SlideShare a Scribd company logo
1 of 42
Digital Wellbeing
Online Course
M5 – Digital Safety
DWEL Online Course © 2023 by DWEL Partner Consortium is licensed under Attribution-ShareAlike 4.0
International
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
The European Commission support for the production of this publication does
not constitute an endorsement of the contents which reflects the views only of
the authors, and the Commission cannot be held responsible for any use which
may be made of the information contained therein
01 Introduction
02 Overview
03 Learning Objectives
04
Exercise
05
Summary
TABLE OF
CONTENTS
06
Get started with your learning journey
provides HE lecturers with
the knowledge and skills to
be proactive in
safeguarding their own
digital wellbeing in order
to maintain high quality
teaching performance.
Starting with an
Introduction to Digital
Wellbeing, its importance
and how you can protect
yours!
https://digiwellbeing.eu/
Our Online Course
01
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Throughout this module, you will learn about digital
safety in the context of an organisation. Firstly, you
will learn about the foundational principles of online
safety and privacy within the context of higher
education, covering data protection, cybersecurity,
and managing digital footprints. Information
contained in this module will also show you how to
identify potential threats like phishing attacks, data
breaches, and identity theft. You will also learn
about how to navigates the legal and ethical
complexities of online safety and privacy within
higher education, and how to create a culture of
digital identity in the workplace.
Overview
DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS
Learning
Objectives
03
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
1. Define the concept of digital safety in the workplace in
the context of higher educational institutions, including
data protection, cybersecurity, and digital footprints
within the context of higher education.
2. Learners will be able to analyse potential risks, including
phishing attacks, data breaches, and identity theft, in the
higher education environment. They will develop
strategies to mitigate online threats and enhance
personal and institutional cybersecurity measures.
3. Learners will be able to examine the ethical implications
of data collection and usage within higher education.
They will understand the legal framework and
institutional policies governing data protection and
privacy.
4. Learners will be able to develop and implement
measures to enhance awareness of online safety and
privacy among students, faculty, and staff, promoting
responsible online communication and social media
usage
Learning Objectives
DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS
Get started!
04
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
What is Digital Safety?
Digital safety within Higher Education Institutions (HEIs) pertains to the comprehensive
measures, practices, and policies put in place to secure the digital assets, data, and
information generated, accessed, or managed by the institution and its stakeholders.
Digital Safety encompasses safeguarding the confidentiality, integrity, and availability
of sensitive information, including personal data, research findings, academic records,
and institutional data. This involves protection against various digital threats such as
cyberattacks, data breaches, unauthorised access, and malicious software.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
What is Digital Safety?
Furthermore, digital safety involves
creating a safe and inclusive online
environment for all members of the
academic community, fostering
responsible online behaviour, and
promoting awareness about online
risks and protective measures.
By prioritising digital safety, HEIs
ensure the preservation of their
reputation, the trust of stakeholders,
and the continuity of their academic
and administrative operations in an
increasingly interconnected digital
landscape.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Watch the video for some tips and
tricks to improve your digital safety!
What is Digital Safety?
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Dimensions of digital safety: data protection,
cybersecurity, and digital footprints
General Data Protection Regulation (GDPR) is a pivotal regulatory framework that governs
the handling, processing, and protection of personal data within higher education
institutions. Enacted by the European Union (EU), GDPR aims to ensure the privacy and
rights of individuals by setting forth stringent guidelines for the collection, storage, and
usage of personal information.
Compliance with GDPR involves implementing robust data protection measures, securing
sensitive information, obtaining explicit consent for data usage, and promptly notifying
individuals in the event of data breaches.
For universities, GDPR mandates a transparent and responsible approach to managing the
vast amount of student and staff data they handle, encompassing enrolment records,
academic transcripts, research data, and more. Adhering to GDPR not only safeguards the
privacy of individuals but also fosters a culture of trust and ethical data handling within the
university community.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
GDPR Checklist For Your University
For universities and colleges, the way they handle personal information is crucial
for students, staff, and operations. The General Data Protection Regulation (GDPR)
is a set of rules that helps protect people's data, and this can be complicated. The
checklist on the following pages is designed to guide higher education institutions
through the important steps to follow to meet GDPR rules.
By using this checklist, universities can make sure they're handling data
responsibly, gaining people's trust, and respecting their privacy. Whether you're a
student, teacher, administrator, or IT person, this checklist will help you
understand how to follow the rules and keep data safe in higher education.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
1. Awareness and Education:
2. Data Inventory and Mapping:
3. Legal Basis and Consent:
• Create a list of all personal data collected and processed.
• Map the flow of personal data to understand its journey.
• Raise awareness among stakeholders about GDPR implications.
• Provide regular training for staff handling personal data.
• Educate students, faculty, and staff about GDPR rights and responsibilities.
• Determine legal basis for data processing (e.g., contract, consent).
• Obtain informed and explicit consent when needed.
GDPR Checklist For Your University
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
