Hive Toronto Privacy Badges: A Facilitator s Guide
|
|
- Meagan Morris
- 8 years ago
- Views:
Transcription
1 Hive Toronto Privacy Badges: A Facilitator s Guide By: Karen Louise Smith, Kathryn Meisner and Teen Peer Researchers
2 Table of Contents Background... 3 What are Open Badges?... 3 What are the Hive Toronto privacy badges?... 3 Badges you can issue by printing... 4 Badges earnable through Mozilla Webmaker... 4 Who are the Hive Toronto privacy badges geared towards?... 5 Who can facilitate the learning activities associated with the badges?... 5 What are the overarching themes and badge concepts?... 5 Personal Information... 6 Privacy Policy... 6 Privacy in Everyday Life... 6 Privacy Futures... 6 What are some appropriate icebreaker activities to explore privacy?... 7 What can facilitators explore before facilitating the learning activities associated with the Hive Toronto badges?... 8 Connected learning... 8 Creative Commons and open licenses... 9 Hypertext markup language (HTML)... 9 What are some suggested pathways for use of the badges? What are some tips for facilitating the learning activities? Anonymizer facilitation tips IP Address Tracer facilitation tips PIPEDA Remixer facilitation tips Profiler facilitation tips Requester facilitation tips Data Trail Timeline facilitation tips Mobile facilitation tips Privacy Coach facilitation tips Internet of Things facilitation tips Drones facilitation tips Printable worksheets and handouts HTML Cheat Sheet IP Address Tracer Worksheet Internet of Things Worksheet Privacy Response Worksheet Acknowledgements Credits
3 Background Hive Toronto is a learning network with a membership of over 60 youth-serving organizations in the Greater Toronto Area. The Hive Toronto learning network is stewarded by Mozilla, a global non-profit that encourages people, including youth, to participate in making the web. In , Hive Toronto received a grant from the Office of the Privacy Commissioner (OPC) of Canada to design 10 prototype level badges to encourage Canadian youth, ages 13 and up, to learn about privacy. The badges and the learning activities were co-designed with 8 peer teen researchers who engaged in the project for up to 70 hours each. This facilitator s guide introduces what Open Badges are, the learning activities developed in this project, and provides tips for facilitating privacy education with teens. To access the badges and learning activities associated with this project, please visit: What are Open Badges? An Open Badge is a special kind of digital badge. Open Badges use an open technical standard to enable learners to display what they have learned on websites or social networking profiles. Open Badges are sometimes described to include an image plus metadata, such as the issuer and the criteria that were achieved to earn the badge. - For more information on Open Badges see What are the Hive Toronto privacy badges? The 10 Hive Toronto badges are prototypes of Open Badges for privacy education. A prototype is often defined as an early version of a design. In this Open Badges project, we were inspired by the open educational community, which aims to make learning resources reusable and remixable by educators. We are releasing our curriculum, along with badge prototypes. The privacy badge prototypes that were developed for this project were created at two different levels. 3
4 Badges you can issue by printing Seven of the Hive Toronto privacy badges are easiest to issue by printing them out. These badges are being released at an early prototype level through the Hive Toronto website. This means that the images and metadata necessary to be issued as an open badge are in place, but not yet implemented on a website for learners to claim their badges. Hive Toronto has released the learning activities and badge designs to encourage organizations to work with the learning resources, and potentially even implement the images and metadata as earnable Open Badges through their own programs and websites. If you want to start using all the badges right away, issuing the badges through print outs is the quickest option. Badges earnable through Mozilla Webmaker Three of the badges that were designed are fully functional Open Badges that can be earned on Mozilla s Webmaker site ( Like the other 7 Hive Toronto privacy badges, the images and metadata have been created. Additionally, learning activities that can be used to support learners to earn the badges can be accessed from the Hive Toronto site. We consider the badges on the Webmaker site to be late level prototypes, but they may still be adapted or remixed in the future by organizations that implement them. The badges created for this project are accessible via the Hive Toronto website at All badge designs and curriculum resources that were created for this project are licensed under a Creative Commons Attribution-4.0 International License to encourage remix and reuse. The open badge prototypes for privacy (images and metadata) are available on 4
5 Who are the Hive Toronto privacy badges geared towards? The Hive Toronto privacy badges are geared towards teen learners ages 13 and up. There is no particular background knowledge of privacy that is necessary to dive into the activities. The learning activities do not require prior technical experience, but some activities involve the use of hypertext markup language (HTML) to remix or code basic webpages. There is a beginner HTML activity in the Anonymizer badge that is recommended if you or your learners are new to HTML. Who can facilitate the learning activities associated with the badges? The curriculum materials and privacy badges associated with this project can be facilitated by: - After school program facilitators - Civic and legal educators - Librarians - Peer or teen facilitators - Other educators (broadly defined) The learning activities can be aligned with the learning objectives in courses as well as informal learning programs. Easy linkages can be drawn to courses and programs that explore digital citizenship, digital media literacy, civics and legal education, maker education, and learn-to-code initiatives. What are the overarching themes and badge concepts? The Hive Toronto privacy badges are organized under four themes, but it is important to note that the badges can be used in any way you wish. The badges 5
