SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
BUREAU          OF      E D U C AT I O N A L       AND        C U LT U R A L      A F FA I R S



                     Your Safety and Security Online:
                               Safety Tips

The U.S. Department of State’s Bureau of Educational and Cultural Affairs takes your online safety
and security very seriously. As you use social networks, e-mail, and the Internet, please consider the
following Safety Tips:

1. Never broadcast private contact information. Never list your e-mail address or phone number in any
public space, such as your profile page, a blog, forums, or photo caption.

2. If you are a member of a social network, pay close attention to your privacy settings, which allow you to
choose how much personal information you reveal and to whom.

3. Carefully consider what you publish on social networks. Before you post photos, videos, or text, ask
yourself if it would embarrass you if your family or employer saw them.

4. Before you add a widget (an application that can be shared with others electronically) to your profile,
think about whether you want the creators of the widget to be able to access your profile page and
information about your activity on the social network. Keep in mind that the social network generally has no
control over these widgets, so exercise discretion when using these tools.

5. Report any abuses of a website’s Terms of Use to the website’s administrators. Any reputable website or
social network will have a way for you to report abuses.

6. E-mail can be used to spread malicious software or obtain your personal information in order to commit
fraud.
    To protect yourself and the computers that you use, follow the guidelines below:

•   Be suspicious of unsolicited e-mail messages or phone calls from individuals asking for personal information.
    If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with
    that organization.

•   Never provide personal or financial information (credit card numbers, PIN numbers, identification numbers) in
    response to e-mails or telephone calls that you did not initiate.

•   Do not send personal or financial information over the Internet before checking the website’s security. (Secure
    website addresses begin with “https://”)

•   Pay attention to the address of a website, located at the top of the screen. Malicious web sites may look
    identical to a legitimate site, but the address may use a variation in spelling or a different domain (e.g., “.com”
    vs. “.net”).

•   Protect your computer and other computers that you use by scanning all removable media, such as a flash
    drive, CD, or DVD, for viruses before opening files that are contained on the media and by scanning all
    attachments that you receive via e-mail prior to opening them.

•   Do not accept or open executable files (indicated by a file name ending in “.exe”) that you receive via e-mail.
    Such files can be dangerous.

         u . s . d e pa rt m e n t o f s tat e b u r e a u o f e d u c at i o n a l a n d c u lt u r a l a f fa i r s   06/2009

Contenu connexe

Tendances

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
U.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape OverviewU.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape OverviewUS Navy Social Media
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishingthecorrosiveone
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 

Tendances (20)

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
U.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape OverviewU.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape Overview
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Ppt
PptPpt
Ppt
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 

En vedette

Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social MediaInfo Ops HQ
 
Social Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief IntroductionSocial Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief IntroductionJeffrey Levy
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?Nixu Corporation
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)US Navy Social Media
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 

En vedette (16)

Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social Media
 
How To Tweet
How To TweetHow To Tweet
How To Tweet
 
Social Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief IntroductionSocial Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief Introduction
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
CyberCoex
CyberCoexCyberCoex
CyberCoex
 
Social Media OPSEC
Social Media OPSECSocial Media OPSEC
Social Media OPSEC
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Social Media in the Army
Social Media in the ArmySocial Media in the Army
Social Media in the Army
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 

Similaire à Social Media Safety Tips

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyTsenn13
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 

Similaire à Social Media Safety Tips (20)

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Internet safety
Internet safetyInternet safety
Internet safety
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 

Plus de Department of Defense

Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Department of Defense
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...Department of Defense
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesDepartment of Defense
 

Plus de Department of Defense (20)

Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011
 
National Security Space Strategy
National Security Space StrategyNational Security Space Strategy
National Security Space Strategy
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
 
Social Media Overview
Social Media OverviewSocial Media Overview
Social Media Overview
 
Getting Started With Twitter
Getting Started With TwitterGetting Started With Twitter
Getting Started With Twitter
 
Tips And Tools For YouTube
Tips And Tools For YouTubeTips And Tools For YouTube
Tips And Tools For YouTube
 
Customizing Your YouTube Channel
Customizing Your YouTube ChannelCustomizing Your YouTube Channel
Customizing Your YouTube Channel
 
YouTube Uses In The Field
YouTube Uses In The FieldYouTube Uses In The Field
YouTube Uses In The Field
 
Army Official Social Media Policy
Army Official Social Media PolicyArmy Official Social Media Policy
Army Official Social Media Policy
 
ONR Innovation Newsletter
ONR Innovation NewsletterONR Innovation Newsletter
ONR Innovation Newsletter
 
Getting Started With You Tube
Getting Started With You TubeGetting Started With You Tube
Getting Started With You Tube
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook Pages
 
Designing Your Facebook Page
Designing Your Facebook Page Designing Your Facebook Page
Designing Your Facebook Page
 
Getting Started With Facebook
Getting Started With Facebook Getting Started With Facebook
Getting Started With Facebook
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 

Dernier

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Dernier (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Social Media Safety Tips

  • 1. BUREAU OF E D U C AT I O N A L AND C U LT U R A L A F FA I R S Your Safety and Security Online: Safety Tips The U.S. Department of State’s Bureau of Educational and Cultural Affairs takes your online safety and security very seriously. As you use social networks, e-mail, and the Internet, please consider the following Safety Tips: 1. Never broadcast private contact information. Never list your e-mail address or phone number in any public space, such as your profile page, a blog, forums, or photo caption. 2. If you are a member of a social network, pay close attention to your privacy settings, which allow you to choose how much personal information you reveal and to whom. 3. Carefully consider what you publish on social networks. Before you post photos, videos, or text, ask yourself if it would embarrass you if your family or employer saw them. 4. Before you add a widget (an application that can be shared with others electronically) to your profile, think about whether you want the creators of the widget to be able to access your profile page and information about your activity on the social network. Keep in mind that the social network generally has no control over these widgets, so exercise discretion when using these tools. 5. Report any abuses of a website’s Terms of Use to the website’s administrators. Any reputable website or social network will have a way for you to report abuses. 6. E-mail can be used to spread malicious software or obtain your personal information in order to commit fraud. To protect yourself and the computers that you use, follow the guidelines below: • Be suspicious of unsolicited e-mail messages or phone calls from individuals asking for personal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with that organization. • Never provide personal or financial information (credit card numbers, PIN numbers, identification numbers) in response to e-mails or telephone calls that you did not initiate. • Do not send personal or financial information over the Internet before checking the website’s security. (Secure website addresses begin with “https://”) • Pay attention to the address of a website, located at the top of the screen. Malicious web sites may look identical to a legitimate site, but the address may use a variation in spelling or a different domain (e.g., “.com” vs. “.net”). • Protect your computer and other computers that you use by scanning all removable media, such as a flash drive, CD, or DVD, for viruses before opening files that are contained on the media and by scanning all attachments that you receive via e-mail prior to opening them. • Do not accept or open executable files (indicated by a file name ending in “.exe”) that you receive via e-mail. Such files can be dangerous. u . s . d e pa rt m e n t o f s tat e b u r e a u o f e d u c at i o n a l a n d c u lt u r a l a f fa i r s 06/2009