background preloader

Online Safety Guide

Online Safety Guide
Home / Kids' Safety / Safety Guide Keeping children safe on the Internet is everyone's job. Parents need to stay in close touch with their kids as they explore the Internet.Teachers need to help students use the Internet appropriately and safely.Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing.Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities.It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. A little perspective from a parent who's been there Just as adults need to help kids stay safe, they also need to learn not to overreact when they find out a child or teenager has been exposed to inappropriate material or strayed from a rule. The challenges posed by the Internet can be positive. Guide to Online Privacy

The Definitive Guide to Online Reputation Management There are a lot of misconceptions about online reputation management. Some people think it’s just social media monitoring, while others believe it has something to do with public relations, and still others literally have no idea how it can impact business and sales. In this guide, I’m going to explain the role of online reputation management in today’s business and media landscape. Companies of every size can benefit from having a clear outline of its main concepts. They Are Talking About You Just a few years ago, the internet was very different. The situation has radically changed. No matter the size of your business, they (prospects, customers, clients…anyone and, potentially, everyone) are talking about you. If you think you can skip this, or if you think you can make it without taking into account people’s voices, opinions, and reviews, think again. The Transparency Risk One of the most recent business commandments is “Be transparent.” What does being “transparent” mean? 1. 2. 3. 4.

DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990s Below is the executive summary for "Doomed to Repeat History? Lessons From the Crypto Wars of the 1990s." Read the full paper here. In the past year, a conflict has erupted between technology companies, privacy advocates, and members of the U.S. law enforcement and intelligence communities over the right to use and distribute products that contain strong encryption technology. Encryption is a method by which two parties can communicate securely. The act that truly launched the Crypto Wars was the White House’s introduction of the “Clipper Chip” in 1993. Nonetheless, the idea that the government could find a palatable way to access the keys to encrypted communications lived on throughout the 1990s. While the domestic fight over key escrow wore on throughout the mid-1990s, another related battle was brewing on the international front over U.S. export controls and encryption technology. It seems like we may once again be on the verge of another war: a Crypto War 2.0.

Cybersecurity in K-12 education: Schools face increased risk of cyber attacks - Fedscoop Editor’s Note: This is part 1 of a three-part series on cybersecurity in K-12 education. Part 2 will focus on the National Initiative for Cybersecurity Education. When Terry Van Zoeren came out of retirement this year to be interim superintendent at a New Jersey school district, he didn’t anticipate dealing with a cyber attack. But the 20-year administration veteran was forced into action in March when a savvy foreign hacker held the Swedesboro-Woolwich School District’s computer system for a ransom — making it impossible for kids at four elementary schools to take their online statewide tests as scheduled. “I hadn’t expected anything like this to happen,” Van Zoeren said in an interview last week with FedScoop. “It made us think really long and hard about the security necessary to make sure something like this is less likely to happen again.” There’s also the wealth of data that schools routinely collect on students and store on their servers, from attendance records to medical issues.

Computers, Freedom, and Privacy in a Networked Society (2010) -- the 20th annual CFP conference.

Related: