Home

Results 1 - 10 of 277,301 for online devices. Search took 5.529 seconds.  
Sort by date/Sort by relevance
1 Guidance Note For educational authorities, NGO partners and institutions who wish to provide children with safe digital devices for distance learning May 2020 UNICEF Albania CHILDREN AND DIGITAL DEVICES Protecting children’s online safety on digital devices 2 Introduction The COVID-19 emergency has changed how children and adolescents around the globe are being educated, with distance schooling and studying online becoming the new normality for school children almost everywhere. (...) Longer hours online connected through digital devices both for entertainment and for education purposes, means increased exposure to online risks for children. (...) In this context, this note aims to provide guidance to relevant actors on the recommended measures and steps that they will need to implement to ensure that devices distributed to children with the aim of ensuring internet connectivity will minimize children’s exposure to online risks and security related threats, while allowing them to maximize the benefits of their online experience.
Language:English
Score: 1126566.4 - https://www.unicef.org/albania...%20the%20digital%20devices.pdf
Data Source: un
Goal 1: Educate The Role of Teachers • Primary source for child online safety instruction • Share responsibility with parents • Assuage parents’ concerns about gaps in their instruction • Tailor lessons by learning about how students use the internet Device Safety • Proper password practice: long, random, never shared • Perhaps teach to use password managers? • Security still necessary even with safe school-provided devices, because students will use others • E.g. personal phones, PC cafes, friends’ devices Digital Citizenship • Media literacy • Social competence • Online safety curriculum • Antibullying programs, including treatment of bullying over digital mediums Goal 2: Build a Safe Digital Environment Online Safety Coordinator • Don’t try to do this ad hoc! • Appoint and train someone to perform the role • Online safety incidents should be reported to coordinator • Coordinator should ensure administration is well-informed about state of online safety Technical Defenses • Provisioning good computing devices • Using accredited ISP, reputable filtering/monitoring tools, network software, applications • Keep software up-to-date • Use firewalls and antivirus • Check for unknown devices • Robust password policy for educators and students Acceptable Use Policy • Policy governs what school devices may be used for • Should be in plain language so it is understood • For younger students, perhaps have as a video Safe Digital Environment Policy • Ensure teachers are educated about safe behavior • Regulate in what circumstances the school may take photos of students and for what purposes those images may be use • Seek student or parent permission before using images • Develop metrics for policies, regularly audit Goal 3: Serve as a Role Model On the Job • Follow acceptable use policy • Abide by same rules on use of personal electronic devices • Communicate professionally with students and parents • Use school email for professional communication • Remote learning policy taking into account environment and other people Off the Job • Educators’ online presence reflects on their institution • Can model proper care for one’s digital reputation • Consider policy curtailing one-on-one digital communication by educators, especially for non-educational purposes
Language:English
Score: 1101292 - https://www.itu.int/en/ITU-D/R...idelines%20for%20Educators.pdf
Data Source: un
Guidance Note: Protecting children’s online safety on digital devices | UNICEF Albania Skip to main content Albania Toggle navigation English Shqip Global Links Visit UNICEF Global High contrast Albania Explore UNICEF About UNICEF Albania Contact us Work with us U-Report Press centre Donate Main navigation What we do Research and reports Stories Take Action Search area has closed. (...) Search Close Search UNICEF Fulltext search Max Document Guidance Note: Protecting children’s online safety on digital devices UNICEF/ALBANIA/LAZE/2019 About This technical note “Protecting children’s online safety on digital devices in Albania” aims to provide guidance to relevant actors on the recommended measures and steps that they will need to implement to ensure that devices distributed to children with the aim of ensuring internet connectivity will minimize children’s exposure to online risks and security related threats, while allowing them to maximize the benefits of their online experience. The guidance note was developed by UNICEF child protection team in collaboration with ICT Department and it will prove beneficial to educational authorities, development or philanthropic partners, NGOs as well as ICT industry actors that are engaged in distribution of digital devices for children. Download document Download file (PDF, 229,05 KB) Related topics Child protection Child rights Child abuse Albania More to explore Press release 09 December 2016 UNICEF launches Online Child Safety Campaign Visit the page Article "Tech Camp" in Shkodra, Korça and Tirana Tech Camp, three days inside the world of technology to learn more about programming and internet security Read the story Press release 05 September 2022 Rita Ora visits "The house of Colors" in Tirana Visit the page Press release 08 July 2022 Presentation of the Study "Trafficked by Someone I Know" Visit the page Footer UNICEF Home What we do Press Center Stories Take Action About UNICEF Albania Work with us Convention on the Rights of the Child (CRC) Frequently asked questions Research and reports Publications We all matter Become a donor Social Footer Secondary Contact us Legal Footer tertiary Report fraud, abuse, wrongdoing
Language:English
Score: 1086701.9 - https://www.unicef.org/albania...-online-safety-digital-devices
Data Source: un
PowerPoint Presentation ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices Presenter: Engr. Kunle Olorundare, SMIEEE Date: 23rd July, 2018 At ITU-T SG 11 Meeting, July 2018 NIGERIA APPROACH ON COMBATTING COUNTERFEIT AND STOLEN ICT DEVICES Engr. (...) The End References  ITU Conformity and Interoperability technical paper, 2014  Counterfeit/substandard phone, A resource guide for government (Mobile Manufacturers Forum) [online]  The Economic Impact of Counterfeiting, Source: https://www.oecd.org/sti/ind/2090589.pdf [online]. Bibliography  Iso.org [online]  www.ncc.gov.ng(Type Approval Regulation)  Intersil Environmental Management Policy Document.  OECD document[online].  Pecb.org [online]  R&TTE Directive Annex 5 [online] …Bibliography  ITU Technical Report, Technical Standardization Sector, 2014 [online].  WTO Committee on Technical Barriers to Trade, Suppliers Declaration of Conformity, 2003 [online].
