Hive Toronto Privacy Badges: A Facilitator s Guide

Size: px
Start display at page:

Download "Hive Toronto Privacy Badges: A Facilitator s Guide"

Transcription

1 Hive Toronto Privacy Badges: A Facilitator s Guide By: Karen Louise Smith, Kathryn Meisner and Teen Peer Researchers

2 Table of Contents Background... 3 What are Open Badges?... 3 What are the Hive Toronto privacy badges?... 3 Badges you can issue by printing... 4 Badges earnable through Mozilla Webmaker... 4 Who are the Hive Toronto privacy badges geared towards?... 5 Who can facilitate the learning activities associated with the badges?... 5 What are the overarching themes and badge concepts?... 5 Personal Information... 6 Privacy Policy... 6 Privacy in Everyday Life... 6 Privacy Futures... 6 What are some appropriate icebreaker activities to explore privacy?... 7 What can facilitators explore before facilitating the learning activities associated with the Hive Toronto badges?... 8 Connected learning... 8 Creative Commons and open licenses... 9 Hypertext markup language (HTML)... 9 What are some suggested pathways for use of the badges? What are some tips for facilitating the learning activities? Anonymizer facilitation tips IP Address Tracer facilitation tips PIPEDA Remixer facilitation tips Profiler facilitation tips Requester facilitation tips Data Trail Timeline facilitation tips Mobile facilitation tips Privacy Coach facilitation tips Internet of Things facilitation tips Drones facilitation tips Printable worksheets and handouts HTML Cheat Sheet IP Address Tracer Worksheet Internet of Things Worksheet Privacy Response Worksheet Acknowledgements Credits

3 Background Hive Toronto is a learning network with a membership of over 60 youth-serving organizations in the Greater Toronto Area. The Hive Toronto learning network is stewarded by Mozilla, a global non-profit that encourages people, including youth, to participate in making the web. In , Hive Toronto received a grant from the Office of the Privacy Commissioner (OPC) of Canada to design 10 prototype level badges to encourage Canadian youth, ages 13 and up, to learn about privacy. The badges and the learning activities were co-designed with 8 peer teen researchers who engaged in the project for up to 70 hours each. This facilitator s guide introduces what Open Badges are, the learning activities developed in this project, and provides tips for facilitating privacy education with teens. To access the badges and learning activities associated with this project, please visit: What are Open Badges? An Open Badge is a special kind of digital badge. Open Badges use an open technical standard to enable learners to display what they have learned on websites or social networking profiles. Open Badges are sometimes described to include an image plus metadata, such as the issuer and the criteria that were achieved to earn the badge. - For more information on Open Badges see What are the Hive Toronto privacy badges? The 10 Hive Toronto badges are prototypes of Open Badges for privacy education. A prototype is often defined as an early version of a design. In this Open Badges project, we were inspired by the open educational community, which aims to make learning resources reusable and remixable by educators. We are releasing our curriculum, along with badge prototypes. The privacy badge prototypes that were developed for this project were created at two different levels. 3

4 Badges you can issue by printing Seven of the Hive Toronto privacy badges are easiest to issue by printing them out. These badges are being released at an early prototype level through the Hive Toronto website. This means that the images and metadata necessary to be issued as an open badge are in place, but not yet implemented on a website for learners to claim their badges. Hive Toronto has released the learning activities and badge designs to encourage organizations to work with the learning resources, and potentially even implement the images and metadata as earnable Open Badges through their own programs and websites. If you want to start using all the badges right away, issuing the badges through print outs is the quickest option. Badges earnable through Mozilla Webmaker Three of the badges that were designed are fully functional Open Badges that can be earned on Mozilla s Webmaker site ( Like the other 7 Hive Toronto privacy badges, the images and metadata have been created. Additionally, learning activities that can be used to support learners to earn the badges can be accessed from the Hive Toronto site. We consider the badges on the Webmaker site to be late level prototypes, but they may still be adapted or remixed in the future by organizations that implement them. The badges created for this project are accessible via the Hive Toronto website at All badge designs and curriculum resources that were created for this project are licensed under a Creative Commons Attribution-4.0 International License to encourage remix and reuse. The open badge prototypes for privacy (images and metadata) are available on 4

5 Who are the Hive Toronto privacy badges geared towards? The Hive Toronto privacy badges are geared towards teen learners ages 13 and up. There is no particular background knowledge of privacy that is necessary to dive into the activities. The learning activities do not require prior technical experience, but some activities involve the use of hypertext markup language (HTML) to remix or code basic webpages. There is a beginner HTML activity in the Anonymizer badge that is recommended if you or your learners are new to HTML. Who can facilitate the learning activities associated with the badges? The curriculum materials and privacy badges associated with this project can be facilitated by: - After school program facilitators - Civic and legal educators - Librarians - Peer or teen facilitators - Other educators (broadly defined) The learning activities can be aligned with the learning objectives in courses as well as informal learning programs. Easy linkages can be drawn to courses and programs that explore digital citizenship, digital media literacy, civics and legal education, maker education, and learn-to-code initiatives. What are the overarching themes and badge concepts? The Hive Toronto privacy badges are organized under four themes, but it is important to note that the badges can be used in any way you wish. The badges 5

