The DON released guidance in June 2010 regarding unofficial internet posts by DON personnel. The guidance applies to any personal comments, photos, videos or graphics posted online by DON personnel in a non-official capacity. It encourages responsible engagement online about Navy and Marine Corps topics while advising personnel to avoid posting classified information, follow all applicable laws and regulations, and use good judgment in their online activities. The guidance provides tips on privacy, security, and legal issues for DON personnel using social media.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while reminding personnel to adhere to federal law, avoid classified information, and not imply endorsement. Personnel are personally responsible for content and advised to use good judgment in discussions.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
hello world: the 2010 web and the enterpriseDenise Howell
This document discusses how social media has evolved beyond just a personal communication tool and is now widely used for commercial, business, educational, and other purposes. It notes that distinguishing between different contexts and arenas for social media use can be difficult. It provides advice on appropriate social media use and potential legal issues to consider, such as security, identity theft, intellectual property protection, and differing legal standards globally. It emphasizes the importance of having simple social media policies and training in place, as well as being prepared for potential crises.
emerging technologies for the ass'n of legal administratorsDenise Howell
The document discusses the changing nature of social media and its implications. It notes that distinctions between personal, educational, and commercial use of social media are breaking down. It warns that one should be careful about posting confidential information or engaging in criminal behavior online. It also addresses issues like security, identity theft, intellectual property, defamation, and differing legal standards globally. The presentation suggests having clear policies on social media use and being prepared to respond quickly to any crises.
Social web refers to how people communicate and connect online through social media sites like Facebook, Twitter, YouTube, Myspace, Gmail, Google, and Yahoo mail. Different social media sites allow sharing of different types of content such as photos, videos, messages, and email. Using social media safely depends on how private or public users make their information and what they share about themselves.
This is the PPT I gave in Charlotte. Many people have asked me for it. I do hope the videos uploaded also. If not, I will try to re-do those. Warning: this presentation uses copyright protected materials used under the Multimedia guidelines and fair use exemptions of the U.S Copyright law. Further use is prohibited.
The document discusses the differences between the author's public and private selves. The author's private self is described as distant, cold, and angry looking, while their public self is all business and analytical. Some similarities between the two selves include caring about responsibilities and communicating effectively. The author aims to be more approachable publicly by smiling more, loosening up, and engaging others in more meaningful conversations.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while reminding personnel to adhere to federal law, avoid classified information, and not imply endorsement. Personnel are personally responsible for content and advised to use good judgment in discussions.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
hello world: the 2010 web and the enterpriseDenise Howell
This document discusses how social media has evolved beyond just a personal communication tool and is now widely used for commercial, business, educational, and other purposes. It notes that distinguishing between different contexts and arenas for social media use can be difficult. It provides advice on appropriate social media use and potential legal issues to consider, such as security, identity theft, intellectual property protection, and differing legal standards globally. It emphasizes the importance of having simple social media policies and training in place, as well as being prepared for potential crises.
emerging technologies for the ass'n of legal administratorsDenise Howell
The document discusses the changing nature of social media and its implications. It notes that distinctions between personal, educational, and commercial use of social media are breaking down. It warns that one should be careful about posting confidential information or engaging in criminal behavior online. It also addresses issues like security, identity theft, intellectual property, defamation, and differing legal standards globally. The presentation suggests having clear policies on social media use and being prepared to respond quickly to any crises.
Social web refers to how people communicate and connect online through social media sites like Facebook, Twitter, YouTube, Myspace, Gmail, Google, and Yahoo mail. Different social media sites allow sharing of different types of content such as photos, videos, messages, and email. Using social media safely depends on how private or public users make their information and what they share about themselves.
This is the PPT I gave in Charlotte. Many people have asked me for it. I do hope the videos uploaded also. If not, I will try to re-do those. Warning: this presentation uses copyright protected materials used under the Multimedia guidelines and fair use exemptions of the U.S Copyright law. Further use is prohibited.
The document discusses the differences between the author's public and private selves. The author's private self is described as distant, cold, and angry looking, while their public self is all business and analytical. Some similarities between the two selves include caring about responsibilities and communicating effectively. The author aims to be more approachable publicly by smiling more, loosening up, and engaging others in more meaningful conversations.
A presentation made to the 2008 New Media Institute fellows to help content makers understand social aspects of the web and how to approach user generated content.
