OpenLearn Works

Lesson 6: Staying safe and legal online 2 of 30 Thursday 29 July 2021 Contents

Introduction 4 Learning Outcomes 4 6.1 Protecting your computer from viruses 4 What is a computer virus? 4 Choosing antivirus software 6 Firewalls 7 Updates 8 Email 8 How do spammers obtain your email address? 9 How to spot spam 9 6.2 Cyber security and recognising scams 12 Health scams 14 Romance scams 16 6.3 Fake websites and identity theft 18 Identity theft 18 6.4 Data protection 22 General Data Protection Regulation (GDPR) 22 Lesson 6: Summary 26 Resources 27 Useful videos 29 Acknowledgements 29

3 of 30 Thursday 29 July 2021 Introduction

Introduction

Welcome to Lesson 6 of Everyday computer skills: a beginner’s guide to computers, tablets, mobile phones and accessibility. In this lesson we will be looking at cyber security – how to stay safe and legal online. We have already looked at staying safe in Lessons 4 and 5, so this lesson will build on what you have already learned. Key words and concepts are in bold. There is a course glossary you can refer to if any of these are unfamiliar to you. This lesson is in four sections:

● Protecting your computer from viruses. ● Cyber security and recognising scams. ● Fake websites and identity theft. ● Data protection.

Learning Outcomes

When you have completed this lesson, you will be able to: ● Protect your computer from viruses. ● Stay secure online and recognise scams. ● Beware of fake websites and identity theft. ● Identify key data protection issues.

6.1 Protecting your computer from viruses

As you discovered in Lessons 4 and 5, there are risks involved in engaging with the world wide web, including computer viruses. There are a few simple steps you can take to protect your computer and the personal information that’s stored on it. In this section, we will look at antivirus software and firewalls.

What is a computer virus?

A computer virus is software that enters your computer system without your knowledge or permission, and ‘infects’ your computer programs with malicious codes.

4 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

For example, a virus might attach itself to a program such as Microsoft Word. Each time the Word program runs, the virus runs too. A virus can reproduce by attaching itself to other computer programs, files or a hard drive, and can cause havoc. Here are some different types of computer infections:

● Adware is software that causes pop-ups and banner adverts in order to generate revenue. It may not do any damage to your device, but it might be able to access your personal information. ● Malware is short for ‘malicious software’ and means any program or file that is harmful to your computer. It includes viruses, worms, Trojan horses and spyware. ● Ransomware is a type of malware that threatens to publish the victim’s data or block access unless a ransom is paid. ● Spyware is software that helps to gather information about a person or organisation without their knowledge. ● A is malicious code disguised as, or contained within, software that looks legitimate. It can install hidden software to gain access to the users’ systems, usually to steal data or cause data loss. ● A worm is a malicious piece of software that replicates itself in order to spread to other computers.

Here are some tips (adapted from Dell Technologies, 2020) to help you protect your computer from viruses and other malware:

Never download and install software unless you are certain it is from a trusted source.

Install antivirus software that can detect, block and eliminate all types of computer viruses.

Keep your antivirus software up to date, as well as running regular scans.

Do not open email attachments unless you have scanned them first. Even a picture can carry a virus.

Install an anti-malware program to prevent software from being installed on your device without your knowledge.

Install anti-spyware software to prevent unwanted adverts from popping up, tracking your activities or scanning your computer for personal information.

5 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

Don’t trust modified software (cracked or hacked software), as it often contains malware.

Guide: Protecting your computer

GCFLearnFree.org explains how to protect your computer from potential threats in this short video. You can turn on captions by clicking on the subtitles icon in the bottom right corner of the video.

View at: youtube:U4lweHnf71E

Choosing antivirus software

Antivirus software looks for and removes viruses before they can infect your computer. Have a look at PC Magazine’s guide to the Best Free Antivirus Protection for 2020. Your internet service provider (ISP) might offer security software as part of your internet deal. There are also popular free security software programs available to download online, such as AVG or Avast. Windows Defender is also free and already built into recent Windows devices. MoneySavingExpert.com has a guide to the best free antivirus software for PCs and Macs. If you decide to pay for your antivirus software, you may find that it offers more protection than the different pieces of free software listed above. Before you decide, check out the various options online, look at review websites or ask your local computer store for guidance.

6 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

Firewalls

Running a firewall on your computer can help to protect you from unauthorised users and control the spread of malware when you’re online. Windows Firewall is included in Windows computers; and Apple products (such as iPads and Apple Macs) have built-in firewall software to safeguard your device.