6 can be used as stand-alone activities, or in any combination with other activities. The four themes and the badges they contain are: Personal Information Personal information can include details like your name, address, and any numbers associated with you. This theme explores what personal information is through badges such as the Anonymizer and IP Address Tracer. Privacy Policy Numerous policies and laws are relevant to privacy in Canada. The badges in this section explore learning about privacy laws, such as the Personal Information Protection and Electronic Documents Act (PIPEDA), as well as the institutions and organizations associated with privacy. The implications of emerging technologies such as drones are also explored. The badges in this section include the PIPEDA Remixer, Profiler, and Requester. Privacy in Everyday Life Have you ever been captured by a security camera when grocery shopping? Do soccer advertisements keep popping up in your social media accounts after you are surfing the web? Privacy is something that must occur within everyday life where numerous forms of surveillance are also occurring. The Data Trail Timeline, Mobile and Privacy Coach badges are part of this theme. Privacy Futures There are many emerging technologies. The Internet of Things (IoT) badge and Drones badge, open up the possibility to think about privacy outside of the frame of our current experiences. Each of the overarching themes has an introductory teaching kit available through the Hive Toronto site. The teaching kits provide an introductory exploration of the theme to help you get started. Some of the Hive Toronto badges are cross-listed between the themes. 6

7 What are some appropriate icebreaker activities to explore privacy? Facilitators such as librarians, community center workers, or peer facilitators who are engaging others to learn about privacy may wish to use an icebreaker activity with a group. Some simple icebreakers that may be effective include: Step forward if Prepare several statements related to privacy and teens such as: Step forward if you have a password on a cell phone or another mobile device Step forward if you update a social media account at least 3 times a day Step forward if you have posted something on social media that you regretted Form a circle with your group. Read aloud your statements and have individuals step forward when one of the statements applies to them, if they feel comfortable. Have individuals reform the circle before each statement is read. 7

8 Paper privacy memes Print out some images related to privacy. Have learners mount their chosen image on a larger piece of paper and write out a meme style caption. The meme example included here reads: Geo Data I know what you did last summer! Memes can be witty, funny, and ironic statements about privacy. What can facilitators explore before facilitating the learning activities associated with the Hive Toronto badges? Connected learning The privacy badges were designed to reflect the ideas behind connected learning. Connected learning is openly networked, interest powered, productioncentered, peer supported, and is linked by a shared purpose. Facilitators will notices that all of the privacy badges include learning, which involves productioncentered learning through making, designing, creating, exploring, or experimenting. Peer-to-peer learning is also emphasized through discussions, group work, and creation activities. - Connected Learning Alliance 8

9 Creative Commons and open licenses Many of the learning activities associated with the privacy badges make use of remix. You may find that your learners need access to Creative Commons or openly licensed work to use in their projects. Creative Commons licenses allow creators to set the terms that others can use and sometimes remix their work. You can read up on Creative Commons licenses: - Creative Commons Homepage - Creative Commons Search You may also find alternative open licenses to be helpful for your learners projects. Materials licensed in the public domain for example are also remixable in your projects. Hypertext markup language (HTML) Hypertext markup language (HTML) is the code that is used to make content ready to display on the World Wide Web. HTML typically includes pairs of tags. The following example shows normal text and strong text. See the opening and closing tags in the Code column of the diagram. To edit the text that appears on the website, you need to edit the text between the tags. Code <p>this text will appear normal.</p> <p><strong>this will appear strong.</strong></p> Display on a webpage This text will appear normal. This text will appear strong. Inserting images into webpages is also a skill you may need. The image source tag has a single tag only and specifies the location of the image, the alternative text for the image, and the size of the image in pixels. 9

10 Code Display on a webpage <img src= " sb-stick _640.png" alt="usb key" height="474" width="200"> To learn more about HTML some options include: - Mozilla Developer Network US/docs/Web/HTML - W3Schools - Codecademy If you create webpage projects with learners, you may crewish to store and display them online. Some places where you can create an account to store and display projects include: - Mozilla Webmaker - CodePen What are some suggested pathways for use of the badges? As stated earlier, facilitators and educators are encouraged to use the badges and associated learning activities in any way that is useful to you. Sometimes, it may be possible to weave in one of the badges, to any already existing course or workshop. Other times, organizations may choose to make use of multiple badges as part of a more extended program. The choice of how to use the badges and learning activities is yours. To help different kinds of facilitators get started with the badges, we provide the following suggested learning pathways, which you can take up, or remix. 10

11 After-school programs After-school programs that take place in settings like community centers, may find it useful to being with the Privacy in Everyday Life badges. The Data Trail timeline activity is an engaging introductory activity to privacy. The Mobile badge relates to everyday practices of youth. The Internet of Things badge provides the opportunity to discuss internet fridges and produce a web comic. After school programs with a youth-led focus may find the Privacy Coach badge aligns with peer-to-peer learning strategies. Public libraries Libraries may find that multiple badges relate to their already existing programs and are appropriate to weave into stand-alone workshops. The Anonymizer badge can be introduced in learn-to-code programs in library branches. The Drones badge can be used with 3D printing programs for libraries with maker spaces. The Data Trail Timeline badge can be used in a video or media production oriented workshop. 11

12 Civic or legal education organizations Civic or legal education organizations may be interested in the themes raised in the Personal Information and Privacy Policy themes. The Anonymizer badge is a starting place to examine what personal information is. The Privacy Policy badge sequence of the PIPEDA Remixer, Profiler, Requester and finally Drones can be followed. Peer-to-peer facilitation Peer-to-peer facilitation of the privacy badges can include the Privacy Coach badge. Peer facilitators are encouraged to draw from the other activities that best align with their interests. For example, privacy and coding can be explored through the Anonymizer, Profiler, and Internet of Things badges. 12

13 What are some tips for facilitating the learning activities? Each of the four themes for the Hive Toronto privacy badges, has a teaching kit with background information to assist facilitators. We recommend reading the teaching kits to familiarize yourself with the concepts to be introduced through the learning activities. Each activity kit for the Hive Toronto badge system, also has an accompanying tips sheet for the facilitator. Each tips sheet contains: 1) An Overview: The overview provides a brief description of the activity with additional information to explain the rationale for creating the badge, or insights about using the learning activities with youth. 2) Discussion tips: Each of the discussion questions is listed with key points and information that you can utilize to inform a take up discussion with your learners. Occasionally, extra questions, likely to surface in your group are also addressed. 3) Low connectivity tips: We recognize that access to computers may be limited when you want to utilize these activities. Facilitation options to use paper, or reduce the computer set up to a single computer connected to the internet and a projector, are provided whenever possible. 4) Extension Ideas: Extension ideas go beyond the original activity and may help you move forward with learners who express a strong interest in the initial activity. Extension activities will take longer than the suggested timeline for the activity. 13