Language:English
Score: 1086249.2 - https://www.itu.int/en/ITU-T/W...23/Documents/2_James_Kunle.pdf
Data Source: un
People experiencing exclusion from the digital space might identify with several social identities, which creates different barriers for connecting online and using digital devices, services, and platforms equitably. (...) Without the capacity to use digital devices as well as to find, use, and adapt information retrieved from the online world and through digital platforms, in addition to creating content and sharing it online, connectivity alone does very little. (...) Having a device to connect is not solely enough to access online.
Language:English
Score: 1084081.1 - https://www.un.org/techenvoy/s...finition_Digital-Inclusion.pdf
Data Source: un
PowerPoint Presentation Safe & Secure Mobile Experience: The Key Issues Shola Sanni – GSMA Policy Manager, Africa ITU Regional Forum on Consumer Information, Protection & Rights for Africa Cotonou BENIN, 14-16 March 2017 CONFIDENTIAL  Mobile sector priorities on Safety & Security  Protecting mobile consumers  Safeguarding children & vulnerable persons  Addressing handset theft & counterfeit devices  Collaboration to combat  Industry model to combat handset theft  Fraud via mobile device  Addressing and minimising fraud  Bonus slide – Mobile Connect Outline 3 Mobile sector priorities for Safety & Security PROTECTING CONSUMERS from illegal activity & ASB PROTECTING CONSUMER PRIVACY & securing customer data PROTECTING PUBLIC SAFETY & meeting legal obligations PROTECTING NETWORKS & DEVICES to keep communications secure 4 Mobile sector priorities for Safety & Security PROTECTING CONSUMERS from illegal activity & ASB PROTECTING CONSUMER PRIVACY & securing customer data PROTECTING PUBLIC SAFETY & meeting legal obligations PROTECTING NETWORKS & DEVICES to keep communications secure 5 Protecting mobile consumers Key issues in mobile consumer protection Safeguarding children & vulnerable persons online Reducing device theft, trade of stolen devices, sale & use of counterfeit devices Mitigating fraud and mobile device security threats 6 Safeguarding children & vulnerable persons Operators • Prevent access, distribution & promote reporting of online child abuse content – GSMA Mobile Alliance Against Child Sexual Abuse Content • Encouraging children‟s safe & responsible internet use – GSMA mYouth program promoting positive use of ICTs • Supporting inclusion & safety of women through GSMA Connected Women program focusing on security & harassment issues Government Ecosystem • Establish clear & transparent legislation regarding illegal content & empower law enforcement before instituting enforcement processes • Actively collaborate with ecosystem to establish best practices for ensuring online safety & bridging the digital gender gap • Review policy & regulatory frameworks to promote digital inclusion & avoid undue “blocking” of internet access • Ensure national reporting hotlines are in place to action online abuse reports • Embrace programmes designed to help build “Digital Resilience” • Educate on potential online issues & encourage positive online behaviours • Implement technical solutions e.g. parental controls & reporting mechanisms • Collaborate across ICT ecosystem to address the issues 7 Addressing handset theft & counterfeit devices GSMA allocation of IMEIs to 3GPP compliant devices Blacklist – initiative to block stolen mobile devices, based on a shared database of IMEIs of stolen mobile devices reported by consumers GSMA IMEI security initiative - technical design principles for IMEI security implementation & GSMA‟s IMEI Security Weakness Reporting and Correction Process GSMA Anti-Theft Device Feature Requirements document for implementation of “Kill Switch” capability in devices 8 Collaboration to combat 9 Industry model to combat handset theft Latin America Case Study 10 Fraud via mobile device Social engineering fraud : examples Phishing – method used to infect computers or mobile devices to access valuable personal details – fraudsters use communications like email to tempt people to access what appear to be authentic websites or services SMiShing – or „SMS phishing‟ uses phone text messages to deliver the “bait” which then induces people to divulge their personal information Vishing – when fraudsters persuade victims to hand over personal details or transfer money, over the phone by impersonating a genuine service, e.g. a bank 11 Addressing and minimizing fraud Role of Operators • Technology solutions – operators adopt GSMA recommended techniques for detecting & dealing with international fraudulent mobile spam • Consumer authentication – Mobile Connect, GSMA guidelines for secure voicemail access • Education & awareness - how to protect personal details and identify potential threats • Develop