6 can be used as stand-alone activities, or in any combination with other activities. The four themes and the badges they contain are: Personal Information Personal information can include details like your name, address, and any numbers associated with you. This theme explores what personal information is through badges such as the Anonymizer and IP Address Tracer. Privacy Policy Numerous policies and laws are relevant to privacy in Canada. The badges in this section explore learning about privacy laws, such as the Personal Information Protection and Electronic Documents Act (PIPEDA), as well as the institutions and organizations associated with privacy. The implications of emerging technologies such as drones are also explored. The badges in this section include the PIPEDA Remixer, Profiler, and Requester. Privacy in Everyday Life Have you ever been captured by a security camera when grocery shopping? Do soccer advertisements keep popping up in your social media accounts after you are surfing the web? Privacy is something that must occur within everyday life where numerous forms of surveillance are also occurring. The Data Trail Timeline, Mobile and Privacy Coach badges are part of this theme. Privacy Futures There are many emerging technologies. The Internet of Things (IoT) badge and Drones badge, open up the possibility to think about privacy outside of the frame of our current experiences. Each of the overarching themes has an introductory teaching kit available through the Hive Toronto site. The teaching kits provide an introductory exploration of the theme to help you get started. Some of the Hive Toronto badges are cross-listed between the themes. 6
7 What are some appropriate icebreaker activities to explore privacy? Facilitators such as librarians, community center workers, or peer facilitators who are engaging others to learn about privacy may wish to use an icebreaker activity with a group. Some simple icebreakers that may be effective include: Step forward if Prepare several statements related to privacy and teens such as: Step forward if you have a password on a cell phone or another mobile device Step forward if you update a social media account at least 3 times a day Step forward if you have posted something on social media that you regretted Form a circle with your group. Read aloud your statements and have individuals step forward when one of the statements applies to them, if they feel comfortable. Have individuals reform the circle before each statement is read. 7
8 Paper privacy memes Print out some images related to privacy. Have learners mount their chosen image on a larger piece of paper and write out a meme style caption. The meme example included here reads: Geo Data I know what you did last summer! Memes can be witty, funny, and ironic statements about privacy. What can facilitators explore before facilitating the learning activities associated with the Hive Toronto badges? Connected learning The privacy badges were designed to reflect the ideas behind connected learning. Connected learning is openly networked, interest powered, productioncentered, peer supported, and is linked by a shared purpose. Facilitators will notices that all of the privacy badges include learning, which involves productioncentered learning through making, designing, creating, exploring, or experimenting. Peer-to-peer learning is also emphasized through discussions, group work, and creation activities. - Connected Learning Alliance 8
9 Creative Commons and open licenses Many of the learning activities associated with the privacy badges make use of remix. You may find that your learners need access to Creative Commons or openly licensed work to use in their projects. Creative Commons licenses allow creators to set the terms that others can use and sometimes remix their work. You can read up on Creative Commons licenses: - Creative Commons Homepage - Creative Commons Search You may also find alternative open licenses to be helpful for your learners projects. Materials licensed in the public domain for example are also remixable in your projects. Hypertext markup language (HTML) Hypertext markup language (HTML) is the code that is used to make content ready to display on the World Wide Web. HTML typically includes pairs of tags. The following example shows normal text and strong text. See the opening and closing tags in the Code column of the diagram. To edit the text that appears on the website, you need to edit the text between the tags. Code <p>this text will appear normal.</p> <p><strong>this will appear strong.</strong></p> Display on a webpage This text will appear normal. This text will appear strong. Inserting images into webpages is also a skill you may need. The image source tag has a single tag only and specifies the location of the image, the alternative text for the image, and the size of the image in pixels. 9
10 Code Display on a webpage <img src= " sb-stick _640.png" alt="usb key" height="474" width="200"> To learn more about HTML some options include: - Mozilla Developer Network US/docs/Web/HTML - W3Schools - Codecademy If you create webpage projects with learners, you may crewish to store and display them online. Some places where you can create an account to store and display projects include: - Mozilla Webmaker - CodePen What are some suggested pathways for use of the badges? As stated earlier, facilitators and educators are encouraged to use the badges and associated learning activities in any way that is useful to you. Sometimes, it may be possible to weave in one of the badges, to any already existing course or workshop. Other times, organizations may choose to make use of multiple badges as part of a more extended program. The choice of how to use the badges and learning activities is yours. To help different kinds of facilitators get started with the badges, we provide the following suggested learning pathways, which you can take up, or remix. 10
11 After-school programs After-school programs that take place in settings like community centers, may find it useful to being with the Privacy in Everyday Life badges. The Data Trail timeline activity is an engaging introductory activity to privacy. The Mobile badge relates to everyday practices of youth. The Internet of Things badge provides the opportunity to discuss internet fridges and produce a web comic. After school programs with a youth-led focus may find the Privacy Coach badge aligns with peer-to-peer learning strategies. Public libraries Libraries may find that multiple badges relate to their already existing programs and are appropriate to weave into stand-alone workshops. The Anonymizer badge can be introduced in learn-to-code programs in library branches. The Drones badge can be used with 3D printing programs for libraries with maker spaces. The Data Trail Timeline badge can be used in a video or media production oriented workshop. 11