14 Anonymizer facilitation tips Overview The Anonymizer badge involves having learners hack a Wikipedia biography page for a celebrity or prominent person. The idea behind the badge is to learn what details may be considered personally identifiable information (PII) in a biography page and to alter them by using a tool called X-Ray Goggles. For example the name of a celebrity could be changed to something like Green Penguin and their place of birth to The Purple Iceberg. Discussion tips Typical responses to discussion topics which emerge when facilitating the Anonymizer badge are provided here. We provide some information to help facilitate a discussion on remixing and hacking for learning and then provide helpful points to assist with take up for the discussion questions. Am I hacking Wikipedia? Learners in this activity are asked to remix a Wikipedia page and this can be considered a form of hacking. The term "hacking" gets a lot of negative press, but that doesn't necessarily mean it's always a bad thing. When we talk about hacking on Webmaker, we are talking about the act of rolling up your sleeves, taking something apart, understanding how it works, and using the original parts to do something new and creative. When you use X-Ray Goggles, you're not actually breaking in to the web page itself like a cyber attacker would. X-Ray Goggles actually "forks" a copy of the page and hosts it on a brand new web page, adding in the changes that you decide to make with using the tool. The goggles allow you to actually view the page's source code, so you can understand how it works and learn valuable skills to enhance your own digital work. With X-Ray Goggles you remix or hack code on your local machine, and if you 14

15 choose, publish your changes to a new page on a Webmaker server. Source: - What kinds of personally identifiable information (PII) were present in the biography page? Learners may identify names, birthplaces, job titles, team names, movie titles, or numerous other details as PII. - Was there any information in the biography page you anonymized that would not be considered personal information (PI) under PIPEDA in Canada? The name and job titles of employees are not considered PI under PIPEDA in Canada. These details were probably anonymized in many of the hacked biography pages. - Do you share any personal information through the internet or use of apps? Learners will likely identify that they share details like their names, addresses, phone numbers, ages, geo-location data, photographs, and more. - If working in a group setting, were you able to guess the identity of the original biography page of any of the other teams? Anonymized biography pages are frequently identifiable by other teams. Details like a prominent accomplishment (i.e., writing a best selling novel, or winning an Oscar) or connections to other prominent individuals can sometimes be the hint that reveals the real identity. - Was there any PI or PII that you could not remove from the biography page? Sometimes teams notice that the overall page url on Wikipedia is not changed through the X-Ray Goggles activity, if learners do not publish their hacked version of the webpage. Learners may also notice that many teams skip changing the URL addresses of the hyperlinks in the biography page which may reveal PI or PII. When taking up this discussion question, it is a good idea to remind learners that digital activities can leave traces of our identities. 15

16 Low Connectivity tips If you want to facilitate this activity without computers, one idea is print out biography pages from Wikipedia and ask learners to create their remixed biography page on a piece of chart paper by cutting and pasting together text. PII can be replaced by new hand-written details. Extension activity Have learners search for themselves online to examine what their online identities reveal about them. Review the tips sheet provided by MediaSmarts on establishing a positive presence online. - Tip Sheet from MediaSmarts Positive Presence Online 16

17 IP Address Tracer facilitation tips Overview Internet protocol (IP) addresses are a kind of personal information that may be collected online that many people do not even think about. Wikipedia defines that an IP Address is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication (Wikipedia, IP address ). An IP address is a string of digits that looks something like Discussion Tips - Do you think an IP Address is personal information? Why or why not? An IP Address is considered personal information by the Canadian government. Learners in your group may be aware that sometimes organizations like a school share a single external IP address and argue against an IP address being PI. - Were there any websites that you tracked where the location information, such as the city or country, was different from where you thought the site should be located? Sometimes IP addresses are masked to appear to be elsewhere. This means that the location of the device or website is made to appear to be elsewhere in the world. - Can you find any statements on whether an internet company or government agency considers an IP address to be personal information? Many Government of Canada websites state that IP addresses are considered PI. For example on February 22 nd, 2014, the following statement was retrieved from Service Canada: the Government of Canada considers the IP address to be personal information, particularly when combined with other data automatically collected when visitor requests a Web page such as the page or pages visited, date and time of the visit. 17

18 - Have you heard of any news stories involving IP addresses? What issues were at stake? Numerous news stories involve IP addresses. Some examples from include: Netflix s perspectives on Canadians use of foreign IP addresses to access extra content Problematic changes, or vandalism, made to Wikipedia pages from particular IP addresses - What steps do people take to keep their IP addresses private? Individuals may choose to use a virtual private network (VPN) or proxy to obscure their IP addresses. Low Connectivity Tips If you want to facilitate this activity without computers you can print out a list of popular IP addresses and have your learners create a paper map. A printable worksheet is available for this activity for your learners to record their research responses on IP addresses. This activity will also work with one internet connected computer and a projector. Extension Idea If your learners have an interest in legal topics, look up cases where IP addresses have factored into prominent cases. Examples of cases include: - Morris v. Johnson, 2011 ONSC 3996 (CanLII) In this case a mayoral candidate who lost the election sought to have the host of the website auroracitizen.ca to release identifying information of anonymous defendants, who she claimed defamed her online - BMG Canada Inc. v. John Doe, [2004] 3 FCR 241, 2004 FC 488 (CanLII) In this case a music industry company sought to have the court order Internet Service Providers (ISPs) to link internet pseudonyms to IP addresses associated with music downloading 18