Ten 'noes' from social networks that changed communications and journalismBorja Ventura
The document discusses how social networks have changed journalism in every step of the process. It explores how each traditional step - having an idea, asking your boss, looking for information - has been impacted. Social networks have allowed people to set the agenda and determine what is important based on what is spreading online. They have eliminated gatekeepers, and looking for trends on social media is now a key way journalists find stories and issues. Overall, social networks have transformed journalism by introducing new criteria around audience interest and how content spreads.
The document discusses cyber bullying, including defining it as bullying that occurs over digital devices. It then lists the most common places cyber bullying occurs such as social media and text messages. The document also discusses the effects of cyber bullying and how to prevent it, including talking to children and setting rules. Finally, it outlines five types of cyberbullying like harassment, flaming, and masquerading.
Impact of social networking sites- advantages and disadvantagesNi
Social networking sites allow users to create profiles and form relationships with other users. They provide advantages like fast communication, sharing interests and information with friends. However, they also have disadvantages such as lacking emotional connection, decreasing face-to-face skills, and reducing family closeness. Social networking sites also enable users to communicate directly but can facilitate laziness and create distractions.
This document discusses social networking and communication literacy. It explains that social networking sites allow for easy and timely connection between people to exchange and share information. Socialization is defined as the process of acquiring social skills and norms to integrate into a group. Offline socialization involves conversing, smiling, listening and keeping an open body language, while online socialization requires being careful with words and content. It also discusses how people curate their identity and self-representation through the photos and profiles they choose to share online, and warns that a digital footprint traces all online activity, impacting reputation.
The document discusses cyber bullying, defining it as bullying that occurs through digital devices. It outlines the most common places cyber bullying occurs, such as social media, texts, and email. The document also discusses how to prevent cyber bullying by educating children and setting rules, and describes the effects of cyber bullying like anxiety and depression. Finally, it identifies five types of cyberbullying: harassment, flaming, exclusion, outing, and masquerading.
Facebook is a social networking website launched in 2004 by Mark Zuckerberg and his Harvard classmates. It allows users to chat, share photos and videos, play games, and connect through groups and events. The document provides tips for staying safe on Facebook, such as keeping private information private, using strong passwords, and adjusting privacy settings. It also lists additional resources for internet safety. Facebook allows free communication between friends and for finding people with shared interests, though it should be used in moderation and for positive purposes only.
Social networking websites have evolved significantly since early sites in the 1990s. Modern sites allow users to connect through sharing content, messages, and activities. While social media makes communication easier and allows networking on a large scale, there are also criticisms such as privacy and security issues. Successful founders like Mark Zuckerberg created hugely popular sites like Facebook and showed how social media can be profitable. However, overuse of social media may encourage antisocial behaviors and vague assumptions about others. Overall social networking provides benefits of easy connections but also risks if not used carefully.
Provided by SchoolTechPolicies.com:
This presentation was provided for elementary students to help them understand the need for appropriate online behaviors.
Delicious pinterest and other social bookmarking and news toolsUWSMC2012
This document provides information on social bookmarking and social news tools, including Delicious, Digg, Reddit, Pinterest, and StumbleUpon. It includes a table comparing the sites on key metrics like audience demographics, year launched, Alexa global and US traffic ranks, pros and cons. It also defines what an Alexa traffic rank measures and how it is calculated based on page views and users over a rolling three month period.
The document provides guidance for Department of Navy (DON) personnel regarding their use of social media and unofficial internet posts. It encourages DON personnel to responsibly engage online about Navy and Marine Corps topics, while reminding them to protect classified/sensitive information, respect privacy, and comply with all applicable laws and regulations. Personnel are personally responsible for any content they post and should make clear if expressing personal rather than official views.
Don guidance for_unofficial_posts_-_explainedBarbara Kessler
The document provides guidance for Department of Navy (DON) personnel regarding their use of social media and unofficial internet posts. It encourages DON personnel to responsibly engage online about Navy and Marine Corps topics, while reminding them to protect classified/sensitive information, respect privacy, and comply with all applicable laws and regulations. Personnel are personally responsible for any content they post and should make clear if expressing personal rather than official views.
This document provides information and guidance about safe and responsible use of social media for military personnel. It discusses Department of Defense social media policies, how to represent the military professionally online, and risks like identity theft and security breaches. Specific tips are given around privacy settings, avoiding sharing sensitive personal details or locations. Resources and contacts are provided to help military members learn about social media best practices.