4. Transparency and Privacy Notices:
5. Individual Rights:
6. Data Security and Protection:
• Establish processes for data access, rectification, erasure, etc.
• Respond promptly to data subject requests.
• Develop clear privacy notices explaining data processing.
• Include information about retention policies, transfers, and rights.
• Implement technical and organisational measures for data security.
• Conduct regular security assessments and tests.
GDPR Checklist For Your Univeristy
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
7. Data Breach Management:
8. Third-Party Processors:
9. Data Protection Impact Assessments (DPIAs):
• Assess GDPR compliance of third-party processors.
• Establish data protection agreements with processors.
• Create a data breach response plan.
• Notify authorities and individuals in case of breaches.
• Conduct DPIAs for high-risk processing activities.
• Address potential risks and implement safeguards.
GDPR Checklist For Your Univeristy
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
10. Data Protection Officer (DPO):
11. Record Keeping:
12. Cross-Border Data Transfers:
• Maintain records of data processing activities.
• Appoint a DPO if required.
• Ensure DPO is independent and accessible.
• Ensure international data transfers comply with GDPR.
• Use safeguards for non-EU countries.
GDPR Checklist For Your Univeristy
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
"Technology, like anything else, is a tool.
It can be used to enhance our lives, or it
can be used to detract from our lives. The
choice is ours."
- Arianna Huffington
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
• Everything that you do online leaves a
continuous trace of your activities.
• Without realizing it, every day we present
ourselves online in an evolving public
presentation of who we are, which can be seen
by anyone online.
• There are elements of our digital footprints that
we can never erase.
• You might think you are at home on your
laptops, mobile phones or tablets
communicating with just a few friends but, in
reality, you are in a huge auditorium speaking
into a public address system to a world that can
record and redistribute everything you say.
What Is a Digital Footprint?
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
• Digital Identity- this is the means with
which we prove we are who we say we
are in an online context. Digital identity
is perhaps the most significant enabler
in accessing services in todays society.
• Digital Reputation - refers to how you
present yourself online, how you
interact with other citizens online, how
you engage with brands/shops. All of
these things tell a story which makes up
your digital reputation.
Some Important Definitions
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Digital Footprint from a HEI Perspective
From a university perspective, various stakeholders are interested in understanding the digital
footprint of individuals within the institution's digital ecosystem. The following instances can be
impacted by a digital footprint:
• Admissions committees are particularly keen to assess prospective students' online presence to
gain insights into their character and suitability for academic programs.
• Employers, when considering graduates for job opportunities, often explore digital footprints to
gauge professionalism and alignment with company values.
• University administrators and faculty might also take an interest in the digital footprints of
students and staff to ensure responsible online behaviour within the academic community.
• Research collaborations and partnerships might involve the assessment of digital footprints to
evaluate the credibility and reputation of potential collaborators.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Watch the video of a Ted Talk for
some extra information on why a
digital footprint is important!
https://www.youtube.com/watch?v=
RVX8ZSAR4OY
Why is Your Digital
Footprint Important?
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
As our universities become more digitalised, higher
education institutions (HEIs) are increasingly reliant
on online platforms for academic, administrative,
and communication purposes. However, this digital
dependence comes with inherent risks and threats
that can compromise the security and privacy of
students, faculty, and staff.
This topic delves into the potential risks and threats
associated with online activities within the higher
education environment, including phishing attacks,
data breaches, and identity theft. By exploring
strategies to effectively mitigate these risks, HEIs
can safeguard sensitive information, uphold trust,
and ensure the continuity of their operations.
5.2 Understanding and Mitigating Online
Risks in Higher Education
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
What is Cybersecurity?
Cybersecurity within a university context involves the practice of safeguarding digital systems,
networks, devices, and data from cyber threats and attacks. It encompasses a comprehensive
range of measures, protocols, and technologies aimed at protecting the university's information
technology (IT) infrastructure. The goal is to ensure the confidentiality, integrity, and availability of
digital resources crucial to the institution's academic, administrative, and research functions. By
implementing robust cybersecurity strategies, universities can counteract potential cyber risks such
as unauthorized access, data breaches, malware infections, and phishing attacks. This proactive
approach helps to mitigate vulnerabilities, swiftly detect and respond to threats, and maintain a
secure online environment essential for the university's operations and reputation in today's
digitally interconnected landscape.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Phishing Attacks - Recognising and Countering
Deceptive Threats
A phishing attack is a cyber threat that involves the fraudulent attempt to obtain sensitive and
confidential information, such as login credentials, financial details, or personal data, by posing as a
legitimate and trustworthy entity. These attacks typically occur through deceptive electronic
communication methods, such as email, text messages, or instant messaging, where the attacker
masquerades as a reputable organization, institution, or individual. The primary objective of a
phishing attack is to manipulate recipients into disclosing their confidential information or clicking
on malicious links that can lead to malware installation or unauthorized access to sensitive systems.
To counter phishing attacks, individuals and organizations must exercise vigilance, employ
cybersecurity best practices, and maintain awareness of common tactics used by cybercriminals to
