Presentation is loading. Please wait.

Presentation is loading. Please wait.

Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere.

Similar presentations


Presentation on theme: "Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere."— Presentation transcript:

1 Or… being a decent person

2  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere in the world – and can cause serious harm.  As IT professionals, you will be able to study the examples here, and produce a publicity item showing people how to behave ethically and morally using IT – and you’ll be able to be sure you’re doing that yourself, too…

3  Exactly what you produce is pretty much up to you – it could be another presentation, or an information leaflet. As long as it is clear enough for you to use for revision, and it covers everything you need in the detail you need, then the medium is your choice. OK?  You need to explain – what each element means, and what can happen when things go wrong – to the customer, the employee, the organisation, the victim, and in the eyes of the law.

4  Stuff you type into your phone or tablet or pc goes just where you want it – doesn’t it?  Ah. No. Not always. And while you might think you have no secrets from anyone, well… think again. EVERYONE has some things that other people don’t know. It’s often called minding their own business! So check out the links on the next slide, and put together your guide on what can happen if your data is poached…

5  http://ukliberty.wordpress.com/data-abuse/ (a bit of a fiery group this, but their info is useful as long as you’re careful) http://ukliberty.wordpress.com/data-abuse/  http://www.computerworld.com/s/article/9220633/Facebook_A PI_abuse_can_expose_private_user_data_say_hackers (any Facebook users here?) http://www.computerworld.com/s/article/9220633/Facebook_A PI_abuse_can_expose_private_user_data_say_hackers  http://news.bbc.co.uk/1/hi/uk/8239596.stm (old but useful) http://news.bbc.co.uk/1/hi/uk/8239596.stm  http://www.zdnet.com/blog/london/uk-government-staff- caught-snooping-on-citizen-data/4716 http://www.zdnet.com/blog/london/uk-government-staff- caught-snooping-on-citizen-data/4716  http://www.zdnet.com/blog/london/queens-speech-unveils- uks-8216patriot-act-web-monitoring- plan/4663?tag=content;siu-container (bothers me, this one…) http://www.zdnet.com/blog/london/queens-speech-unveils- uks-8216patriot-act-web-monitoring- plan/4663?tag=content;siu-container  And then – recently in the news – cookie control through http://www.aboutcookies.org/ and http://www.bbc.co.uk/webwise/guides/about-cookies and http://www.allaboutcookies.org/cookies/ http://www.aboutcookies.org/ http://www.bbc.co.uk/webwise/guides/about-cookies http://www.allaboutcookies.org/cookies/  And any search for ‘keylogger’ is just too darn scary: look how easy it is to get this software! Check what it does!

6 And there’s more… Electronic surveillance goes further than keylogging: http://humanresources.about.com/od/technology/a/s urveillance.htm http://humanresources.about.com/od/technology/a/s urveillance.htm http://www.adt.co.uk/retail/retail-electronic-article- surveillance-solutions http://www.adt.co.uk/retail/retail-electronic-article- surveillance-solutions Lastly – tracking your cell/mobile phone… http://www.ehow.com/how_2385973_triangulate-cell- phone.html http://www.ehow.com/how_2385973_triangulate-cell- phone.html http://news.bbc.co.uk/1/hi/technology/4738219.stm http://www.mobilelocators.com/how.php http://planetcreation.co.uk/sat-gps/

7 Add your info into your work – a leaflet/presentation/audio recording?

8  Hopefully you know not to text, email or comment in ways that are just too pathetic to copy here. Hopefully you’re not one of those… well, what do you call them? There’s a current Net trend of ‘trolling’ (more on the next slide) which is pretty disgusting too.  Use the resources on the next slide to help you guide people on how to avoid being a victim, and what to do if they are bullied in this fashion…

9  http://stopcyberbullying.org/ http://stopcyberbullying.org/  http://www.direct.gov.uk/en/YoungPeople/Healt hAndRelationships/Bullying/DG_070501 http://www.direct.gov.uk/en/YoungPeople/Healt hAndRelationships/Bullying/DG_070501  http://www.cyberbullying.info/ (an interactive resource that I think is pretty good – what do you think?) http://www.cyberbullying.info/  http://old.digizen.org/cyberbullying/default.asp x http://old.digizen.org/cyberbullying/default.asp x  http://www.cyberbullying.org/ http://www.cyberbullying.org/  http://www.ncpc.org/cyberbullying http://www.ncpc.org/cyberbullying  http://www.childline.org.uk/Explore/Bullying/Pa ges/CyberBullying.aspx http://www.childline.org.uk/Explore/Bullying/Pa ges/CyberBullying.aspx

10 Add your info into your work – a leaflet/presentation/audio recording?

11  With the increasing use of ICT, employees are increasingly checked on and monitored. ◦ Staff here are checked in and out with their electronic tags, for example. ◦ Ambulance drivers are checked to make sure they don’t stop off at home without asking first ◦ Call centre staff are recorded to check they stick to the script and have no personal calls ◦ Just about every organisation – this school included – has an Acceptable User Policy for the kit which tells you that your Internet use is checked and that there are things you are just not allowed to do.  Check out the sources on the next slide to help you provide your thoughts and advice on dealing with being monitored

12  http://www.employeeprivacyrights.co.uk/monito ring-your-workers.html http://www.employeeprivacyrights.co.uk/monito ring-your-workers.html  http://www.businesslink.gov.uk/bdotg/action/d etail?itemId=1074414934&type=RESOURCES http://www.businesslink.gov.uk/bdotg/action/d etail?itemId=1074414934&type=RESOURCES  http://www.dailymail.co.uk/sciencetech/article- 2153100/Theyre-watching-By-2015-60- employers-monitor-workers-Facebook- pages.html (hmph! Beware of sources like this – but still, they’re worth using – carefully!) http://www.dailymail.co.uk/sciencetech/article- 2153100/Theyre-watching-By-2015-60- employers-monitor-workers-Facebook- pages.html  http://www.usatoday.com/money/workplace/20 10-03-17-workplaceprivacy15_CV_N.htm (same with this bunch!) http://www.usatoday.com/money/workplace/20 10-03-17-workplaceprivacy15_CV_N.htm

13 Add your info into your work – a leaflet/presentation/audio recording?

14  So what have you discovered?  What sources did you use that were NOT on the slides? (extra credit for any paper-based resources)  SPELLCHECK and get someone else to proof read it for you, to make sure it all makes sense to someone else…  Then send it in!


Download ppt "Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere."

Similar presentations


Ads by Google