The document provides best practices guidelines for Army personnel engaging in social media. It discusses policies around social media use and outlines tactics for implementing platforms like blogs, Facebook, and Twitter. The key points are:
1) Army personnel must maintain professional conduct online and remember policies around operations security and the Uniform Code of Military Justice.
2) Effective social media use requires planning, resources to maintain sites, and engagement with audiences.
3) Platforms like blogs and Facebook should present an official perspective and engage communities through content and comments.
4) Personnel must identify their Army affiliation online and make their commander aware of any personal blogs or profiles. Operations security and policies still apply to personal sites.
The document provides guidance for Coast Guard personnel on the responsible use of social media both personally and professionally. It outlines principles for official Coast Guard social media use, including only posting approved information, building an engaged community, and ensuring accessibility. It also provides guidance for personal social media use, stressing the need to follow all laws and policies, practice restraint, and realize that nothing posted is truly private or anonymous. A decision tree is included to help determine if a photo or video can be posted online.
Navy personnel are encouraged to use social media responsibly while being aware of potential risks. The document provides guidance on safe social media use, noting that information posted online can be seen by everyone and remain forever. It lists ways to mitigate risks like using privacy settings, not discussing sensitive information, and avoiding sharing personally identifiable information. Statistics show that 75% of Sailors use social media and there are over 500 official Navy social media presences.
This document discusses operational security (OPSEC) considerations for using social media. It provides tips for safe social media use such as being careful about what personal information is posted, using privacy settings, disabling geotagging, and being aware that even seemingly harmless posts can potentially put soldiers, families and missions at risk if they provide too many details to adversaries. Specific concerns are outlined for units, families, family readiness groups and children using social media. The document emphasizes that OPSEC should always be the top priority for anyone in the Army community using social media.
The document provides best practices for using social media platforms like Facebook, blogs, and Twitter for Army public affairs and engagement. It outlines guidelines for setting up official profiles and pages, including using .mil domains when possible and maintaining OPSEC. The document advises having a strategic plan, committing resources to maintain a presence, and being willing to engage with audiences. It also provides examples of effective military leaders' social media pages.
This document provides guidance on using social media for the Air Force. It includes tips for leaders, Airmen, families and an introduction to common social media platforms and trends. Leaders are encouraged to use social media to connect with audiences and share stories. Airmen should represent core values and be cautious of sensitive information. Families can use social media to support Airmen but should avoid oversharing details. The document also covers hashtags, geotagging and telling the Air Force story on social media.
This document provides guidance on using social media for the Air Force. It discusses social media use for Air Force leaders, Airmen, and families. It also covers common social media platforms and tips, including how to use hashtags to tell the Air Force story. The document encourages sharing experiences as an Airman or family member while maintaining security and following Air Force policies.
A presentation made to the 2008 New Media Institute fellows to help content makers understand social aspects of the web and how to approach user generated content.
Ten 'noes' from social networks that changed communications and journalismBorja Ventura
The document discusses how social networks have changed journalism in every step of the process. It explores how each traditional step - having an idea, asking your boss, looking for information - has been impacted. Social networks have allowed people to set the agenda and determine what is important based on what is spreading online. They have eliminated gatekeepers, and looking for trends on social media is now a key way journalists find stories and issues. Overall, social networks have transformed journalism by introducing new criteria around audience interest and how content spreads.
The document discusses cyber bullying, including defining it as bullying that occurs over digital devices. It then lists the most common places cyber bullying occurs such as social media and text messages. The document also discusses the effects of cyber bullying and how to prevent it, including talking to children and setting rules. Finally, it outlines five types of cyberbullying like harassment, flaming, and masquerading.
Impact of social networking sites- advantages and disadvantagesNi
Social networking sites allow users to create profiles and form relationships with other users. They provide advantages like fast communication, sharing interests and information with friends. However, they also have disadvantages such as lacking emotional connection, decreasing face-to-face skills, and reducing family closeness. Social networking sites also enable users to communicate directly but can facilitate laziness and create distractions.
This document discusses social networking and communication literacy. It explains that social networking sites allow for easy and timely connection between people to exchange and share information. Socialization is defined as the process of acquiring social skills and norms to integrate into a group. Offline socialization involves conversing, smiling, listening and keeping an open body language, while online socialization requires being careful with words and content. It also discusses how people curate their identity and self-representation through the photos and profiles they choose to share online, and warns that a digital footprint traces all online activity, impacting reputation.
