Internet Safety. A guide to staying smart & safe online
|
|
- Briana Taylor
- 7 years ago
- Views:
Transcription
1 Internet Safety A guide to staying smart & safe online
2 What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online
3 It s not just about computers There are many ways to use the internet - Computers - Mobile Phones, ipods - Game Consoles (Xbox360, Playstation) And many places - At home, at friend s houses, on the street, in shops/cafes
4 Privacy If a website is too nosey you re probably right! If a website or person is asking for too much information think before handing over those details. Create an internet version of yourself Use a different date of birth for websites Use an internet name for websites (perhaps create a new middle name) Look for the Privacy Settings and you decide how private you want to keep your information
5 Privacy - tips No need to keep logged in! Stop others using your account if you leave your PC or phone unattended. This would be like walking away from an ATM leaving your card in the machine.
6 Privacy Tips Look for your Privacy Settings
7 Privacy You decide what level of privacy you want. Take responsibility for your information. Rule Of Thumb: if you wouldn t like the information stuck on your front door for everyone to see would you put it online? In the next few slides we ll show you some examples of how to take control of your information
8 Privacy Tips In this example anybody can see all of your information.
9 Privacy Tips In this example only your friends can see your information.
10 Privacy Tips You can decide using a Custom setting.
11 Privacy Tips With higher privacy settings none of this information would be available to a complete stranger. Adam has not used a real photo a good idea.
12 In this example Heather has not used a real photo and has blocked strangers from seeing any of her information
13 Privacy Tips Facebook? Bebo? Pretty much all the same
14 Staying Safe Online Cyberbullying is usually done through text messages, , online chat. In the next few slides we ll show you how to take action.
15 Staying Safe Online Best first step is to block someone from contacting you online. If they can t contact you they can t do anything. How to block someone on Facebook.
16 Staying Safe Online
17 Staying Safe Online Online Chat this includes online chatting in Facebook, Bebo and Instant Messenger. Every online chat system will have a way to block or delete people. Usually it is as simple as right-clicking on their name and choosing block or delete.
18 Staying Safe Online How to avoid trouble 99% of the time there are no problems online. Just like in real life you should stay aware of your surroundings. Classic internet arguments & problems - Online discussion forums with sensitive or controversial subject matter (politics, religion etc) - Keyboard Warriors who spend their time online looking for victims.
19 Internet Language Constantly changing You can do a search if you don t know what it means
20 Internet Language
21 Internet Language
22 Resources
23 Resources
24 Some tips if Ur Bn Bullied By text or video messages: Turn off your phone for a few days If it persists change your number Don t reply Report persistent abuse to your mobile service provider Keep the evidence Text harassment is a crime. If just annoying tell an adult; if threatening or malicious tell the Gardai
25 By phone calls: Put the phone down Always tell an adult Don t give any personal details Use voic or caller ID to vet your phone calls Don t leave your name on your voice mail greeting or get an adult to record your greeting Calls can usually be traced Think about changing your number Keep a record of nuisance calls and report them to the Gardai
26 By and website: Never reply to unwanted or unpleasant s Keep the messages as evidence and tell an adult Never reply to someone you don t know as this will confirm your address as real Keep personal information private Contact the sender s ISP by writing, e.g. abuse@hotmail.com Stop, Block and Tell Think B4U Click
Internet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationStaying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationCyber Safety and Anti Bullying Policy
Tarlee Primary School Cyber Safety and Anti Bullying Policy Policy Review: Due to the rapid speed of technological innovation, Internet technology and the schools use of technological resources that will
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationParent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009
Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Princeton Survey Research Associates International for the Pew Internet & American Life Project Sample:
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationCybersafety and protocols for conducting online life?
Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationHint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationGrand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationWORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
More informationIdaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents
stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition
More informationChatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses
More informationGeneral Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationA guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:
A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.