12 Civic or legal education organizations Civic or legal education organizations may be interested in the themes raised in the Personal Information and Privacy Policy themes. The Anonymizer badge is a starting place to examine what personal information is. The Privacy Policy badge sequence of the PIPEDA Remixer, Profiler, Requester and finally Drones can be followed. Peer-to-peer facilitation Peer-to-peer facilitation of the privacy badges can include the Privacy Coach badge. Peer facilitators are encouraged to draw from the other activities that best align with their interests. For example, privacy and coding can be explored through the Anonymizer, Profiler, and Internet of Things badges. 12
13 What are some tips for facilitating the learning activities? Each of the four themes for the Hive Toronto privacy badges, has a teaching kit with background information to assist facilitators. We recommend reading the teaching kits to familiarize yourself with the concepts to be introduced through the learning activities. Each activity kit for the Hive Toronto badge system, also has an accompanying tips sheet for the facilitator. Each tips sheet contains: 1) An Overview: The overview provides a brief description of the activity with additional information to explain the rationale for creating the badge, or insights about using the learning activities with youth. 2) Discussion tips: Each of the discussion questions is listed with key points and information that you can utilize to inform a take up discussion with your learners. Occasionally, extra questions, likely to surface in your group are also addressed. 3) Low connectivity tips: We recognize that access to computers may be limited when you want to utilize these activities. Facilitation options to use paper, or reduce the computer set up to a single computer connected to the internet and a projector, are provided whenever possible. 4) Extension Ideas: Extension ideas go beyond the original activity and may help you move forward with learners who express a strong interest in the initial activity. Extension activities will take longer than the suggested timeline for the activity. 13
14 Anonymizer facilitation tips Overview The Anonymizer badge involves having learners hack a Wikipedia biography page for a celebrity or prominent person. The idea behind the badge is to learn what details may be considered personally identifiable information (PII) in a biography page and to alter them by using a tool called X-Ray Goggles. For example the name of a celebrity could be changed to something like Green Penguin and their place of birth to The Purple Iceberg. Discussion tips Typical responses to discussion topics which emerge when facilitating the Anonymizer badge are provided here. We provide some information to help facilitate a discussion on remixing and hacking for learning and then provide helpful points to assist with take up for the discussion questions. Am I hacking Wikipedia? Learners in this activity are asked to remix a Wikipedia page and this can be considered a form of hacking. The term "hacking" gets a lot of negative press, but that doesn't necessarily mean it's always a bad thing. When we talk about hacking on Webmaker, we are talking about the act of rolling up your sleeves, taking something apart, understanding how it works, and using the original parts to do something new and creative. When you use X-Ray Goggles, you're not actually breaking in to the web page itself like a cyber attacker would. X-Ray Goggles actually "forks" a copy of the page and hosts it on a brand new web page, adding in the changes that you decide to make with using the tool. The goggles allow you to actually view the page's source code, so you can understand how it works and learn valuable skills to enhance your own digital work. With X-Ray Goggles you remix or hack code on your local machine, and if you 14
15 choose, publish your changes to a new page on a Webmaker server. Source: - What kinds of personally identifiable information (PII) were present in the biography page? Learners may identify names, birthplaces, job titles, team names, movie titles, or numerous other details as PII. - Was there any information in the biography page you anonymized that would not be considered personal information (PI) under PIPEDA in Canada? The name and job titles of employees are not considered PI under PIPEDA in Canada. These details were probably anonymized in many of the hacked biography pages. - Do you share any personal information through the internet or use of apps? Learners will likely identify that they share details like their names, addresses, phone numbers, ages, geo-location data, photographs, and more. - If working in a group setting, were you able to guess the identity of the original biography page of any of the other teams? Anonymized biography pages are frequently identifiable by other teams. Details like a prominent accomplishment (i.e., writing a best selling novel, or winning an Oscar) or connections to other prominent individuals can sometimes be the hint that reveals the real identity. - Was there any PI or PII that you could not remove from the biography page? Sometimes teams notice that the overall page url on Wikipedia is not changed through the X-Ray Goggles activity, if learners do not publish their hacked version of the webpage. Learners may also notice that many teams skip changing the URL addresses of the hyperlinks in the biography page which may reveal PI or PII. When taking up this discussion question, it is a good idea to remind learners that digital activities can leave traces of our identities. 15
16 Low Connectivity tips If you want to facilitate this activity without computers, one idea is print out biography pages from Wikipedia and ask learners to create their remixed biography page on a piece of chart paper by cutting and pasting together text. PII can be replaced by new hand-written details. Extension activity Have learners search for themselves online to examine what their online identities reveal about them. Review the tips sheet provided by MediaSmarts on establishing a positive presence online. - Tip Sheet from MediaSmarts Positive Presence Online 16