deceive and compromise unsuspecting targets.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
How to combat Phishing Attacks
Phishing attacks remain a significant challenge for HEIs. Cybercriminals often send convincing emails that
impersonate legitimate entities, enticing recipients to provide sensitive data such as login credentials. By
enhancing the community's awareness of phishing techniques and promoting sceptical scrutiny of email
communications, HEIs can empower users to identify suspicious requests. Enhancing awareness of
phishing threats within a higher education environment involves a multifaceted approach.
Regular workshops, seminars, and simulated phishing campaigns provide essential education on
recognising and handling suspicious emails. Vigilance is key: verifying sender addresses, hovering over
links, and using two-factor authentication (2FA) whenever possible adds layers of protection. Staying
informed through security alerts and providing accessible reporting mechanisms fosters an environment
of shared responsibility. Emphasising the use of official platforms and directly accessing links further
reduces risks. Incorporating up-to-date security software and verifying requests for sensitive
information contribute to a multi-layered security posture. Ultimately, promoting a cautious, informed,
and collaborative mindset equips students, faculty, and staff with the tools to navigate the digital
landscape securely and confidently.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Identity theft can compromise the personal
and academic identities of students, faculty,
and staff.
To counter this threat, HEIs should promote
the responsible management of personal
information, advising individuals to avoid
oversharing on social media and maintaining
strong and unique passwords.
Implementing identity verification processes
for critical transactions and limiting access to
sensitive data to authorized personnel are
essential measures in deterring identity theft
attempts.
Identity Theft: Protecting Personal and
Academic Identities
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Case Study- HSE Hack In Ireland
In May 2021, the Health Service Executive (HSE) of Ireland fell victim to a significant cyberattack involving a
sophisticated phishing campaign. The HSE, responsible for Ireland's public health and social care services,
became the target of a large-scale phishing attack. Cybercriminals posed as the HSE and sent seemingly
authentic emails to staff members, enticing them to click on malicious links or provide sensitive
information. This incident underscored the critical importance of cybersecurity preparedness within a
crucial public sector institution.
The Phishers used several different techniques to ensure that the attack was successful. Firstly, they used
deceptive emails. The attackers crafted emails that convincingly mimicked official HSE communication,
often mentioning COVID-19 updates or vaccination information. Secondly, they used an Urgent Tone. The
emails used an urgent tone to prompt recipients to take immediate action, such as clicking on a link or
providing login credentials to access purported important documents or updates. This is to ensure that
people reading the email get sucked into the scam as the sense of urgency means people tend to miss
obvious issues. Finally, the hackers also used Malicious Links. Clicking on the embedded links redirected
users to fake websites designed to collect login credentials or distribute malware.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Case Study- HSE Hack In Ireland
Impact: The aftermath of the phishing attack on the Health Service Executive (HSE) Ireland showcased a
cascade of adverse impacts. The breach resulted in unauthorised access to sensitive data encompassing
patient records, appointment schedules, and administrative documents. Beyond data compromise, the
attack inflicted disruption on essential healthcare services, manifesting as cancelled appointments,
treatment delays, and a consequential strain on patient care. Moreover, the incident left a lasting imprint
on public trust, eroding confidence in the HSE's capacity to ensure the security of patient data. This erosion
of trust triggered concerns among patients and stakeholders, underscoring the far-reaching consequences
of a successful phishing attack on a critical public institution.
Response: In response to the phishing attack, the Health Service Executive (HSE) promptly activated an
immediate incident response, collaborating with IT experts, law enforcement, and cybersecurity agencies.
This collective effort aimed to rapidly contain the breach and assess the extent of damage. Transparent
communication channels were swiftly established with the public, offering clear information about the
breach, detailing the steps undertaken to address it, and outlining precautionary measures individuals
could take to safeguard themselves.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Case Study- HSE Hack In Ireland
Outcomes: Recognising the criticality of proactive measures, the HSE introduced compulsory training
initiatives to equip staff with the ability to recognise phishing attempts. This training underscored the
significance of verifying emails and links before taking any actions. The incident engendered significant
lessons for the HSE. It underscored the ongoing necessity of sustaining cybersecurity training and
awareness programs, ensuring that staff remain adept at identifying and promptly reporting phishing
attempts.
The event also spotlighted the importance of well-structured incident response plans, serving as an
indispensable tool to mitigate the impact of cyberattacks and enable swift operational recovery. Most
significantly, the breach emphasised the intrinsic value of upholding public trust, a facet requiring
forthright and transparent communication throughout and following cybersecurity incidents.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Navigating Legal and Ethical
Aspects of Online Safety and
Privacy in Higher Education
In the digital era, legal and ethical factors
significantly impact online safety and
privacy in higher education. This topic
dives into the practical side of abiding by
laws, regulations, and institutional
policies, while also exploring the ethical
facets tied to data collection and use.
Over the next few slides, we will look at
the legal and ethical aspects of online
safety in terms of policies, digital integrity,
crafting clear guidelines, Ethical
Implications of Data Collection and Ethical
Data Usage.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Legal and Ethical Aspects of Online Safety and Privacy
in Higher Education
Legal Compliance and Regulations: Upholding Digital Integrity
