection: Online Resources ‹ Photography business ins... - 0 views

  •  
    Protection of copyrighted photographs  "Yes, getting your work online exposes you to risk of theft." "Shut everything down and only share images when asked directly by a potential client. This is obviously a really bad idea," -understand rights to your works -prevent theft of your works by knowing what to do if someone steals
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Haley M

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
Maggie B

Change Passwords | Create Strong Passwords | Microsoft Security - 1 views

  •  
    This article has some suggestions on how to make a strong password so that you can protect your accounts and information.
  •  
    A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create a strong password. Some or all might help protect your online transactions: Length. Make your passwords long with eight or more characters. Complexity. Include letters, punctuation, symbols, and numbers.
Nolan C

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
Steve Madsen

Online bullying: Teachers to get cyber safety training program - 0 views

  •  
    "AUSTRALIAN school teachers will have access to a new cybersafety training program, helping them to protect students from cyberbullying, sexting and grooming by internet predators."
Toni H.

Microsoft Online Safety - 0 views

  •  
    protect your computer
Brandon P

Google Promotes Online Safety With 'Good to Know' Campaign - Search Engine Watch (#SEW) - 0 views

  • Google Promotes Online Safety With 'Good to Know' Campaign
  • Google is about to launch its first online safety campaign. Teaming with the Citizens Advice Bureau (CAB), Google will promote “safe computer usage” for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device
  • Gillan Guy, the CAB's chief executive, said that “Information is a powerful tool for preventing problems from arising in the first and safety, personal data and identity theft are among the top concerns of people of using internet”.
  • ...1 more annotation...
  • Google & the Citizens Advice Bureau created a few tips to stay safe online: Always make sure to have a strong password. Try to always have a unique password to you that no one else will know. Using a long password will keep it safe. Try to always have a mixture of letters, numbers, and symbols. Some people remember their password with a song or lyrics or a mixture of the two. When you get a suspicious email with personal information on it, go directly to the site: don't click on the link in the email. Unless you're expecting the email, it's probably not from them and is known as a "Phishing attack" that's trying to get your personal info and steal from you. Always look for 'https' in the URL. A website is running through a secure connection when it's through https. This will safeguard your emails, credit card numbers, and all other info from watching eyes. Just as you make sure not to leave your front door open, you need to make sure you're always signing out of your computer. Make sure to always sign out of social media accounts and all other accounts that you may have signed into. Try and only use safe networks that are secure. Internet cafes are nice but not always the safest place for you to be browsing the Internet. With all the apps out there, make sure that you always have the latest app. Make sure you trust all your apps and the sources your apps come from. Always lock and passcode lock your phone. Never store personal details on your phone because anyone could take it and have all your info. Two-step verification is a must if accounts offer it. This will make you or anyone else go through two different steps of verification to access your account – much like Facebook when you login. You have to login and then tell which computer you're logging in from, then it texts you. By doing this it will keep your account safe.
  •  
    On this website, I have highlighted a few sections that I thought were important. In the pink, I highlighted what Google is launching and why. In the yellow, I highlighted a quote someone said. The green highlight shows 7 tips that are very important for not only students, but everyone else to stay safe online.
  •  
    Google gives information on how to be safe online. "Good to Know" campaign.
  •  
    "Google will promote "safe computer usage" for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device."
Callie S

5 Ways to Stay Safe Online | ClickID Blog - 0 views

  • 3. Be Careful with Email Emails are a common source of spam and phishing scams. Avoid opening suspicious emails or clicking questionable links (within emails or without). Even if an email contains a link to a seemingly trustworthy site that you frequent (like your email provider or bank), it is always a good idea to avoid the link and point your browser to the site manually. This can avoid phishing scams. Additionally, simply loading the pictures in a spam message can send information back to its creator notifying them that your email address is an active target. So utilize your email’s spam filter to avoid infected emails from ever loading.
  •  
    One way to protect yourself is by being careful on your email. It is common for phishing scams and spam.
Haley M

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
Summer T

Protecting your information teenagers.ashx (application/pdf Object) - 0 views

  •  
    Personal information is disclosed to, and used responsibly by, many legitimate online businesses to conduct business and online social interactions. However, if not managed carefully, it is possible for personal information to be accessed and misused for marketing, identity theft or for cyberbullying or cyberstalking.
  •  
    Parents watch what your teens put online because other teens or older people could be stalking your child.
October H

Surviving a Hack - 0 views

  •  
    "There's a topic that all web developers need to keep current on - regardless of whether you're a newbie or a veteran, if your site has been up for 10 years or for 10 minutes - and that topic is web site security and protecting yourself from hackers. What can be even more important than prevention is the cure in case your site is hacked."
  •  
    STOP! You might be hacked, don't panic read this blog and get that hacker off that site. It has different ways to help you stop hackers from getting inside your private life eon the internet.
William H

1_Tuunainen.pdf (application/pdf Object) - 0 views

  •  
    Abstract Online social networking offers a new, easy and inexpensive way to maintain already existing relationships and present oneself to others. However, the increasing number of actions in online services also gives a rise to privacy concerns and risks. In an attempt to understand the factors, especially privacy awareness, that influence users to disclose or protect information in online environment, we view privacy behavior from the perspectives of privacy protection and information disclosing. In our empirical study, we present results from a survey of 210 users of Facebook. Our results indicate, that most of our respondents, who seem to be active users of Facebook, disclose a considerable amount of private information. Contrary to their own belief, they are not too well aware of the visibility of their information to people they do not necessarily know. Furthermore, Facebook's privacy policy and the terms of use were largely not known or understood by our respondents.
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
October H

Resources: 10 Steps to Protecting Your Computer - 0 views

  •  
    "Everyone must read this! Don't skip it...don't tell yourself that you are safe... Your inaction could cause great harm... At home, your identity, your money, and your personal information could be at risk. At work, your patient's medical information could be at risk!"
  •  
    These are 10 steps to protecting your computer. Are you and your computer safe?
Maggie B

WHAT IS COPYRIGHT? / Copyright is a form of protection provided by the laws of the Unit... - 1 views

  •  
    WHAT IS COPYRIGHT? / Copyright is a form of protection provided by the laws of the United States ...
‹ Previous 21 - 40 of 103 Next › Last »
Showing 20 items per page