SlideShare a Scribd company logo
How to stay safe online
Emarl Hannah Al-Jaradi
Data protection act 1998
The Data Protection Act controls how your personal information is used by
organisations, businesses or the government.
There is stronger legal protection for more sensitive information, such as:
 ethnic background
 political opinions
 religious beliefs
 health
 sexual health
 criminal records
Everyone responsible for using data has to follow rules called ‘data protection
principles’. They must make sure the information is:
 used fairly
 used for limited, specifically stated purposes
 kept for no longer than is absolutely necessary
 handled according to people’s data protection rights
 kept safe and secure
Computer misuse act
 Unauthorised access to a computer
 Unauthorised access to the internet
 Unauthorised access with intent to commit or facilitate a crime
 Email and chat room abuses
 Hacking
Copyright act
 Copying and distributing copyrighted software, music and film
 When you buy software, for example, copyright law forbids you from:
 giving a copy to a friend
 making a copy and then selling it
 using the software on a network (unless the licence allows it)
 renting the software without the permission of the copyright holder
Healthy and safety act
 To secure the health, safety and welfare of persons at work.
 To protect persons other than persons at work against risks to health or safety
arising out of or in connection with the activities of persons at work.
 To control the keeping and use of explosive or highly flammable or otherwise
dangerous substances, and generally preventing the unlawful acquisition,
possession and use of such substances.
The risks of using the internet
Viruses
computer viruses infect your programs and files, change the way your computer
operates or stop it from working altogether.
The precautions you can take
Use up to date anti virus
Keep your operating system up to date
Don’t open an email attachment unless you are expecting it
Risks of Hackers
 Get your usernames and passwords
 Steal your money and open credit card and bank accounts in your name
 Request new account Pins or additional credit cards
 Make purchases
 Use and abuse your Social Security number
 Sell your information to other parties who will use it for illicit or illegal purposes
The precautions you can take
Be aware of public wifi
Look after your passwords
Fraud and Theft
 Fraud has the intention of hiding the criminal act of stealing, while theft does not.
 Thieves know they can’t hide the act so they don’t make much effort to hide it,
while the person who is doing fraud makes an extra effort to hide the act.
 The precautions you can take
 Check your bank statements
 Use a strong password
 Don’t give away your pin code
 Try not to keep financial information on your laptop
Risk of injury if you spend long hours on
the computer
 Eye strain.
 Obesity
 Muscle and joint problems
 Back and neck pain
 Headaches

More Related Content

What's hot

bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhi
jayine group
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
missstevenson01
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Dilip Prajapati
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
Business law
Business lawBusiness law
Business law
Eswaranking
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
pronab Kurmi
 
Cybercrime
CybercrimeCybercrime
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Uday Bhaskarwar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Deepak Bhojwani
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
vjom
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
 
Cyber crime
Cyber crimeCyber crime
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
KrishnaVashistha4
 
APT 510 Assignment 1
APT 510 Assignment 1APT 510 Assignment 1
APT 510 Assignment 1
Jordan Amerson
 
Phishing demo
Phishing demoPhishing demo
Cyber crime
Cyber crimeCyber crime
Cyber crime
Zeeshan Masood S
 

What's hot (20)

bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Business law
Business lawBusiness law
Business law
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
APT 510 Assignment 1
APT 510 Assignment 1APT 510 Assignment 1
APT 510 Assignment 1
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to How to stay safe online

2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
aaberra
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Adeel Rasheed
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pardeep Kumar
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
devashishicai
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
ARYAS87
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
Module vi mis
Module vi misModule vi mis
Module vi mis
Arnav Chowdhury
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
Syangba132
 

Similar to How to stay safe online (20)

2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 

Recently uploaded

Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 

Recently uploaded (20)

Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 

How to stay safe online

  • 1. How to stay safe online Emarl Hannah Al-Jaradi
  • 2. Data protection act 1998 The Data Protection Act controls how your personal information is used by organisations, businesses or the government. There is stronger legal protection for more sensitive information, such as:  ethnic background  political opinions  religious beliefs  health  sexual health  criminal records
  • 3. Everyone responsible for using data has to follow rules called ‘data protection principles’. They must make sure the information is:  used fairly  used for limited, specifically stated purposes  kept for no longer than is absolutely necessary  handled according to people’s data protection rights  kept safe and secure
  • 4. Computer misuse act  Unauthorised access to a computer  Unauthorised access to the internet  Unauthorised access with intent to commit or facilitate a crime  Email and chat room abuses  Hacking
  • 5. Copyright act  Copying and distributing copyrighted software, music and film  When you buy software, for example, copyright law forbids you from:  giving a copy to a friend  making a copy and then selling it  using the software on a network (unless the licence allows it)  renting the software without the permission of the copyright holder
  • 6. Healthy and safety act  To secure the health, safety and welfare of persons at work.  To protect persons other than persons at work against risks to health or safety arising out of or in connection with the activities of persons at work.  To control the keeping and use of explosive or highly flammable or otherwise dangerous substances, and generally preventing the unlawful acquisition, possession and use of such substances.
  • 7. The risks of using the internet Viruses computer viruses infect your programs and files, change the way your computer operates or stop it from working altogether. The precautions you can take Use up to date anti virus Keep your operating system up to date Don’t open an email attachment unless you are expecting it
  • 8. Risks of Hackers  Get your usernames and passwords  Steal your money and open credit card and bank accounts in your name  Request new account Pins or additional credit cards  Make purchases  Use and abuse your Social Security number  Sell your information to other parties who will use it for illicit or illegal purposes The precautions you can take Be aware of public wifi Look after your passwords
  • 9. Fraud and Theft  Fraud has the intention of hiding the criminal act of stealing, while theft does not.  Thieves know they can’t hide the act so they don’t make much effort to hide it, while the person who is doing fraud makes an extra effort to hide the act.  The precautions you can take  Check your bank statements  Use a strong password  Don’t give away your pin code  Try not to keep financial information on your laptop
  • 10. Risk of injury if you spend long hours on the computer  Eye strain.  Obesity  Muscle and joint problems  Back and neck pain  Headaches