Understanding Anti-Virus Software
This article provides information about anti-virus software and how it works.
Create an account to save and access your bookmarked materials anytime, anywhere.
An Online Resource Library on Domestic & Sexual Violence
This article provides information about anti-virus software and how it works.
This article provides information about active content (JavaScript, Java and ActiveX controls) as well as general information about cookies.
This document provides a summary of the provisions found in COPPA, the Child Online Privacy Protection Act of 1998, created by the Federal Trade Commission. This act, which took effect on April 21 2000, was implemented to ensure that children's' privacy is better protected when they are online.
This fact sheet offers information for teachers on the Children's Online Privacy Protection Act and provisions within the act that allow teachers to act on behalf of a parent during school activities online.
This fact sheet offers information to parents about the rules and requirements for website operators that were established by the FTC to make sure that children's privacy is protected online.
This article offers information about protecting personal information online. Tips on how to know if your privacy is being protected and additional steps you can take to protect your privacy are also included.
This article offers information about cyberbullying, describing what it is, why it has become such a problem, and ways that individuals can protect themselves from cyberbullies.
This guide provides parents with information on how they can prevent their child from being victimized by or engaging in harmful behavior online, as well as intervention techniques.
This document provides information about cyberbullying and cyberthreats for educators and other professionals whose focus is youth safety and well-being and sets forth recommendations for a comprehensive school and community-based approach to address these concerns.
This paper discusses the ways that the internet and other information and communication technologies aid the trafficking of women.