SlideShare a Scribd company logo
1 of 8
How to stay safe
online
SHIRLEY DINIZ
ITC Legislation
 There is 4 types of ITC legislation:
Data Protection Act
 The Data Protection Act 1998 (DPA) is an Act of Parliament of the United
Kingdom of Great Britain and Northern Ireland which defines UK law on
the processing of data on identifiable living people. It is the main piece of
legislation that governs the protection of personal data in the UK.
Computer Misuse Act
 This was introduced to regulate personal data. This helps to provide protection
against the abuse of personal information.
Copyright & Patents Act
 The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It
gives the creators of literary, dramatic, musical and artistic works the right to
control the ways in which their material may be used.
Health and Safety Act
 The Health and Safety at Work Act 1974 is the primary piece of legislation
covering occupational health and safety in Great Britain. The Health and
Safety Executive, with local authorities (and other enforcing authorities) is
responsible for enforcing the Act and a number of other Acts and
Statutory Instruments relevant to the working environment.
The risk of Using the Internet
 Risk from viruses
• Some computer viruses are programmed to harm your computer by damaging
programs, deleting files, or reformatting the hard drive. Others simply replicate
themselves or flood a network with traffic, making it impossible to perform any
internet activity. Even less harmful computer viruses can significantly disrupt your
system’s performance, sapping computer memory and causing frequent computer
crashes.
• Use up to date anti-virus
The label "antivirus" was originally given to programs that identified and removed a
particular type of malware called a virus. Today, however, antivirus programs are useful
for preventing infections caused by many types of malware.
Risks from hackers
 Hacker is a term used by some to mean "a clever programmer" and by
others, especially those in popular media, to mean "someone who tries to
break into computer systems.“
People are scouring the internet for news and information about their
favourite actors, actresses, and other high profile names. Hackers and
spammers use this phenomenon to their advantage, creating malicious
websites and selling allegedly legitimate ringtones and screensavers, even
wallpapers that contain malicious software hidden within them.
Fraud and Theft
 Internet fraud is the use of Internet services or software with Internet access to
defraud victims or to otherwise take advantage of them; for example, by stealing
personal information, which can even lead to identity thief. A very common form of
Internet fraud is the distribution of rogue security software . Internet services can
be used to present fraudulent solicitations to prospective victims, to conduct
fraudulent transactions, or to transmit the proceeds of fraud to financial institutions
or to others connected with the scheme.
 To avoid that you shouldn’t download music illegal, and do not open email
attachments from an unknown, suspicious, or untrustworthy source. If you're not
familiar with the sender, do not open, download, or execute any files or email
attachments.
Risk of Injury if you spend long hours on the
computer.
 The use of visual display units (VDU) and other display screen equipment (DSE) has
been related to various symptoms to do with sight and working posture. These
symptoms are often perceived as fatigue of some kind. Applying simple ergonomic
principles to the layout of your work area and how you study can readily prevent
them.
Try to position the monitor to minimize glare and reflections on the screen. Suitable
lighting is important: remember that glare can occur either directly or by reflection
from the screen. Glare from windows can usually be eliminated by curtains or blinds, or
by facing the screen in a different direction. It might be a good idea to make
adjustments from time to time during the day, as light changes. You should have
general lighting, by artificial or natural light or both, that illuminates the whole room
adequately.

More Related Content

What's hot

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3Suad 00
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyDigvijay Naruka
 

What's hot (20)

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
System failure
System  failureSystem  failure
System failure
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Ict Legislation
Ict LegislationIct Legislation
Ict Legislation
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
trial
trialtrial
trial
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 

Viewers also liked

63983288 foreign-exchange-management-act
63983288 foreign-exchange-management-act63983288 foreign-exchange-management-act
63983288 foreign-exchange-management-actTinku Kumar
 
Consolidate & Save
Consolidate & SaveConsolidate & Save
Consolidate & SaveRandox
 
Annual call for new screening topics
Annual call for new screening topicsAnnual call for new screening topics
Annual call for new screening topicsPHEScreening
 
3. Trust feedback from qa visit
3. Trust feedback from qa visit3. Trust feedback from qa visit
3. Trust feedback from qa visitPHEScreening
 
4. Update on non-invasive prenatal testing
4. Update on non-invasive prenatal testing4. Update on non-invasive prenatal testing
4. Update on non-invasive prenatal testingPHEScreening
 
Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล
 Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล
Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดลnawaporn khamseanwong
 
AAA London Network Event 27 Nov 2015 John Martin role of clinical lead pres...
AAA London Network Event 27 Nov 2015   John Martin role of clinical lead pres...AAA London Network Event 27 Nov 2015   John Martin role of clinical lead pres...
AAA London Network Event 27 Nov 2015 John Martin role of clinical lead pres...PHEScreening
 
Stewart Kane CV 2016
Stewart Kane CV 2016Stewart Kane CV 2016
Stewart Kane CV 2016Stewart Kane
 

Viewers also liked (17)

China The Next 30 Years
China  The Next 30 YearsChina  The Next 30 Years
China The Next 30 Years
 