7 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

Updates

Your computer will be better protected from viruses if you keep your operating system updated, because these updates often include security responses to new kinds of threats. Whether your operating system is Windows or Mac, you will receive notifications when new updates are available. You can also update your system manually. If you’re worried that your computer is not working properly or think that it may have a virus, run a scan with your antivirus software. If that still doesn’t work, contact a computer store helpline.

Email phishing

This section extends what we have already learnt about email phishing in Lesson 4. Most emails sent every day are unsolicited junk mail, such as:

advertising, for example online pharmacies, pornography, dating or gambling

get rich quick and work from home schemes

hoax virus warnings

8 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

hoax charity appeals

chain emails, pretending to bring good luck if forwarded to multiple contacts.

How do spammers obtain your email address?

Spammers may use automated software to generate email addresses. They can also hack into legitimate websites to gather users’ details. Sometimes, they copy addresses from regular emails that have been copied or forwarded to lots of people without using ‘bcc’. They may also buy lists of emails from other spammers or scammers. These may be obtained through spam emails or scams encouraging people to enter their details on fraudulent websites, as we saw in Lesson 4.

How to spot spam

Spam emails may feature some of the following warning signs:

9 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

You don’t know the sender.

The email includes misspellings designed to fool spam filters, such as ‘p0rn’ spelt with a zero.

The email makes an offer that seems too good to be true.

The subject line and contents of the email do not match.

The email makes a pressing offer with an urgent end date. For example: ‘Buy today and get 50% off.’

The email asks you to forward an email to multiple people and may offer you money for doing so.

The email comes with a virus warning.

The email includes attachments such as an EXE file. EXE files are executable files that run programs. Although not all attachments contain viruses, if the email comes with a virus, it will appear in an attached file. Before you open any file attachments, make sure the file is coming from a trusted source. If in doubt, scan it with up to date antivirus software. Be wary about clicking on an email attachment as it could release a virus that scans your computer for personal information and sends out spam email to people in your address book. You may even get a phone call from someone claiming to be from a well-known software company like Microsoft. The person calling will tell you that there’s a problem with your computer and that they need to get access to it. This is intended to include access to your personal details. Legitimate IT companies never contact customers in this way. If you receive a scam call, hang up immediately. Spam or junk email may contain viruses and spyware and can be a vehicle for online , such as phishing. Unwanted email may contain offensive images and clutters the

10 of 30 Thursday 29 July 2021 6.1 Protecting your computer from viruses

inbox. Never reply to a spam email as this would confirm to the spammers that your email address is active.

Activity 6.1: How to spot a scam Allow about 5 minutes Take a look at this visual guide from DigitalLearn.org on recognising scams. Make notes in the space below about some of the signs to watch out for.

Provide your answer...

Discussion Here are some questions that you should ask yourself:

● Can you tell who the email is from? ● Have you heard of the person or organisation? ● Does the email look professional? ● Are they asking for your money or information? ● Do they claim they can fix your computer? ● Are they trying to rush you into a quick action? ● Is it too good to be true?

11 of 30 Thursday 29 July 2021 6.2 Cyber security and recognising scams

6.2 Cyber security and recognising scams

What is cyber security? The word ‘cyber’ broadly refers to computing, internet networks, online spaces and the digital world. When we refer to cyber security or information technology (IT) security, we mean the protection of computer systems and networks from theft or damage. Cyber security is also meant to ensure that online services are free from disruption or misdirection. Cyber crime is a troubling reality because all devices (smartphones, laptops, tablets and computers) and the services we access online at home or at work are vulnerable to theft or damage. In Lessons 4 and 5, we discussed how unauthorised access to personal information stored on online devices can take place. Smartphones, computers and other online devices have become an essential part of everyday life. From online banking and shopping to email and , more and more of our personal and financial information is stored online. This makes it more important than ever to take steps to prevent cyber criminals getting hold of our data. In 1998, Donn Parker designed the confidentiality, integrity and availability (CIA) triad for internet security, to provide guidance to organisations wanting to protect their stored information.

● Confidentiality means data is read only by authorised users. ● Integrity means data remains trustworthy and accurate, allowing changes only by authorised users or processes.

12 of 30 Thursday 29 July 2021 6.2 Cyber security and recognising scams

● Availability means that authorised persons are guaranteed reliable access to their stored data.

Recognising online scams In this section we will look at two common scams to be aware of. These are health scams, such as fake online pharmacies, and romance scams, where people you meet on friendship or dating websites may not be who they seem.