The document discusses cyber bullying, defining it as bullying that occurs through digital devices. It outlines the most common places cyber bullying occurs, such as social media, texts, and email. The document also discusses how to prevent cyber bullying by educating children and setting rules, and describes the effects of cyber bullying like anxiety and depression. Finally, it identifies five types of cyberbullying: harassment, flaming, exclusion, outing, and masquerading.
Facebook is a social networking website launched in 2004 by Mark Zuckerberg and his Harvard classmates. It allows users to chat, share photos and videos, play games, and connect through groups and events. The document provides tips for staying safe on Facebook, such as keeping private information private, using strong passwords, and adjusting privacy settings. It also lists additional resources for internet safety. Facebook allows free communication between friends and for finding people with shared interests, though it should be used in moderation and for positive purposes only.
Social networking websites have evolved significantly since early sites in the 1990s. Modern sites allow users to connect through sharing content, messages, and activities. While social media makes communication easier and allows networking on a large scale, there are also criticisms such as privacy and security issues. Successful founders like Mark Zuckerberg created hugely popular sites like Facebook and showed how social media can be profitable. However, overuse of social media may encourage antisocial behaviors and vague assumptions about others. Overall social networking provides benefits of easy connections but also risks if not used carefully.
Provided by SchoolTechPolicies.com:
This presentation was provided for elementary students to help them understand the need for appropriate online behaviors.
Delicious pinterest and other social bookmarking and news toolsUWSMC2012
This document provides information on social bookmarking and social news tools, including Delicious, Digg, Reddit, Pinterest, and StumbleUpon. It includes a table comparing the sites on key metrics like audience demographics, year launched, Alexa global and US traffic ranks, pros and cons. It also defines what an Alexa traffic rank measures and how it is calculated based on page views and users over a rolling three month period.
The document provides guidance for Department of Navy (DON) personnel regarding their use of social media and unofficial internet posts. It encourages DON personnel to responsibly engage online about Navy and Marine Corps topics, while reminding them to protect classified/sensitive information, respect privacy, and comply with all applicable laws and regulations. Personnel are personally responsible for any content they post and should make clear if expressing personal rather than official views.
Don guidance for_unofficial_posts_-_explainedBarbara Kessler
The document provides guidance for Department of Navy (DON) personnel regarding their use of social media and unofficial internet posts. It encourages DON personnel to responsibly engage online about Navy and Marine Corps topics, while reminding them to protect classified/sensitive information, respect privacy, and comply with all applicable laws and regulations. Personnel are personally responsible for any content they post and should make clear if expressing personal rather than official views.
This document provides information and guidance about safe and responsible use of social media for military personnel. It discusses Department of Defense social media policies, how to represent the military professionally online, and risks like identity theft and security breaches. Specific tips are given around privacy settings, avoiding sharing sensitive personal details or locations. Resources and contacts are provided to help military members learn about social media best practices.
The document provides best practices guidelines for Army personnel engaging in social media. It discusses policies around social media use and outlines tactics for implementing platforms like blogs, Facebook, and Twitter. The key points are:
1) Army personnel must maintain professional conduct online and remember policies around operations security and the Uniform Code of Military Justice.
2) Effective social media use requires planning, resources to maintain sites, and engagement with audiences.
3) Platforms like blogs and Facebook should present an official perspective and engage communities through content and comments.
4) Personnel must identify their Army affiliation online and make their commander aware of any personal blogs or profiles. Operations security and policies still apply to personal sites.
The document provides guidance for Coast Guard personnel on the responsible use of social media both personally and professionally. It outlines principles for official Coast Guard social media use, including only posting approved information, building an engaged community, and ensuring accessibility. It also provides guidance for personal social media use, stressing the need to follow all laws and policies, practice restraint, and realize that nothing posted is truly private or anonymous. A decision tree is included to help determine if a photo or video can be posted online.
Navy personnel are encouraged to use social media responsibly while being aware of potential risks. The document provides guidance on safe social media use, noting that information posted online can be seen by everyone and remain forever. It lists ways to mitigate risks like using privacy settings, not discussing sensitive information, and avoiding sharing personally identifiable information. Statistics show that 75% of Sailors use social media and there are over 500 official Navy social media presences.
