SIDE OF SOCIAL is an attempt to exploit a computer INFORMATION system or a private network inside a computer. Simply put, it is the MEDIA BE AWARE OF IMPERSONATORS unauthorized access to or control over Make sure you know who is getting your computer network security systems personal or financial information. Don’t for some illicit purpose. give out personal information on the CYBERBULLYING phone, through e-mail or over the Internet is when someone, typically a teenager, CYBERCRIME unless you’ve initiated the contact or bullies or harasses others on the is defined as a crime where a internet and in other digital spaces, computer is the object of the crime know who you’re dealing with. particularly on social media sites. or is used as a tool to commit an SAFELY DISPOSE OF PERSONAL offense. A cybercriminal may use a FAKE PERSONA INFORMATION A character version of yourself. It could device to access a user’s personal information, confidential business Before you get rid of a computer dispose be how you act in public or in a information, government information, of all the personal information it stores. relationship. Either way it's not the ‘real’ or disable a device. Use a kill disk to wipe out the utility you. program to overwrite the entire hard drive. IDENTITY THEFT KEEP PASSWORDS PRIVATE occurs when someone uses another person's personal identifying Use strong passwords for your laptop, information, like their name, identifying credit card, bank account, and other number, or credit card number, without accounts. their permission, to commit fraud or other crimes. SHARE EXPERT PROPER ENCRYPT YOUR DATA KNOWLEDGE NETIQUETTE Keep your browser secure. To safeguard The Internet is a great platform for sharing your online transactions, use encryption good information. software that scrambles information you CHECK, THEN CLICK send over the internet. AVOID CONFLICT Before you post something, double check Trading insults and abuse is bad netiquette. that you are saying exactly what you want DON’T OVERSHARE ON SOCIAL It is pointless and negative and could get to say. One small error can completely NETWORKING SITES you banned from the platform or change the meaning of your message. If you post too much information about community. Avoid being drawn into fights yourself, an identity thief can find and never post abusive content on social WE ARE ONLY HUMAN information about your life. media. Remember that an actual person with real feelings, beliefs, imperfections and KEEP YOUR DEVICES SECURE, USE DON'T EXCLUDE OTHERS emotions is behind every message, email or SECURITY SOFTWARE If you have an inside-joke to share with comment. It is sometimes easy to get Install anti-virus software, anti-spyware another other person, or a small number of carried away and write something that you software, and a firewall. Set your people in a larger online group, send it would not dream of saying to someone’s face and can be mistaken for displaying bad preference to update these protections through private message. netiquette or cyberbullying behavior. often. CHOOSE YOUR FRIENDS AVOID PHISHING EMAILS WISELY DON’T SPAM Think about it, before sending a friend Don’t open files, click on links, or It is normal if you want to be noticed in the request or accepting an invitation. download programs sent by strangers. crowd of people on social media but RESPECT PEOPLE'S spamming (another word for sending the READ PRIVACY POLICIES PRIVACY same or similar messages lots of times) can They can be long and complex, but they Don’t give out other people's personal be annoying and may have the opposite tell you how the site maintains accuracy, information such as emails, address effect. access, security, and control of the without their permission. personal information.