13 of 30 Thursday 29 July 2021 6.2 Cyber security and recognising scams

Health scams

There are plenty of websites out there that will take advantage of consumers looking for a quick fix for minor to serious health issues. Health and medical product scams offer you products at much lower prices than high street pharmacies. You may or may not receive the product after you’ve paid for it or you might receive a product that is poor quality and possibly even harmful to your health. Some websites will make false claims that certain products, medicines and treatments can bring about a ‘miracle’ health cure.

Fake online pharmacies Scammers have been known to set up fake pharmacy websites designed to look like legitimate operators. Medicines and drugs are offered at very cheap prices or without the need for a prescription from a doctor. Prescription-only medicine requires a doctor or other qualified healthcare professional. You should not use medicine that hasn’t been prescribed for you as it may be dangerous. Even if you buy a medicine you have been prescribed, what you receive from these websites may not be the real thing.

What to look out for

● Unsolicited emails offering cheap or hard-to-get pills or treatments. ● Pharmacy websites based overseas or that do not include a contact telephone number or street address, making it difficult to sort out an issue if anything goes wrong. ● Whether there is any scientific evidence to back up the claim that the product actually works.

14 of 30 Thursday 29 July 2021 6.2 Cyber security and recognising scams

What to do

DO NOT access an online pharmacy site through a link in an unsolicited email. Delete it.

BE SUSPICIOUS of uninvited emails or pop-up boxes offering you unbelievable deals. Delete them.

DO NOT OPEN suspicious or unsolicited emails (spam) and do not click on or open any files attached to them. Delete them. All pharmacies in the UK, including those providing internet services, must be registered with the General Pharmaceutical Council and meet their standards for registered pharmacies. The General Pharmaceutical Council maintains an extensive pharmacy register. If you click on the Registered Pharmacy logo on a website, it will take you to a web page where you can verify if the website is legal. If it’s not, you can report the suspected scam.

There is also an EU-wide scheme. The EU logo looks like this:

15 of 30 Thursday 29 July 2021 6.2 Cyber security and recognising scams

Romance scams

Online dating can be safe but it’s wise to be careful, because people have been exploited through online relationships. We will explore two types of friendship or dating scams: catfishing and revenge porn.

Catfishing A relationship starts online and after trust has built up, the scammer asks you to transfer them money. They may say they have lost their credit card, or they are stuck abroad and need funds to cover their travel home. This is often called a or catfishing. A ‘catfish’ is someone who assumes a fake identity and who lies to their victim to make them fall in love. Catfishing may be a scam to make money or it might be done as a prank, which can be very hurtful. The second kind of romance scam may be a relationship or just a brief online exchange during which images or video of nudity or sexual acts are taken. The scammer then threatens to post the content online unless payment is received. This kind of scam is often referred to as sextortion or revenge porn. It is a form of non-physical sexual exploitation that leaves those who use webcams for flirting and cybersex vulnerable to abuse. Revenge porn isn’t always about money – some people may do it to hurt their former romantic partner. This is considered a serious crime.

If you have been a victim of a romance scam, report it. Police Scotland has information on romance fraud on its website.

16 of 30 Thursday 29 July 2021 6.2 Cyber security and recognising scams

Have you been scammed? If you think you’ve been a victim of an online scam, do not suffer in silence and don’t be embarrassed to report it. Which?, a consumer rights organisation, has a useful guide to where to report different types of scams.

If you feel you need emotional support and would like to talk to someone about your experience of being scammed, you can contact Victim Support (UK). Call 0808 168 9111 or email

Activity 6.2: What to do if you’ve been scammed Allow about 15 minutes Look again at the different types of online scams in this section and choose one. Then have a look at ‘How to spot a fake, fraudulent or scam website’ on the Which? website. Use the space below to make notes on what you would do if you were a victim of a similar scam.

Provide your answer...

Discussion Here are some ideas:

● You could report phishing or email scams to your email provider (such as Gmail) as spam or junk mail. If the email claims to be from a genuine company, such as your bank, tell them so they can let other customers know that it is a scam. ● If you think your identity has been stolen, report it to your bank or credit card provider immediately. ● Financial scams can be reported to Action Fraud, the UK’s national fraud and crime reporting centre. ● Revenge porn (or sextortion) can be reported to Police Scotland. ● You can also report a scam to your local Citizens Advice centre, who may pass it on to Trading Standards staff.

