SlideShare una empresa de Scribd logo
1 de 12
HOW TO
SIGN-UP AND USE
TELSTRA SAFE SOCIAL™



              TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 1: REGISTER FAMILY




• Families can subscribe to BigPond Security service at BigPond.com/security.

• From ‘My Account’ page, click on the ‘Telstra Safe Social™’ tab and create a password.

• Add the name, email and age of the first child you want to help protect.

• Click ‘Choose Social Network’ to proceed to the next step...
                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 2: CHOOSE SOCIAL NETWORK




• Telstra Safe Social™ is able to connect with Facebook, Twitter, YouTube and MySpace - with more networks
  being added as they become relevant.

• Click an icon button to select the social network site you want to monitor...


                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 3: ACCEPT TERMS & CONDITIONS




• Families must first read and accept the terms and conditions of Telstra Safe Social™ as well as the chosen
  social network site before the connection is processed.

• Click ‘I Accept’ to proceed to the next step...


                                                                         TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 4: CONNECT TO SOCIAL NETWORK




• You will be presented with the connection method provided by the social network, e.g. ‘Connect using
  Facebook’ button.

• Click on the ‘connect’ button to proceed to the next step...


                                                                         TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 5: LOGIN TO YOUR SOCIAL ACCOUNT




• The child needs to login to their social network account to initiate the connection with Telstra Safe Social™.

• Login to the social network to proceed to the next step...



                                                                            TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 6: GO TO TELSTRA SAFE SOCIAL APP




• The social network will then prompt you to install the Telstra Safe Social™ application (app).

• Click ‘Go to App’ to proceed to the next step...



                                                                           TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 7: ALLOW PERMISSION TO ACCESS




• The child accepts the installation of the app, which enables Telstra Safe Social™ to monitor the child’s social
  network behaviour and activity.

• Click ‘Allow’ to proceed to the next step...


                                                                           TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 8: MANAGE PROTECTION LEVELS




• Parents / guardians will then receive alerts based on the child's age.

• Repeat steps 1 to 7 to add other children to the service or additional social networks.

• Parents / guardians can edit the ‘Protection Level’ settings for each child at any time.

                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 9: MONITOR SOCIAL ACTIVITY




• Telstra Safe Social™ scans conversation posts, websites, photos and video for inappropriate content
  including details on language and content considered dangerous.




                                                                        TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
STEP 10: MANAGE SOCIAL ACTIVITY

Telstra Safe Social™ helps families to start a conversation about online behaviour and
how to stay aware from potentially risky situations.




• Alert summaries are sent on a daily, weekly or monthly basis as threats or antisocial behaviour are
  detected, depending on the level of protection applied to the child.

• Alerts will be sent to the parent if the connection with the social network is broken so they can discuss their
  options with their child.

• Telstra Safe Social™ will monitor online activity no matter where or how the child uses their social
  network, ie: on devices including home PCs, smartphones, tablets, at other people’s houses, or on public
  computers.
                                                                             TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
HELP YOUR KIDS
                                            STAY SAFE WITH
                                            TELSTRA SAFE SOCIAL
                                            FIND OUT HOW YOU CAN PROTECT YOUR KIDS
                                            ONLINE, VISIT BIGPOND.COM/SECURITY
TELSTRA TEMPLATE 4X3 BLUE BETA | TELPPTV4




                                                                    TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY

Más contenido relacionado

La actualidad más candente (9)

6 mm cyberbullying
6 mm cyberbullying6 mm cyberbullying
6 mm cyberbullying
 
Cyber Bullying Hits the Big Screen
Cyber Bullying Hits the Big ScreenCyber Bullying Hits the Big Screen
Cyber Bullying Hits the Big Screen
 
Bullying Hits the Big Screen
Bullying Hits the Big ScreenBullying Hits the Big Screen
Bullying Hits the Big Screen
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
4 ways to help keep your children safe online
4 ways to help keep your children safe online4 ways to help keep your children safe online
4 ways to help keep your children safe online
 
How to save children from bad effect of internet
How to save children from bad effect of internetHow to save children from bad effect of internet
How to save children from bad effect of internet
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

Destacado

Destacado (6)

Home tweet home
Home tweet home Home tweet home
Home tweet home
 
Australia: Land of plenty (opportunities for smart infrastructure)
 Australia: Land of plenty (opportunities for smart infrastructure) Australia: Land of plenty (opportunities for smart infrastructure)
Australia: Land of plenty (opportunities for smart infrastructure)
 
Making contact: How to deliver a true customer experience
Making contact: How to deliver a true customer experienceMaking contact: How to deliver a true customer experience
Making contact: How to deliver a true customer experience
 
The future is a foreign country
The future is a foreign countryThe future is a foreign country
The future is a foreign country
 
Check out our new purpose-built trucks
Check out our new purpose-built trucks Check out our new purpose-built trucks
Check out our new purpose-built trucks
 
Cloud conference & expo presentation
Cloud conference & expo presentationCloud conference & expo presentation
Cloud conference & expo presentation
 

Similar a How to sign up and use Telstra Safe Social™

infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
Justin Giles
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 

Similar a How to sign up and use Telstra Safe Social™ (20)

Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
7 Things You Should Know About Twitter
7 Things You Should Know About Twitter7 Things You Should Know About Twitter
7 Things You Should Know About Twitter
 
Helping keep safe using Facebook - whether managing a Facebook page or as par...
Helping keep safe using Facebook - whether managing a Facebook page or as par...Helping keep safe using Facebook - whether managing a Facebook page or as par...
Helping keep safe using Facebook - whether managing a Facebook page or as par...
 