As we saw, higher education must operate within legal boundaries like GDPR and FERPA, ensuring
data security and privacy. Following these regulations is crucial, showing students, faculty, and staff
that their personal information is handled responsibly. This exploration focuses on the pragmatic
aspect of legal adherence to protecting the institutional reputation and stakeholder confidence.
Institutional Policies: Crafting Clear Guidelines
Internal policies set norms for online safety and privacy. These policies define the proper use of
digital resources and procedures for secure data handling. Scrutinising these guidelines fosters an
environment of accountability, offering individuals clear directives for responsible digital
engagement.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Legal and Ethical Aspects of Online Safety and Privacy
in Higher Education
Ethical Implications of Data Collection: Balancing Progress and Privacy
Collecting data for research and operations triggers ethical concerns about privacy. Discussing these
issues highlights the challenge of advancing research while respecting privacy rights. Concrete
scenarios prompt universities to adopt transparent practices, enabling stakeholders to make
informed choices about sharing their data.
Ethical Data Usage: Maximising Benefits with Responsibility
Ethical data use goes beyond collection to encompass sharing, analysis, and application. This aspect
underscores the obligation to utilise data meaningfully without causing harm. A pragmatic approach
involves critically assessing ethical guidelines, leveraging data's potential while safeguarding rights
and maintaining trust.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Institutions of higher education play a pivotal
role in not only imparting knowledge but also
shaping responsible digital citizenship. The
heart of the matter lies in acknowledging that
higher education moulds not only future
professionals but also future digital citizens. By
embracing the concept of digital responsibility,
institutions lay the groundwork for a shared
ethos that resonates through online actions.
This topic explores the critical dimensions of
cultivating a culture of digital responsibility within
the academic community.
Fostering Digital Responsibility within the
Academic Community
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Ways To Foster Digital Responsibility within a HEI
Enhancing Awareness of Online Safety and Privacy: Nurturing Vigilance
Participants will delve into the nuances of fostering heightened awareness regarding online safety
and privacy. This involves creating targeted initiatives that educate students, faculty, and staff about
the risks associated with online activities. By recognising potential threats, participants can
implement preventive measures and empower individuals to protect their digital identities.
Advocating Responsible Online Communication: Cultivating Ethical Engagement
Effective communication in the digital realm demands ethical considerations. Participants will acquire
insights into promoting courteous and responsible online interactions among students, faculty, and
staff. By championing thoughtful discourse and constructive dialogue, participants contribute to a
respectful and inclusive digital environment.
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Ways To Foster Digital Responsibility within a HEI
Implementing Secure Online Practices: Safeguarding Personal Information
In a landscape where personal information is digitally exchanged, participants will master best
practices for secure online communication. This includes discerning trusted sources, employing
strong passwords, and recognising phishing attempts. Equipped with these skills, participants can
safeguard their personal data and guide others towards responsible online practices.
Crafting a Holistic Approach: Instilling Values for Digital Responsibility
It is important to emphasise the value of a holistic approach to digital responsibility. Participants will
learn to foster a culture where each member of the academic community understands their role in
maintaining a secure and respectful digital environment. By applying knowledge and practical
techniques, participants will contribute to an informed and conscientious academic ecosystem that
champions digital responsibility.
DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS
Exercises
05
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Learning Exercise:
Reflect on your key takeaways from this
module and identify one action step you
will take to improve your digital
wellbeing. Share your reflections with a
colleague or in a discussion forum to help
hold yourself accountable and foster a
supportive community around digital
wellbeing.
•
”
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Learning Exercise:
Reflect on your key takeaways from
this module and identify one action
step you will take to improve your
digital wellbeing. Share your
reflections with a colleague or in a
discussion forum to help hold yourself
accountable and foster a supportive
community around digital wellbeing.
Research and explore
tools, apps, or other
resources that can support
your digital wellbeing
journey. Share your
findings with colleagues
and discuss how these
resources might be
incorporated into your
daily routines.
DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS
Summary
06
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Summary
In conclusion, Module 1 has provided
a strong foundation for
understanding the concept of digital
wellbeing and its significance in both
personal and professional contexts.
Throughout the module, we have
explored the impact of technology on
physical and psychological health,
learned mindfulness techniques to
manage technology use, and
discussed strategies for fostering a
healthy digital work environment. As
you continue your journey towards
digital wellbeing, we encourage you
to apply the knowledge and skills
you've gained in this module to your
•
”
DIGITAL
WELLBEING
FOR
HIGHER
EDUCATION
LECTURERS
Now that you have a solid
understanding of digital wellbeing, we
invite you to continue your learning
journey by taking Module 2, which
delves deeper into the relationship
between technology use and personal
habits. This module will provide
valuable insights and practical
strategies for identifying patterns in
your technology use, recognising
potential triggers, and developing
effective techniques to manage your
digital interactions. By participating in
Module 2, you will further enhance
your digital wellbeing skills and
continue to build a balanced and
healthy relationship with technology.
•
”
https://digiwellbeing.eu/
Follow our
journey here

