Page 16 - 2.1
P. 16
JIMINY SELF-HELP HANDBOOK 16
When speaking about communication online, emails are used on a regular basis, but this does not
mean they are free of scams. The easiest and quickest way to find out if an email is from a fraudster is
to check the sender's email address. Unfortunately, it happens that an email from a fraudster comes
from a reliable email address because the fraudster hacks into someone's mailbox. In such a situation,
if anything raises our doubts, it is advised to simply ignore such an email and delete it - under no
circumstances should we open the email, let alone click on the links or attachments provided inside it.
Never open unknown attachments and do not click on links to pages unless you are 100% sure of their
source. On the other hand, when sending an email instruct learners that they can choose who sees
their messages (CC and BCC). Similar precautions apply to social media - in the account privacy settings
of the channel, account owners can decide what information is made public. A little scepticism will
come in handy even if the Facebook message or email in our inbox comes from a person we know. It
may turn out that our friend's computer was previously infected with malware and sends out messages
with a "surprise" on its own. Further speaking, things you put on the Internet will stay there forever.
That is why it is worth thinking twice before clicking on the "send" or “post” button. Especially if you
share your private information - photos, personal data. The pinnacle of carelessness is to upload a scan
of your ID card or driver's license to a free server. "Identity thieves" will certainly benefit from such a
“gift”. In order to maintain security or a sense of anonymity on the network, it is worth using
pseudonyms. If you don't have to give out your personal data, don't do it. The less information about
you on the web, the more secure your activity is.
Although mentioned here as last, an important issue that should not be neglected is password
protection. It is worth making sure that they are effective enough in case of a hacking attack. The best
way to do this is to use different passwords for different pages, different for the bank service, on the
mailbox and social networking sites. In this way, if the password to one page leaks, the hacker will not
log on to the others. Names or dates should not be used, as guessing random characters is much
harder. Learners should be alert not to share passwords with anyone else and change their passwords
from time to time to avoid the theft of data and further related consequences. You should also instruct
learners to sign off accounts.
The DigiCompEdu Framework is also a roadmap on how to protect sensitive digital content.
Managing, protecting and sharing digital resources competence of the Framework addresses this topic.
And marks how to: organize digital content and make it available to learners, parents and other
educators; effectively protect sensitive digital content, respect and correctly apply privacy and
copyright rules, and understand the use and creation of open licences and open educational resources,
including their proper attribution. In this regard, additional safety is recommended when:
Sharing resources using links or as attachments.
Sharing resources on online platforms or personal / organisational websites / blogs.
Sharing own repositories or resources with others, managing their access and rights as
appropriate.
Sharing administrative and student-related data to colleagues, students and parents, as
appropriate.
2.3. Copyright
When using or sharing information, content and resources found on the Internet, you are required to
check if the material has been created and shared by authors with licenses permitting its open use.
Therefore, digital resources that are in the public domain are not necessarily available for open, free