SlideShare a Scribd company logo
Lesson 50: Using the Internet Responsibly
    • restricting access to others outside your location or
      against particular types of information
    • recognizing and adhering to policies for use of the
      Internet on other computers
    • understanding what is considered personal information
      when using other computers
    • protecting yourself when conducting e-commerce or
      purchasing online and how to be a responsible user when
      working with computers or being online
    • staying informed of changes in technology



© CCI Learning Solutions Inc.                                 1
Restricting Access
    • May be necessary to restrict access to specific information or
      searching Internet
          – Prevents dangers from entering the network but also ensures Internet
            transactions are limited to business purposes
    • Other companies may monitor employee activity using security
      measures to prevent unauthorized access
    • Several companies provide special software to restrict Internet
      access, or restrict access to certain type of sites
    • Can provide certain level of access control by setting options on
      browser
    • School or business may have set policies regarding access to
      sensitive or important files and folders on network
    • Needs to be balance between ability to find information freely, versus
      avoiding potentially illegal or unethical behavior

© CCI Learning Solutions Inc.                                                      2
Protecting Yourself
    • Who owns original work done on public computer?
          – No absolute rule
          – In general, if you work on something personal during company time on
            company computer, material you created also belongs to company
          – Speak to employer and find out what guidelines or policies applicable
          – Same principles apply to work you do on school computer; check with
            teacher or school administrator prior to beginning any work
    • General laws and rules that govern how Internet information can be
      used at work, home, or school
    • Also consider ethics of what you are doing online
    • If not aware of rules and guidelines in your location, always ask
      someone who can provide the answers or tell you where to find
      information


© CCI Learning Solutions Inc.                                                       3
Protecting Yourself
    • How safe you feel making transactions when buying something online will
      determine how much e-commerce or online shopping you conduct
    • Do not give out credit card information indiscriminately
    • Be sure Web site is of reputable company
    • If company offers deal that seems too good to be true, research that deal
    • If receive e-mail or see advertisement asking for contributions to worthy
      cause or need you to update information, check validity of charity or financial
      institution
    • When registering with sites for more information, use e-mail address from
      web-based program to reduce number of potential future junk messages
    • Do not share any logon IDs or passwords for any Web sites
    • Avoid sharing or trading information with anyone you chat with online
    • Occasionally change profile information and password



© CCI Learning Solutions Inc.                                                           4
Protecting Yourself
    • Infringement on your privacy refers to any personal information about
      you that may be accessible to others online
    • Others can track information whenever you visit Internet sites
      through methods such as online forms, cookies, or temporary
      Internet files
    • Be sure to read privacy statement on Web site
    • Do not fill in any forms unless you really want something from Web
      site
    • Be careful with selecting options that you want to receive e-mail from
      third-party companies on related products or services
    • Set up browser to limit type of information that can be tracked




© CCI Learning Solutions Inc.                                                  5
Protecting Yourself
    • If you begin to receive a lot of junk mail, delete cookies
    • Delete history for sites you visited
    • Set up separate e-mail address for non-personal items, and use alias
      instead of name
    • Do not leave computing device with personal information displayed in
      public area
    • Purchase third-party software that directly addresses privacy issues
    • When on Internet, use common sense
    • Wide range of sources on Internet that discuss and explain privacy
      issues more thoroughly and offer suggestions on how you can
      protect yourself and your family when living online




© CCI Learning Solutions Inc.                                                6
Keeping Up with Technology
    • Important to be aware of what technological changes are and how they may
      affect how you use computer online
    • Not all updates and patches are needed for every software program but
      subscribing to automated notices for updates beneficial
    • Most critical updates to keep up with are updates to your antivirus program
      or other protection software
    • Interesting to read about new technology and how it might benefit you,
      company, or family:
          – Subscribe to online newsletter that deals with technology
          – Purchase or subscribe to printed versions of magazines or periodicals dealing
            with technological advances in computer industry
          – Subscribe to online technology newsletter generated by local university or college
          – Listen to news reports or read technology section of local newspaper to see what
            products may be featured, and read expert opinions about them



© CCI Learning Solutions Inc.                                                                    7
Looking at Personal Responsibilities
    • All share some responsibility as end users and living online
    • Consumables refer to disposable and recyclable items
    • Employ environmentally responsible practices when
      purchasing new computer items or consumables
    • Look into companies in your location who dispose of special
      types of cartridges or non-working computer components,
      including old cellular phones
    • Consider donating older computers to charitable organization
      or individual who may be able to use it
          – Do backup of own data and then clean existing system
    • Share new knowledge with others


