Want to create interactive content? It’s easy in Genially!

Get started free

E-safety

Vlatka Hižman-Tržić

Created on August 23, 2021

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

E - safety

Presentation for teachers and students

participating in the Project STE(A)M Approach with using Nature Based Learning

Start

1. NETIQUETTE 2. INTERNET SAFETY 3. COPYRIGHTS

1. NETIQUETTE

  • Netiquette is the social code of the internet, manners on internet.
  • The golden rule of netiquette: treat others the way you want to be treated yourself. It represents the spirit of netiquette - that of being civilized.

Next

Netiquette rules

  • When you receive an e-mail which tells you to send it to everyone…. please don’t.
  • Do not forward jokes, chain letters, or unimportant e-mails without the receiver’s permission.
  • Do not forward virus warnings.
  • Do not send messages in ALL CAPS. This is like shouting at someone online.
  • Do not leave the subject line blank in e-mails. People want to know what it’s about.
  • Ask before you send huge attachments.
  • Don't spread false information about yourself or others.
  • Don't step into social networking quarrels! Be polite - politeness is cool!
  • Respect cultural differences!
  • Never forward other people's e-mails without their permission.
  • When sending your own e-mails, do not assume that something sent on the internet is private.
  • Check and correct all e-mails before you click send.
  • Be forgiving of other people's mistakes online.
  • Keep your e-mails short and to the point.
  • When you receive a nasty text or e-mail — do not respond. If this continues, block the person.

Next

2. INTERNET SAFETY

Internet safety is the act of staying safer online. This includes being aware of the risks associated with your online activity and employing a few strategies to prevent or avoid these risks. Internet safety is also sometimes referred to as online safety, cyber safety, or e-safety.

Risks of the internet

  • Identity theft
  • Cyberbullying
  • Online predators
  • Faulty privacy setting
  • Phishing
  • Online scams
  • Malware
  • Inappropriate content
  • Bait and switch

Next

Internet safety tips

  • Know the dangers of the internet
Teach students about suspicious activity online and encourage them to ask for help if something seems unusual.
  • Remember your identity is important
Remind students not to reveal too much information about themselves. Their date of birth, address, and SSN are all examples of personal information, and they shouldn't share them freely.
  • Beware of strangers
It's important to teach students at a young age to be cautious online and tell an adult if someone they don’t know communicates with them or makes them uncomfortable.
  • Watch out for phishing
Don't click on suspicious links in an email or social network message.
  • Choose strong passwords
Create a hack-proof password by selecting a combination of uppercase and lowercase letters, numbers, and symbols, and make sure it's at least 12 characters long. Never use common words, phrases, or personal information like a phone number or family members names.

Next

  • Keep your social media accounts secure
If someone messages you who hasn't done so in a while, be suspicious. Your friend's account may have been hacked. Don't meet any strangers you have talked to online! Not everyone is who they seem to be!Don't open unknown websites because they can have dangerous viruses.
  • Be careful what you post
Personal or inappropriate photos can attract online predators, or could affect future educational or employment opportunities.
  • Shop online only from secure sites
  • Keep privacy settings on
Turn on Safe Browsing! Limit internet cookies!
  • Understand privacy policy
Even if your settings are set to private, remember nothing is private.

Next

  • Make a backup of data regularly
One of the best ways to combat the threat of ransomware is to make a backup of your data regularly.
  • Keep your internet connection secure
A VPN is one of the best ways to ensure your internet connection is secure.
  • Install a comprehensive cybersecurity suite
  • Be careful what you download
A malicious website is attempts to install malware on your device, or anything that will disrupt computer operation, gather your personal information, or allow unauthorized access to your machine.

Next

  • Close unused accounts...
Because they can be a rich source of personal information for cybercriminals.

Next

Be familiar with SMART rules !

Next

3. Copyrights

Your online content, no matter its form, is easy to be stolen and claimed as their own by unscrupulous parties. When creating WWW content, you should take care not to infringe on someone else's copyrigts. The law protects every textual, musical, cinematographic, painting, graphic, photographic and other work, except for narrow legal exceptions and works for which the authors themselves have explicitly stated that they can be freely copied and used. Only those contents, that bear the copyright inscription, or the sign © (after the sign ©, the name of the copyright holder and the year of the first edition of the work are written), are protected.

The following are not protected as copyrighted works:ideas, scientific discoveries, procedures, working methods and mathematical concepts,official texts in the field of legislation, administration and judiciary, as well as their collections that have been published for official information to the public,daily news and other news that have the character of ordinary media information.

Next

Other people's images, photographs, music sequences and similar elements of WWW pages may not be used without the permission of the author. If we do not get permission, we must continue to research further and try to create our own work.

In our works we can use other people's quotations, if below the quotation we state the name of the author and indicate the source in which the author's name is also found.

Copyright protection lasts for the life of the author and for another seventy years after his death and is subject for inheritance, which proves how serious this right is.

Numerous bloggers, as well as some portals, provide published works under certain conditions relating to the sharing, shortening and/or modification in commercial and non-commercial applications with, or without the obligation to publish the identity of the author. There are four Creative Commons rights, called Attribution (abbreviated by), Noncommercial (nc), No Derivative Works (nd) and Share Alike (sa).The Creative Commons logo usually has a prominent inscription below its short name CC: Some rights reserved.

Next

Sources:

Thanks for reading and be safe on internet !

Author: Vlatka Hižman-Tržić, Tehnička škola Virovitica, Croatia