Jisc RSC Eastern Web 2.0 Your new business partner? April 2010 'Digital identity'
Upcoming SlideShare
Loading in...5
×
 

Jisc RSC Eastern Web 2.0 Your new business partner? April 2010 'Digital identity'

on

  • 167 views

Digital Identity presentation

Digital Identity presentation

Statistics

Views

Total Views
167
Views on SlideShare
167
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Origins: In 2003, the Government published a Green Paper called Every Child Matters alongside the formal response to the report into the death of Victoria Climbié. After a thorough consultation process, the Children Act 2004 became law. This legislation is the legal underpinning for Every Child Matters, which sets out the Government’s approach to the well-being of children and young people from birth to age 19.The aim of the Every Child Matters programme is to give all children the support they need to:be healthy stay safe enjoy and achieve make a positive contribution achieve economic well-being. the need to protect children. The Soham murders of schoolgirls Jessica Chapman and Holly Wells by Ian Huntley; more recently Baby “P”.
  • Safeguarding: Limiting grade on Ofsted inspectione-Safety – the safe and responsible use of technology – is sometimes presented as primarily a child protection issue. While children, young people and vulnerable adults do need support to keep themselves safe online (see Safeguarding), the risks associated with the use of technology are not confined to them. e-Safety issues may also affect adults – for example, the mismanagement of personal data, and risks of financial scams, identity theft and cyberbullying. This will be particularly relevant for those adults who are new to using technology.There is wealth of online resources to support organisations and individuals in keeping safe online.
  • The Oxford dictionary definition“The quality or condition of being a specified person or thing”One way of explaining Identity, as a mechanic, using a motor vehicle VIN number (vehicle Identification number). Consider the data record stored at DVLA. The VIN number uniquely identifies the car to which it belongs. In addition it contains other attributes of the car such as year, make, model, and colour. The title also contains relationships; most notably, the title relates the vehicle to the person who owns it. And the VIN will also act as a history of the vehicle, because it identifies every owner of the car since the time it was produced.
  • Digital Identity management is about creating, managing, using and eventually destroying records like the ones that contains the title of your car. These records might identify a person, a car, a computer, a piece of land, or almost anything else. Sometimes the records are created with other purposes in mind: allowing or denying access to a building, authorizing the creation of a file, allowing the transfer of funds and so on. The relationship between identities and the authorised actions associated with them make digital identities useful, though, at the same time, difficult to manage.
  • “Reputation is the opinion (more technically, a social evaluation) of the group of entities toward a person, a group of people, or an organization on a certain criterion. It is an important factor in many fields, such as education, business, online communities or social status”.Source: http://en.wikipedia.org/wiki/Reputation“It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”Warren Buffett
  • The 2008 U.S. presidential election showed that digital rep has such game-changing power that it can make or break a presidential candidate. Barack Obama’s campaign created the textbook of how to do online campaigning. The lessons learned from that campaign about how to build community, mobilize people for support, raise money and respond to attacks. Triple “O” Obama’s Online OperationThe future holds many challenges for managing your reputation, influence and brand. Leaders need to understand that Web 2.0 is the new reality and be ready to respond. Forward-thinking leaders already recognize the pivotal role that digital technology plays in supporting collaboration both within a company and externally with customers, partners and other stakeholders.Forster, Debenhams: Our approach is to listen carefully and engage respectfully with our customers. They're still king in social media, so good behaviour will be rewarded.Google’s corporate motto ”Don’t be evil” Key words:Reliable, Trustworthy, Customer care, integrity, ethics, ethical standards, accuracy, relevance,
  • How easy it is to find information on anybody onlineSafeguarding blogE-safety blogUniversity of Reading worksheets and games
  • You can protect your digital identity on the Internet by being alert to scams, employing strong passwords, installing anti-virus and anti-spyware software and keeping it up-to-date. Create a password that is at least eight characters and includes numbers and characters like ! or # Avoid a dictionary word or name. 2. Avoid using the same password for financial sites that you use for everyday activity like email. 3. Always make sure you are at the site you want by looking for "https://www..." in the address bar. Note the "s," that means you have a secure connection to that site. See, How do I make sure a Web site is safe when I shop online?4. Make sure you are really at the site you want. Click on the yellow padlock and read the security document. Look at two things-who owns the site and who issued the certificate. Make sure you recognize BOTH names. See, If I have a secure connection to a Web site, does that mean I can trust the Web site?5. Don't click on a link in an email; type in the URL instead. Clicking a link in a fraudulent email can take you to a phishing site that will look so real it will fool you into entering your login information. How you can help Encourage your child to:Protect their privacy on the internet by not sharing personal details when using social networking services or visiting websites. This includes family information, their full name, gender, age, home address, email, phone number, pictures of themselves, home or school information and passwords. Read the privacy policies on websites they use—these are usually accessible from the home page. Parents may have to check these for young children. Specifically look for what information is being collected, how it will be used, if it is being sold or transferred to a third party and what mechanisms are used to protect the privacy of the user in online activities such as instant messaging, email and public chat rooms. If they shop online or subscribe to services on a website, check that the site facilitates safe and secure transactions. For example, look for the padlock in the bottom right of the browser window policy statement or https:// in the web address. Ask you to help them register for a service or set up an account, to ensure they are not providing personal identifying information. Also use screen names or IDs that do not indicate gender, age, name or location. Remember that not everyone is who they say they are and not all information on the internet is true. Check their settings. If they have profiles in social networking sites such as Facebook or MySpace they may need to manually change some settings to maximise privacy; for example, to limit who can view their profile, who can search for them and how they can be contacted. Be aware that content they post may be online for a long time, and encourage them to think carefully about what they post. You may also wish to consider using parental control software. This is mainly used to filter or block inappropriate content but some is used to block the outgoing transmission of personally identifiable information (PII) such as names, addresses, gender, email address and phone numbers.

Jisc RSC Eastern Web 2.0 Your new business partner? April 2010 'Digital identity' Jisc RSC Eastern Web 2.0 Your new business partner? April 2010 'Digital identity' Presentation Transcript

  • Safeguarding “Digital Identity” Malcolm Bodley e-Learning Advisor FE JISC Regional Support Centre Eastern Go to View > Header 2013 | slide 1 01 December & Footer to edit RSCs – Stimulating and supporting innovation in learning
  • • Every Child Matters – be healthy – stay safe – enjoy and achieve – make a positive contribution – achieve economic well-being.
  • • Safeguarding • E-safety • “Technology is like giving children wings, but you can’t always control the directions in which they fly.” SWGfL PlymKids Project, 2009
  • • What is digital Identity?
  • • Digital Identity Management
  • • What is digital reputation?
  • • Digital Dossier
  • • Organisational Reputation
  • • • • • • Resources BBC Learning Zone Safeguarding blog E-safety blog Digital Identity
  • • How can you protect your Digital Identity – Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your address. – Do not publish your photograph or videos of yourself online for all to see. – Don’t believe everything you read online - remember some people are not who they say they are. – Parents should encourage young people to use the internet in open areas of the home. E.g. the kitchen or living room rather than private areas such as a bedroom – If you or your children receive abuse online then report it