SlideShare una empresa de Scribd logo
1 de 12
HOW TO
SIGN-UP AND USE
TELSTRA SAFE SOCIAL™



              TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 1: REGISTER FAMILY




• Families can subscribe to BigPond Security service at BigPond.com/security.

• From ‘My Account’ page, click on the ‘Telstra Safe Social™’ tab and create a password.

• Add the name, email and age of the first child you want to help protect.

• Click ‘Choose Social Network’ to proceed to the next step...
                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 2: CHOOSE SOCIAL NETWORK




• Telstra Safe Social™ is able to connect with Facebook, Twitter, YouTube and MySpace - with more networks
  being added as they become relevant.

• Click an icon button to select the social network site you want to monitor...


                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 3: ACCEPT TERMS & CONDITIONS




• Families must first read and accept the terms and conditions of Telstra Safe Social™ as well as the chosen
  social network site before the connection is processed.

• Click ‘I Accept’ to proceed to the next step...


                                                                         TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 4: CONNECT TO SOCIAL NETWORK




• You will be presented with the connection method provided by the social network, e.g. ‘Connect using
  Facebook’ button.

• Click on the ‘connect’ button to proceed to the next step...


                                                                         TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 5: LOGIN TO YOUR SOCIAL ACCOUNT




• The child needs to login to their social network account to initiate the connection with Telstra Safe Social™.

• Login to the social network to proceed to the next step...



                                                                            TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 6: GO TO TELSTRA SAFE SOCIAL APP




• The social network will then prompt you to install the Telstra Safe Social™ application (app).

• Click ‘Go to App’ to proceed to the next step...



                                                                           TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 7: ALLOW PERMISSION TO ACCESS




• The child accepts the installation of the app, which enables Telstra Safe Social™ to monitor the child’s social
  network behaviour and activity.

• Click ‘Allow’ to proceed to the next step...


                                                                           TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 8: MANAGE PROTECTION LEVELS




• Parents / guardians will then receive alerts based on the child's age.

• Repeat steps 1 to 7 to add other children to the service or additional social networks.

• Parents / guardians can edit the ‘Protection Level’ settings for each child at any time.

                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 9: MONITOR SOCIAL ACTIVITY




• Telstra Safe Social™ scans conversation posts, websites, photos and video for inappropriate content
  including details on language and content considered dangerous.




                                                                        TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 10: MANAGE SOCIAL ACTIVITY

Telstra Safe Social™ helps families to start a conversation about online behaviour and
how to stay aware from potentially risky situations.




• Alert summaries are sent on a daily, weekly or monthly basis as threats or antisocial behaviour are
  detected, depending on the level of protection applied to the child.

• Alerts will be sent to the parent if the connection with the social network is broken so they can discuss their
  options with their child.

• Telstra Safe Social™ will monitor online activity no matter where or how the child uses their social
  network, ie: on devices including home PCs, smartphones, tablets, at other people’s houses, or on public
  computers.
                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
HELP YOUR KIDS
                                            STAY SAFE WITH
                                            TELSTRA SAFE SOCIAL
                                            FIND OUT HOW YOU CAN PROTECT YOUR KIDS
                                            ONLINE, VISIT BIGPOND.COM/SECURITY
TELSTRA TEMPLATE 4X3 BLUE BETA | TELPPTV4




                                                                    TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY

Más contenido relacionado

La actualidad más candente

6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullyinglisamholden
 
Cyber Bullying Hits the Big Screen
Cyber Bullying Hits the Big ScreenCyber Bullying Hits the Big Screen
Cyber Bullying Hits the Big Screen11phf2
 
Bullying Hits the Big Screen
Bullying Hits the Big ScreenBullying Hits the Big Screen
Bullying Hits the Big Screen11phf2
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsMike Hasley
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
4 ways to help keep your children safe online
4 ways to help keep your children safe online4 ways to help keep your children safe online
4 ways to help keep your children safe onlineCOCOON
 
How to save children from bad effect of internet
How to save children from bad effect of internetHow to save children from bad effect of internet
How to save children from bad effect of internetAngga Pramodhawardhani
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 

La actualidad más candente (9)