17 of 30 Thursday 29 July 2021 6.3 Fake websites and identity theft

6.3 Fake websites and identity theft

Scammers and online fraudsters can create fake, fraudulent or scam websites that look official. They are good at creating convincing websites that may look like a government department, your internet provider or your bank’s website. Fake websites will look very similar to the genuine bank website, and only a few tiny details may be different. Scam websites are created to mislead you into providing personal or financial information. For example, a fake bank website may ask you to update your account or security information. You might also come across websites that are set up to look like a service offered by one of the government websites. For example, there are websites that offer to help you apply for a passport renewal or a new driving licence. Although they are not necessarily illegal, these websites charge a fee to use them. You can avoid paying by going directly to the official government department. Your first stop should be GOV.UK, the government’s official website. See Lesson 5 for more information about online public services. In its online guide, Which? lists eight steps to test whether a website is legitimate or not. You covered most of them in Lesson 5, aside from ‘Can you trust a trust mark?’. Trust mark labels or logos are not always a good way of judging whether a website is trustworthy. A website that carries the logo of a reputable organisation still may not be genuine. If you’re in doubt, contact the trust mark company to check.

Identity theft

One of the main reasons for setting up a fraudulent website is to steal identity details.

18 of 30 Thursday 29 July 2021 6.3 Fake websites and identity theft

Identity theft is a type of fraud where an attacker uses stolen personal information to impersonate another person. In the past, this type of fraud involved intercepting postal deliveries containing personal information: names, addresses, bank account details and so on. It would then be possible for the fraudster to open credit card accounts and apply for loans in your name. It goes without saying that identity theft can ruin a person’s finances. The online world has opened up new sources of information for fraudsters. Even security- conscious people can fall victim to malware designed to detect your personal information. We have seen in Lesson 4 how phishing attacks can persuade users to divulge personal

19 of 30 Thursday 29 July 2021 6.3 Fake websites and identity theft

information. In Lesson 5, we learned how hackers can steal millions of personal records by attacking online retailers.

How to spot identity theft

Online identity theft may pass unnoticed for some time, allowing great damage to be done to your finances. Some useful signs to watch out for include:

unexplained bank withdrawals or credit card charges

bills and other expected official letters don’t arrive

cards or cheques are declined

fraudsters making contact about debts you know nothing about

receiving notice that your information was compromised by a data breach at a company where you do business or have an account

20 of 30 Thursday 29 July 2021 6.3 Fake websites and identity theft

your bank or credit card provider making contact about suspicious behaviour on your bank account.

Activity 6.3: Are you safe online? Allow about 5 minutes Now that you have gained some insights into identity theft, what can you do to protect yourself from it? This animation from OpenLearn gives some useful tips on how to keep your information safe online.

Video content is not available in this format.

There is a short quiz for you to take at the end. How well did you do?

21 of 30 Thursday 29 July 2021 6.4 Data protection

6.4 Data protection

Data protection is about the fair and proper use of private information. It relates to a person’s essential right to privacy. On another level, it is also about building trust between people and organisations. Data protection regulations are meant to ensure that you are treated fairly and openly. For example, your right to have control over your own identity and your interactions with others – so long as these do not have an adverse impact on the wider interests of society. Technological innovation makes data protection increasingly important. Data protection laws and regulations are meant to establish public trust in how personal data is used and stored by both the private and public sectors. In the UK, data protection is set out in the General Data Protection Regulation (GDPR) and the Data Protection Act (DPA) 2018.

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) came into effect in the UK on 25 May 2018. The regulation sets out guidelines for collecting and processing personal information from people who live in the European Union (EU). The reach of the GDPR applies beyond the EU and will still apply during Brexit negotiations. In this section we will look at some of the contents of the GDPR.

Principles relating to processing data These principles shape how personal data should be processed and are meant to lie at the heart of organisations that provide services to EU citizens. The principles are:

● Fairness and transparency. ● Limiting how much data is required for the intended purpose. ● Minimising data. ● Accuracy. ● Limits of storage.

22 of 30 Thursday 29 July 2021 6.4 Data protection

● Integrity and confidentiality. ● Accountability.

The GDPR addresses what organisations must and must not do with your data. For example, you have the right to be informed about how your data is collected and used. You also have a right to know an organisation’s purpose for processing your personal data, how long they retain it and who they will share it with. Ultimately, you have a right to concise, transparent, intelligible and easily accessible information that uses clear and plain language.

