SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
BUREAU          OF      E D U C AT I O N A L       AND        C U LT U R A L      A F FA I R S



                     Your Safety and Security Online:
                               Safety Tips

The U.S. Department of State’s Bureau of Educational and Cultural Affairs takes your online safety
and security very seriously. As you use social networks, e-mail, and the Internet, please consider the
following Safety Tips:

1. Never broadcast private contact information. Never list your e-mail address or phone number in any
public space, such as your profile page, a blog, forums, or photo caption.

2. If you are a member of a social network, pay close attention to your privacy settings, which allow you to
choose how much personal information you reveal and to whom.

3. Carefully consider what you publish on social networks. Before you post photos, videos, or text, ask
yourself if it would embarrass you if your family or employer saw them.

4. Before you add a widget (an application that can be shared with others electronically) to your profile,
think about whether you want the creators of the widget to be able to access your profile page and
information about your activity on the social network. Keep in mind that the social network generally has no
control over these widgets, so exercise discretion when using these tools.

5. Report any abuses of a website’s Terms of Use to the website’s administrators. Any reputable website or
social network will have a way for you to report abuses.

6. E-mail can be used to spread malicious software or obtain your personal information in order to commit
fraud.
    To protect yourself and the computers that you use, follow the guidelines below:

•   Be suspicious of unsolicited e-mail messages or phone calls from individuals asking for personal information.
    If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with
    that organization.

•   Never provide personal or financial information (credit card numbers, PIN numbers, identification numbers) in
    response to e-mails or telephone calls that you did not initiate.

•   Do not send personal or financial information over the Internet before checking the website’s security. (Secure
    website addresses begin with “https://”)

•   Pay attention to the address of a website, located at the top of the screen. Malicious web sites may look
    identical to a legitimate site, but the address may use a variation in spelling or a different domain (e.g., “.com”
    vs. “.net”).

•   Protect your computer and other computers that you use by scanning all removable media, such as a flash
    drive, CD, or DVD, for viruses before opening files that are contained on the media and by scanning all
    attachments that you receive via e-mail prior to opening them.

•   Do not accept or open executable files (indicated by a file name ending in “.exe”) that you receive via e-mail.
    Such files can be dangerous.

         u . s . d e pa rt m e n t o f s tat e b u r e a u o f e d u c at i o n a l a n d c u lt u r a l a f fa i r s   06/2009

Más contenido relacionado

La actualidad más candente

Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Trainingnovemberchild
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSPriyanka Aash
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information security
Information security Information security
Information security AishaIshaq4
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 

La actualidad más candente (20)

Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Information security
Information security Information security
Information security
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 

Destacado

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social MediaInfo Ops HQ
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Social Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief IntroductionSocial Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief IntroductionJeffrey Levy
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?Nixu Corporation
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)US Navy Social Media
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
U.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape OverviewU.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape OverviewUS Navy Social Media
 

Destacado (18)

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social Media
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
How To Tweet
How To TweetHow To Tweet
How To Tweet
 
Social Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief IntroductionSocial Media And The Gov’t: A Brief Introduction
Social Media And The Gov’t: A Brief Introduction
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
CyberCoex
CyberCoexCyberCoex
CyberCoex
 
Social Media OPSEC
Social Media OPSECSocial Media OPSEC
Social Media OPSEC
 
Navy Command Facebook Assessment and Worksheet (March 2015)
 Navy Command Facebook Assessment and Worksheet (March 2015) Navy Command Facebook Assessment and Worksheet (March 2015)
Navy Command Facebook Assessment and Worksheet (March 2015)
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Social Media in the Army
Social Media in the ArmySocial Media in the Army
Social Media in the Army
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
U.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape OverviewU.S. Navy Social Media Landscape Overview
U.S. Navy Social Media Landscape Overview
 

Similar a Social Media Safety Tips

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyTsenn13
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 

Similar a Social Media Safety Tips (20)

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Internet safety
Internet safetyInternet safety
Internet safety
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 

Más de Department of Defense

Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Department of Defense
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...Department of Defense
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesDepartment of Defense
 

Más de Department of Defense (20)

Invasive species commanders_guide
Invasive species commanders_guideInvasive species commanders_guide
Invasive species commanders_guide
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011Endangered Species Bulletin - Spring 2011
Endangered Species Bulletin - Spring 2011
 
National Security Space Strategy
National Security Space StrategyNational Security Space Strategy
National Security Space Strategy
 
Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011Strengthening Our Military Families - Meeting America's Commitment January 2011
Strengthening Our Military Families - Meeting America's Commitment January 2011
 
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...
 
