Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Technology Safety Practices


Published on

A presentation given at the 2004 Digital Edge Expo in Washington DC. Public forum discussion about issues of abuse with technology and what individuals could do about it.

Published in: Business, Technology
  • Be the first to comment

Technology Safety Practices

  1. 1. Technology Safety Practices @ Home and Work Presented by Shireen Mitchell Executive Officer, Digital Sisters
  2. 2. Technology Literacy Wows <ul><li>The first “computers” were mostly women! </li></ul><ul><li>Great technology designers were artists including musicians. </li></ul><ul><li>Medical technology breakthrough </li></ul><ul><li>The “bug” in the computer was really a moth. </li></ul><ul><li>The computerized home and car. </li></ul><ul><li>Produce your own Media project </li></ul>
  3. 3. Technology Literacy Woes <ul><li>Misunderstandings about technology (solves anything?)‏ </li></ul><ul><li>Stereotypes (who are tech gurus)‏ </li></ul><ul><li>Privacy and Protection </li></ul><ul><li>Abuse of Technology </li></ul><ul><li>Production of hazardous materials (environmental concerns)‏ </li></ul>
  4. 4. Privacy and Protection <ul><li>Cell and Cordless phones </li></ul><ul><li>Global Positioning System </li></ul><ul><li>Digital Tracking of Children </li></ul><ul><li>Viruses, Worms & Hackers, Oh My! </li></ul><ul><li>Pop-ups and Spammers </li></ul><ul><li>Being “Googled” </li></ul><ul><li>The availability of information </li></ul>
  5. 5. Data Security and Backups <ul><li>Avoiding Computer & Network Crashes </li></ul><ul><li>Surge protectors & uninterrupted power supplies. </li></ul><ul><li>Once a month backup </li></ul><ul><li>Store duplicates @ locations away from the computer </li></ul><ul><li>Logins & password protect folders </li></ul>
  6. 6. Connections <ul><li>Always on DSL, Cable & Satellite </li></ul><ul><li>Dial up, internal modems </li></ul><ul><li>Wireless & Encryption </li></ul><ul><li>Networks, Servers @ work </li></ul><ul><li>Hacker proof </li></ul><ul><li>Firewalls </li></ul>
  7. 7. WWW - Wows <ul><li>Physicist sharing research (web)‏ </li></ul><ul><li>E-Commerce </li></ul><ul><li>Online Banking </li></ul><ul><li>Instant messaging & Chat Rooms </li></ul><ul><li>Support groups & discussion boards </li></ul><ul><li>Work from Home </li></ul><ul><li>Distant Learning </li></ul>
  8. 8. Web Sites Woes <ul><li>Cookies </li></ul><ul><li>Remembering passwords </li></ul><ul><ul><li>Using letters and #’s combos (more than six)‏ </li></ul></ul><ul><ul><li>Do not tape it to the computer </li></ul></ul><ul><li>Histories and Caching </li></ul><ul><li>Downloads, Pop-ups & blasters </li></ul>
  9. 9. Children Online <ul><li>Homework help </li></ul><ul><li>Online and video games </li></ul><ul><li>Project research </li></ul><ul><li>Filters </li></ul><ul><li>Online rules </li></ul><ul><li>Screen names & email </li></ul><ul><li>School levels but no names </li></ul><ul><li>Chat rooms </li></ul><ul><li>Games </li></ul>
  10. 10. Email <ul><li>Instant communication </li></ul><ul><li>Transfer work files, resumes, & get community info </li></ul><ul><li>Two accounts: work vs personal email </li></ul><ul><li>Email is not a safe or confidential way to talk to someone </li></ul><ul><li>Spam and viruses </li></ul><ul><li>Chain letters </li></ul>
  11. 11. Telephone Wows <ul><li>Major source of communication </li></ul><ul><li>Transfers voice, data & fax (images)‏ </li></ul><ul><li>Voice mail </li></ul><ul><li>Automated systems </li></ul>
  12. 12. Telephone Woes <ul><li>Traditional “corded” phones are more private than cell or cordless phones. </li></ul><ul><li>Always have at least one corded phone in the home </li></ul><ul><li>Cells are traceable </li></ul><ul><li>Hands free and driving </li></ul><ul><li>Phone recording & echos </li></ul><ul><li>Vital info, no echos, corded phone </li></ul>
  13. 13. Cell Phones and Children <ul><li>Instant access to children while away from home </li></ul><ul><li>Safety tool including emergencies </li></ul><ul><li>Internet access & digital cameras </li></ul><ul><li>Bullies by cell phones </li></ul><ul><li>Text messaging or calling gives away the telephone number </li></ul>
  14. 14. Other Technology <ul><li>Data tracking of your children </li></ul><ul><li>Positioning Systems </li></ul><ul><ul><li>Global Positioning Systems </li></ul></ul><ul><ul><li>Mapping systems/data </li></ul></ul><ul><ul><li>Verizon online yellow pages </li></ul></ul><ul><li>Electronic Voting </li></ul><ul><li>Jury Technology </li></ul>
  15. 15. Technology and Domestic Violence <ul><li>Survivors map roads to new lives on the Web by reaching out to shelters, researching restraining orders, and finding housing and employment opportunities. </li></ul><ul><li>Secure computers or public access </li></ul><ul><li>Cell phone and GPS Tracking </li></ul><ul><li>Video and Cyber stalking </li></ul>
  16. 16. Resources <ul><li>National Network to End Domestic Violence: Technology Safety Project </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> ~ housecall </li></ul>
  17. 17. Digital Sisters, Inc. <ul><ul><li>PO Box 76528 </li></ul></ul><ul><ul><li>Washington, DC 20013 </li></ul></ul><ul><ul><li>202.722.6881 </li></ul></ul><ul><ul><li> ~ </li></ul></ul>