17 IP Address Tracer facilitation tips Overview Internet protocol (IP) addresses are a kind of personal information that may be collected online that many people do not even think about. Wikipedia defines that an IP Address is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication (Wikipedia, IP address ). An IP address is a string of digits that looks something like Discussion Tips - Do you think an IP Address is personal information? Why or why not? An IP Address is considered personal information by the Canadian government. Learners in your group may be aware that sometimes organizations like a school share a single external IP address and argue against an IP address being PI. - Were there any websites that you tracked where the location information, such as the city or country, was different from where you thought the site should be located? Sometimes IP addresses are masked to appear to be elsewhere. This means that the location of the device or website is made to appear to be elsewhere in the world. - Can you find any statements on whether an internet company or government agency considers an IP address to be personal information? Many Government of Canada websites state that IP addresses are considered PI. For example on February 22 nd, 2014, the following statement was retrieved from Service Canada: the Government of Canada considers the IP address to be personal information, particularly when combined with other data automatically collected when visitor requests a Web page such as the page or pages visited, date and time of the visit. 17
18 - Have you heard of any news stories involving IP addresses? What issues were at stake? Numerous news stories involve IP addresses. Some examples from include: Netflix s perspectives on Canadians use of foreign IP addresses to access extra content Problematic changes, or vandalism, made to Wikipedia pages from particular IP addresses - What steps do people take to keep their IP addresses private? Individuals may choose to use a virtual private network (VPN) or proxy to obscure their IP addresses. Low Connectivity Tips If you want to facilitate this activity without computers you can print out a list of popular IP addresses and have your learners create a paper map. A printable worksheet is available for this activity for your learners to record their research responses on IP addresses. This activity will also work with one internet connected computer and a projector. Extension Idea If your learners have an interest in legal topics, look up cases where IP addresses have factored into prominent cases. Examples of cases include: - Morris v. Johnson, 2011 ONSC 3996 (CanLII) In this case a mayoral candidate who lost the election sought to have the host of the website auroracitizen.ca to release identifying information of anonymous defendants, who she claimed defamed her online - BMG Canada Inc. v. John Doe, [2004] 3 FCR 241, 2004 FC 488 (CanLII) In this case a music industry company sought to have the court order Internet Service Providers (ISPs) to link internet pseudonyms to IP addresses associated with music downloading 18
19 PIPEDA Remixer facilitation tips Overview The idea behind the PIPEDA Remixer badge is to crowdsource the reading and interpretation of a privacy policy, like PIPEDA. Learners in your group will research and explain a portion of PIPEDA such as a fair information practice, or section of the bill, and write up their summary on a remixed webpage template. All the individual pages from this activity, can by hyperlinked off a collaborative main page which acts as the repository for the group s knowledge. Using the webpage templates for this activity requires the ability to edit text in an HTML document. Discussion Tips - What did you learn about the purpose and application of PIPEDA? Groups may note that PIPEDA governs how personal information can be collected and used in relation to commercial activities. It applies for information collected during commercial activities in Canada. In some provinces and territories there is similar legislation in place, that will apply instead of PIPEDA. The Office of the Privacy Commissioner of Canada has resources on the application of PIPEDA that you can refer to for further information. A Guide for Individuals: Protecting your Privacy - How would you characterize the principles from PIPEDA? The principles from PIPEDA are drawn from the fair information principles in the Canadian Standards Association's Model Code for the Protection of Personal Information. Your learners may notice that the principles connect to social values or fairness. - What type of complaints do you expect have been lodged in Canada under PIPEDA? Numerous types of complaints have been launched under PIPEDA. One prominent complaint that was fuelled by students, was a 2008 complaint 19
20 complaint launched through the Canadian Internet Policy and Public Interest Clinic (CIPPIC) in Ottawa. Students were concerned over issues like the inability to truly delete their Facebook profiles and Facebook responded to these concerns. Read more at: CIPPIC Facebook Privacy Commissioner Finds Facebook Violating Canadian Privacy Law Unauthorized credit checks are another area where complaints have been lodged. CBC Story on Unauthorized Credit Check - What was the experience like to try to distill the key points from privacy law? Learners may note that the legal text was difficult to read and understand. Prompt the group to identify strategies that they used to make use of the complex text, such as group discussion. - Where would you look for further information on privacy law in Canada? Some options for further information on privacy law in Canada include: MediaSmarts Government Offices such as the Office of the Privacy Commissioner of Canada or provincial offices Low Connectivity Tips If you lack computers, but still want to facilitate this activity, using print outs and chart paper is an option. Extension Ideas Use your PIPEDA Remix homepage to link together other relevant projects or makes. 20