6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullying
 
Cyber Bullying Hits the Big Screen
Cyber Bullying Hits the Big ScreenCyber Bullying Hits the Big Screen
Cyber Bullying Hits the Big Screen
 
Bullying Hits the Big Screen
Bullying Hits the Big ScreenBullying Hits the Big Screen
Bullying Hits the Big Screen
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
4 ways to help keep your children safe online
4 ways to help keep your children safe online4 ways to help keep your children safe online
4 ways to help keep your children safe online
 
How to save children from bad effect of internet
How to save children from bad effect of internetHow to save children from bad effect of internet
How to save children from bad effect of internet
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

Destacado

Home tweet home
Home tweet home Home tweet home
Home tweet home Telstra
 
Australia: Land of plenty (opportunities for smart infrastructure)
 Australia: Land of plenty (opportunities for smart infrastructure) Australia: Land of plenty (opportunities for smart infrastructure)
Australia: Land of plenty (opportunities for smart infrastructure)Telstra
 
Making contact: How to deliver a true customer experience
Making contact: How to deliver a true customer experienceMaking contact: How to deliver a true customer experience
Making contact: How to deliver a true customer experienceTelstra
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign countryTelstra
 
Check out our new purpose-built trucks
Check out our new purpose-built trucks Check out our new purpose-built trucks
Check out our new purpose-built trucks Telstra
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentationTelstra
 

Destacado (6)

Home tweet home
Home tweet home Home tweet home
Home tweet home
 
Australia: Land of plenty (opportunities for smart infrastructure)
 Australia: Land of plenty (opportunities for smart infrastructure) Australia: Land of plenty (opportunities for smart infrastructure)
Australia: Land of plenty (opportunities for smart infrastructure)
 
Making contact: How to deliver a true customer experience
Making contact: How to deliver a true customer experienceMaking contact: How to deliver a true customer experience
Making contact: How to deliver a true customer experience
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign country
 
Check out our new purpose-built trucks
Check out our new purpose-built trucks Check out our new purpose-built trucks
Check out our new purpose-built trucks
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 

Similar a How to sign up and use Telstra Safe Social™

Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016Justin Giles
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
7 Things You Should Know About Twitter
7 Things You Should Know About Twitter7 Things You Should Know About Twitter
7 Things You Should Know About TwitterYour eKavach
 
Helping keep safe using Facebook - whether managing a Facebook page or as par...
Helping keep safe using Facebook - whether managing a Facebook page or as par...Helping keep safe using Facebook - whether managing a Facebook page or as par...
Helping keep safe using Facebook - whether managing a Facebook page or as par...Malcolm Wilson
 

Similar a How to sign up and use Telstra Safe Social™ (20)

Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
7 Things You Should Know About Twitter
7 Things You Should Know About Twitter7 Things You Should Know About Twitter
7 Things You Should Know About Twitter
 
Helping keep safe using Facebook - whether managing a Facebook page or as par...
Helping keep safe using Facebook - whether managing a Facebook page or as par...Helping keep safe using Facebook - whether managing a Facebook page or as par...
Helping keep safe using Facebook - whether managing a Facebook page or as par...
 

Más de Telstra

Empowering employees for disruptive innovation
Empowering employees for disruptive innovation Empowering employees for disruptive innovation
Empowering employees for disruptive innovation Telstra
 
Boots & All images summary 2010/11
Boots  & All images summary 2010/11Boots  & All images summary 2010/11
Boots & All images summary 2010/11Telstra
 
Boots & all Telstra Operations summer 2010/11
Boots & all Telstra Operations summer 2010/11Boots & all Telstra Operations summer 2010/11
Boots & all Telstra Operations summer 2010/11Telstra
 
Home tweet home
Home tweet home Home tweet home
Home tweet home Telstra
 
The future is another country. Hugh Bradlow presentation - Telstra
The future is another country. Hugh Bradlow presentation - TelstraThe future is another country. Hugh Bradlow presentation - Telstra
The future is another country. Hugh Bradlow presentation - TelstraTelstra
 
Telstra Productivity Indicator 2010 - Key Findings
Telstra Productivity Indicator 2010 - Key FindingsTelstra Productivity Indicator 2010 - Key Findings
Telstra Productivity Indicator 2010 - Key FindingsTelstra
 