Your rights The GDPR includes eight individual rights:

● The right to be informed. ● The right of access. ● The right to rectification. ● The right to erasure. ● The right to restrict processing. ● The right to data portability. ● The right to object. ● Rights in relation to automated decision-making and profiling.

In certain circumstances, you have a right to have your personal data erased – this is also called ‘the right to be forgotten’. You can make a request for erasure verbally or in writing, and the relevant organisation has one month to respond to this kind of request.

Guide: GDPR

The Information Commissioner’s Officer (ICO) has a ‘Guide to the General Data Protection Regulation’ if you would like more information.

Data Protection Act (DPA) 2018 The GDPR is an EU-wide regulation, while the Data Protection Act (DPA) 2018 is a UK Act of Parliament that incorporates elements of the GDPR. The GDPR is broader in scope than DPA 2018, because it includes wider protections such as location data and genetic information. In addition, the GDPR penalties are harsher than those that can be imposed by the DPA 2018. The Data Protection Act 2018 applies to information used to identify an individual or their personal details. It controls how your personal information is used by organisations, businesses or the government in the UK. The principles of data protection include fairness, lawfulness and transparency. This means that personal data must be:

● Used for specified and explicit purposes. ● Relevant and limited to what is required. ● Accurate and kept up to date.

23 of 30 Thursday 29 July 2021 6.4 Data protection

● Protected against unlawful or unauthorised processing, access, loss, destruction or damage.

Special categories of personal data There are some types of personal data that the GDPR singles out as likely to be more sensitive. They are given extra protection to avoid risks to your human rights and freedoms. These include:

● Race or ethnic background. ● Political opinions. ● Religious beliefs. ● Trade union membership. ● Genetics. ● Biometrics (where used for identification). ● Health. ● Sex life or sexual orientation.

There are separate safeguards for personal data relating to criminal convictions and offences.

Your rights The Data Protection Act 2018 confers certain important rights. As a citizen and a consumer, you have the right to find out what information the government and other organisations store about you. You have the right to:

● Be informed about how your data is being used. ● Access personal data. ● Have incorrect data updated. ● Have data erased. ● Stop or restrict the processing of your data. ● Data portability (allowing you to reuse your data for different services). ● Object to how your data is processed in certain circumstances.

For more information about your rights under the Data Protection Act 2018, visit GOV.UK.

Activity 6.4: GDPR explained Allow about 10 minutes Watch this video from Channel 4 News, which gives an overview of the GDPR and the Data Protection Act 2018. Make some notes in the space below about how data protection regulations might impact you.

View at: youtube:acijNEErf-c

24 of 30 Thursday 29 July 2021 6.4 Data protection

Provide your answer...

Discussion Some of the ways that you would be affected are as follows:

● You can ask organisations to remove your personal information from their databases. ● Companies must ask your permission to store your data or add you to mailing lists. And they must use plain language when they ask. ● You can see what data an organisation holds about you. ● If your personal data is stored by a company that is hacked, they must tell you if your data is stolen. ● In limited cases, you may have the right to be ‘forgotten’ and have your data erased.

25 of 30 Thursday 29 July 2021 Lesson 6: Summary

Lesson 6: Summary

This lesson has gone into more detail about the steps you can take to stay safe online and protect your personal information, building on what you covered in Lessons 4 and 5. In this lesson, you looked at some of the precautions you can take to minimise risks, such as running an antivirus program, keeping it up to date and not responding to phishing emails. Computer viruses and malware are rogue programs that can spread from one computer to the next. They can steal personal information and do damage to your computer. Installing trusted antivirus software on your computer is important to protect you from online risks like viruses and malware, but you should still be aware of what you click, download and open. You also looked at how cyber criminals can take advantage of people looking for health products or relationships online. Another serious risk is identity theft, a type of fraud that uses stolen personal information to impersonate another person. You also looked at some of the ways you can spot online scams like these and what you can do to protect yourself. Finally, you looked at some of the principles of the GDPR (EU-wide) and DPA 2018 (UK only). These regulations are intended to protect how your personal information is used and stored by companies and organisations and gives you certain rights.

Activity 6.5: Looking back on Lesson 6 Use the space below to make notes on what you’ve learned in Lesson 6. Think about what was new to you and what you already knew. Here are some ideas to get you started:

● I have antivirus software on my computer and keep it up to date. ● I know what to look out for to check if an email or website is fake or from a trusted source. ● I have an idea of the protections and rights that I have under data protection regulations.

Provide your answer...