This document discusses operational security (OPSEC) considerations for using social media. It provides tips for safe social media use such as being careful about what personal information is posted, using privacy settings, disabling geotagging, and being aware that even seemingly harmless posts can potentially put soldiers, families and missions at risk if they provide too many details to adversaries. Specific concerns are outlined for units, families, family readiness groups and children using social media. The document emphasizes that OPSEC should always be the top priority for anyone in the Army community using social media.
The document provides best practices for using social media platforms like Facebook, blogs, and Twitter for Army public affairs and engagement. It outlines guidelines for setting up official profiles and pages, including using .mil domains when possible and maintaining OPSEC. The document advises having a strategic plan, committing resources to maintain a presence, and being willing to engage with audiences. It also provides examples of effective military leaders' social media pages.
This document provides guidance on using social media for the Air Force. It includes tips for leaders, Airmen, families and an introduction to common social media platforms and trends. Leaders are encouraged to use social media to connect with audiences and share stories. Airmen should represent core values and be cautious of sensitive information. Families can use social media to support Airmen but should avoid oversharing details. The document also covers hashtags, geotagging and telling the Air Force story on social media.
This document provides guidance on using social media for the Air Force. It discusses social media use for Air Force leaders, Airmen, and families. It also covers common social media platforms and tips, including how to use hashtags to tell the Air Force story. The document encourages sharing experiences as an Airman or family member while maintaining security and following Air Force policies.
This document provides guidance on maintaining operational security (OPSEC) on social media. It advises avoiding sharing details about military service members' locations, units, future ship or base movements, personal information and schedules. The document outlines specific information that should not be shared, such as overseas base descriptions, unit morale or future plans. It suggests more general discussions of service, deployments and support for the military. Readers are encouraged to educate others on OPSEC and report any potential violations. Maintaining privacy settings and being cautious of online connections is also advised.
This document discusses what happens to a person's digital assets when they die or become disabled. It notes that most people have accumulated significant "digital stuff" like photos, emails, social media accounts, finances and digital media purchases. The document outlines steps to take to plan for these digital assets, including creating an inventory, naming a "digital personal representative" and including any special instructions. It provides examples of how different social media platforms and companies handle deceased users' accounts. The document emphasizes the importance of having your wishes in writing to avoid headaches for loved ones later.
This document discusses what happens to a person's digital assets when they die or become disabled. It notes that most people have accumulated significant "digital stuff" like photos, emails, social media accounts, finances and digital media purchases. The document outlines steps to take to plan for these digital assets, including creating an inventory, naming a "digital personal representative" and including any special instructions. It provides examples of how different social media platforms and companies handle deceased users' accounts. The document emphasizes the importance of having your wishes in writing to avoid headaches for loved ones later.
U.S. Navy Command Leadership Social Media HandbookDouglas Burdett
This document provides guidelines for Navy commands regarding the use of social media. It discusses defining social media and relevant DoD and Navy policies. It provides guidance on communicating expectations to sailors regarding safe social media use and avoiding OPSEC violations. It also offers tips for commands regarding setting communication objectives, content strategies, and selecting and managing social media platforms. The overall aim is to help commands incorporate social media effectively while maintaining standards of conduct.
This document discusses how to plan for one's digital assets after death or disability. It begins by outlining the objective of answering what happens to digital "stuff" like photos, emails, social media accounts, and online purchases. It then discusses the growth of the digital world and lists common types of digital assets people accumulate. The rest of the document provides guidance on inventorying digital assets, naming an executor, including instructions, and options for various social media and online accounts. It emphasizes the importance of planning and expresses some of the legal uncertainties around digital assets.
Advantages and Disadvantages Of Social MediaDilna DV
This document discusses the advantages and disadvantages of social media. It begins with defining social media as websites and apps that allow users to create and share content or participate in social networking. Some key advantages mentioned are worldwide connectivity, finding people with common interests, and its use as a promotional tool. Disadvantages include cyberbullying, risks of fraud and identity theft due to lack of privacy controls, addiction, and negative impacts on family relationships and student motivation. The document concludes that social media can be beneficial if used wisely, but individuals must take responsibility for their own safety when sharing personal information online.
Examine national and local nonprofit organizations in crisis and look at ways to prepare for crisis and reduce the negative effects of crisis when present.
Top 10 Social Media Quick Tips for Special OlympicsRyan Eades
The document provides 10 quick tips for Special Olympics employees using social media both professionally and personally. The tips advise employees to be transparent about their role at Special Olympics, provide relevant and respectful comments, avoid confidential information or crisis situations, and protect themselves and Special Olympics' reputation and brand. Employees are welcome to participate online but must follow these guidelines to do so appropriately.
