Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.

Similar presentations


Presentation on theme: "Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules."— Presentation transcript:

1 Privacy & Other Issues

2 Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules and restrictions. Your use privileges can be suspended or terminated if the rules are broken. If you didnt read the AUP when you signed up, you can always find it on their Web site. You cant plead ignorance on not knowing of the AUP.

3 Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program written using a macro language for a specific program that executes when a document is opened. Trojan horse - a program that slips into the system using a disguise (a game, screen saver) Worm - like a virus, but it reproduces and works over networks Some are harmless, but many are destructive.

4 Avoiding Viruses, Worms, etc. Use antivirus software and update it regularly Keep floppy disks out of your floppy drive unless you are working on them. Consider disabling Java and Javascript capabilities on your Web browser Back up files Disconnect your computer from Net when done. Do not open strange email attachments

5 Avoiding Viruses, Worms, etc. Viruses and email –You cannot get a virus from a plain text message. –Attachments can carry viruses or be a trojan horse Save attachments to the hard drive before you open it. See p. 62 for helpful tips for setting up mailer programs to save files automatically Do not take the filename by face value. Delete unexpected attachments

6 Information Online Information about you = $$$ Advertisers love to know about you and what you like and buy Web Pages can be customized to your tastes Information can be maintained in databases and made available to others

7 Information Gathering A lot of information is voluntarily given by you Other information can be gathered via search engines and other resources.

8 Security Who cares? What can you do? –Make passwords hard to figure out –Log out of your account –Do not give out unnecessary personal info –Beware of scams –Shop and use auctions safely

9 Libel, Threats, Professionalism Libel- written or pictoral statement that damages a person/organization ($ or other). Posting libelous statements online can result in a lawsuit against the poster. Private individuals have more rights than public ones (i.e. politicians) Remember that email can easily become publicly viewable.

10 Libel, Threats, Professionalism Do not take threats casually. A flame is an email or newsgroup message where the author attacks another person with high intensity. A flame war is an exchange of flames between 2 or more people. In the workplace you may be monitored and harassment is taken seriously. Use your head.

11 Software Piracy and Infringement SW Piracy - the willful reproduction or distribution of 1+ copies of a program/work. Read your programs license agreement to see what you can do with the program. The Internet and CD-R has made piracy of software and music easier for people. A good way to get a virus.

12 More Security Secure Web Documents –Where Web documents reside on a secure server (that uses encryption schemes) –Making sure that the right people get access to documents Firewalls –software/hardware that restricts access to the LAN to trusted users (controlling traffic in both directions)


Download ppt "Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules."

Similar presentations


Ads by Google