21 Profiler facilitation tips Overview This badge follows in the tradition of civics education initiatives in Canada, which sometimes aim to familiarize learners with the organizations and individuals involved in policy-making. It is hard to understand policy-making if you don t know what bodies like the House of Commons and people like Members of Parliament are supposed to do. Similarly, it is important to understand the organizations, offices, and job titles that relate to privacy in Canada. Knowing about institutions like the Office of the Privacy Commissioner of Canada (OPC) and the existence of privacy officers in organizations such as corporations, may assist young people to better understand their privacy rights. Discussion Tips - Which organization or job title related to privacy did you profile and why? The activity prompts for the options of the Office of the Privacy Commissioner of Canada (OPC) or privacy officers as a job title. Learners may also locate law clinics, advocacy organizations, research groups, civil society organizations, or provincially-based offices that are active in the debates about privacy in Canada. - How was your organization or job title related to privacy and PIPEDA? The answers that learners provide to this question can be diverse. Sometimes offices and organizations related to privacy are mentioned directly in the legislation. Other times, the organizations may be active in discussions, debates, complaints or news stories about the law. - How might the organizations or professionals associated with privacy work together or otherwise interact? Organizations and privacy professionals may interact through conferences, professional associations, or industry events. For example, the Conference Board of Canada maintains a Council of the Chief Privacy Officers ( with a series of annual meetings. Staff of the OPC and industry representatives sometimes speak at public events, such as the We Are Wearables talk on Wearable Tech Privacy & Identity Payments held in March 2015 ( 21
22 Organizations and professionals associated with privacy can also be involved in complaints processes through the OPC or provincially-based privacy offices. Legal challenges that are taken through the courts also sometimes occur. - Did you uncover any controversies or complaints related to PIPEDA while creating your privacy profile? If any learners in your group choose law clinics or advocacy organizations, they may uncover complaints or privacy challenges raised under PIPEDA. These could include cases like the Facebook complaint, described in the tips for the PIPEDA Remixer activity. Learners may also uncover controversies about technologies that were invading the privacy of users. Low connectivity tips If you lack computers, this activity can be facilitated with print outs and the use of chart paper and markers to construct the profile pages. Extension Idea Create a profile for a privacy relevant organization outside of Canada. 22
23 Requester facilitation tips Overview One of the fair information practices that guides PIPEDA is the right to request personal information that is held about you. This badge is intended to explore some different ways to facilitate practicing this right with teens. Facilitating this activity requires preparation at least a month in advance. If you plan to request information from a telecommunications company, it is recommended that you request the information at least a month in advance. Downloading an archive from Twitter or Facebook should be conducted at least a week in advance, as there may be a delay to generate an archive you can download. Discussion Tips - Are there any differences from the data that can be downloaded from a social media company like Facebook and Twitter, and the personal information that may be requested from a telecommunications company? Learners may note that some social media companies, such as Twitter and Facebook, have built in a feature to allow users to download their data. From the button or link, it is hard to tell what the archive will contain. The process outlined to request personal information data from a telecommunications company includes detailed, itemized requests for particular types of information. In the samples we generated when trialing this activity, IP addresses were not visible from the telecommunications company or Twitter archive, but were visible in the Facebook data. The Twitter and Facebook archives contained photographs, but the response from the telecommunications company had no photographs. - What personal information was in the Twitter archive you reviewed? If you downloaded a Twitter archive you may notice that it contains all of the contents of your tweets. This can include information on events you attended, your political opinions, or friends you interacted with via Twitter. - How might you use your personal information from a download from a social media account? 23
Invitation to participate in a research project. Research assistant, to be hired
Invitation to participate in a research project Co-Designing Open Badges for Privacy Education with Canadian Youth Information for Toronto area teens (ages 18 19) Principal Investigator: Dr. Karen Smith
More informationSAMPLE LESSON PLAN. Superheroes of the Open Web
SAMPLE LESSON PLAN Superheroes of the Open Web Synopsis: In this hands-on workshop, learners aged 10 and up play, deconstruct and modify websites in order to understand how to create content for, and build,
More informationThe Computing Curriculum at Coston Primary
Years Year 1 Year 2 1 and 2 Autumn We are learning about programming and computational thinking and in We are learning about programming and computational thinking and in Year 1 Food and farming Year 2
More informationWebsite Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer!
Website Planning Questionnaire Colleen Rice Nelson Introduction Thank you for your interest in the services of The Ultimate Answer! Every choice and decision you make concerning your website may or may
More informationBusiness of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide
Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide 1 P a g e Contents Module Objectives... 3 Training Materials / Resources... 3 2 P a g e Module Outcomes After completing these
More informationExecutive Summary Key Findings
Executive Summary Key Findings Young Canadians immersion in social networking activities, as highlighted in Life Online, provides the context for understanding young people s attitudes and behaviours relating
More informationScams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationPrivate Today, Public Tomorrow
Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
More informationThe Notebook Software Activity Guide
The Notebook Software Activity Guide The Notebook software activity guide is intended to act as a reference of the best practices for creating and presenting lesson activities using Notebook software.
More informationVirtual Exhibit 5.0 requires that you have PastPerfect version 5.0 or higher with the MultiMedia and Virtual Exhibit Upgrades.
