SlideShare a Scribd company logo
HOW TO STAY SAFE ONLINE
Liquidation
Internet security risks
presentations
INTRODUCTION
In this presentation I am going to talk about How to stay safe online
• How to protect yourself from cyber bullying or hacking
They are 4 different types of how to stay safe online:
• Data protection act (1998)
• Computer misuse act (1990)
• Copyright designs and patents act (1988)
DATA PROTECTION ACT (1998)
Data protection laws are exist for making a balance between the rights of individual
privacy of people
During the second half of the 20th century , government and businesses started to use
the computers to get more information about customers and stuff
For example:
• Names
• Addresses
• Credit histories
COMPUTER MISUSE ACT (1990)
• This was made by Parliament and made three new rules:
• Logging on someone’s computer without permission or looking at someone else's
files.
• Hacking the bank's computer and wanting to increase the money in your account.
or actually changing the money in an account.
• writing a virus to destroy someone else's data
COPYRIGHT DESIGNS AND PATENTS ACT (1988)
• Copyright designs and patents act are there to prevent other people from making a
profit by stealing other people’s ideas .
• The biggest and most recent example is Samsung did copy iPhone features. Its
more of the design and interface that has been copied, And Samsung has been
using the same design with all its phones till date.
TIPS STAYING SAFE ONLINE
1)Don’t post any personal information online – like your address, email address or mobile number.
2)Think carefully before posting pictures or videos of yourself
3)Never give out your passwords
5)Don’t befriend people you don’t know
6)Don’t meet up with people you’ve met online, not everyone online is who they say they are
10)If you see something online that makes you feel uncomfortable, unsafe or worried :
LEAVE THE WEBSITE
TREATS TO USER SAFETY
• Virus attack:
A computer virus is a programme, or piece of code which can harm your machine. A
virus can spread to other computers and also attack other programmes on your
computer. (By attack I mean change or delete files.)
• Hacking : hacker is someone who seeks and weaknesses in a computer system or
computer network and this process called hacking
• Theft: the act of stealing the wrongful taking and carrying away of personal goods
or property of another
• Physical injury from spending long hours on the computer
SAFETY PRECAUTIONS
• Install up to date anti-virus
• Do not open attachments from unknown sources
• Use a appropriate chairs and desk
• Minimise hours spend online

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
ProjectsByJen.com
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Moumita Chatterjee
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
kgoldberg01
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 

Viewers also liked

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
Dizeo
 
Respect
RespectRespect
Respect
myacanaday
 
What things could you recycle 11.1交
What  things could you recycle 11.1交What  things could you recycle 11.1交
What things could you recycle 11.1交
Jennifer Chen
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Recycle, Reuse and Reduce
Recycle, Reuse and ReduceRecycle, Reuse and Reduce
Recycle, Reuse and Reduce
Sister T.A.
 
Recycling powerpoint
Recycling powerpointRecycling powerpoint
Recycling powerpointkramertw
 
recycle reduce reuse
recycle reduce reuserecycle reduce reuse
recycle reduce reuseSidra Afzal
 
Recycling Of Wastes
Recycling Of WastesRecycling Of Wastes
Recycling Of Wastes
skhangc
 
Recycling presentation
Recycling presentationRecycling presentation
Recycling presentation
anuladak
 
Recycling powerpoint
Recycling powerpointRecycling powerpoint
Recycling powerpoint
hcenglish
 
What is Recycling: 7 Benefits of Recycling
What is Recycling: 7 Benefits of RecyclingWhat is Recycling: 7 Benefits of Recycling
What is Recycling: 7 Benefits of Recycling
Pacebutler
 
Reduce, Reuse and Recycle (3R)
Reduce, Reuse and Recycle (3R)Reduce, Reuse and Recycle (3R)
Reduce, Reuse and Recycle (3R)rebina
 

Viewers also liked (13)

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Respect
RespectRespect
Respect
 
What things could you recycle 11.1交
What  things could you recycle 11.1交What  things could you recycle 11.1交
What things could you recycle 11.1交
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Recycle, Reuse and Reduce
Recycle, Reuse and ReduceRecycle, Reuse and Reduce
Recycle, Reuse and Reduce
 
Recycling powerpoint
Recycling powerpointRecycling powerpoint
Recycling powerpoint
 
recycle reduce reuse
recycle reduce reuserecycle reduce reuse
recycle reduce reuse
 
Recycling Of Wastes
Recycling Of WastesRecycling Of Wastes
Recycling Of Wastes
 
Recycling presentation
Recycling presentationRecycling presentation
Recycling presentation
 
Recycling powerpoint
Recycling powerpointRecycling powerpoint
Recycling powerpoint
 
My house-power point
My house-power pointMy house-power point
My house-power point
 
What is Recycling: 7 Benefits of Recycling
What is Recycling: 7 Benefits of RecyclingWhat is Recycling: 7 Benefits of Recycling
What is Recycling: 7 Benefits of Recycling
 
Reduce, Reuse and Recycle (3R)
Reduce, Reuse and Recycle (3R)Reduce, Reuse and Recycle (3R)
Reduce, Reuse and Recycle (3R)
 

Similar to How to stay safe online

Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
priya785691
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
Awais Haider
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
ssuser84f16f
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 

Similar to How to stay safe online (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hamza
HamzaHamza
Hamza
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 

Recently uploaded (16)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 

How to stay safe online

  • 1. HOW TO STAY SAFE ONLINE Liquidation Internet security risks presentations
  • 2. INTRODUCTION In this presentation I am going to talk about How to stay safe online • How to protect yourself from cyber bullying or hacking They are 4 different types of how to stay safe online: • Data protection act (1998) • Computer misuse act (1990) • Copyright designs and patents act (1988)
  • 3. DATA PROTECTION ACT (1998) Data protection laws are exist for making a balance between the rights of individual privacy of people During the second half of the 20th century , government and businesses started to use the computers to get more information about customers and stuff For example: • Names • Addresses • Credit histories
  • 4. COMPUTER MISUSE ACT (1990) • This was made by Parliament and made three new rules: • Logging on someone’s computer without permission or looking at someone else's files. • Hacking the bank's computer and wanting to increase the money in your account. or actually changing the money in an account. • writing a virus to destroy someone else's data
  • 5. COPYRIGHT DESIGNS AND PATENTS ACT (1988) • Copyright designs and patents act are there to prevent other people from making a profit by stealing other people’s ideas . • The biggest and most recent example is Samsung did copy iPhone features. Its more of the design and interface that has been copied, And Samsung has been using the same design with all its phones till date.
  • 6. TIPS STAYING SAFE ONLINE 1)Don’t post any personal information online – like your address, email address or mobile number. 2)Think carefully before posting pictures or videos of yourself 3)Never give out your passwords 5)Don’t befriend people you don’t know 6)Don’t meet up with people you’ve met online, not everyone online is who they say they are 10)If you see something online that makes you feel uncomfortable, unsafe or worried : LEAVE THE WEBSITE
  • 7. TREATS TO USER SAFETY • Virus attack: A computer virus is a programme, or piece of code which can harm your machine. A virus can spread to other computers and also attack other programmes on your computer. (By attack I mean change or delete files.) • Hacking : hacker is someone who seeks and weaknesses in a computer system or computer network and this process called hacking • Theft: the act of stealing the wrongful taking and carrying away of personal goods or property of another • Physical injury from spending long hours on the computer
  • 8. SAFETY PRECAUTIONS • Install up to date anti-virus • Do not open attachments from unknown sources • Use a appropriate chairs and desk • Minimise hours spend online