×
×

4.2

[[General Digital Competence|General Digital Competence]] [[Enabling Digital Competence|Enabling Digital Competence]] [[Care Specific Digital Competence|Care Specific Digital Competence]]
[[Information|Information]] [[Communication|Communication]] [[Content Creation|Content Creation]] [[Safety|Safety]]
[[4.1|4.1]] [[4.2|4.2]] [[4.3|4.3]] [[4.4|4.4]]

 

Competence domain A General digital competence
Competence area 4 Safety
Competence title 4.2 Protecting data and digital identity
Competence description   Understanding common terms of service; actively protecting own data; respecting other people's privacy;
protecting self from online fraud, threats and cyberbullying.
Application level User Guide/mentor
  He/She is able to:
Knowledge examples

- understand the terms of use of online services (e.g. collection of
personal data by providers)
- give examples fo up-to-date strategies to protect own systems
and data
- realise the visibility of own digital footprint
- understand the risks of identity theft and other credentials’ theft

- explain why care recipients can be particularly vulnerable to
online misconduct, fraud and other threats
- give examples of assistance and protective measures to be
offered to care recipients in relation to data protection
- understand carers’ responsibilities and considerations when
handling care recipients’ private or otherwise sensitive information

Skills examples

- install and use various anti-virus systems and applications
- take steps to mitigate risks of fraud by using strong passwords
- monitor own digital footprint
- modify or delete information about self or others he/she is
responsible for

- mediate the User skills to care recipients
- support care recipients in adopting the User skills
Attitudes examples - follow the principles of online privacy and safety
- act critically when disclosing information about him/herself of
others online
- combine data protection with respect to care recipients’ privacy
- ensure that care recipients keep track of all security measures
they take (e.g. passwords and PIN codes applied, user accounts
created)