28 VIRTUAL EXHIBIT Virtual Exhibit (VE) is the instant Web exhibit creation tool for PastPerfect Museum Software. Virtual Exhibit converts selected collection records and images from PastPerfect to HTML
More informationCyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
More informationINTRODUCTION TO THE WEB
INTRODUCTION TO THE WEB A beginner s guide to understanding and using the web 3 September 2013 Version 1.2 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video Tutorials 3 How Does the
More informationWEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
More informationBoys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology
Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the
More informationKIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS
KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS We love technology, and want to teach others. With the help of developers, designers and professional educators, we ve created content that not only showcases
More informationA BETTER WAY TO ADVERTISE. Your guide to SmartAds & Internet Advertising
A BETTER WAY TO ADVERTISE Your guide to SmartAds & Internet Advertising CONTENTS The Basics Of Internet Advertising It all starts with Cookies Segmentation Targeting Re- Targeting Geographic Targeting
More informationTwitter For Tourism. Topic Social Media Tutorial 44
Topic Social Media Tutorial 44 Twitter For Tourism Twitter is a great tool for businesses looking to attract new customers and increase visibility of their branding. By creatively utilising the 140 character
More informationEducator s Guide to Digital Citizenship: Responsibility and Digital Reputations
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
More informationCMS Training Manual. A brief overview of your website s content management system (CMS) with screenshots. CMS Manual
Training A brief overview of your website s content management system () with screenshots. 1 Contents Logging In:...3 Dashboard:...4 Page List / Search Filter:...5 Common Icons:...6 Adding a New Page:...7
More informationPinterest Beginner s Guide for Attorneys
Pinterest Beginner s Guide for Attorneys Are you looking for an additional source of website traffic and leads? Pinterest can deliver them. This guide will walk you through setting up your account, how
More informationApplication for Middle School Programs. First Name Last Name. Grade date of birth / / Home Telephone (
Girls Incorporated of Lynn 50 High Street Lynn Ma 01902 781-592-9744 x230 www.girlsinclynn.org Odyssey Eureka Application for Middle School Programs First Name Last Name Grade date of birth / / Home Telephone
More informationSeizing Opportunity: Good Privacy Practices for Developing Mobile Apps
Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps 1 2 Introduction Canada s privacy laws require all businesses to balance innovation and entrepreneurialism with effective privacy
More informationWebsites: Social Networks, Blogs & Usergenerated
INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationPrivate Today, Public Tomorrow
Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
More information5 - Low Cost Ways to Increase Your
- 5 - Low Cost Ways to Increase Your DIGITAL MARKETING Presence Contents Introduction Social Media Email Marketing Blogging Video Marketing Website Optimization Final Note 3 4 7 9 11 12 14 2 Taking a Digital
More informationPrivacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
More informationMusic, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
More informationNETS for Students: Achievement Rubric
NETS for Students: Achievement Rubric DRAFT (March 22, 2005) Purpose: This draft version of the NETS for Students: Achievement Rubric is available online for educational technology professionals to review
More informationA Guide to Promoting your Project
Contents 1. Introduction 2. Why Promotion? 3. Channels Traditional Media i. Television ii. Radio iii. Print Digital Media 4. Planning Assigning Roles i. Coordinating ii. Speaking iii. Writing iv. Photographer
More informationThinking About a Website? An Introduction to Websites for Business. Name:
Thinking About a Website? An Introduction to Websites for Business Name: Thinking About a Website? Workshop Contents: Power point slides Task 1 Answer sheet: What makes a good website? Task 2: Creating
More informationCreating an Email with Constant Contact. A step-by-step guide
Creating an Email with Constant Contact A step-by-step guide About this Manual Once your Constant Contact account is established, use this manual as a guide to help you create your email campaign Here
More informationSalisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
More informationPinterest has to be one of my favourite Social Media platforms and I m not alone!
Pinterest has to be one of my favourite Social Media platforms and I m not alone! With 79.3 million users, 50 billion pins and 1 billion boards it is host to an enormous amount of content. But many of
More informationJoomla! 2.5.x Training Manual
Joomla! 2.5.x Training Manual Joomla is an online content management system that keeps track of all content on your website including text, images, links, and documents. This manual includes several tutorials
More informationBrock University Content Management System Training Guide
Brock University Content Management System Training Guide Table of Contents Brock University Content Management System Training Guide...1 Logging In...2 User Permissions...3 Content Editors...3 Section
More informationGuidelines for Creating Your Own Troop or Group Web Page
Girl Scouts of the USA Guidelines for Creating Your Own Troop or Group Web Page These guidelines are written for adult volunteers, older girls, and others considering developing a Web page or home page
More informationNavigating the Web: Are You Missing The Boat?
Navigating the Web: Are You Missing The Boat? Laura Patterson, M.A. Senior Instructor, Professional and Technical Communication School of Engineering The University of British Columbia This Morning s Itinerary
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationDESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
More informationGetting Started with Scratch
Getting Started with Scratch a guide to designing introductory Scratch workshops draft version, september 2009 Overview There s no one way to host a Scratch workshop. Workshops can take on a variety of
More informationSearch Engine Optimization
Search Engine Optimization Search An Introductory Guide How to improve the effectiveness of your web site through better search engine results. As you ve probably learned, having a Web site is almost a
More informationEDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010
EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 2 Table of Contents 1. INTRODUCTION... 3 2. EDUCATION ISSUES IN BILL C- 32... 3 3. EDUCATIONAL
More informationBasic Website Creation. General Information about Websites
Basic Website Creation General Information about Websites Before you start creating your website you should get a general understanding of how the Internet works. This will help you understand what goes
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More information17 of the Internet s Best Banner Ads. Love em or Hate em They Do Work!
Love em or Hate em They Do Work! Banner Ads What are they? Ever since the Internet started to take off in the mid 90 s, banner ads have been an acceptable way of advertising on the Web. Banner ads come
More informationYou can make your own layout / theme for your PowerPoint project.
About the PowerPoint Intermediate Workshop The purpose of the PowerPoint Intermediate workshop is to inform users more about the design aspect of making presentations. We will build on the skills learned
More informationCopyright Notice: digital images, photographs and the internet
Copyright Notice: digital images, photographs and the internet Copyright Notice Number: 1/2014 Updated: March 2014 What is a Copyright Notice?... 1 Copyright in images and photographs... 1 The basics...
More informationComprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
More information[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
More informationSaving money on food MODULE FOUR MODULE FOUR*
making ends meet... and more! * Saving money on food * If possible, this module should take place in or near a grocery store. In some cities, grocery stores offer community rooms that non-profit organizations
More informationUser Guide. Chapter 6. Teacher Pages
User Guide Chapter 6 s Table of Contents 1. Introduction... 4 I. Enhancements... 5 II. Tips... 6 2. Key Information... 7 3. How to Add a... 8 4. How to Edit... 10 I. SharpSchool s WYSIWYG Editor... 11
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationMoneySmart Rookie Community educator guide. Financial literacy for young people
MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under
More informationTo familiarise University Web administration staff with the capabilities of the University CMS and also introduce concepts of Web marketing.
Web Training Course: Web Editing - How to use the Content Management System (CMS). Version 1.0 Draft October 2006 Version 1.1 March 2007 Version 1.2 April 2007 Course Rationale: The University is currently
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationPublicity Guide. How to promote your community relations event through the media. How to promote your community relations event through the media.
Publicity Guide How to promote your community relations event through the media How to promote your community relations event through the media. 1 Contents 1. Introduction... 4 2. Why publicity?... 4 3.
More informationAn easy guide to... MARKETING FOR CLUBS
An easy guide to... MARKETING FOR CLUBS Inspiration to Participation Lincolnshire Sport www.lincolnshiresport.com Marketing your Club and Activities Does your club have a media lead? Think about appointing
More informationThe Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationIncome, Expenses and Budget module
Income, Expenses and Budget module Trainer s introduction The skills to control your personal income, expenses and budget are the most basic tools that people need in their financial toolkit. But many
More informationTwitter for Small Business
Twitter for Small Business A GUIDE TO GET STARTED business.twitter.com @TwitterSmallBiz CASE STUDY A Twitter success story And it all started with that one little Tweet, said Roberta Dyer, whose independent
More informationPromoting Your Business Using Social Media Building a Strategy. Name:
Promoting Your Business Using Social Media Building a Strategy Name: Promoting Your Business using Social Media Workshop Contents: Power point slides Task 1: What are the benefits of promoting your business
More informationRDM on Demand Privacy Policy
RDM on Demand Privacy Policy Ataccama Corp. www.ataccama.com info@ataccama.com Toronto, CA Prague, CZ London, UK Stamford, US 1 ATACCAMA RDM ON DEMAND PRIVACY POLICY 1. Ataccama Corp. ("Ataccama") and
More informationMusic and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
More informationYour Blueprint websites Content Management System (CMS).
Your Blueprint websites Content Management System (CMS). Your Blueprint website comes with its own content management system (CMS) so that you can make your site your own. It is simple to use and allows
More informationSocial Media for Business and Professional Use. An Introduction to Queens Library s Presence on Today s Most Popular Online Communities
Social Media for Business and Professional Use An Introduction to Queens Library s Presence on Today s Most Popular Online Communities Why Should My Company Care About Social Media? It s a global phenomenon:
More informationMODULE: RELATIONSHIPS ONLINE
MODULE: RELATIONSHIPS ONLINE DRAFT 23 Everett Street Cambridge, MA 02138, USA youthandmedia@cyber.law.harvard.edu http://youthandmedia.org {1} Overview: This module explores the topic of healthy relationships
More informationOBJECTIVES. The BIG Idea. How do I register for the ACT? What do I need to know for the test day? ACT Registration
ACT Registration 3 Taking Tests The BIG Idea How do I register for the ACT? What do I need to know for the test day? AGENDA Approx. 45 minutes I. Warm Up: ACTing Ahead (5 minutes) II. ACT Registration
More informationFacebook SVEA TRAINING MODULES. www.svea-project.eu
Facebook SVEA TRAINING MODULES www.svea-project.eu Author: Louis Dare, Coleg Sir Gâr Project Coordinator: MFG Baden-Württemberg mbh Public Innovation Agency for ICT and Media Petra Newrly Breitscheidstr.
More informationLogging In From your Web browser, enter the GLOBE URL: https://bms.activemediaonline.net/bms/
About GLOBE Global Library of Brand Elements GLOBE is a digital asset and content management system. GLOBE serves as the central repository for all brand-related marketing materials. What is an asset?
More informationIndiana University Northwest Social Media Handbook
Indiana University Northwest Social Media Handbook Introduction Social media has changed the way we communicate both as an institution and as individuals. With tools such as YouTube, Facebook, Twitter,
More informationBitstrips for Schools http://www.bitstripsforschools.com
The SAMR Model: Integrating Bitstrips for Schools Ministry Licensed Resource Title: Description of resource Bitstrips for Schools http://www.bitstripsforschools.com Bitstrips for Schools is an online educational
More informationSocial Media Guidelines
MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with
More informationLocal Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood
Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood How Do You Get Found in Local Search and Stay There? As you've likely noticed when searching on Google over the past
More informationGuidelines for Effective Email Creative
Guidelines for Effective Email Creative While the need for quality and effective design has always existed from a marketing standpoint, challenges unique to the email space require a different look at
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationLet s Connect. Best Practices. A Helpful Guide for Your WebsiteAlive Account
TM Let s Connect Best Practices A Helpful Guide for Your WebsiteAlive Account Table of Contents Best Practices 3. Why Add Live Chat? 3. How Will You Be Using Live Chat 4. What Capabilities Do You Need
More informationAN INTRODUCTION TO PINTEREST FOR BUSINESS.