More Related Content

Similar to DWEL - Module 5 final.pptx

E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 educationdeborahjudah
 
Digital Mentoring for Youth Employment
Digital Mentoring for Youth EmploymentDigital Mentoring for Youth Employment
Digital Mentoring for Youth EmploymentEmiralex
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital Worldcyberprosocial
 
M1. What does the digitization of socio-health services mean
M1. What does the digitization of socio-health services meanM1. What does the digitization of socio-health services mean
M1. What does the digitization of socio-health services meanLuis Gómez Martinena
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )MAHIRA
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipInas Hafi
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 

Similar to DWEL - Module 5 final.pptx (20)

E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 education
 
CIPP
CIPPCIPP
CIPP
 
Digital Mentoring for Youth Employment
Digital Mentoring for Youth EmploymentDigital Mentoring for Youth Employment
Digital Mentoring for Youth Employment
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 
M1. What does the digitization of socio-health services mean
M1. What does the digitization of socio-health services meanM1. What does the digitization of socio-health services mean
M1. What does the digitization of socio-health services mean
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
LiDA 1o2.pptx
LiDA 1o2.pptxLiDA 1o2.pptx
LiDA 1o2.pptx
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 

More from caniceconsulting

Module 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptxModule 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptxcaniceconsulting
 
PROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptxPROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptxcaniceconsulting
 
PROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptxPROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptxcaniceconsulting
 
PROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptxPROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptxPROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptxPROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptxPROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptxcaniceconsulting
 
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...caniceconsulting
 
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...caniceconsulting
 
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptxPROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptxcaniceconsulting
 
PROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptxPROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptxPROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptxPROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptxPROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptxPROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptxPROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptxPROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptxcaniceconsulting
 
BG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptxBG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptxcaniceconsulting
 
BG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptxBG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptxcaniceconsulting
 
BG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptxBG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptxcaniceconsulting
 

More from caniceconsulting (20)

Module 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptxModule 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptx
 
PROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptxPROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptx
 
PROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptxPROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptx
 
PROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptxPROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptx
 
PROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptxPROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptx
 
PROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptxPROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptx
 
PROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptxPROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptx
 
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
 
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
 
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptxPROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
 
PROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptxPROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptx
 
PROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptxPROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptx
 
PROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptxPROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptx
 
PROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptxPROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptx
 
PROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptxPROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptx
 
PROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptxPROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptx
 
PROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptxPROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptx
 
BG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptxBG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptx
 
BG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptxBG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptx
 
BG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptxBG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptx
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