robust risk management strategies Role of Government • Cross-sector enforcement of technology solutions – ensure banks & retailers implement highest possible level of security measures related to their service • Institute legislation and regulation focused on perpetrators • Preventative controls - consumer awareness campaigns, increase consumer education & protection to help minimise their exposure to fraud 12 Read more on safety, privacy & security across the mobile ecosystem Report available at http://www.gsma.com/publicpolicy/wp- content/uploads/2017/02/GSMA_Safet y-privacy-and-security-across-the- mobile-ecosystem.pdf Published February 2017 http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf Thank you Copyright © 2017 GSMA. (...) Convenient: easily register and log in to websites and apps, authorising transactions when online, confirming the users‟ true identity in a secure digital transaction.
Language:English
Score: 1081935.4 - https://www.itu.int/en/ITU-D/R...nni_GSMA_SAFETY%20SECURITY.pdf
Data Source: un
Attended by 85 participants representing national statistical offices, ministries, regulators and international and regional organizations, as well as the private sector. EGH Online Forum and Face-to-face Meeting Discussion and Outcomes Internet by type of portable device and network used Internet security Child and youth online protection Mobile phone ownership Mobile phone activities Barriers to Internet use by individuals ICT employment Future work of the EGH 11/25/2014 4 INTRODUÇÃOInternet by type of portable device and network used The EGH agreed on the definition and response categories of the indicator individuals using the Internet by type of portable device and network used to access the Internet . (...) Internet by type of portable device and network used Did you use any of the following portable device to access the Internet in the last three months? (...) INTRODUÇÃOMeasuring child and youth online protection The EGH recognized that child online protection is relevant for policy making but difficult to measure.
Language:English
Score: 1081523 - https://www.itu.int/en/ITU-D/S.../events/wtis2014/014_E_doc.pdf
Data Source: un
Use devices in open areas of the home — this can help you manage and be aware of who your child interacts with online through phones, tablets, smart TVs, gaming consoles and other connected devices. 6. (...) Here are some helpful tips: • During non-school hours at home, establish time limits around when and for how long your child can be online. • Use the available technologies — parental controls and tools to monitor online time allow you to measure and set time limits on device use or internet access. (...) • Prepare — locate the computer, device or games console in an open area of your home and use available parental controls and safety features for devices, browsers and apps. • Stay involved — talk regularly with your child about their gaming interests and who they play with online.
Language:English
Score: 1076661.1 - https://www.itu.int/en/ITU-D/C...0the%20COVID-19%20pandemic.pdf
Data Source: un
During registration with an online service, the user’s client device creates a new key pair. It retains the private key and registers the public key with the online service. Authentication is done by the client device proving possession of the private key to the service by signing a challenge. (...) All rights reserved. • User is prompted to choose an available FIDO authenticator that matches the online service’s acceptance policy. • User unlocks the FIDO authenticator using a fingerprint reader, a button on a second– factor device, securely–entered PIN or other method. • User’s device creates a new public/private key pair unique for the local device, online service and user’s account. • Public key is sent to the online service and associated with the user’s account.
Language:English
Score: 1073818.1 - https://www.itu.int/en/ITU-T/e...20iOS%20Toolkit%20Overview.pdf
Data Source: un
E-guide: How to Protect the Data in Mobile Devices The E-Guide “How To Protect Data In Mobile Devices” highlights the importance of protecting data in mobile devices. Many times, people do not realize how much data is in their mobile device. Ordinary practices such as sending email, accessing social media, and banking online can encourage criminals to steal someone’s identity in order to access information related to credit card numbers, addresses, and contact details, among others.  The Guide will recommend several actions that should be taken into consideration to ensure data protection in mobile devices. How To Manage Your Online Privacy Who has never seen an online ad popping, just a few minutes after searching for the exact same item?
Language:English
Score: 1073447.9 - https://www.itu.int/en/cop/Pages/trend-micro.aspx
Data Source: un