{"version":"1.0","provider_name":"K\u016aKULU KAIAULU","provider_url":"http:\/\/blogs.ksbe.edu\/edtechconference2012","author_name":"Alan Tamayose","author_url":"http:\/\/blogs.ksbe.edu\/edtechconference2012\/author\/altamayo\/","title":"Protecting Yourself and Others in a Digital Age - K\u016aKULU KAIAULU","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"uIfA0RfeeA\"><a href=\"http:\/\/blogs.ksbe.edu\/edtechconference2012\/protecting-yourself-and-others-in-a-digital-age\/\">Protecting Yourself and Others in a Digital Age<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/blogs.ksbe.edu\/edtechconference2012\/protecting-yourself-and-others-in-a-digital-age\/embed\/#?secret=uIfA0RfeeA\" width=\"600\" height=\"338\" title=\"&#8220;Protecting Yourself and Others in a Digital Age&#8221; &#8212; K\u016aKULU KAIAULU\" data-secret=\"uIfA0RfeeA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Presentation Have you ever wondered what the security professionals do to keep themselves safe while surfing the Internet,\u00a0 using mobile devices, or the wireless network at your local coffee shop?\u00a0 Come join Jason Martin, Mgr. of Information Security for Kamehameha schools as he walks you through the tips and tricks you can use to safeguard [&hellip;]"}