© CCI Learning Solutions Inc.                                        8
Review Questions
  1. An example of why you might want to restrict access to certain
     aspects of the Internet could be to:
          a. Control where students or young children can go when
             online
          b. Control where employees can go when online
          c. Prevent downloading of files
          d. Any of the above
          e. a or c
  2. When you create personal documents on a computer at
     school or work, the documents belong to you.
          a. True               b. False


© CCI Learning Solutions Inc.                                       9
Review Questions
  3. In addition to checking with the school administrator as to how
     you may use a school computer, where else could you check?
          a. The school library or librarian
          b. Reference books about computer use
          c. Your parents
          d. Your lawyer
          e. Any of the above
          f.       a or b




© CCI Learning Solutions Inc.                                     10
Review Questions
  4. What are some ways you can protect your privacy while online?
     a. Do not fill in any forms where you may not be interested in
        getting information from the company.
     b. Use an alias when on public forums or blogs.
     c. Do not check the option to receive information from marketing
        partners of the company.
     d. Any of the above
     e. a or b
  5. What are some ways you can share your information with others?
     a. Volunteer to teach someone about computers.
     b. Volunteer to help at a telethon by inputting data such as names
        and donation amounts.
     c. Provide technical support for family members.
     d. Any of the above
     e. a or c
© CCI Learning Solutions Inc.                                             11

More Related Content

What's hot

Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
CTIC Technology Centre
 
Digital citizenship lesson 1
Digital citizenship lesson 1Digital citizenship lesson 1
Digital citizenship lesson 1
jpanotes
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
Ammar Iyyad B. Amran
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Zephyrum
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
HamadRabban
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
 
Mobile training and social media: leverage the power
Mobile training and social media: leverage the powerMobile training and social media: leverage the power
Mobile training and social media: leverage the power
tbirdcymru
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
Tũi Wichets
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Priscila Velázquez
 
E-Safety
E-SafetyE-Safety
Technology
TechnologyTechnology
Technology
Deborah Oronzio
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technology
Ezzy Izzuddin
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
Kevin Murphy
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of Internet
BAS ADITYA SRINIVAS
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & Netiquette
Steve Katz
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
darlinga
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
Alec Couros
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
JOE3210
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
Jose Luis Leon Gonzalez
 

What's hot (20)

Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Digital citizenship lesson 1
Digital citizenship lesson 1Digital citizenship lesson 1
Digital citizenship lesson 1
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
Mobile training and social media: leverage the power
Mobile training and social media: leverage the powerMobile training and social media: leverage the power
Mobile training and social media: leverage the power
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Technology
TechnologyTechnology
Technology
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technology
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of Internet
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & Netiquette
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital Citizenship & Media Literacy
Digital Citizenship & Media LiteracyDigital Citizenship & Media Literacy
Digital Citizenship & Media Literacy
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 

Viewers also liked

The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentation
guest3d7966
 
ROVIN_Ict Magazine
ROVIN_Ict MagazineROVIN_Ict Magazine
ROVIN_Ict Magazine
rovin b. alcazar
 
ROVIN_Ict Magazine
ROVIN_Ict MagazineROVIN_Ict Magazine
ROVIN_Ict Magazine
rovin b. alcazar
 
Networking And Internet
Networking And InternetNetworking And Internet
Networking And Internet
susantai89
 
Wikipedia
WikipediaWikipedia
Wikipedia
Gabe Tompkins
 
Group presentation on network
Group presentation on networkGroup presentation on network
Group presentation on network
Altaf Hussain Makhdoom
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
jstaker
 
Salazar Group Magazine
Salazar  Group MagazineSalazar  Group Magazine
Salazar Group Magazine
State University
 
Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013
Dawn Miller
 
L46 slides
L46 slidesL46 slides
L46 slides
sgibson28
 
Как просыпается весна в Молдове
Как просыпается весна в МолдовеКак просыпается весна в Молдове
Как просыпается весна в Молдове
Lilia Pașa
 
School technology school_interview word
School technology school_interview wordSchool technology school_interview word
School technology school_interview word
laurengilbert34
 
L45 slides
L45 slidesL45 slides
L45 slides
sgibson28
 
Цветут сады в Молдове
Цветут сады в МолдовеЦветут сады в Молдове
Цветут сады в Молдове
Lilia Pașa
 
L48 slides
L48 slidesL48 slides
L48 slides
sgibson28
 
L47 slides
L47 slidesL47 slides
L47 slides
sgibson28
 
L49 slides
L49 slidesL49 slides
L49 slides
sgibson28
 
L44 slides
L44 slidesL44 slides
L44 slides
sgibson28
 
Рубцов Николай Михайлович
Рубцов  Николай МихайловичРубцов  Николай Михайлович
Рубцов Николай Михайлович
TatynaO
 
