 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

How to protect yourself, your computer, and others on the internet
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Netiquette Rules.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams Stevie's Scam School videos
Company LOGO Internet Safety A Community Approach.
How To Protect Your Privacy and Avoid Identity Theft Online.
How It Applies In A Virtual World
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
What is E-commerce Safety Precautions Password Strengths
FlipFlop PD June 12, 2012 Stephanie Dixon, EBRPSS What’s in Your Digital Dossier?
STAY CONNECTED TOLLFREEEXPRESS CONTROL PANEL GUIDE.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
PRIVACY BOOTCAMP YpJU.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Client/User Analysis Website Design. 2 Questions to be answered: What is the purpose of the site? What is the purpose of the site? Who is the site for?
By: Elizabeth Scruggs Digital Citizenship Project.
Grade 11 Digital Learning Project (DLP) An introduction to the digital portion of the class.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Julie Latham Digital Citizenship: An Informational Guide.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Protecting Your Assets By Preventing Identity Theft 1.
SOCIAL MEDIA’S IMPACT ON PERSONAL BRANDING WHY YOUR DIGITAL FOOTPRINT MATTERS Image retrieved from socialmediatoday.com Created by Nicole Gennarelli.
1/11 E-shop Date of preparation: Name of the coordinating persons: Bojan Nestorović Darko Stošić Bojan Nestorović, Darko Stošić.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Digital Footprint.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Digital Citizenship How to use the internet to learn and have fun How to stay in control How to report Karen Bentall, LibrarianAnne Terwilliger, Counselor.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Safety.
Protecting Your Assets By Preventing Identity Theft
St Mary’s C of E Primary School Chiddingfold
Take Charge of your Finances
Creating your online identity
Digital Citizenship.
Consumer Economics Chapter 11
Take Charge of your Finances
Do’s & Don'ts: Online Shopping
Digital Citizenship.
Information Security Footprint.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Your Digital Footprint
“Your Digital Footprint” Career Preparedness
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
Digital Citizenship.
Protecting Your Credit Identity
Internet Safety – Social Media
Digital Citizenship.
Take Charge of your Finances
Company Name | Phone Number | Website | Address
Digital Footprint By: Jamie Purdy.
Presentation transcript:

 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?

 A digital footprint is a term used to describe the trail, traces, or “footprints” that people have online.  Can be passive or active.  The data left behind by users on digital services.  Sometimes referred to as the cyber shadow or digital shadow.  Digital footprints can refer to an individual, business, organization or corporation.

 A passive digital footprint is created when data is collected without the owner knowing.  Occurs by tracking an IP address.  When it was created.  Where they came from.  Also includes your search history.

 An active digital footprint is created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media.  Occurs when a user is logged into a site and makes a post or an edit.  Examples:  Sending an  Publishing a blog  Being active on social media

 Control your privacy settings.  Watch what you share.  Be selective of who you connect with on social media.  Use your real name when creating profiles.  Be selective on which sites you join.  Do a Google search of yourself often.  Only post positive things.  Think before you press send and post.

 Social Media  s  Search Engines  Blog Sites  Web Sites  Comments you Post

 Potential Employers  Potential Identity Theft  Schools/Universities may research  Physical Safety  Organizations may conduct research

 Know who are purchasing from  Check out the seller to be sure that it is legitimate.  Be sure to obtain the contact information in case there is a problem.  Be sure the site is legitimate  Make sure the site is secure.  Never use unsecured wireless networks to make online purchases.  Protect your personal information  Make sure that the you think the required information is necessary.  Remember, you do not have to fill out the fields that are not required.  Check the privacy policy before making a purchase.  Use safe payment options  Credit cards are generally the safest option.  Never send cash!

 Keep a paper trail  Print and save records of your online transactions.  Read your credit card statements as soon as possible.  Turn your computer off when you’re finished shopping  If the computer is on, it gives scammers the opportunity to access your computer.  Be wary of s requesting information  Do not respond to s asking for further information or confirmation of purchase.

 Home Depot identity thefts from credit card and online transactions Home Depot identity thefts from credit card and online transactions  Target’s Data Breach Target’s Data Breach

 Nine_Elements.html Nine_Elements.html

 tal-citizenship-resources-matt- davis tal-citizenship-resources-matt- davis  rs_old/more/google/ rs_old/more/google/  kids-websites/digital-citizenship/ kids-websites/digital-citizenship/  igital-citizenship-resources#graph3 igital-citizenship-resources#graph3

 m/2014/01/29/active-and-passive- digital-footprints/ m/2014/01/29/active-and-passive- digital-footprints/  ay-safe-online/protect-your- personal-information/online- shopping ay-safe-online/protect-your- personal-information/online- shopping