17. REGISTERING ONLINE
• When you are registering or signing up for
an account online, make sure you think
about what information you are giving out!
• You could be putting yourself at risk!
18. WHY WOULD OTHERS WANT MY
PERSONAL INFORMATION?
• To find out more about you
• Identity theft
• To access your online banking
• To access your social media accounts
• To bully or manipulate you
• Obtain your credit card number to shop online
• To try to sell you something
22. Password Safety Steps
1. Use parts of 3 things: favourite: food,
number, date: Loaf12%bDay
2. Include different types of characters, the
most popular one is the “!”
3. Use upper and lower case letters
4. Change your password frequently (every 6
months)
5. Never share your password
23. Delete online history
Browsers keep your
history
Every site
Delete history after
every use or set your
browser to delete on
shutdown
Hit Ctrl+Shift+Delete
Immediately!
26. Safety Steps
1. Google yourself
2. Always log off
3. Use anonymous names or nicknames
4. Don’t share your passwords
5. Share positive info.
6. Think about what you might be revealing
7. Think first click after
Notes de l'éditeur
Digital Media consumption is now the most time-consuming youth activity
On average per day
9 hours digital media (including TV)
7 hours sleeping
6.8 hours in education
.07 hours exercising (57 minutes walking to and from class, as well as extra-curricular activities)
If you wouldn’t say it to someone’s face, don’t post it
If you don’t want everyone to see it, don’t send it
This includes texting, messaging, Snapchat, Instagram, Kick, Pinterest, Vine, Tumblr, Google Plus, WhatsApp, LinkedIn, Tinder
Your Digital Identity is fed by
Who you are
What you do
Where you’ve been
When and how you use the internet
How you respond on the internet
This makes up your digital identity or digital footprint - every click, post, submit, download contributes to your footprint
Every time you are online you leave trails behind
These trails provide information to others that you may not want shared
Video Digital Identity- 2:08 minutes: https://www.youtube.com/watch?v=uJzuDcyR0WM
Facilitator: (scenario)
Have the class discuss who uses their digital information
How this information could be used to assess them
How it can be used to manipulate or bully them
Ask if anyone knows someone that has been bullied using social media
What advice do the participants have for social media users
Facilitator:
Play video 4:05 minutes Cyber Bullying Virus: https://www.youtube.com/watch?v=vmQ8nM7b6XQ
Discuss with the class how cyber bullying impacts just as much as physical bullying
Just like walking in the sand or leaving finger prints
Spending time on the Internet leaves a trail of dirt or a digital footprint behind
Your digital footprint is online evidence of who you are and where you have been
Let’s take a look at how the digital world has changed us and how we can protect ourselves
Video Internet Safety Tips 5:01 minutes : https://www.youtube.com/watch?v=yrln8nyVBLU
Facilitator discuss the following:
Let’s look at how your digital dirt is used
How does Social Media impact the listed relationships?
Consider the implications
It isn’t just your friends that see the post , picture or comment that you made
Your Future can also see the posts
Future Employers
Future College, University, Trade School
Even the police can find your internet profile
Video Internet Danger – Everyone Knows Sarah 1:05 https://www.youtube.com/watch?v=ThxmgXMBpoM
Would you tell or show someone standing in line –
Your full name
Gender
Favourite things
Address
Telephone numbers
Email address
When you were born (birth date)
Social Insurance Number
License plate
Pictures of your children
The fact that you are going on vacation, where and for how long
That no one would be at home
Your state of mind
Your negative feelings about other people (rants)
Political views (views on political events)
But you may do all the time and not even know it.
Facilitator:
Ask the participants how each of the below can use their digital dirt?
Advertisers – to feed you advertising
Friends – to connect with you, view your FB, Pintrest, LinkedIn, etc……
Friends of Friends – creep you
Employers – profile you
Customers – seek your information
Cyber Bullies – to bully you
Criminals – steal your information and identity
Not fair but it is true
Job Seekers need to be very careful with their online profiles
Many employers will do an online search to see what they can find out about you
If they discover something they feel is not a fit, such as an unfortunate photo of you or comment you have made, you may not get the job
Of 2,184 hiring managers recently surveyed by CareerBuilder, 437 said a candidate’s online profile helped them land a position.
More often, though, it backfires:
939 said they found information that led them not to hire a candidate
This is up 9 percentage points from last year
Why the confusion????
Confusion is created when we switch from a device that we once used for something to a totally different device that does multiple things or everything
An alarm clock is a safe device that we use in our home to keep time and alarm to wake us up
To us this is a safe device
Now we have a new set of devices, tools and resources that have multiple uses
Only the devices have risk factors make vulnerable
We think we are safe because the personal device belongs to us and the traditional use of the original device couldn’t get us in trouble
Registering for a warranty or product or newsletter was once safe and easy to do
Now when you are registering or signing up for something you have to be much more careful because the device that you use and the organization that you submit the information to leaves you exposed to some dangers
Consider security especially for sites that you provide your credit or debit card information to
Consider your password
Strong or secure passwords are passwords that are difficult for others to guess
They are usually complicated and include letters, numbers & symbols
Make sure you choose a secure and strong password
A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase
Be safe with your password
Delete History
Open the Microsoft Edge browser
Press Ctrl + H to open the history menu
Select Clear all history
Choose the appropriate boxes for types of data you'd like to clear.
Select Clear
Ask yourself the following questions:
Does this accurately represent me?
Do I feel comfortable having either co-workers, potential employers or patients view this content?
Does it reveal too much personal information that I would be uncomfortable sharing with the public?
THINK
Remember that Social Media should never take the place of a real conversation
We should not be defined by Social Media
Relationships are much more important
Google yourself – see what comes up (web, images, videos)
Always log off
Use anonymous names or nicknames
Treat passwords like toothbrushes – Don’t share and change often
Share information you are proud of that adds to a positive image of you
Like articles achievements and memories
Think about what you might be revealing (going on vacation etc…)
Think twice before you click