Similar to Unofficial Facebook Posts Explained (20)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
1. DEPARTMENT OF THE NAVY (DON)
GUIDANCE FOR UNOFFICIAL
INTERNET POSTS
SOCIAL MEDIA GUIDANCE
2. DON released guidance in June 2010
regarding unofficial internet posts
We’re going to break it
down for you…
highlighting what you
need to know
You can read it yourself here,
http://www.slideshare.net/USNavySocial
Media/don-guidance-for-unofficial-
internet-posts
SOCIAL MEDIA GUIDANCE
3. HEY—We’re talking to YOU!
“DON personnel” on
this guidance refers to
all active-duty, reserve,
and civilian
Department of the
Navy personnel to
include all Sailors and
Marines
SOCIAL MEDIA GUIDANCE
4. This applies to anything you say
(write/post/share) on the internet
that is NOT in an official Navy capacity
• Content includes, but is not limited to,
personal comments, photographs,
video, and graphics.
• Internet sites include social networking
sites, blogs, forums, photo and
video-sharing sites, and other sites to
include sites not owned, operated or
controlled by the DON or DOD. Yup, applies to this
photo, too!
SOCIAL MEDIA GUIDANCE
5. SUMMARY: We want you to engage
online, responsibly!
DON personnel are encouraged to responsibly engage in unofficial
Internet posts about the Navy and Marine Corps and DON-related topics
The Navy and Marine
Corps perform valuable Polite, helpful and
services around the world responsible
engagement!
every day and DON
personnel are often in the
best position to share the
Navy and Marine Corps’
story with domestic and
foreign publics
SOCIAL MEDIA GUIDANCE
6. 20 THINGS YOU
NEED TO KNOW
TIPS FOR KEEPING SAFE AND STAYING
OUT OF TROUBLE ONLINE
SOCIAL MEDIA GUIDANCE
7. 1. You are personally
responsible for your actions
• Ensure Navy and Marine Corps content “Use your best
judgment,
is accurate and appropriate shipmates!”
• Be thoughtful about the non-service
related content you post
• Be aware that you lose control over
content once posted on the Internet
• Always use your best judgment and
keep in mind how the content of their
posts will reflect upon yourself, your
command, and the Navy or Marine
Corps – now and in the future!
SOCIAL MEDIA GUIDANCE
8. 2. Don’t break the law
• Adhere to Federal law, DOD, and DON
regulations and policies online
• If you violate Federal law, regulations or
policies, you are subject to disciplinary
action under the Uniform Code of
Military Justice (UCMJ)
SOCIAL MEDIA GUIDANCE
9. 3. Identify yourself
• If appropriate, identify
yourself as DON personnel,
to include your rank, military
component (e.g., Captain
Smith, USMC), and status
(active or reserve)
• If you decide not to identify
yourself as such, you should When expressing personal opinions, make clear that
not disguise, impersonate or you are speaking for yourself and not on behalf of the
otherwise misrepresent your DON when the subject deals with Navy or Marine
identity or affiliation with the Corps issues. Use a disclaimer such as: “the postings
DON on this site are my own and don’t represent
Navy/Marine Corps’ positions or opinions.”
SOCIAL MEDIA GUIDANCE
10. 4. If you wouldn’t say it to
your grandma, don’t post it
• Don’t say/post anything that
could be perceived as:
– Defamatory
– Libelous
– Obscene
– Abusive
– Threatening Quick Reference Definitions
– Racially or ethnically hateful Defamatory: (adj) injurious to someone's
name or reputation
– Otherwise offensive or illegal
Libelous: (adj) harmful and often untrue;
tending to discredit or malign
SOCIAL MEDIA GUIDANCE
11. 5. Avoid spillage
• Do not post any information that is:
– Classified (Confidential, Secret, Top Secret)
– Controlled unclassified information (CUI)
– Sensitive but Unclassified (SBU) (For Official Use Only (FOUO),
Law Enforcement Sensitive (LES), Sensitive Homeland Security
Information, Security Sensitive Information (SSI), Critical
Infrastructure Information (CII), etc.)
– Or might otherwise violate operations security (OPSEC)(tactics,
troop movements, force size, weapon system details, etc)
• When in doubt, DON personnel should contact the unit operations
officer, security officer, intelligence officer, or public affairs officer
for guidance.