DWEL - Module 5 final.pptx

  • 1. Digital Wellbeing Online Course M5 – Digital Safety DWEL Online Course © 2023 by DWEL Partner Consortium is licensed under Attribution-ShareAlike 4.0 International
  • 2. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS The European Commission support for the production of this publication does not constitute an endorsement of the contents which reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein 01 Introduction 02 Overview 03 Learning Objectives 04 Exercise 05 Summary TABLE OF CONTENTS 06 Get started with your learning journey
  • 3. provides HE lecturers with the knowledge and skills to be proactive in safeguarding their own digital wellbeing in order to maintain high quality teaching performance. Starting with an Introduction to Digital Wellbeing, its importance and how you can protect yours! https://digiwellbeing.eu/ Our Online Course 01
  • 4. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Throughout this module, you will learn about digital safety in the context of an organisation. Firstly, you will learn about the foundational principles of online safety and privacy within the context of higher education, covering data protection, cybersecurity, and managing digital footprints. Information contained in this module will also show you how to identify potential threats like phishing attacks, data breaches, and identity theft. You will also learn about how to navigates the legal and ethical complexities of online safety and privacy within higher education, and how to create a culture of digital identity in the workplace. Overview
  • 5. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Learning Objectives 03
  • 6. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS 1. Define the concept of digital safety in the workplace in the context of higher educational institutions, including data protection, cybersecurity, and digital footprints within the context of higher education. 2. Learners will be able to analyse potential risks, including phishing attacks, data breaches, and identity theft, in the higher education environment. They will develop strategies to mitigate online threats and enhance personal and institutional cybersecurity measures. 3. Learners will be able to examine the ethical implications of data collection and usage within higher education. They will understand the legal framework and institutional policies governing data protection and privacy. 4. Learners will be able to develop and implement measures to enhance awareness of online safety and privacy among students, faculty, and staff, promoting responsible online communication and social media usage Learning Objectives
  • 7. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Get started! 04
  • 8. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS What is Digital Safety? Digital safety within Higher Education Institutions (HEIs) pertains to the comprehensive measures, practices, and policies put in place to secure the digital assets, data, and information generated, accessed, or managed by the institution and its stakeholders. Digital Safety encompasses safeguarding the confidentiality, integrity, and availability of sensitive information, including personal data, research findings, academic records, and institutional data. This involves protection against various digital threats such as cyberattacks, data breaches, unauthorised access, and malicious software.
  • 9. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS What is Digital Safety? Furthermore, digital safety involves creating a safe and inclusive online environment for all members of the academic community, fostering responsible online behaviour, and promoting awareness about online risks and protective measures. By prioritising digital safety, HEIs ensure the preservation of their reputation, the trust of stakeholders, and the continuity of their academic and administrative operations in an increasingly interconnected digital landscape.
  • 10. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Watch the video for some tips and tricks to improve your digital safety! What is Digital Safety?
  • 11. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Dimensions of digital safety: data protection, cybersecurity, and digital footprints General Data Protection Regulation (GDPR) is a pivotal regulatory framework that governs the handling, processing, and protection of personal data within higher education institutions. Enacted by the European Union (EU), GDPR aims to ensure the privacy and rights of individuals by setting forth stringent guidelines for the collection, storage, and usage of personal information. Compliance with GDPR involves implementing robust data protection measures, securing sensitive information, obtaining explicit consent for data usage, and promptly notifying individuals in the event of data breaches. For universities, GDPR mandates a transparent and responsible approach to managing the vast amount of student and staff data they handle, encompassing enrolment records, academic transcripts, research data, and more. Adhering to GDPR not only safeguards the privacy of individuals but also fosters a culture of trust and ethical data handling within the university community.
  • 12. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS GDPR Checklist For Your University For universities and colleges, the way they handle personal information is crucial for students, staff, and operations. The General Data Protection Regulation (GDPR) is a set of rules that helps protect people's data, and this can be complicated. The checklist on the following pages is designed to guide higher education institutions through the important steps to follow to meet GDPR rules. By using this checklist, universities can make sure they're handling data responsibly, gaining people's trust, and respecting their privacy. Whether you're a student, teacher, administrator, or IT person, this checklist will help you understand how to follow the rules and keep data safe in higher education.
  • 13. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS 1. Awareness and Education: 2. Data Inventory and Mapping: 3. Legal Basis and Consent: • Create a list of all personal data collected and processed. • Map the flow of personal data to understand its journey. • Raise awareness among stakeholders about GDPR implications. • Provide regular training for staff handling personal data. • Educate students, faculty, and staff about GDPR rights and responsibilities. • Determine legal basis for data processing (e.g., contract, consent). • Obtain informed and explicit consent when needed. GDPR Checklist For Your University
  • 14. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS 4. Transparency and Privacy Notices: 5. Individual Rights: 6. Data Security and Protection: • Establish processes for data access, rectification, erasure, etc. • Respond promptly to data subject requests. • Develop clear privacy notices explaining data processing. • Include information about retention policies, transfers, and rights. • Implement technical and organisational measures for data security. • Conduct regular security assessments and tests. GDPR Checklist For Your Univeristy
  • 15. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS 7. Data Breach Management: 8. Third-Party Processors: 9. Data Protection Impact Assessments (DPIAs): • Assess GDPR compliance of third-party processors. • Establish data protection agreements with processors. • Create a data breach response plan. • Notify authorities and individuals in case of breaches. • Conduct DPIAs for high-risk processing activities. • Address potential risks and implement safeguards. GDPR Checklist For Your Univeristy
  • 16. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS 10. Data Protection Officer (DPO): 11. Record Keeping: 12. Cross-Border Data Transfers: • Maintain records of data processing activities. • Appoint a DPO if required. • Ensure DPO is independent and accessible. • Ensure international data transfers comply with GDPR. • Use safeguards for non-EU countries. GDPR Checklist For Your Univeristy
  • 17. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS "Technology, like anything else, is a tool. It can be used to enhance our lives, or it can be used to detract from our lives. The choice is ours." - Arianna Huffington
  • 18. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS • Everything that you do online leaves a continuous trace of your activities. • Without realizing it, every day we present ourselves online in an evolving public presentation of who we are, which can be seen by anyone online. • There are elements of our digital footprints that we can never erase. • You might think you are at home on your laptops, mobile phones or tablets communicating with just a few friends but, in reality, you are in a huge auditorium speaking into a public address system to a world that can record and redistribute everything you say. What Is a Digital Footprint?