Ahmad-Elsherif..-CV
Ahmad-Elsherif..-CVAhmad-Elsherif..-CV
Ahmad-Elsherif..-CV
 
Architect Presentation
Architect PresentationArchitect Presentation
Architect Presentation
 
63983288 foreign-exchange-management-act
63983288 foreign-exchange-management-act63983288 foreign-exchange-management-act
63983288 foreign-exchange-management-act
 
Consolidate & Save
Consolidate & SaveConsolidate & Save
Consolidate & Save
 
Annual call for new screening topics
Annual call for new screening topicsAnnual call for new screening topics
Annual call for new screening topics
 
Business ad venture opportunity
Business ad venture opportunityBusiness ad venture opportunity
Business ad venture opportunity
 
3. Trust feedback from qa visit
3. Trust feedback from qa visit3. Trust feedback from qa visit
3. Trust feedback from qa visit
 
4. Update on non-invasive prenatal testing
4. Update on non-invasive prenatal testing4. Update on non-invasive prenatal testing
4. Update on non-invasive prenatal testing
 
Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล
 Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล
Load แนวข้อสอบ พนักงานประจำห้องทดลอง มหาวิทยาลัยมหิดล
 
AAA London Network Event 27 Nov 2015 John Martin role of clinical lead pres...
AAA London Network Event 27 Nov 2015   John Martin role of clinical lead pres...AAA London Network Event 27 Nov 2015   John Martin role of clinical lead pres...
AAA London Network Event 27 Nov 2015 John Martin role of clinical lead pres...
 
How to bring in relevant Knowledge, know-how and experience to Ukraine.
How to bring in relevant Knowledge, know-how and experience to Ukraine.How to bring in relevant Knowledge, know-how and experience to Ukraine.
How to bring in relevant Knowledge, know-how and experience to Ukraine.
 
Как инициировать изменения в производственной культуре предприятия
Как инициировать изменения в производственной культуре предприятияКак инициировать изменения в производственной культуре предприятия
Как инициировать изменения в производственной культуре предприятия
 
Mibi2 bilingue intercultural
Mibi2 bilingue interculturalMibi2 bilingue intercultural
Mibi2 bilingue intercultural
 
Phenylketonuria
PhenylketonuriaPhenylketonuria
Phenylketonuria
 
Phenylketonuria
PhenylketonuriaPhenylketonuria
Phenylketonuria
 
Stewart Kane CV 2016
Stewart Kane CV 2016Stewart Kane CV 2016
Stewart Kane CV 2016
 

Similar to How to stay safe online

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 

Similar to How to stay safe online (20)

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Computer
ComputerComputer
Computer
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ppt lesson 17
Ppt lesson 17Ppt lesson 17
Ppt lesson 17
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Hamza
HamzaHamza
Hamza
 
ehadjasd
ehadjasdehadjasd
ehadjasd
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 

Recently uploaded

VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Delhi Call girls
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Delhi Call girls
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRDelhi Call girls
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)AshtonCains
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Nitya salvi
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYdizinfo
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensSocioCosmos
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazinesamuelcoulson30
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 35 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 

How to stay safe online

  • 1. How to stay safe online SHIRLEY DINIZ
  • 2. ITC Legislation  There is 4 types of ITC legislation: Data Protection Act  The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK.
  • 3. Computer Misuse Act  This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Copyright & Patents Act  The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used.
  • 4. Health and Safety Act  The Health and Safety at Work Act 1974 is the primary piece of legislation covering occupational health and safety in Great Britain. The Health and Safety Executive, with local authorities (and other enforcing authorities) is responsible for enforcing the Act and a number of other Acts and Statutory Instruments relevant to the working environment.
  • 5. The risk of Using the Internet  Risk from viruses • Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes. • Use up to date anti-virus The label "antivirus" was originally given to programs that identified and removed a particular type of malware called a virus. Today, however, antivirus programs are useful for preventing infections caused by many types of malware.
  • 6. Risks from hackers  Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.“ People are scouring the internet for news and information about their favourite actors, actresses, and other high profile names. Hackers and spammers use this phenomenon to their advantage, creating malicious websites and selling allegedly legitimate ringtones and screensavers, even wallpapers that contain malicious software hidden within them.
  • 7. Fraud and Theft  Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity thief. A very common form of Internet fraud is the distribution of rogue security software . Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.  To avoid that you shouldn’t download music illegal, and do not open email attachments from an unknown, suspicious, or untrustworthy source. If you're not familiar with the sender, do not open, download, or execute any files or email attachments.
  • 8. Risk of Injury if you spend long hours on the computer.  The use of visual display units (VDU) and other display screen equipment (DSE) has been related to various symptoms to do with sight and working posture. These symptoms are often perceived as fatigue of some kind. Applying simple ergonomic principles to the layout of your work area and how you study can readily prevent them. Try to position the monitor to minimize glare and reflections on the screen. Suitable lighting is important: remember that glare can occur either directly or by reflection from the screen. Glare from windows can usually be eliminated by curtains or blinds, or by facing the screen in a different direction. It might be a good idea to make adjustments from time to time during the day, as light changes. You should have general lighting, by artificial or natural light or both, that illuminates the whole room adequately.