Preliminary Story board
Preliminary Story boardPreliminary Story board
Preliminary Story board
1davidjordan1
 

Viewers also liked (20)

The Internet Presentation
The Internet PresentationThe Internet Presentation
The Internet Presentation
 
ROVIN_Ict Magazine
ROVIN_Ict MagazineROVIN_Ict Magazine
ROVIN_Ict Magazine
 
ROVIN_Ict Magazine
ROVIN_Ict MagazineROVIN_Ict Magazine
ROVIN_Ict Magazine
 
Networking And Internet
Networking And InternetNetworking And Internet
Networking And Internet
 
Wikipedia
WikipediaWikipedia
Wikipedia
 
Group presentation on network
Group presentation on networkGroup presentation on network
Group presentation on network
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 
Salazar Group Magazine
Salazar  Group MagazineSalazar  Group Magazine
Salazar Group Magazine
 
Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013Designs by dawn brochure 5 15-2013
Designs by dawn brochure 5 15-2013
 
L46 slides
L46 slidesL46 slides
L46 slides
 
Как просыпается весна в Молдове
Как просыпается весна в МолдовеКак просыпается весна в Молдове
Как просыпается весна в Молдове
 
School technology school_interview word
School technology school_interview wordSchool technology school_interview word
School technology school_interview word
 
L45 slides
L45 slidesL45 slides
L45 slides
 
Цветут сады в Молдове
Цветут сады в МолдовеЦветут сады в Молдове
Цветут сады в Молдове
 
L48 slides
L48 slidesL48 slides
L48 slides
 
L47 slides
L47 slidesL47 slides
L47 slides
 
L49 slides
L49 slidesL49 slides
L49 slides
 
L44 slides
L44 slidesL44 slides
L44 slides
 
Рубцов Николай Михайлович
Рубцов  Николай МихайловичРубцов  Николай Михайлович
Рубцов Николай Михайлович
 
Preliminary Story board
Preliminary Story boardPreliminary Story board
Preliminary Story board
 

Similar to L50 slides

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
gfair3
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
Rolly Franco
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
Charina Mostierra
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
Daniel Ayala
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
MyCase Legal Case and Practice Management Software
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
Darren McManus
 
MS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentMS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics Assignment
Darren McManus
 
L06 slides
L06 slidesL06 slides
L06 slides
Ann Bentley
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
 
BSAD 372 SPRING 2017 CH 7
BSAD 372 SPRING 2017 CH 7BSAD 372 SPRING 2017 CH 7
BSAD 372 SPRING 2017 CH 7
Janice Robinson
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
DMA Cookies update
DMA Cookies updateDMA Cookies update
DMA Cookies update
Rachel Aldighieri
 
L07 slides
L07 slidesL07 slides
L07 slides
Ann Bentley
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 

Similar to L50 slides (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
MS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentMS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics Assignment
 
L06 slides
L06 slidesL06 slides
L06 slides
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
BSAD 372 SPRING 2017 CH 7
BSAD 372 SPRING 2017 CH 7BSAD 372 SPRING 2017 CH 7
BSAD 372 SPRING 2017 CH 7
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
DMA Cookies update
DMA Cookies updateDMA Cookies update
DMA Cookies update
 
L07 slides
L07 slidesL07 slides
L07 slides
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 

