Page 16 - 2.1
P. 16

JIMINY SELF-HELP HANDBOOK   16


               When speaking about communication online, emails are used on a regular basis, but this does not
               mean they are free of scams. The easiest and quickest way to find out if an email is from a fraudster is
               to check the sender's email address. Unfortunately, it happens that an email from a fraudster comes
               from a reliable email address because the fraudster hacks into someone's mailbox. In such a situation,
               if anything raises our doubts, it is advised to simply ignore such an email and delete it  - under no
               circumstances should we open the email, let alone click on the links or attachments provided inside it.
               Never open unknown attachments and do not click on links to pages unless you are 100% sure of their
               source. On the other hand, when sending an email instruct learners that they can choose who sees
               their messages (CC and BCC). Similar precautions apply to social media - in the account privacy settings
               of the channel, account owners can decide what information is made public. A little scepticism will
               come in handy even if the Facebook message or email in our inbox comes from a person we know. It
               may turn out that our friend's computer was previously infected with malware and sends out messages
               with a "surprise" on its own. Further speaking, things you put on the Internet will stay there forever.
               That is why it is worth thinking twice before clicking on the "send" or “post” button. Especially if you
               share your private information - photos, personal data. The pinnacle of carelessness is to upload a scan
               of your ID card or driver's license to a free server. "Identity thieves" will certainly benefit from such a
               “gift”.  In  order  to  maintain  security  or  a  sense  of  anonymity  on  the  network,  it  is  worth  using
               pseudonyms. If you don't have to give out your personal data, don't do it. The less information about
               you on the web, the more secure your activity is.

               Although  mentioned  here  as  last,  an  important  issue  that  should  not  be  neglected  is  password
               protection. It is worth making sure that they are effective enough in case of a hacking attack. The best
               way to do this is to use different passwords for different pages, different for the bank service, on the
               mailbox and social networking sites. In this way, if the password to one page leaks, the hacker will not
               log on to the others. Names or dates should not be used, as guessing random characters is much
               harder. Learners should be alert not to share passwords with anyone else and change their passwords
               from time to time to avoid the theft of data and further related consequences. You should also instruct
               learners to sign off accounts.

               The  DigiCompEdu  Framework  is  also  a  roadmap  on  how  to  protect  sensitive  digital  content.
               Managing, protecting and sharing digital resources competence of the Framework addresses this topic.
               And  marks  how  to:  organize  digital  content  and  make  it  available  to  learners,  parents  and  other
               educators;  effectively  protect  sensitive  digital  content,  respect  and  correctly  apply  privacy  and
               copyright rules, and understand the use and creation of open licences and open educational resources,
               including their proper attribution. In this regard, additional safety is recommended when:

                     Sharing resources using links or as attachments.
                     Sharing resources on online platforms or personal / organisational websites / blogs.
                     Sharing  own  repositories  or  resources  with  others,  managing  their  access  and  rights  as
                      appropriate.
                     Sharing  administrative  and  student-related  data  to  colleagues,  students  and  parents,  as
                      appropriate.

               2.3. Copyright
               When using or sharing information, content and resources found on the Internet, you are required to
               check if the material has been created and shared by authors with licenses permitting its open use.
               Therefore, digital resources that are in the public domain are not necessarily available for open, free
   11   12   13   14   15   16   17   18   19   20   21