19 PIPEDA Remixer facilitation tips Overview The idea behind the PIPEDA Remixer badge is to crowdsource the reading and interpretation of a privacy policy, like PIPEDA. Learners in your group will research and explain a portion of PIPEDA such as a fair information practice, or section of the bill, and write up their summary on a remixed webpage template. All the individual pages from this activity, can by hyperlinked off a collaborative main page which acts as the repository for the group s knowledge. Using the webpage templates for this activity requires the ability to edit text in an HTML document. Discussion Tips - What did you learn about the purpose and application of PIPEDA? Groups may note that PIPEDA governs how personal information can be collected and used in relation to commercial activities. It applies for information collected during commercial activities in Canada. In some provinces and territories there is similar legislation in place, that will apply instead of PIPEDA. The Office of the Privacy Commissioner of Canada has resources on the application of PIPEDA that you can refer to for further information. A Guide for Individuals: Protecting your Privacy - How would you characterize the principles from PIPEDA? The principles from PIPEDA are drawn from the fair information principles in the Canadian Standards Association's Model Code for the Protection of Personal Information. Your learners may notice that the principles connect to social values or fairness. - What type of complaints do you expect have been lodged in Canada under PIPEDA? Numerous types of complaints have been launched under PIPEDA. One prominent complaint that was fuelled by students, was a 2008 complaint 19

20 complaint launched through the Canadian Internet Policy and Public Interest Clinic (CIPPIC) in Ottawa. Students were concerned over issues like the inability to truly delete their Facebook profiles and Facebook responded to these concerns. Read more at: CIPPIC Facebook Privacy Commissioner Finds Facebook Violating Canadian Privacy Law Unauthorized credit checks are another area where complaints have been lodged. CBC Story on Unauthorized Credit Check - What was the experience like to try to distill the key points from privacy law? Learners may note that the legal text was difficult to read and understand. Prompt the group to identify strategies that they used to make use of the complex text, such as group discussion. - Where would you look for further information on privacy law in Canada? Some options for further information on privacy law in Canada include: MediaSmarts Government Offices such as the Office of the Privacy Commissioner of Canada or provincial offices Low Connectivity Tips If you lack computers, but still want to facilitate this activity, using print outs and chart paper is an option. Extension Ideas Use your PIPEDA Remix homepage to link together other relevant projects or makes. 20

21 Profiler facilitation tips Overview This badge follows in the tradition of civics education initiatives in Canada, which sometimes aim to familiarize learners with the organizations and individuals involved in policy-making. It is hard to understand policy-making if you don t know what bodies like the House of Commons and people like Members of Parliament are supposed to do. Similarly, it is important to understand the organizations, offices, and job titles that relate to privacy in Canada. Knowing about institutions like the Office of the Privacy Commissioner of Canada (OPC) and the existence of privacy officers in organizations such as corporations, may assist young people to better understand their privacy rights. Discussion Tips - Which organization or job title related to privacy did you profile and why? The activity prompts for the options of the Office of the Privacy Commissioner of Canada (OPC) or privacy officers as a job title. Learners may also locate law clinics, advocacy organizations, research groups, civil society organizations, or provincially-based offices that are active in the debates about privacy in Canada. - How was your organization or job title related to privacy and PIPEDA? The answers that learners provide to this question can be diverse. Sometimes offices and organizations related to privacy are mentioned directly in the legislation. Other times, the organizations may be active in discussions, debates, complaints or news stories about the law. - How might the organizations or professionals associated with privacy work together or otherwise interact? Organizations and privacy professionals may interact through conferences, professional associations, or industry events. For example, the Conference Board of Canada maintains a Council of the Chief Privacy Officers ( with a series of annual meetings. Staff of the OPC and industry representatives sometimes speak at public events, such as the We Are Wearables talk on Wearable Tech Privacy & Identity Payments held in March 2015 ( 21

22 Organizations and professionals associated with privacy can also be involved in complaints processes through the OPC or provincially-based privacy offices. Legal challenges that are taken through the courts also sometimes occur. - Did you uncover any controversies or complaints related to PIPEDA while creating your privacy profile? If any learners in your group choose law clinics or advocacy organizations, they may uncover complaints or privacy challenges raised under PIPEDA. These could include cases like the Facebook complaint, described in the tips for the PIPEDA Remixer activity. Learners may also uncover controversies about technologies that were invading the privacy of users. Low connectivity tips If you lack computers, this activity can be facilitated with print outs and the use of chart paper and markers to construct the profile pages. Extension Idea Create a profile for a privacy relevant organization outside of Canada. 22

23 Requester facilitation tips Overview One of the fair information practices that guides PIPEDA is the right to request personal information that is held about you. This badge is intended to explore some different ways to facilitate practicing this right with teens. Facilitating this activity requires preparation at least a month in advance. If you plan to request information from a telecommunications company, it is recommended that you request the information at least a month in advance. Downloading an archive from Twitter or Facebook should be conducted at least a week in advance, as there may be a delay to generate an archive you can download. Discussion Tips - Are there any differences from the data that can be downloaded from a social media company like Facebook and Twitter, and the personal information that may be requested from a telecommunications company? Learners may note that some social media companies, such as Twitter and Facebook, have built in a feature to allow users to download their data. From the button or link, it is hard to tell what the archive will contain. The process outlined to request personal information data from a telecommunications company includes detailed, itemized requests for particular types of information. In the samples we generated when trialing this activity, IP addresses were not visible from the telecommunications company or Twitter archive, but were visible in the Facebook data. The Twitter and Facebook archives contained photographs, but the response from the telecommunications company had no photographs. - What personal information was in the Twitter archive you reviewed? If you downloaded a Twitter archive you may notice that it contains all of the contents of your tweets. This can include information on events you attended, your political opinions, or friends you interacted with via Twitter. - How might you use your personal information from a download from a social media account? 23