L50 slides

  • 1. Lesson 50: Using the Internet Responsibly • restricting access to others outside your location or against particular types of information • recognizing and adhering to policies for use of the Internet on other computers • understanding what is considered personal information when using other computers • protecting yourself when conducting e-commerce or purchasing online and how to be a responsible user when working with computers or being online • staying informed of changes in technology © CCI Learning Solutions Inc. 1
  • 2. Restricting Access • May be necessary to restrict access to specific information or searching Internet – Prevents dangers from entering the network but also ensures Internet transactions are limited to business purposes • Other companies may monitor employee activity using security measures to prevent unauthorized access • Several companies provide special software to restrict Internet access, or restrict access to certain type of sites • Can provide certain level of access control by setting options on browser • School or business may have set policies regarding access to sensitive or important files and folders on network • Needs to be balance between ability to find information freely, versus avoiding potentially illegal or unethical behavior © CCI Learning Solutions Inc. 2
  • 3. Protecting Yourself • Who owns original work done on public computer? – No absolute rule – In general, if you work on something personal during company time on company computer, material you created also belongs to company – Speak to employer and find out what guidelines or policies applicable – Same principles apply to work you do on school computer; check with teacher or school administrator prior to beginning any work • General laws and rules that govern how Internet information can be used at work, home, or school • Also consider ethics of what you are doing online • If not aware of rules and guidelines in your location, always ask someone who can provide the answers or tell you where to find information © CCI Learning Solutions Inc. 3
  • 4. Protecting Yourself • How safe you feel making transactions when buying something online will determine how much e-commerce or online shopping you conduct • Do not give out credit card information indiscriminately • Be sure Web site is of reputable company • If company offers deal that seems too good to be true, research that deal • If receive e-mail or see advertisement asking for contributions to worthy cause or need you to update information, check validity of charity or financial institution • When registering with sites for more information, use e-mail address from web-based program to reduce number of potential future junk messages • Do not share any logon IDs or passwords for any Web sites • Avoid sharing or trading information with anyone you chat with online • Occasionally change profile information and password © CCI Learning Solutions Inc. 4
  • 5. Protecting Yourself • Infringement on your privacy refers to any personal information about you that may be accessible to others online • Others can track information whenever you visit Internet sites through methods such as online forms, cookies, or temporary Internet files • Be sure to read privacy statement on Web site • Do not fill in any forms unless you really want something from Web site • Be careful with selecting options that you want to receive e-mail from third-party companies on related products or services • Set up browser to limit type of information that can be tracked © CCI Learning Solutions Inc. 5
  • 6. Protecting Yourself • If you begin to receive a lot of junk mail, delete cookies • Delete history for sites you visited • Set up separate e-mail address for non-personal items, and use alias instead of name • Do not leave computing device with personal information displayed in public area • Purchase third-party software that directly addresses privacy issues • When on Internet, use common sense • Wide range of sources on Internet that discuss and explain privacy issues more thoroughly and offer suggestions on how you can protect yourself and your family when living online © CCI Learning Solutions Inc. 6
  • 7. Keeping Up with Technology • Important to be aware of what technological changes are and how they may affect how you use computer online • Not all updates and patches are needed for every software program but subscribing to automated notices for updates beneficial • Most critical updates to keep up with are updates to your antivirus program or other protection software • Interesting to read about new technology and how it might benefit you, company, or family: – Subscribe to online newsletter that deals with technology – Purchase or subscribe to printed versions of magazines or periodicals dealing with technological advances in computer industry – Subscribe to online technology newsletter generated by local university or college – Listen to news reports or read technology section of local newspaper to see what products may be featured, and read expert opinions about them © CCI Learning Solutions Inc. 7
  • 8. Looking at Personal Responsibilities • All share some responsibility as end users and living online • Consumables refer to disposable and recyclable items • Employ environmentally responsible practices when purchasing new computer items or consumables • Look into companies in your location who dispose of special types of cartridges or non-working computer components, including old cellular phones • Consider donating older computers to charitable organization or individual who may be able to use it – Do backup of own data and then clean existing system • Share new knowledge with others © CCI Learning Solutions Inc. 8
  • 9. Review Questions 1. An example of why you might want to restrict access to certain aspects of the Internet could be to: a. Control where students or young children can go when online b. Control where employees can go when online c. Prevent downloading of files d. Any of the above e. a or c 2. When you create personal documents on a computer at school or work, the documents belong to you. a. True b. False © CCI Learning Solutions Inc. 9
  • 10. Review Questions 3. In addition to checking with the school administrator as to how you may use a school computer, where else could you check? a. The school library or librarian b. Reference books about computer use c. Your parents d. Your lawyer e. Any of the above f. a or b © CCI Learning Solutions Inc. 10
  • 11. Review Questions 4. What are some ways you can protect your privacy while online? a. Do not fill in any forms where you may not be interested in getting information from the company. b. Use an alias when on public forums or blogs. c. Do not check the option to receive information from marketing partners of the company. d. Any of the above e. a or b 5. What are some ways you can share your information with others? a. Volunteer to teach someone about computers. b. Volunteer to help at a telethon by inputting data such as names and donation amounts. c. Provide technical support for family members. d. Any of the above e. a or c © CCI Learning Solutions Inc. 11

Editor's Notes

  1. Pg477As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  2. Pg477As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.
  3. Pg477As time permits, go over these questions with the class to ensure they have a good grasp of the concepts learned in this lesson.Answers are found on the CCI microsite (ic3.ccilearning.com); you must be logged in as an instructor. Alternatively, if you received the instructor resources in electronic form, they will be located in the root folder.On completion of the Review Questions, have students navigate to the CCI microsite to begin the additional review there.