SOCIAL MEDIA GUIDANCE
12. 6. Protect your privacy
• Don’t share:
– Your Social Security number
– Home address
– Birthday
– Birth place
– Driver’s license number
– Other personally identifying information
• By piecing together information provided on
different websites, criminals and adversaries can
use information to, among other things, steal
your passwords and impersonate you.
http://www.fitceleb.com/node/7837
SOCIAL MEDIA GUIDANCE
13. 7. Protect the privacy of
others
• Don’t post information that would infringe upon the
privacy, proprietary, or personal rights of others
• SUCH AS…
– Contact information (email address, home address, phone
numbers, etc.)
– Physical location
SOCIAL MEDIA GUIDANCE
14. 8. don’t break the law
(didn’t we already say this?)
• Don’t use any words, logos or
other marks if such posting would
infringe upon the trademark,
service mark, certification mark, or
other intellectual property rights of
the owners of such marks without
the permission of such owners
SOCIAL MEDIA GUIDANCE
15. 9. Use don graphics as
appropriate
•Use of Department of the Navy, and Marines Corps
Seals is restricted to OFFICIAL USE ONLY (SECNAVINST
5030.4A).
•Use of other Navy and Marines Corps symbols is
permissible in unofficial posts so long as the
symbols are used in a manner that does not bring
discredit upon the department, does not result in
personal financial gain, and does not give the
impression of official or implied endorsement. Any
other use requires permission. Contact your public
affairs officer if you have any questions.
•DON personnel who violate the use of DON Browse the Navy Graphics Library for
seals, posters, logos and more!
symbols are potentially subject to legal
proceedings. http://www.navy.mil/view_ggphotos.asp
SOCIAL MEDIA GUIDANCE
16. 10. don’t share information
that is not approved for
public release
Not memos, not e-mails, not
meeting notes, not message
traffic, not white papers, not
public affairs guidance, not
pre-decisional materials, not
investigatory information,
not proprietary
information…
“Released” = OK to post/share!
JUST DON’T DO IT!
SOCIAL MEDIA GUIDANCE
17. 11. Talk about what you
know best
Only discuss Navy or
Marine Corps issues
related to your
professional JAG Officers
expertise, personal discussing
experiences, or what life in
personal knowledge the US Navy
JAG Corps is
like = within
their area of
expertise!
SOCIAL MEDIA GUIDANCE
18. 12. Correct
misinformation politely
A discussion on the U.S. Navy Facebook Page raised
concerns over OPSEC among fans. No OPSEC
• Professionally and
violation, in fact, took place and Navy responded:
respectfully correct errors
and misrepresentations
made, by others, about
the Navy or Marine Corps
• Not sure if you have
accurate information to
correct error? Refer to
the chain of command or
public affairs for guidance
SOCIAL MEDIA GUIDANCE
19. 13. don’t get political
• You can express your political opinion within DoD guidelines:
– You can express your political views on public issues or political candidates
online, but not as part of an organized communication campaign
– If your communication identifies you as a member of DoD/DON it should clearly
state the opinions are yours
– You cannot solicit votes for or against a party, candidate, cause
– You cannot participate in any interview or discussion as an advocate for or
against a party, candidate, cause
– Commissioned officers must avoid contemptuous words against the President,
Vice President, SECDEF, Dept. Secretary (i.e. SECNAV), Governor and Legislature
of any state he or she is on duty in or present (THIS IS FEDERAL LAW)
• Don’t express or imply Navy or Marine Corps endorsement of
any opinions, products or causes
Source: Department of Defense Directive 1344.10
SOCIAL MEDIA GUIDANCE
20. 14. Look out for bad guys
• Do not click links or open attachments
unless the source can be trusted!
Emails may appear to
come from your friends,
but beware of suspicious
emails or links like these
• Cyber criminals pretend to be people they are not in order to
deceive DON personnel into performing actions that launch
cyber attacks, download viruses, and install malware and
spyware onto computers
SOCIAL MEDIA GUIDANCE
21. 15. Use strong passwords
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in your password, the
better.
• Use the entire keyboard, not just the letters and characters
you use or see most often.
• Have a different password for every login
• Avoid:
– Dictionary words in any language.
– Words spelled backwards, common misspellings, and abbreviations.
– Sequences or repeated characters.
– Personal information.
