Tuesday, 16 September 2014

Components 2 & 3: Applying Digital Information Security Practices and Applying personal Security Protocols

Applying Digital Information Security Practices is referred to in the curriculum as an independent process where students should begin to apply strategies for determining and protecting the the security of digital information and develop an understanding of some of the risks that can be present when working with different types of online environments, such as social media (ACARA, 2014). Applying Personal Security Protocols relates closely to this, but has a heavier emphasis on the personal aspect. This component also deals with the recognition and reporting of cyber bullying and displaying mindfulness and tactfulness when online.

Applying these kinds of practices could be displayed when creating an private online webpage. For example, later in the year we will be looking at creating personal blogs that the children can upload their work to. These will be private and therefore students will have to configure the settings for this to happen. this could involve a friend trying to access it to ensure it can't be found. Another example of keeping safe would be using non-predictable usernames and passwords.

Social Media

Some of you may already be aware of the age restrictions of certain social media sites like Facebook, Twitter and YouTube, but provided below are a set of links to each of these sites' privacy policies and terms of use. You may know be fully aware that your child is using these sites, you may not, what's important is that you know that they are conducting themselves in the correct manner on these sites and that, above all, they are safely using the technology.

Facebook

Twitter

YouTube


No comments:

Post a Comment

CC License

Creative Commons Licence
Social and Ethical use of ICT by Andy Thomas is licensed under a Creative Commons Attribution 4.0 International License.