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, TelstraMWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, TelstraTelstra
 

Más de Telstra (7)

Empowering employees for disruptive innovation
Empowering employees for disruptive innovation Empowering employees for disruptive innovation
Empowering employees for disruptive innovation
 
Boots & All images summary 2010/11
Boots  & All images summary 2010/11Boots  & All images summary 2010/11
Boots & All images summary 2010/11
 
Boots & all Telstra Operations summer 2010/11
Boots & all Telstra Operations summer 2010/11Boots & all Telstra Operations summer 2010/11
Boots & all Telstra Operations summer 2010/11
 
Home tweet home
Home tweet home Home tweet home
Home tweet home
 
The future is another country. Hugh Bradlow presentation - Telstra
The future is another country. Hugh Bradlow presentation - TelstraThe future is another country. Hugh Bradlow presentation - Telstra
The future is another country. Hugh Bradlow presentation - Telstra
 
Telstra Productivity Indicator 2010 - Key Findings
Telstra Productivity Indicator 2010 - Key FindingsTelstra Productivity Indicator 2010 - Key Findings
Telstra Productivity Indicator 2010 - Key Findings
 
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, TelstraMWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

How to sign up and use Telstra Safe Social™

  • 1. HOW TO SIGN-UP AND USE TELSTRA SAFE SOCIAL™ TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 2. STEP 1: REGISTER FAMILY • Families can subscribe to BigPond Security service at BigPond.com/security. • From ‘My Account’ page, click on the ‘Telstra Safe Social™’ tab and create a password. • Add the name, email and age of the first child you want to help protect. • Click ‘Choose Social Network’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 3. STEP 2: CHOOSE SOCIAL NETWORK • Telstra Safe Social™ is able to connect with Facebook, Twitter, YouTube and MySpace - with more networks being added as they become relevant. • Click an icon button to select the social network site you want to monitor... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 4. STEP 3: ACCEPT TERMS & CONDITIONS • Families must first read and accept the terms and conditions of Telstra Safe Social™ as well as the chosen social network site before the connection is processed. • Click ‘I Accept’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 5. STEP 4: CONNECT TO SOCIAL NETWORK • You will be presented with the connection method provided by the social network, e.g. ‘Connect using Facebook’ button. • Click on the ‘connect’ button to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 6. STEP 5: LOGIN TO YOUR SOCIAL ACCOUNT • The child needs to login to their social network account to initiate the connection with Telstra Safe Social™. • Login to the social network to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 7. STEP 6: GO TO TELSTRA SAFE SOCIAL APP • The social network will then prompt you to install the Telstra Safe Social™ application (app). • Click ‘Go to App’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 8. STEP 7: ALLOW PERMISSION TO ACCESS • The child accepts the installation of the app, which enables Telstra Safe Social™ to monitor the child’s social network behaviour and activity. • Click ‘Allow’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 9. STEP 8: MANAGE PROTECTION LEVELS • Parents / guardians will then receive alerts based on the child's age. • Repeat steps 1 to 7 to add other children to the service or additional social networks. • Parents / guardians can edit the ‘Protection Level’ settings for each child at any time. TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 10. STEP 9: MONITOR SOCIAL ACTIVITY • Telstra Safe Social™ scans conversation posts, websites, photos and video for inappropriate content including details on language and content considered dangerous. TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 11. STEP 10: MANAGE SOCIAL ACTIVITY Telstra Safe Social™ helps families to start a conversation about online behaviour and how to stay aware from potentially risky situations. • Alert summaries are sent on a daily, weekly or monthly basis as threats or antisocial behaviour are detected, depending on the level of protection applied to the child. • Alerts will be sent to the parent if the connection with the social network is broken so they can discuss their options with their child. • Telstra Safe Social™ will monitor online activity no matter where or how the child uses their social network, ie: on devices including home PCs, smartphones, tablets, at other people’s houses, or on public computers. TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 12. HELP YOUR KIDS STAY SAFE WITH TELSTRA SAFE SOCIAL FIND OUT HOW YOU CAN PROTECT YOUR KIDS ONLINE, VISIT BIGPOND.COM/SECURITY TELSTRA TEMPLATE 4X3 BLUE BETA | TELPPTV4 TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY