Page 52 - iPlus_Ver_2.0_class_7
P. 52

•  Instruct your child to view only the sites that are appropriate for their age. Keep a check on
                     their online activities.

                  •  Keep strong passwords for e-mail accounts or social networking websites.
                  •  Ask your children not to share their personal details and passwords with others.

                  •  Protect the computer system through the firewall so that unnecessary sites can not be accessed
                     by the children.
                  •  Keep changing the password and privacy settings of the computers.

                     Info Byte

                      Encryption is the process of transforming data into unreadable code to maintain privacy.



                   i +   DIGITAL FOOTPRINTS

                  Footprints are the impressions we leave through walking on the ground while
                  moving. In the same way, a Digital Footprint is an impression that a user
                  leaves while using the Internet.

                  A Digital Footprint is used to describe the mark, traces or "footprints" that a
                  person leaves when he uses the internet. The information exchanged online
                  through e-mails and attachments, uploading videos or images, leaves marks
                  of personal information about you which is available to others online. A Digital Footprint is also
                  known as a Digital Dossier.

                  How to Delete Digital Footprints

                  We leave marks or footprints when we work online. These footprints could be used by others
                  in a positive or negative way. One should follow certain guidelines while being online. Some of
                  them are as follows:

                  •  Keep deleting the browsing history and cookies from your computer on a regular basis.

                  •  Turn on your privacy settings in such a way that your family or friends can see your posts.
                  •  Always upload appropriate content online.

                  •  Choose secure passwords that are unique to each login and be sure to change them regularly.

                  •  Remember that anything posted is public (even if your social network settings are private) as
                     the information is stored on a server.

                   i +   INDIAN LAWS AND GOVERNMENT INITIATIVES

                  The various legislations that enforce cybersecurity in India are as follows:

                  Information and Technology Act, 2000

                  This act is also known as the Indian Cyber Act. It provides legal recognition to all e-transactions

                  and aims to protect online privacy and curb online crimes.



                    50
                         iPlus (Ver. 2.0)-VII
   47   48   49   50   51   52   53   54   55   56   57