Source: Microsoft Online Safety (http://www.microsoft.com/protect/fraud/passwords/create.aspx)
SOCIAL MEDIA GUIDANCE
22. 16. don’t grant access to
people you don’t know
• This includes “friends” and “followers” on social networks
• “Friends” and “followers” are considered relationships that
can affect your security clearance, so make sure
you only make connections with people you know well
Really?!? Do you know this guy?
SOCIAL MEDIA GUIDANCE
23. 17. Choose applications
wisely
• Applications (e.g. Farmville on Facebook) may
share your personal information with other
users on Facebook AND external to Facebook
• Check the settings of EACH application you
use before “allowing access”
SOCIAL MEDIA GUIDANCE
24. 18. Check privacy settings
• Don’t accept default privacy
settings
• See guidance for minimum
Facebook privacy settings
• Make sure only your family and
friends (people you know WELL)
can see your photos, full name
and other information http://www.slideshare.net/USNavySocialMedia/reco
• Assume that all information
mmended-facebook-privacy-settings-august-2010
shared can be made public (as in
someone can find it on Google!)
SOCIAL MEDIA GUIDANCE
25. 19. Look out for intruders
• Notice any changes to your account that you
didn’t make?
1. Change your password
2. Think about how someone may have received access to
your site and make appropriate changes to avoid that in
the future
• Check your accounts daily for possible use or
changes by unauthorized users
SOCIAL MEDIA GUIDANCE
26. 20. Use anti-virus and
anti-spyware
• Use anti-virus and anti-spyware software on your personal
computer and keep them up to date!
• DON Personnel can download free anti-virus software from Navy
Information Assurance at https://infosec.navy.mil/av/index.jsp
• There is also free software available online*:
– AVG Anti-virus: http://free.avg.com/
– Avast Anti-Virus: http://www.avast.com/
– Ad Aware Anti-Spyware: www.lavasoft.com/products/ad_aware_free.php
– Microsoft Security Essentials (Anti-Virus & Anti-Spyware):
http://www.microsoft.com/security_essentials/
* No endorsement intended, there are plenty of other free and paid for anti-virus and anti-spyware
software available online. These are just a few we found .
SOCIAL MEDIA GUIDANCE
27. For answers to social media
questions, contact your local public
affairs office or CHINFO
CDR Scott McIlnay LT Lesley Lykins
Director, Emerging Media Integration (OI-54) Deputy, Emerging Media Integration (OI-54A)
Department of the Navy, Office of Information Department of the Navy, Office of Information
Office:(703) 692-4718 Office:(703) 695-6915
Fax:(703) 692-9046 Fax:(703) 692-9046
Email: scott.mcilnay@navy.mil Email: lesley.lykins@navy.mil
FB: /scott.mcilnay FB: /lesleylykins
Twitter: @smcilnay Twitter: @lyfsgr8
SOCIAL MEDIA GUIDANCE
28. Can’t get enough?
• Responsible and Effective Use of Internet-based Capabilities, Directive Type Memorandum 09-026
(DTM 09-026)
• Joint Ethics Regulation, Department of Defense 5500.7-R
http://www.dod.mil/dodgc/defense_ethics/ethics_regulation/jer1-6.doc
• Political Activities by Members of the Armed Forces, Department of Defense Directive 1344.10
http://www.dtic.mil/whs/directives/corres/pdf/134410p.pdf
• Handling Dissident and Protest Activities Among Members of the Armed Forces, Department of
Defense Directive 1325.06 http://www.dtic.mil/whs/directives/corres/pdf/132506p.pdf
• Department of the Navy Privacy Program, Secretary of Navy Instruction 5211.5E
http://doni.daps.dla.mil/Directives/05000%20General%20Management%20Security%20and%20Safety%20Servic
es/05-200%20Management%20Program%20and%20Techniques%20Services/5211.5E.pdf
• Department of the Navy Public Affairs Policy and Regulations, Secretary of the Navy Instruction
5720.44B
http://doni.daps.dla.mil/Directives/05000%20General%20Management%20Security%20and%20Safety%20Servic
es/05-700%20General%20External%20and%20Internal%20Relations%20Services/5720.44B.pdf
• Department of the Navy Policy for Content of Publicly Accessible World Wide Web Sites, Secretary
of the Navy Instruction 5720.47B
http://doni.daps.dla.mil/Directives/05000%20General%20Management%20Security%20and%20Safety%20Servic
es/05-700%20General%20External%20and%20Internal%20Relations%20Services/5720.47B.pdf
SOCIAL MEDIA GUIDANCE