Invitation to participate in a research project. Research assistant, to be hired

Invitation to participate in a research project. Research assistant, to be hired Invitation to participate in a research project Co-Designing Open Badges for Privacy Education with Canadian Youth Information for Toronto area teens (ages 18 19) Principal Investigator: Dr. Karen Smith

More information

SAMPLE LESSON PLAN. Superheroes of the Open Web

SAMPLE LESSON PLAN. Superheroes of the Open Web SAMPLE LESSON PLAN Superheroes of the Open Web Synopsis: In this hands-on workshop, learners aged 10 and up play, deconstruct and modify websites in order to understand how to create content for, and build,

More information

The Computing Curriculum at Coston Primary

The Computing Curriculum at Coston Primary Years Year 1 Year 2 1 and 2 Autumn We are learning about programming and computational thinking and in We are learning about programming and computational thinking and in Year 1 Food and farming Year 2

More information

Website Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer!

Website Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer! Website Planning Questionnaire Colleen Rice Nelson Introduction Thank you for your interest in the services of The Ultimate Answer! Every choice and decision you make concerning your website may or may

More information

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide 1 P a g e Contents Module Objectives... 3 Training Materials / Resources... 3 2 P a g e Module Outcomes After completing these

More information

Executive Summary Key Findings

Executive Summary Key Findings Executive Summary Key Findings Young Canadians immersion in social networking activities, as highlighted in Life Online, provides the context for understanding young people s attitudes and behaviours relating

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

The Notebook Software Activity Guide

The Notebook Software Activity Guide The Notebook Software Activity Guide The Notebook software activity guide is intended to act as a reference of the best practices for creating and presenting lesson activities using Notebook software.

More information

Virtual Exhibit 5.0 requires that you have PastPerfect version 5.0 or higher with the MultiMedia and Virtual Exhibit Upgrades.

Virtual Exhibit 5.0 requires that you have PastPerfect version 5.0 or higher with the MultiMedia and Virtual Exhibit Upgrades. 28 VIRTUAL EXHIBIT Virtual Exhibit (VE) is the instant Web exhibit creation tool for PastPerfect Museum Software. Virtual Exhibit converts selected collection records and images from PastPerfect to HTML

More information

Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

More information

INTRODUCTION TO THE WEB

INTRODUCTION TO THE WEB INTRODUCTION TO THE WEB A beginner s guide to understanding and using the web 3 September 2013 Version 1.2 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video Tutorials 3 How Does the

More information

WEBSITE PRIVACY POLICY. Last modified 10/20/11

WEBSITE PRIVACY POLICY. Last modified 10/20/11 WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us

More information

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the

More information

KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS

KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS KIDS LEARNING CODE: LUNCH +AFTER SCHOOL PROGRAMS We love technology, and want to teach others. With the help of developers, designers and professional educators, we ve created content that not only showcases

More information

A BETTER WAY TO ADVERTISE. Your guide to SmartAds & Internet Advertising

A BETTER WAY TO ADVERTISE. Your guide to SmartAds & Internet Advertising A BETTER WAY TO ADVERTISE Your guide to SmartAds & Internet Advertising CONTENTS The Basics Of Internet Advertising It all starts with Cookies Segmentation Targeting Re- Targeting Geographic Targeting

More information

Twitter For Tourism. Topic Social Media Tutorial 44

Twitter For Tourism. Topic Social Media Tutorial 44 Topic Social Media Tutorial 44 Twitter For Tourism Twitter is a great tool for businesses looking to attract new customers and increase visibility of their branding. By creatively utilising the 140 character

More information

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media

More information

CMS Training Manual. A brief overview of your website s content management system (CMS) with screenshots. CMS Manual

CMS Training Manual. A brief overview of your website s content management system (CMS) with screenshots. CMS Manual Training A brief overview of your website s content management system () with screenshots. 1 Contents Logging In:...3 Dashboard:...4 Page List / Search Filter:...5 Common Icons:...6 Adding a New Page:...7

More information

Pinterest Beginner s Guide for Attorneys

Pinterest Beginner s Guide for Attorneys Pinterest Beginner s Guide for Attorneys Are you looking for an additional source of website traffic and leads? Pinterest can deliver them. This guide will walk you through setting up your account, how

More information

Application for Middle School Programs. First Name Last Name. Grade date of birth / / Home Telephone (

Application for Middle School Programs. First Name Last Name. Grade date of birth / / Home Telephone ( Girls Incorporated of Lynn 50 High Street Lynn Ma 01902 781-592-9744 x230 www.girlsinclynn.org Odyssey Eureka Application for Middle School Programs First Name Last Name Grade date of birth / / Home Telephone

More information

Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps

Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps 1 2 Introduction Canada s privacy laws require all businesses to balance innovation and entrepreneurialism with effective privacy

More information

Websites: Social Networks, Blogs & Usergenerated

Websites: Social Networks, Blogs & Usergenerated INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

5 - Low Cost Ways to Increase Your

5 - Low Cost Ways to Increase Your - 5 - Low Cost Ways to Increase Your DIGITAL MARKETING Presence Contents Introduction Social Media Email Marketing Blogging Video Marketing Website Optimization Final Note 3 4 7 9 11 12 14 2 Taking a Digital

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

NETS for Students: Achievement Rubric

NETS for Students: Achievement Rubric NETS for Students: Achievement Rubric DRAFT (March 22, 2005) Purpose: This draft version of the NETS for Students: Achievement Rubric is available online for educational technology professionals to review

More information

A Guide to Promoting your Project

A Guide to Promoting your Project Contents 1. Introduction 2. Why Promotion? 3. Channels Traditional Media i. Television ii. Radio iii. Print Digital Media 4. Planning Assigning Roles i. Coordinating ii. Speaking iii. Writing iv. Photographer

More information

Thinking About a Website? An Introduction to Websites for Business. Name:

Thinking About a Website? An Introduction to Websites for Business. Name: Thinking About a Website? An Introduction to Websites for Business Name: Thinking About a Website? Workshop Contents: Power point slides Task 1 Answer sheet: What makes a good website? Task 2: Creating

More information

Creating an Email with Constant Contact. A step-by-step guide

Creating an Email with Constant Contact. A step-by-step guide Creating an Email with Constant Contact A step-by-step guide About this Manual Once your Constant Contact account is established, use this manual as a guide to help you create your email campaign Here

More information

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online

More information

Pinterest has to be one of my favourite Social Media platforms and I m not alone!

Pinterest has to be one of my favourite Social Media platforms and I m not alone! Pinterest has to be one of my favourite Social Media platforms and I m not alone! With 79.3 million users, 50 billion pins and 1 billion boards it is host to an enormous amount of content. But many of

More information

Joomla! 2.5.x Training Manual

Joomla! 2.5.x Training Manual Joomla! 2.5.x Training Manual Joomla is an online content management system that keeps track of all content on your website including text, images, links, and documents. This manual includes several tutorials

More information

Brock University Content Management System Training Guide

Brock University Content Management System Training Guide Brock University Content Management System Training Guide Table of Contents Brock University Content Management System Training Guide...1 Logging In...2 User Permissions...3 Content Editors...3 Section

More information

Guidelines for Creating Your Own Troop or Group Web Page

Guidelines for Creating Your Own Troop or Group Web Page Girl Scouts of the USA Guidelines for Creating Your Own Troop or Group Web Page These guidelines are written for adult volunteers, older girls, and others considering developing a Web page or home page

More information

Navigating the Web: Are You Missing The Boat?

Navigating the Web: Are You Missing The Boat? Navigating the Web: Are You Missing The Boat? Laura Patterson, M.A. Senior Instructor, Professional and Technical Communication School of Engineering The University of British Columbia This Morning s Itinerary

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Getting Started with Scratch

Getting Started with Scratch Getting Started with Scratch a guide to designing introductory Scratch workshops draft version, september 2009 Overview There s no one way to host a Scratch workshop. Workshops can take on a variety of

More information

Search Engine Optimization

Search Engine Optimization Search Engine Optimization Search An Introductory Guide How to improve the effectiveness of your web site through better search engine results. As you ve probably learned, having a Web site is almost a

More information

EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010

EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 2 Table of Contents 1. INTRODUCTION... 3 2. EDUCATION ISSUES IN BILL C- 32... 3 3. EDUCATIONAL

More information

Basic Website Creation. General Information about Websites

Basic Website Creation. General Information about Websites Basic Website Creation General Information about Websites Before you start creating your website you should get a general understanding of how the Internet works. This will help you understand what goes

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

17 of the Internet s Best Banner Ads. Love em or Hate em They Do Work!

17 of the Internet s Best Banner Ads. Love em or Hate em They Do Work! Love em or Hate em They Do Work! Banner Ads What are they? Ever since the Internet started to take off in the mid 90 s, banner ads have been an acceptable way of advertising on the Web. Banner ads come

More information

You can make your own layout / theme for your PowerPoint project.

You can make your own layout / theme for your PowerPoint project. About the PowerPoint Intermediate Workshop The purpose of the PowerPoint Intermediate workshop is to inform users more about the design aspect of making presentations. We will build on the skills learned

More information

Copyright Notice: digital images, photographs and the internet

Copyright Notice: digital images, photographs and the internet Copyright Notice: digital images, photographs and the internet Copyright Notice Number: 1/2014 Updated: March 2014 What is a Copyright Notice?... 1 Copyright in images and photographs... 1 The basics...

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

Saving money on food MODULE FOUR MODULE FOUR*

Saving money on food MODULE FOUR MODULE FOUR* making ends meet... and more! * Saving money on food * If possible, this module should take place in or near a grocery store. In some cities, grocery stores offer community rooms that non-profit organizations

More information

User Guide. Chapter 6. Teacher Pages

User Guide. Chapter 6. Teacher Pages User Guide Chapter 6 s Table of Contents 1. Introduction... 4 I. Enhancements... 5 II. Tips... 6 2. Key Information... 7 3. How to Add a... 8 4. How to Edit... 10 I. SharpSchool s WYSIWYG Editor... 11

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

MoneySmart Rookie Community educator guide. Financial literacy for young people

MoneySmart Rookie Community educator guide. Financial literacy for young people MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under

More information

To familiarise University Web administration staff with the capabilities of the University CMS and also introduce concepts of Web marketing.

To familiarise University Web administration staff with the capabilities of the University CMS and also introduce concepts of Web marketing. Web Training Course: Web Editing - How to use the Content Management System (CMS). Version 1.0 Draft October 2006 Version 1.1 March 2007 Version 1.2 April 2007 Course Rationale: The University is currently

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Publicity Guide. How to promote your community relations event through the media. How to promote your community relations event through the media.

Publicity Guide. How to promote your community relations event through the media. How to promote your community relations event through the media. Publicity Guide How to promote your community relations event through the media How to promote your community relations event through the media. 1 Contents 1. Introduction... 4 2. Why publicity?... 4 3.