26 of 30 Thursday 29 July 2021 Resources

Resources

● Action Fraud: report cyber crime to the police. ● Dell Technologies: ‘What are the different types of viruses, spyware and malware that can infect my computer?’. ● DigitalLearn.org: ‘Internet privacy: searching and visiting sites’ (online course). ● GOV.UK: ‘The Data Protection Act 2018’. ● Information Commissioners Office: ‘Guide to the General Data Protection Regulation (GDPR)’. ● OpenLearn: Introduction to cyber security: stay safe online (online course). ● Police Scotland: ‘Romance fraud’. ● PCMag UK: ‘The best antivirus protection for 2020’. ● WebMed Pharmacy: ‘Are you buying fake medicines online?’ ● Which?: ‘How to spot a fake, fraudulent or scam website’.

Text

● Structured text document – for use with assistive technology (Word document) ● Structured text document – for use with assistive technology (PDF) ● HTML ● Text in braille ● Text in large print ● Easy Read (in production)

Audio and video

● British Sign Language video clips (in production) ● English audio files

Languages

● Plik dźwiękowy po polsku (Polish Audio) ● Tekst polski (Polish Text) ● 普通话音频 (Simplified Chinese Audio) ● 简体中文文本 (Simplified Chinese Text) (Arabic Audio) ﺍﻟﺘﺴﺠﻴﻞ ﺍﻟﺼﻮﺗﻲ ﺑﺎﻟﻌﺮﺑﻴﺔ ● (Arabic Text) ﺍﻟﻨﺺ ﺑﺎﻟﻌﺮﺑﻴﺔ ● ● ਪੰਜਾਬੀ ਆਡੀਓ (Punjabi Audio) ● ਪੰਜਾਬੀ ਟੈਕਸਟ (Punjabi Text)

27 of 30 Thursday 29 July 2021 Resources

● ਪੰਜਾਬੀ ਆਡੀਓ (Urdu Audio) (Urdu Text) ﺍﺭﺩﻭ ﭨﯿﮑﺴﭧ ● ● Audio în limba română (Romanian Audio) ● Text în limba română (Romanian Text)

28 of 30 Thursday 29 July 2021 Useful videos

Useful videos

You can add captions to YouTube videos by clicking on the subtitles/closed captions icon. Please note that some of these YouTube videos may have adverts.

● ‘GDPR explained: how the new data protection act could change your life’ (Channel 4 News). ● ‘Supporting others to be safe online’ (Lead Scotland).

Below is a subtitled recording of an online session delivered by Lead Scotland in June 2020. It is aimed at carers and others supporting disabled people to access the internet and stay safe online.

Video content is not available in this format.

You should now try the quiz for this lesson. This quiz covers your learning across the whole course: if you pass it, this counts towards your digital badge.

Acknowledgements

Except for third party materials and otherwise stated (see terms and conditions), this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this free course: Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.

29 of 30 Thursday 29 July 2021 Acknowledgements

Images 6.1 GDPR padlock circle: Image by Pete Linforth from Pixabay 6.1 Tip icon: Image by OpenClipart-Vectors from Pixabay 6.1 Laptop firewall update: one photo / Shutterstock 6.1: Internet security: Oksana Stepanenko / 123RF 6.1: No spam: Suthee Navakul / 123RF 6.1 Cartoon scammer: MicrovOne / iStock / Getty Images Plus 6.1 Warning symbol triangle: Image by Clker-Free-Vector-Images from Pixabay 6.2 Cyber security word cloud: Image by Darwin Laganzon from Pixabay 6.2 Blue/Green Triangle: TechTarget 6.2 Nutrition expert: Elnur Amikishiyev / 123RF 6.2 Do not icon: Image by janjf93 from Pixabay 6.2 Registered pharmacy: General Pharmaceutical Council 6.2 EU registered pharmacy: General Pharmaceutical Council 6.2 Catfishing: iridi / iStock / Getty Images Plus 6.3 Fingerprint: Image by ar130405 from Pixabay 6.3 Identity theft padlock: alexmillos / 123RF 6.3 Identity theft fingerprint: razihusin / iStock / Getty Images Plus 6.3 Warning symbol triangle: Image by Clker-Free-Vector-Images from Pixabay 6.4 GDPR padlock circle: Image by Pete Linforth from Pixabay 6.4 Padlock European Union: Image by Tumisu from Pixabay

Videos Activity 6.3 Are you safe online?: The Open University Useful videos: Supporting others to be safe online: Lead Scotland

30 of 30 Thursday 29 July 2021