1 / 12

Privacy & Other Issues

Privacy & Other Issues. Acceptable Use Policies. When you sign up for an account at school or from an Internet Service Provider, you agree to their rules and restrictions. Your use privileges can be suspended or terminated if the rules are broken.

garan
Télécharger la présentation

Privacy & Other Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy & Other Issues

  2. Acceptable Use Policies • When you sign up for an account at school or from an Internet Service Provider, you agree to their rules and restrictions. • Your use privileges can be suspended or terminated if the rules are broken. • If you didn’t read the AUP when you signed up, you can always find it on their Web site. • You can’t plead ignorance on not knowing of the AUP.

  3. Viruses, Trojans, Worms • Virus - a program that attaches itself to a host, and copies itself onto new files/disks • Macro viruses - small program written using a macro language for a specific program that executes when a document is opened. • Trojan horse - a program that slips into the system using a disguise (a game, screen saver) • Worm - like a virus, but it reproduces and works over networks • Some are harmless, but many are destructive.

  4. Avoiding Viruses, Worms, etc. • Use antivirus software and update it regularly • Keep floppy disks out of your floppy drive unless you are working on them. • Consider disabling Java and Javascript capabilities on your Web browser • Back up files • Disconnect your computer from Net when done. • Do not open “strange” email attachments

  5. Avoiding Viruses, Worms, etc. • Viruses and email • You cannot get a virus from a plain text message. • Attachments can carry viruses or be a trojan horse • Save attachments to the hard drive before you open it. • See p. 62 for helpful tips for setting up mailer programs to save files automatically • Do not take the filename by face value. • Delete unexpected attachments

  6. Information Online • Information about you = $$$ • Advertisers love to know about you and what you like and buy • Web Pages can be customized to your tastes • Information can be maintained in databases and made available to others

  7. Information Gathering • A lot of information is voluntarily given by you • Other information can be gathered via search engines and other resources.

  8. Security • Who cares? • What can you do? • Make passwords hard to figure out • Log out of your account • Do not give out unnecessary personal info • Beware of scams • Shop and use auctions safely

  9. Libel, Threats, Professionalism • Libel- written or pictoral statement that damages a person/organization ($ or other). • Posting libelous statements online can result in a lawsuit against the poster. • Private individuals have more rights than public ones (i.e. politicians) • Remember that email can easily become publicly viewable.

  10. Libel, Threats, Professionalism • Do not take threats casually. • A flame is an email or newsgroup message where the author attacks another person with high intensity. • A flame war is an exchange of flames between 2 or more people. • In the workplace you may be monitored and harassment is taken seriously. Use your head.

  11. Software Piracy and Infringement • SW Piracy - the willful reproduction or distribution of 1+ copies of a program/work. • Read your program’s license agreement to see what you can do with the program. • The Internet and CD-R has made piracy of software and music easier for people. • A good way to get a virus.

  12. More Security • Secure Web Documents • Where Web documents reside on a secure server (that uses encryption schemes) • Making sure that the right people get access to documents • Firewalls • software/hardware that restricts access to the LAN to trusted users (controlling traffic in both directions)

More Related