  • 19. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS • Digital Identity- this is the means with which we prove we are who we say we are in an online context. Digital identity is perhaps the most significant enabler in accessing services in todays society. • Digital Reputation - refers to how you present yourself online, how you interact with other citizens online, how you engage with brands/shops. All of these things tell a story which makes up your digital reputation. Some Important Definitions
  • 20. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Digital Footprint from a HEI Perspective From a university perspective, various stakeholders are interested in understanding the digital footprint of individuals within the institution's digital ecosystem. The following instances can be impacted by a digital footprint: • Admissions committees are particularly keen to assess prospective students' online presence to gain insights into their character and suitability for academic programs. • Employers, when considering graduates for job opportunities, often explore digital footprints to gauge professionalism and alignment with company values. • University administrators and faculty might also take an interest in the digital footprints of students and staff to ensure responsible online behaviour within the academic community. • Research collaborations and partnerships might involve the assessment of digital footprints to evaluate the credibility and reputation of potential collaborators.
  • 21. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Watch the video of a Ted Talk for some extra information on why a digital footprint is important! https://www.youtube.com/watch?v= RVX8ZSAR4OY Why is Your Digital Footprint Important?
  • 22. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS As our universities become more digitalised, higher education institutions (HEIs) are increasingly reliant on online platforms for academic, administrative, and communication purposes. However, this digital dependence comes with inherent risks and threats that can compromise the security and privacy of students, faculty, and staff. This topic delves into the potential risks and threats associated with online activities within the higher education environment, including phishing attacks, data breaches, and identity theft. By exploring strategies to effectively mitigate these risks, HEIs can safeguard sensitive information, uphold trust, and ensure the continuity of their operations. 5.2 Understanding and Mitigating Online Risks in Higher Education
  • 23. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS What is Cybersecurity? Cybersecurity within a university context involves the practice of safeguarding digital systems, networks, devices, and data from cyber threats and attacks. It encompasses a comprehensive range of measures, protocols, and technologies aimed at protecting the university's information technology (IT) infrastructure. The goal is to ensure the confidentiality, integrity, and availability of digital resources crucial to the institution's academic, administrative, and research functions. By implementing robust cybersecurity strategies, universities can counteract potential cyber risks such as unauthorized access, data breaches, malware infections, and phishing attacks. This proactive approach helps to mitigate vulnerabilities, swiftly detect and respond to threats, and maintain a secure online environment essential for the university's operations and reputation in today's digitally interconnected landscape.
  • 24. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Phishing Attacks - Recognising and Countering Deceptive Threats A phishing attack is a cyber threat that involves the fraudulent attempt to obtain sensitive and confidential information, such as login credentials, financial details, or personal data, by posing as a legitimate and trustworthy entity. These attacks typically occur through deceptive electronic communication methods, such as email, text messages, or instant messaging, where the attacker masquerades as a reputable organization, institution, or individual. The primary objective of a phishing attack is to manipulate recipients into disclosing their confidential information or clicking on malicious links that can lead to malware installation or unauthorized access to sensitive systems. To counter phishing attacks, individuals and organizations must exercise vigilance, employ cybersecurity best practices, and maintain awareness of common tactics used by cybercriminals to deceive and compromise unsuspecting targets.
  • 25. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS How to combat Phishing Attacks Phishing attacks remain a significant challenge for HEIs. Cybercriminals often send convincing emails that impersonate legitimate entities, enticing recipients to provide sensitive data such as login credentials. By enhancing the community's awareness of phishing techniques and promoting sceptical scrutiny of email communications, HEIs can empower users to identify suspicious requests. Enhancing awareness of phishing threats within a higher education environment involves a multifaceted approach. Regular workshops, seminars, and simulated phishing campaigns provide essential education on recognising and handling suspicious emails. Vigilance is key: verifying sender addresses, hovering over links, and using two-factor authentication (2FA) whenever possible adds layers of protection. Staying informed through security alerts and providing accessible reporting mechanisms fosters an environment of shared responsibility. Emphasising the use of official platforms and directly accessing links further reduces risks. Incorporating up-to-date security software and verifying requests for sensitive information contribute to a multi-layered security posture. Ultimately, promoting a cautious, informed, and collaborative mindset equips students, faculty, and staff with the tools to navigate the digital landscape securely and confidently.
  • 26. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Identity theft can compromise the personal and academic identities of students, faculty, and staff. To counter this threat, HEIs should promote the responsible management of personal information, advising individuals to avoid oversharing on social media and maintaining strong and unique passwords. Implementing identity verification processes for critical transactions and limiting access to sensitive data to authorized personnel are essential measures in deterring identity theft attempts. Identity Theft: Protecting Personal and Academic Identities
  • 27. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Case Study- HSE Hack In Ireland In May 2021, the Health Service Executive (HSE) of Ireland fell victim to a significant cyberattack involving a sophisticated phishing campaign. The HSE, responsible for Ireland's public health and social care services, became the target of a large-scale phishing attack. Cybercriminals posed as the HSE and sent seemingly authentic emails to staff members, enticing them to click on malicious links or provide sensitive information. This incident underscored the critical importance of cybersecurity preparedness within a crucial public sector institution. The Phishers used several different techniques to ensure that the attack was successful. Firstly, they used deceptive emails. The attackers crafted emails that convincingly mimicked official HSE communication, often mentioning COVID-19 updates or vaccination information. Secondly, they used an Urgent Tone. The emails used an urgent tone to prompt recipients to take immediate action, such as clicking on a link or providing login credentials to access purported important documents or updates. This is to ensure that people reading the email get sucked into the scam as the sense of urgency means people tend to miss obvious issues. Finally, the hackers also used Malicious Links. Clicking on the embedded links redirected users to fake websites designed to collect login credentials or distribute malware.
  • 28. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Case Study- HSE Hack In Ireland Impact: The aftermath of the phishing attack on the Health Service Executive (HSE) Ireland showcased a cascade of adverse impacts. The breach resulted in unauthorised access to sensitive data encompassing patient records, appointment schedules, and administrative documents. Beyond data compromise, the attack inflicted disruption on essential healthcare services, manifesting as cancelled appointments, treatment delays, and a consequential strain on patient care. Moreover, the incident left a lasting imprint on public trust, eroding confidence in the HSE's capacity to ensure the security of patient data. This erosion of trust triggered concerns among patients and stakeholders, underscoring the far-reaching consequences of a successful phishing attack on a critical public institution. Response: In response to the phishing attack, the Health Service Executive (HSE) promptly activated an immediate incident response, collaborating with IT experts, law enforcement, and cybersecurity agencies. This collective effort aimed to rapidly contain the breach and assess the extent of damage. Transparent communication channels were swiftly established with the public, offering clear information about the breach, detailing the steps undertaken to address it, and outlining precautionary measures individuals could take to safeguard themselves.
