Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers and the Internet. Email Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.

Similar presentations


Presentation on theme: "Computers and the Internet. Email Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for."— Presentation transcript:

1 Computers and the Internet

2 Email Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for unlimited periods of time. Even if you delete your mail, messages may remain on servers or backup devices for unlimited periods of time. Police can seize all your email Police can seize all your email ISP may legally be able to look at your email ISP may legally be able to look at your email Treat it like a public conversation Treat it like a public conversation

3 Stewie’s Email

4 Email At Work: At Work: Employers are not required to inform you if they monitor your email. Employers are not required to inform you if they monitor your email. Boss has legal right to review all email even if sent from private account. Boss has legal right to review all email even if sent from private account. There is no privacy when it comes to email and instant messages sent while at work. There is no privacy when it comes to email and instant messages sent while at work.

5 Email Spam Spam Unwanted email advertisements, like pop-ups Unwanted email advertisements, like pop-ups It’s not illegal It’s not illegal Sender must include their email address Sender must include their email address There is a “Do Not Spam List” There is a “Do Not Spam List”

6 Email Phishing, Spyware, and Invasions Phishing, Spyware, and Invasions A constant threat to your identity A constant threat to your identity Phishing: Email is sent that pretends to be from a legitimate business/person/etc. Asks to go to site and enter information Phishing: Email is sent that pretends to be from a legitimate business/person/etc. Asks to go to site and enter information Spyware: Program that gathers information about you through the Internet. Once on, it can transfer anything Spyware: Program that gathers information about you through the Internet. Once on, it can transfer anything

7 Intel?

8 Information US Patriot Act- Search everything and anything for the safety and security of the group/society. US Patriot Act- Search everything and anything for the safety and security of the group/society.

9 Shopping on the Internet Only use official websites. Hackers have many “mirrored” sites. Only use official websites. Hackers have many “mirrored” sites. Only enter information on secured sites Only enter information on secured sites Padlock on page or in URL area Padlock on page or in URL area Business required to send product within time listed. If not they must notify you Business required to send product within time listed. If not they must notify you

10 Copyright and Trademark Infringement Literary works, movies, music, sound, paintings, photographs, choreography, software, names, etc. Literary works, movies, music, sound, paintings, photographs, choreography, software, names, etc. Fair Use: Generally up to 30 seconds worth if movie, song, etc. Fair Use: Generally up to 30 seconds worth if movie, song, etc.


Download ppt "Computers and the Internet. Email Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for."

Similar presentations


Ads by Google