Social Media Overview
Social Media OverviewSocial Media Overview
Social Media Overview
 
Getting Started With Twitter
Getting Started With TwitterGetting Started With Twitter
Getting Started With Twitter
 
Tips And Tools For YouTube
Tips And Tools For YouTubeTips And Tools For YouTube
Tips And Tools For YouTube
 
Customizing Your YouTube Channel
Customizing Your YouTube ChannelCustomizing Your YouTube Channel
Customizing Your YouTube Channel
 
YouTube Uses In The Field
YouTube Uses In The FieldYouTube Uses In The Field
YouTube Uses In The Field
 
Army Official Social Media Policy
Army Official Social Media PolicyArmy Official Social Media Policy
Army Official Social Media Policy
 
ONR Innovation Newsletter
ONR Innovation NewsletterONR Innovation Newsletter
ONR Innovation Newsletter
 
Getting Started With You Tube
Getting Started With You TubeGetting Started With You Tube
Getting Started With You Tube
 
Creative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook PagesCreative Ways To Use And Manage Facebook Pages
Creative Ways To Use And Manage Facebook Pages
 
Designing Your Facebook Page
Designing Your Facebook Page Designing Your Facebook Page
Designing Your Facebook Page
 
Getting Started With Facebook
Getting Started With Facebook Getting Started With Facebook
Getting Started With Facebook
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 

Último

Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 

Último (20)

Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 

Social Media Safety Tips

  • 1. BUREAU OF E D U C AT I O N A L AND C U LT U R A L A F FA I R S Your Safety and Security Online: Safety Tips The U.S. Department of State’s Bureau of Educational and Cultural Affairs takes your online safety and security very seriously. As you use social networks, e-mail, and the Internet, please consider the following Safety Tips: 1. Never broadcast private contact information. Never list your e-mail address or phone number in any public space, such as your profile page, a blog, forums, or photo caption. 2. If you are a member of a social network, pay close attention to your privacy settings, which allow you to choose how much personal information you reveal and to whom. 3. Carefully consider what you publish on social networks. Before you post photos, videos, or text, ask yourself if it would embarrass you if your family or employer saw them. 4. Before you add a widget (an application that can be shared with others electronically) to your profile, think about whether you want the creators of the widget to be able to access your profile page and information about your activity on the social network. Keep in mind that the social network generally has no control over these widgets, so exercise discretion when using these tools. 5. Report any abuses of a website’s Terms of Use to the website’s administrators. Any reputable website or social network will have a way for you to report abuses. 6. E-mail can be used to spread malicious software or obtain your personal information in order to commit fraud. To protect yourself and the computers that you use, follow the guidelines below: • Be suspicious of unsolicited e-mail messages or phone calls from individuals asking for personal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with that organization. • Never provide personal or financial information (credit card numbers, PIN numbers, identification numbers) in response to e-mails or telephone calls that you did not initiate. • Do not send personal or financial information over the Internet before checking the website’s security. (Secure website addresses begin with “https://”) • Pay attention to the address of a website, located at the top of the screen. Malicious web sites may look identical to a legitimate site, but the address may use a variation in spelling or a different domain (e.g., “.com” vs. “.net”). • Protect your computer and other computers that you use by scanning all removable media, such as a flash drive, CD, or DVD, for viruses before opening files that are contained on the media and by scanning all attachments that you receive via e-mail prior to opening them. • Do not accept or open executable files (indicated by a file name ending in “.exe”) that you receive via e-mail. Such files can be dangerous. u . s . d e pa rt m e n t o f s tat e b u r e a u o f e d u c at i o n a l a n d c u lt u r a l a f fa i r s 06/2009