  • 29. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Case Study- HSE Hack In Ireland Outcomes: Recognising the criticality of proactive measures, the HSE introduced compulsory training initiatives to equip staff with the ability to recognise phishing attempts. This training underscored the significance of verifying emails and links before taking any actions. The incident engendered significant lessons for the HSE. It underscored the ongoing necessity of sustaining cybersecurity training and awareness programs, ensuring that staff remain adept at identifying and promptly reporting phishing attempts. The event also spotlighted the importance of well-structured incident response plans, serving as an indispensable tool to mitigate the impact of cyberattacks and enable swift operational recovery. Most significantly, the breach emphasised the intrinsic value of upholding public trust, a facet requiring forthright and transparent communication throughout and following cybersecurity incidents.
  • 30. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Navigating Legal and Ethical Aspects of Online Safety and Privacy in Higher Education In the digital era, legal and ethical factors significantly impact online safety and privacy in higher education. This topic dives into the practical side of abiding by laws, regulations, and institutional policies, while also exploring the ethical facets tied to data collection and use. Over the next few slides, we will look at the legal and ethical aspects of online safety in terms of policies, digital integrity, crafting clear guidelines, Ethical Implications of Data Collection and Ethical Data Usage.
  • 31. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Legal and Ethical Aspects of Online Safety and Privacy in Higher Education Legal Compliance and Regulations: Upholding Digital Integrity As we saw, higher education must operate within legal boundaries like GDPR and FERPA, ensuring data security and privacy. Following these regulations is crucial, showing students, faculty, and staff that their personal information is handled responsibly. This exploration focuses on the pragmatic aspect of legal adherence to protecting the institutional reputation and stakeholder confidence. Institutional Policies: Crafting Clear Guidelines Internal policies set norms for online safety and privacy. These policies define the proper use of digital resources and procedures for secure data handling. Scrutinising these guidelines fosters an environment of accountability, offering individuals clear directives for responsible digital engagement.
  • 32. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Legal and Ethical Aspects of Online Safety and Privacy in Higher Education Ethical Implications of Data Collection: Balancing Progress and Privacy Collecting data for research and operations triggers ethical concerns about privacy. Discussing these issues highlights the challenge of advancing research while respecting privacy rights. Concrete scenarios prompt universities to adopt transparent practices, enabling stakeholders to make informed choices about sharing their data. Ethical Data Usage: Maximising Benefits with Responsibility Ethical data use goes beyond collection to encompass sharing, analysis, and application. This aspect underscores the obligation to utilise data meaningfully without causing harm. A pragmatic approach involves critically assessing ethical guidelines, leveraging data's potential while safeguarding rights and maintaining trust.
  • 33. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Institutions of higher education play a pivotal role in not only imparting knowledge but also shaping responsible digital citizenship. The heart of the matter lies in acknowledging that higher education moulds not only future professionals but also future digital citizens. By embracing the concept of digital responsibility, institutions lay the groundwork for a shared ethos that resonates through online actions. This topic explores the critical dimensions of cultivating a culture of digital responsibility within the academic community. Fostering Digital Responsibility within the Academic Community
  • 34. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Ways To Foster Digital Responsibility within a HEI Enhancing Awareness of Online Safety and Privacy: Nurturing Vigilance Participants will delve into the nuances of fostering heightened awareness regarding online safety and privacy. This involves creating targeted initiatives that educate students, faculty, and staff about the risks associated with online activities. By recognising potential threats, participants can implement preventive measures and empower individuals to protect their digital identities. Advocating Responsible Online Communication: Cultivating Ethical Engagement Effective communication in the digital realm demands ethical considerations. Participants will acquire insights into promoting courteous and responsible online interactions among students, faculty, and staff. By championing thoughtful discourse and constructive dialogue, participants contribute to a respectful and inclusive digital environment.
  • 35. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Ways To Foster Digital Responsibility within a HEI Implementing Secure Online Practices: Safeguarding Personal Information In a landscape where personal information is digitally exchanged, participants will master best practices for secure online communication. This includes discerning trusted sources, employing strong passwords, and recognising phishing attempts. Equipped with these skills, participants can safeguard their personal data and guide others towards responsible online practices. Crafting a Holistic Approach: Instilling Values for Digital Responsibility It is important to emphasise the value of a holistic approach to digital responsibility. Participants will learn to foster a culture where each member of the academic community understands their role in maintaining a secure and respectful digital environment. By applying knowledge and practical techniques, participants will contribute to an informed and conscientious academic ecosystem that champions digital responsibility.
  • 36. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Exercises 05
  • 37. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Learning Exercise: Reflect on your key takeaways from this module and identify one action step you will take to improve your digital wellbeing. Share your reflections with a colleague or in a discussion forum to help hold yourself accountable and foster a supportive community around digital wellbeing. • ”
  • 38. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Learning Exercise: Reflect on your key takeaways from this module and identify one action step you will take to improve your digital wellbeing. Share your reflections with a colleague or in a discussion forum to help hold yourself accountable and foster a supportive community around digital wellbeing. Research and explore tools, apps, or other resources that can support your digital wellbeing journey. Share your findings with colleagues and discuss how these resources might be incorporated into your daily routines.
  • 39. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Summary 06
  • 40. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Summary In conclusion, Module 1 has provided a strong foundation for understanding the concept of digital wellbeing and its significance in both personal and professional contexts. Throughout the module, we have explored the impact of technology on physical and psychological health, learned mindfulness techniques to manage technology use, and discussed strategies for fostering a healthy digital work environment. As you continue your journey towards digital wellbeing, we encourage you to apply the knowledge and skills you've gained in this module to your • ”
  • 41. DIGITAL WELLBEING FOR HIGHER EDUCATION LECTURERS Now that you have a solid understanding of digital wellbeing, we invite you to continue your learning journey by taking Module 2, which delves deeper into the relationship between technology use and personal habits. This module will provide valuable insights and practical strategies for identifying patterns in your technology use, recognising potential triggers, and developing effective techniques to manage your digital interactions. By participating in Module 2, you will further enhance your digital wellbeing skills and continue to build a balanced and healthy relationship with technology. • ”