More informationRCN BUSINESS OFFICE MOBILITY FOR DESKTOP
RCN BUSINESS OFFICE MOBILITY FOR DESKTOP Quick Reference Guide 3 Office Mobility File Tools Help RECEIVING CALLS JOE SMITH Enter name or number + When someone calls your RCN Business number, you ll see
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationFacebook Guidelines For Parents
Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationAn Easyread guide on how to deal with Nuisance phone calls and text messages. Northamptonshire Learning Disability Partnership Board
An Easyread guide on how to deal with Nuisance phone calls and text messages Northamptonshire Learning Disability Partnership Board Nuisance calls What are nuisance calls? Nuisance calls are unwanted phone
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationSibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationAudio setup and making calls
Forward your Quick Start Guide phone calls Want your calls to go to your Voice Mail or to your cell phone or a hotel room phone?. In the lower-left of the main Skype for Business window, click the Call
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationRingCentral for Desktop. UK User Guide
RingCentral for Desktop UK User Guide RingCentral for Desktop Table of Contents Table of Contents 3 Welcome 4 Download and install the app 5 Log in to RingCentral for Desktop 6 Getting Familiar with RingCentral
More informationCyberbullying A whole-school community issue
Cyberbullying A whole-school community issue Introduction Today s children and young people have grown up in a world that is very different from that of most adults. Many young people experience the internet
More informationTeen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More informationLync 2013 Quick Reference Lync Meetings. Join a Lync Meeting. Schedule a Lync Meeting. Do I need a PIN, work number or extension? Set meeting options
Join a Lync Meeting 1. In the meeting request, click Join Lync Meeting or click Join Online in the meeting reminder. 2. On the Join Meeting Audio window, select one of the options: Use Lync (full audio
More informationStalking. Office for Student Affairs
Stalking The Aurora Center for Advocacy & Education 117 Appleby Hall*128 Pleasant St. SE*Minneapolis, MN 55455 Business Line: (612) 626-2929 Email: aurora.center@umn.edu*website: www.umn.edu/aurora Office
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationOnline Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk
Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to
More informationSkype Forensics: Analyzing Call and Chat Data From Computers and Mobile
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging
More informationSocial Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
More informationWISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk
WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading
More information(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).
ELECTRONICALLY MEDIATED COMMUNICATION (EMC) Communication sent via a channel such as a cell phone or the Internet (versus face-to-face). Examples of EMC Cell phones Computerconferencing Discussion boards
More informationNew Social Networking Apps
Do you track your child s Facebook account and texting (We certainly hope so!)? Well, time for an update on alternative networking and messaging apps teens are using (often with a much more raw side of
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationNower Hill High School
Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline
More informationUPDATE Appendix H: How to set Facebook s privacy settings to increase security
UPDATE Appendix H: How to set Facebook s privacy settings to increase security (October 2012) Please note that in order to protect yourself you should also change your Security Settings and all the options
More informationCreate a Basic Skype* Account. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.
Create a Basic Skype* Account Intel Easy Steps 1 2012 Intel Corporation Using Skype* to Communicate: Create and use a Basic Skype Account There are different ways of communicating and sharing through the
More informationHome-School Agreement
Home-School Agreement Why do we have a Home-School Agreement? As a School we aim to provide an outstanding education, both within and beyond the classroom, which enables all our students to realise and
More informationSprint Worldwide Services Guide
Sprint Worldwide Services Guide HTC Touch Pro2 www.sprint.com 2009 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. Table of Contents Sprint
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More informationHelping to keep your children safe online
Helping to keep your children safe online Chat speak how many of these do you know? gr8 BRB DEGT LMIRL POS KPC P911 PAL PAW PIR Adults often have anxieties about new media Everything that s already in
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informationCould you spot a scammer?