More information

An easy guide to... MARKETING FOR CLUBS

An easy guide to... MARKETING FOR CLUBS An easy guide to... MARKETING FOR CLUBS Inspiration to Participation Lincolnshire Sport www.lincolnshiresport.com Marketing your Club and Activities Does your club have a media lead? Think about appointing

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Income, Expenses and Budget module

Income, Expenses and Budget module Income, Expenses and Budget module Trainer s introduction The skills to control your personal income, expenses and budget are the most basic tools that people need in their financial toolkit. But many

More information

Twitter for Small Business

Twitter for Small Business Twitter for Small Business A GUIDE TO GET STARTED business.twitter.com @TwitterSmallBiz CASE STUDY A Twitter success story And it all started with that one little Tweet, said Roberta Dyer, whose independent

More information

Promoting Your Business Using Social Media Building a Strategy. Name:

Promoting Your Business Using Social Media Building a Strategy. Name: Promoting Your Business Using Social Media Building a Strategy Name: Promoting Your Business using Social Media Workshop Contents: Power point slides Task 1: What are the benefits of promoting your business

More information

RDM on Demand Privacy Policy

RDM on Demand Privacy Policy RDM on Demand Privacy Policy Ataccama Corp. www.ataccama.com info@ataccama.com Toronto, CA Prague, CZ London, UK Stamford, US 1 ATACCAMA RDM ON DEMAND PRIVACY POLICY 1. Ataccama Corp. ("Ataccama") and

More information

Music and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

More information

Your Blueprint websites Content Management System (CMS).

Your Blueprint websites Content Management System (CMS). Your Blueprint websites Content Management System (CMS). Your Blueprint website comes with its own content management system (CMS) so that you can make your site your own. It is simple to use and allows

More information

Social Media for Business and Professional Use. An Introduction to Queens Library s Presence on Today s Most Popular Online Communities

Social Media for Business and Professional Use. An Introduction to Queens Library s Presence on Today s Most Popular Online Communities Social Media for Business and Professional Use An Introduction to Queens Library s Presence on Today s Most Popular Online Communities Why Should My Company Care About Social Media? It s a global phenomenon:

More information

MODULE: RELATIONSHIPS ONLINE

MODULE: RELATIONSHIPS ONLINE MODULE: RELATIONSHIPS ONLINE DRAFT 23 Everett Street Cambridge, MA 02138, USA youthandmedia@cyber.law.harvard.edu http://youthandmedia.org {1} Overview: This module explores the topic of healthy relationships

More information

OBJECTIVES. The BIG Idea. How do I register for the ACT? What do I need to know for the test day? ACT Registration

OBJECTIVES. The BIG Idea. How do I register for the ACT? What do I need to know for the test day? ACT Registration ACT Registration 3 Taking Tests The BIG Idea How do I register for the ACT? What do I need to know for the test day? AGENDA Approx. 45 minutes I. Warm Up: ACTing Ahead (5 minutes) II. ACT Registration

More information

Facebook SVEA TRAINING MODULES. www.svea-project.eu

Facebook SVEA TRAINING MODULES. www.svea-project.eu Facebook SVEA TRAINING MODULES www.svea-project.eu Author: Louis Dare, Coleg Sir Gâr Project Coordinator: MFG Baden-Württemberg mbh Public Innovation Agency for ICT and Media Petra Newrly Breitscheidstr.

More information

Logging In From your Web browser, enter the GLOBE URL: https://bms.activemediaonline.net/bms/

Logging In From your Web browser, enter the GLOBE URL: https://bms.activemediaonline.net/bms/ About GLOBE Global Library of Brand Elements GLOBE is a digital asset and content management system. GLOBE serves as the central repository for all brand-related marketing materials. What is an asset?

More information

Indiana University Northwest Social Media Handbook

Indiana University Northwest Social Media Handbook Indiana University Northwest Social Media Handbook Introduction Social media has changed the way we communicate both as an institution and as individuals. With tools such as YouTube, Facebook, Twitter,

More information

Bitstrips for Schools http://www.bitstripsforschools.com

Bitstrips for Schools http://www.bitstripsforschools.com The SAMR Model: Integrating Bitstrips for Schools Ministry Licensed Resource Title: Description of resource Bitstrips for Schools http://www.bitstripsforschools.com Bitstrips for Schools is an online educational

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood

Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood How Do You Get Found in Local Search and Stay There? As you've likely noticed when searching on Google over the past

More information

Guidelines for Effective Email Creative

Guidelines for Effective Email Creative Guidelines for Effective Email Creative While the need for quality and effective design has always existed from a marketing standpoint, challenges unique to the email space require a different look at

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Let s Connect. Best Practices. A Helpful Guide for Your WebsiteAlive Account

Let s Connect. Best Practices. A Helpful Guide for Your WebsiteAlive Account TM Let s Connect Best Practices A Helpful Guide for Your WebsiteAlive Account Table of Contents Best Practices 3. Why Add Live Chat? 3. How Will You Be Using Live Chat 4. What Capabilities Do You Need

More information

AN INTRODUCTION TO PINTEREST FOR BUSINESS.

AN INTRODUCTION TO PINTEREST FOR BUSINESS. AN INTRODUCTION TO PINTEREST FOR BUSINESS. A setup and strategy guide for marketers. A publication of 2 CONTENTS. 04 10 Why Use Pinterest? How to Create a Pinterest Business Account 15 15 Pinterest for

More information

to get more customers online

to get more customers online ONLINE MARKETING WITH 25 MARKETING TIPS & TRICKS to get more customers online @ 2015 ReachLocal, Inc. All Rights Reserved. REACHLOCAL is a registered trademark. reachlocal.com 1 In the perfect world, getting

More information

Program Your Own Game

Program Your Own Game Program Your Own Game Provided by TryEngineering - Lesson Focus Lesson focuses on how software engineers design computer games and other software. Student teams work together to develop a simple computer

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

How to train your Browser Controller

How to train your Browser Controller How to train your Browser Controller Table of Contents ABOUT 3 TOP BAR SETTINGS 3 CHILD LOCK 3 SPYDERWEB 3 PERSONAL PRIVACY EXPOSURE 4 KEY & STATS 4 GRAPH VIEW 4 AUTO-REFRESH 5 DOMAIN GEO-LOCATION INFO

More information

Database Security. The Need for Database Security

Database Security. The Need for Database Security Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important

More information

State of Nevada. Ektron Content Management System (CMS) Basic Training Guide

State of Nevada. Ektron Content Management System (CMS) Basic Training Guide State of Nevada Ektron Content Management System (CMS) Basic Training Guide December 8, 2015 Table of Contents Logging In and Navigating to Your Website Folders... 1 Metadata What it is, How it Works...

