Want to create interactive content? It’s easy in Genially!
E-safety
Vlatka Hižman-Tržić
Created on August 23, 2021
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
E - safety
Presentation for teachers and students
participating in the Project STE(A)M Approach with using Nature Based Learning
Start
1. NETIQUETTE 2. INTERNET SAFETY 3. COPYRIGHTS
1. NETIQUETTE
- Netiquette is the social code of the internet, manners on internet.
- The golden rule of netiquette: treat others the way you want to be treated yourself. It represents the spirit of netiquette - that of being civilized.
Next
Netiquette rules
- When you receive an e-mail which tells you to send it to everyone…. please don’t.
- Do not forward jokes, chain letters, or unimportant e-mails without the receiver’s permission.
- Do not forward virus warnings.
- Do not send messages in ALL CAPS. This is like shouting at someone online.
- Do not leave the subject line blank in e-mails. People want to know what it’s about.
- Ask before you send huge attachments.
- Don't spread false information about yourself or others.
- Don't step into social networking quarrels! Be polite - politeness is cool!
- Respect cultural differences!
- Never forward other people's e-mails without their permission.
- When sending your own e-mails, do not assume that something sent on the internet is private.
- Check and correct all e-mails before you click send.
- Be forgiving of other people's mistakes online.
- Keep your e-mails short and to the point.
- When you receive a nasty text or e-mail — do not respond. If this continues, block the person.
Next
2. INTERNET SAFETY
Internet safety is the act of staying safer online. This includes being aware of the risks associated with your online activity and employing a few strategies to prevent or avoid these risks. Internet safety is also sometimes referred to as online safety, cyber safety, or e-safety.
Risks of the internet
- Identity theft
- Cyberbullying
- Online predators
- Faulty privacy setting
- Phishing
- Online scams
- Malware
- Inappropriate content
- Bait and switch
Next
Internet safety tips
- Know the dangers of the internet
- Remember your identity is important
- Beware of strangers
- Watch out for phishing
- Choose strong passwords
Next
- Keep your social media accounts secure
- Be careful what you post
- Shop online only from secure sites
- Keep privacy settings on
- Understand privacy policy
Next
- Make a backup of data regularly
- Keep your internet connection secure
- Install a comprehensive cybersecurity suite
- Be careful what you download
Next
- Close unused accounts...
Next
Be familiar with SMART rules !
Next
3. Copyrights
Your online content, no matter its form, is easy to be stolen and claimed as their own by unscrupulous parties. When creating WWW content, you should take care not to infringe on someone else's copyrigts. The law protects every textual, musical, cinematographic, painting, graphic, photographic and other work, except for narrow legal exceptions and works for which the authors themselves have explicitly stated that they can be freely copied and used. Only those contents, that bear the copyright inscription, or the sign © (after the sign ©, the name of the copyright holder and the year of the first edition of the work are written), are protected.
The following are not protected as copyrighted works:ideas, scientific discoveries, procedures, working methods and mathematical concepts,official texts in the field of legislation, administration and judiciary, as well as their collections that have been published for official information to the public,daily news and other news that have the character of ordinary media information.
Next
Other people's images, photographs, music sequences and similar elements of WWW pages may not be used without the permission of the author. If we do not get permission, we must continue to research further and try to create our own work.
In our works we can use other people's quotations, if below the quotation we state the name of the author and indicate the source in which the author's name is also found.
Copyright protection lasts for the life of the author and for another seventy years after his death and is subject for inheritance, which proves how serious this right is.
Numerous bloggers, as well as some portals, provide published works under certain conditions relating to the sharing, shortening and/or modification in commercial and non-commercial applications with, or without the obligation to publish the identity of the author. There are four Creative Commons rights, called Attribution (abbreviated by), Noncommercial (nc), No Derivative Works (nd) and Share Alike (sa).The Creative Commons logo usually has a prominent inscription below its short name CC: Some rights reserved.
Next
Sources:
Thanks for reading and be safe on internet !
Author: Vlatka Hižman-Tržić, Tehnička škola Virovitica, Croatia