Más de Telstra

Más de Telstra (7)

Empowering employees for disruptive innovation
Empowering employees for disruptive innovation Empowering employees for disruptive innovation
Empowering employees for disruptive innovation
 
Boots & All images summary 2010/11
Boots  & All images summary 2010/11Boots  & All images summary 2010/11
Boots & All images summary 2010/11
 
Boots & all Telstra Operations summer 2010/11
Boots & all Telstra Operations summer 2010/11Boots & all Telstra Operations summer 2010/11
Boots & all Telstra Operations summer 2010/11
 
Home tweet home
Home tweet home Home tweet home
Home tweet home
 
The future is another country. Hugh Bradlow presentation - Telstra
The future is another country. Hugh Bradlow presentation - TelstraThe future is another country. Hugh Bradlow presentation - Telstra
The future is another country. Hugh Bradlow presentation - Telstra
 
Telstra Productivity Indicator 2010 - Key Findings
Telstra Productivity Indicator 2010 - Key FindingsTelstra Productivity Indicator 2010 - Key Findings
Telstra Productivity Indicator 2010 - Key Findings
 
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, TelstraMWC Presentation: World of Applications, Hugh Bradlow, Telstra
MWC Presentation: World of Applications, Hugh Bradlow, Telstra
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

How to sign up and use Telstra Safe Social™

  • 1. HOW TO SIGN-UP AND USE TELSTRA SAFE SOCIAL™ TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 2. STEP 1: REGISTER FAMILY • Families can subscribe to BigPond Security service at BigPond.com/security. • From ‘My Account’ page, click on the ‘Telstra Safe Social™’ tab and create a password. • Add the name, email and age of the first child you want to help protect. • Click ‘Choose Social Network’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 3. STEP 2: CHOOSE SOCIAL NETWORK • Telstra Safe Social™ is able to connect with Facebook, Twitter, YouTube and MySpace - with more networks being added as they become relevant. • Click an icon button to select the social network site you want to monitor... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 4. STEP 3: ACCEPT TERMS & CONDITIONS • Families must first read and accept the terms and conditions of Telstra Safe Social™ as well as the chosen social network site before the connection is processed. • Click ‘I Accept’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 5. STEP 4: CONNECT TO SOCIAL NETWORK • You will be presented with the connection method provided by the social network, e.g. ‘Connect using Facebook’ button. • Click on the ‘connect’ button to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 6. STEP 5: LOGIN TO YOUR SOCIAL ACCOUNT • The child needs to login to their social network account to initiate the connection with Telstra Safe Social™. • Login to the social network to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 7. STEP 6: GO TO TELSTRA SAFE SOCIAL APP • The social network will then prompt you to install the Telstra Safe Social™ application (app). • Click ‘Go to App’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 8. STEP 7: ALLOW PERMISSION TO ACCESS • The child accepts the installation of the app, which enables Telstra Safe Social™ to monitor the child’s social network behaviour and activity. • Click ‘Allow’ to proceed to the next step... TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 9. STEP 8: MANAGE PROTECTION LEVELS • Parents / guardians will then receive alerts based on the child's age. • Repeat steps 1 to 7 to add other children to the service or additional social networks. • Parents / guardians can edit the ‘Protection Level’ settings for each child at any time. TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 10. STEP 9: MONITOR SOCIAL ACTIVITY • Telstra Safe Social™ scans conversation posts, websites, photos and video for inappropriate content including details on language and content considered dangerous. TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 11. STEP 10: MANAGE SOCIAL ACTIVITY Telstra Safe Social™ helps families to start a conversation about online behaviour and how to stay aware from potentially risky situations. • Alert summaries are sent on a daily, weekly or monthly basis as threats or antisocial behaviour are detected, depending on the level of protection applied to the child. • Alerts will be sent to the parent if the connection with the social network is broken so they can discuss their options with their child. • Telstra Safe Social™ will monitor online activity no matter where or how the child uses their social network, ie: on devices including home PCs, smartphones, tablets, at other people’s houses, or on public computers. TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY
  • 12. HELP YOUR KIDS STAY SAFE WITH TELSTRA SAFE SOCIAL FIND OUT HOW YOU CAN PROTECT YOUR KIDS ONLINE, VISIT BIGPOND.COM/SECURITY TELSTRA TEMPLATE 4X3 BLUE BETA | TELPPTV4 TELSTRA UNRESTRICTED | BIGPOND.COM/SECURITY