Digital Citizenship (#dublindigitattoo)
Dublin Unified has created one-stop shopping for teachers, students, and parents/guardians on the topic of Digital Citizenship: http://sites.google.com/a/dublinusd.org/dublin-digital-tattoo/ Please feel free to use this site and let us know if you need additional information. Copyright guidelines can be found here: http://www.dublin.k12.ca.us/Page/6655. Social Media adopted Board Policies can be found here: http://www.dublin.k12.ca.us/Page/9492Student Privacy:DUSD APP Agreements Student privacy laws mitigate the need to have clarity on what APP's we can allow in classrooms. Instructional Software must follow district guidelines in concert with LCAP and agreed Board adopted curriculum. Please complete and submit to your Principal or Department Lead the Instructional Software Approval Form. New push towards privacy with F3/CETPA/counties/schools Any online software, extension, or add-on used on Chromebooks by students must adhere to the CA student privacy agreement in order to be considered for use. Use the Dublin CSPA form with the educational technology company and once signed, send to Technology Services.Please read our Google related Dublin Unified Google FAQ. & here's more information Google Education Apps, in AB 1584 Compliance, Data Privacy Guidebook, , Created by F3, CETPA and CCSESA “Ask Before You App” 6-minute video for professional development, Created by F3, CETPA and CommonSense Education. Great tools for new hire orientation, and trainings/staff meetings with Administrators, Teachers, Coaches and adjunct staff. Any questions about your child and privacy can be directed to Technology Services.
Student privacy laws mitigate the need to have clarity on what APP's we can allow in classrooms. Visit our portal on the CA Privacy Alliance site to learn more about the APP's used in Dublin classrooms for instruction.
Student Privacy Pledge: http://studentprivacypledge.org/
Cybersafety & YouHere are some FREE & easy steps to make your online experience more secure:
Videos on topic: http://www.today.com/video/hackers-want-to-hold-your-data-for-ransom-here-s-how-to-stop-them-899367491901 March 2017Cyber safety and warnings:iOS (iPhone):
- Run Google Security on all GMail accounts. Wizard will walk you through steps
- Run ninite once a month for updates to all add-on's, extensions, plug-ins on any computer
- Antivirus at Home: ISP provider Or: https://home.sophos.com/login (free for home use)
- 2 step verification for all accounts (if offered), especially banking, credit cards, email
- Verify your email account has not been sold and compromised via haveibeenpwned.com/ https://haveibeenpwned.com/ (Check QRTLY or more). If your email is on a breach site, change password immediately!
- Worried about URL's (websites sent to in email, etc) you get or see others on: virustotal.com
- Change Passwords QRTLY on all accounts, especially banking, credit cards, email
- Different email accounts for different uses- 1 for work, 1 for social media, 1 for family, 1 for professional memberships.
- 1/19/17: A recent exploit has been discovered that can cause your iPhone to freeze and crash though text message. Users do not have to open the text in order to be affected. Resolution: Should you receive such a text, wait for your phone to reboot, then block the sender ( Block number/contact )
- 2/16/17: X-Agent Spyware now targeting iOS and MacOS (Targets web browser passwords, screenshots, system configurations, iPhone backups, etc.). More Information
- 1/23/17: The sourcecode for another Android trojan has been released. As always be careful of what you install on your Android device. More Information (The IT Department does not necessarily recommend installing Dr.Web for Android)
- 1/19/17: Warning, there is a rash of sophisticated phishing (scam) emails that appear to come from Google and will prompt you to login. This attack will steal your login and your Google password. More Information
- 2/16/17: Third Yahoo email data breach, change your passwords again. More Information
Android Devices (Phones and tablets):
- 2/22/17: Chrome exploit, "font wasn't found". This exploit informs you that a Chrome language pack needs to be updated. Installing the supposed language pack in turn installs a virus on the target computer. More Information
- 1/19/17: Last week a exploit was published along with a sample code for a autofill exploit. This exploit could be used for all major browsers (Except Firefox) to obtain your login, password, email, credit card number, etc for users that use the autofill feature. The best security prevention for this would be to turn autofill off. How to turn off
- 1/31/17: Most free Android VPNs leak data, many don't use encryption study finds. More info here
- 1/24/17: HummingBad exploit found in the Google Play store. This malware is capable of sending malicious apps and adds to user. More info here
- 2/10/17: Mirai1 trojan More information
- 1/25/17: Linux proxy Trojan in the wild. More information