More information

Level: 3 Credit value: 5 GLH: 40 Assessment type:

Level: 3 Credit value: 5 GLH: 40 Assessment type: Unit 352 Website software UAN: Level: 3 Credit value: 5 GLH: 40 Assessment type: Relationship to NOS: Assessment requirements specified by a sector or regulatory body: Aim: Y/502/4632 Portfolio of Evidence

More information

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to

More information

ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS

ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY COLLECTION AND USE OF INFORMATION FROM USERS ADVANCED CABLE COMMUNICATIONS WEBSITE PRIVACY POLICY Advanced Cable Communications ( Company ) strives to offer visitors to its website (the Site ) the many advantages of Internet technology and to provide

More information

Financial Literacy. Banking and financial services

Financial Literacy. Banking and financial services Financial Literacy Banking and financial services HANDOUT 4-1 Banks and credit unions 1 Banks and credit unions are places where you can safely deposit your money, cash your cheques, pay your bills, ask

More information

New Mexico 3-Tiered Licensure System

New Mexico 3-Tiered Licensure System New Mexico 3-Tiered Licensure System Requirements & Guidelines for the Preparation of the New Mexico Professional Development Dossier (PDD) for Teachers Prepared by the New Mexico Public Education Department

More information

How To Write A Cq5 Authoring Manual On An Ubuntu Cq 5.2.2 (Windows) (Windows 5) (Mac) (Apple) (Amd) (Powerbook) (Html) (Web) (Font

How To Write A Cq5 Authoring Manual On An Ubuntu Cq 5.2.2 (Windows) (Windows 5) (Mac) (Apple) (Amd) (Powerbook) (Html) (Web) (Font Adobe CQ5 Authoring Basics Print Manual SFU s Content Management System SFU IT Services CMS Team ABSTRACT A summary of CQ5 Authoring Basics including: Setup and Login, CQ Interface Tour, Versioning, Uploading

More information

We are bloggers. > History: The blog activity could replace a diary. > Enjoy and achieve > Make a positive contribution

We are bloggers. > History: The blog activity could replace a diary. > Enjoy and achieve > Make a positive contribution Unit 5.3 We are bloggers Media reviews 1 About this unit Software: WordPress / Blogger / learning platform blogging tool or similar (also, GIMP, Audacity, Windows Movie Maker (Windows XP), Windows Live

More information

Digital Life 102 LESSON PLAN UNIT 1. Essential Question What is the place of digital media in our lives?

Digital Life 102 LESSON PLAN UNIT 1. Essential Question What is the place of digital media in our lives? LESSON PLAN Digital Life 102 UNIT 1 Essential Question What is the place of digital media in our lives? Lesson Overview Students test their knowledge of digital media and learn some statistics about media

More information

User Documentation SEO EXPERT

User Documentation SEO EXPERT The SEO Expert module helps you quickly: User Documentation SEO EXPERT Create and personalize Friendly URLs Insert Meta tags for product pages, Facebook posts and Twitter Cards in your shop This module

More information

How to Use Social Media to Enhance Your Web Presence USING SOCIAL MEDIA FOR BUSINESS. www.climbthesearch.com

How to Use Social Media to Enhance Your Web Presence USING SOCIAL MEDIA FOR BUSINESS. www.climbthesearch.com USING SOCIAL MEDIA How to Use Social Media to Enhance Your Web Presence FOR BUSINESS www.climbthesearch.com s Share WRITTEN Khoi Le Marketing Director khoi@climbthesearch.com 2 INTRODUCTION If you or the

More information

Social Media Playbook

Social Media Playbook Social Media Playbook Personalized Experience Social technologies are changing the way we collaborate and communicate with each other. Many traditional forms of marketing and advertising have been replaced

More information

SVSU Websites Style Guide. Need help? Call the ITD Lab, x7471

SVSU Websites Style Guide. Need help? Call the ITD Lab, x7471 SVSU Websites Style Guide SVSU Websites Style Guide Need help? Call the ITD Lab, x7471 1 SVSU Websites Style Guide Contents Writing for the Web...3 Questions to Ask Yourself...3 Who is our priority audience?...3

More information

YOUR MONEY, YOUR GOALS. A financial empowerment toolkit for community volunteers

YOUR MONEY, YOUR GOALS. A financial empowerment toolkit for community volunteers YOUR MONEY, YOUR GOALS A financial empowerment toolkit for community volunteers Consumer Financial Protection Bureau April 2015 Table of contents INTRODUCTION PART 1: Volunteers and financial empowerment...

More information

WEB SITE DEVELOPMENT WORKSHEET

WEB SITE DEVELOPMENT WORKSHEET WEB SITE DEVELOPMENT WORKSHEET Thank you for considering Xymmetrix for your web development needs. The following materials will help us evaluate the size and scope of your project. We appreciate you taking

More information

Best Practices in Digital Rights Management:

Best Practices in Digital Rights Management: Neustar Insights Whitepaper Best Practices in Digital Rights Management: Reducing the Risk to Online Content with IP Intelligence CONTENTS Executive Summary 2 Content Reigns on the Internet 3 The Need

More information