Could you spot a scammer? Keeping you safe and secure Fraud can affect anyone whatever your background, age or experience And attempts can come in all shapes and sizes over the phone, on the internet or
More informationSign in to Outlook Web App
Getting Started with Outlook Web App Sign in to Outlook Web App Sign in to Outlook Web App Go to Microsoft Online Services webpage at https://login.microsoftonline.com/ 1. Login with your UTHSC email address
More informationCreating a Google Voice Account:
Google Voice: Texting Appointment Reminders to Students Google Voice is a free web-based program that provides the opportunity to send and receive free text messages and calls. All that is necessary is
More informationReference Guide Table of Contents
Reference Guide Table of Contents Overview and Quick Start 2 Log in and hear my messages 3 Skip, Forward, Save, or Delete a message 3 Change my PIN number (Passcode) 3 Change my Status while logged in
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationMicrosoft Office & Lync Tech Tips
Microsoft Office & Lync Tech Tips Tech Tip - Using Conversation View in Outlook There are several ways to sort or organize your e-mails within Outlook. Sorting by sender, subject, received date and size
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationInternet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
More informationRelated KidsHealth Links. Discussion Questions
Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible
More informationTelephone Users Guide
Telephone Users Guide T A B L E O F C O N T E N T S 1 WELCOME TO ARMSTRONG TELEPHONE 2 Our Commitment to You Identifying Our Employees Dialing 911 - Your Safety Is Important 3 HOW TO MAKE CALLS Domestic
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationSaheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
More informationMiVoice 6725ip Microsoft Lync Phone 41-001368-00 REV04 WORK SMART USER GUIDE
MiVoice 6725ip Microsoft Lync Phone 41-001368-00 REV04 WORK SMART USER GUIDE NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks
More informationKeeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety.
// CRIME IS LOW IN LANCASHIRE We want to work with you to keep it that way. This section contains tips on how you can help to prevent crime and avoid becoming a victim of crime. Click on the contents below
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationSkype for Business: Get Started... 3. Set-up Audio... 3. Set-up Video... 3. Conversation Window... 4. Shut Your Virtual Office Door...
Desktop/Laptop Contents : Get Started... 3 Set-up Audio... 3 Set-up Video... 3 Conversation Window... 4 Shut Your Virtual Office Door... 4 Personalise... 5 Customise What s Happening Today... 5 Profile
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationCisco Unity Connection Voicemail User Guide
Cisco Unity Connection Voicemail User Guide University of Alberta IST Voice & Data Networks Telephones Effective July 25, 2011 Table of Contents Table of Contents... 1 CISCO UNITY VOICEMAIL USER TRAINING
More informationWhatever your experience as a tarot operator you will receive full training and support from our experienced support team. 3.
CONTENTS 1. WELCOME TO THE COMPANY... 3 2. SELF EMPLOYED STATUS... 3 3. PAY INFORMATION... 3 4. INFORMATION AND REQUIREMENTS... 4 5. THE SYSTEM... 4 6. CREATING YOUR WEB PROFILE... 6 7. CODE OF CONDUCT...
More informationUnified Communications Android Client Quick Reference Guide
Unified Communications Android Client Quick Reference Guide Table of Contents About MegaPath Unified Communications (UC)... 2 Download and Install the UC Client... 2 Logging In... 3 Logout... 3 The UC
More informationWyoming 2012. www.homeschoollegaladvantage.com
Wyoming 2012 Wyoming Homeschooling Requirements: Approach Establish a homeschool Compulsory Attendance Applies to children who are 7 years of age on or before September 15, and who have not yet attained
More informationUniCom Enterprise Phone (Polycom CX600) User Guide
UniCom Enterprise Phone (Polycom CX600) User Guide 1 6 What is UniCom Enterprise?...1 Frequently Used Make a Call...6 What is Microsoft Lync?...1 Call Functions Use Call Controls...7 Who can use UniCom
More informationAmy wants to use her email to view some photos her friend Sandy sent, from her vacation to Washington DC.
E-mail Attachments Hi, I m Sarah. I m going to show you how to download files people send to you in emails, and how to send your own files to other people using your email. We ll follow along with Amy,
More informationInternet Safety & Awareness. Dan Tomlinson 02/23/2013
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
More informationTerese Jonsson, Open Up Administrator, talks through the basics of online social networking.
Social Networking Terese Jonsson, Open Up Administrator, talks through the basics of online social networking. What is social networking? An online social network is a website where you can set up a profile
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More information