AN INTRODUCTION TO PINTEREST FOR BUSINESS. A setup and strategy guide for marketers. A publication of 2 CONTENTS. 04 10 Why Use Pinterest? How to Create a Pinterest Business Account 15 15 Pinterest for
More informationto get more customers online
ONLINE MARKETING WITH 25 MARKETING TIPS & TRICKS to get more customers online @ 2015 ReachLocal, Inc. All Rights Reserved. REACHLOCAL is a registered trademark. reachlocal.com 1 In the perfect world, getting
More informationProgram Your Own Game
Program Your Own Game Provided by TryEngineering - Lesson Focus Lesson focuses on how software engineers design computer games and other software. Student teams work together to develop a simple computer
More informationPrivacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
More informationHow to train your Browser Controller
How to train your Browser Controller Table of Contents ABOUT 3 TOP BAR SETTINGS 3 CHILD LOCK 3 SPYDERWEB 3 PERSONAL PRIVACY EXPOSURE 4 KEY & STATS 4 GRAPH VIEW 4 AUTO-REFRESH 5 DOMAIN GEO-LOCATION INFO
More informationDatabase Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
More informationState of Nevada. Ektron Content Management System (CMS) Basic Training Guide
State of Nevada Ektron Content Management System (CMS) Basic Training Guide December 8, 2015 Table of Contents Logging In and Navigating to Your Website Folders... 1 Metadata What it is, How it Works...
More informationLevel: 3 Credit value: 5 GLH: 40 Assessment type:
Unit 352 Website software UAN: Level: 3 Credit value: 5 GLH: 40 Assessment type: Relationship to NOS: Assessment requirements specified by a sector or regulatory body: Aim: Y/502/4632 Portfolio of Evidence
More informationProtect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project
HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to
More informationADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS
ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide
More informationFinancial Literacy. Banking and financial services
Financial Literacy Banking and financial services HANDOUT 4-1 Banks and credit unions 1 Banks and credit unions are places where you can safely deposit your money, cash your cheques, pay your bills, ask
More informationNew Mexico 3-Tiered Licensure System
New Mexico 3-Tiered Licensure System Requirements & Guidelines for the Preparation of the New Mexico Professional Development Dossier (PDD) for Teachers Prepared by the New Mexico Public Education Department
More informationHow To Write A Cq5 Authoring Manual On An Ubuntu Cq 5.2.2 (Windows) (Windows 5) (Mac) (Apple) (Amd) (Powerbook) (Html) (Web) (Font
Adobe CQ5 Authoring Basics Print Manual SFU s Content Management System SFU IT Services CMS Team ABSTRACT A summary of CQ5 Authoring Basics including: Setup and Login, CQ Interface Tour, Versioning, Uploading
More informationWe are bloggers. > History: The blog activity could replace a diary. > Enjoy and achieve > Make a positive contribution
Unit 5.3 We are bloggers Media reviews 1 About this unit Software: WordPress / Blogger / learning platform blogging tool or similar (also, GIMP, Audacity, Windows Movie Maker (Windows XP), Windows Live
More informationDigital Life 102 LESSON PLAN UNIT 1. Essential Question What is the place of digital media in our lives?
LESSON PLAN Digital Life 102 UNIT 1 Essential Question What is the place of digital media in our lives? Lesson Overview Students test their knowledge of digital media and learn some statistics about media
More informationUser Documentation SEO EXPERT
The SEO Expert module helps you quickly: User Documentation SEO EXPERT Create and personalize Friendly URLs Insert Meta tags for product pages, Facebook posts and Twitter Cards in your shop This module
More informationHow to Use Social Media to Enhance Your Web Presence USING SOCIAL MEDIA FOR BUSINESS. www.climbthesearch.com
USING SOCIAL MEDIA How to Use Social Media to Enhance Your Web Presence FOR BUSINESS www.climbthesearch.com s Share WRITTEN Khoi Le Marketing Director khoi@climbthesearch.com 2 INTRODUCTION If you or the
More informationSocial Media Playbook
Social Media Playbook Personalized Experience Social technologies are changing the way we collaborate and communicate with each other. Many traditional forms of marketing and advertising have been replaced
More informationSVSU Websites Style Guide. Need help? Call the ITD Lab, x7471
SVSU Websites Style Guide SVSU Websites Style Guide Need help? Call the ITD Lab, x7471 1 SVSU Websites Style Guide Contents Writing for the Web...3 Questions to Ask Yourself...3 Who is our priority audience?...3
More informationYOUR MONEY, YOUR GOALS. A financial empowerment toolkit for community volunteers
YOUR MONEY, YOUR GOALS A financial empowerment toolkit for community volunteers Consumer Financial Protection Bureau April 2015 Table of contents INTRODUCTION PART 1: Volunteers and financial empowerment...
More informationWEB SITE DEVELOPMENT WORKSHEET
WEB SITE DEVELOPMENT WORKSHEET Thank you for considering Xymmetrix for your web development needs. The following materials will help us evaluate the size and scope of your project. We appreciate you taking
More informationBest Practices in Digital Rights Management:
Neustar Insights Whitepaper Best Practices in Digital Rights Management: Reducing the Risk to Online Content with IP Intelligence CONTENTS Executive Summary 2 Content Reigns on the Internet 3 The Need
More information