10 online privacy  module samedit1
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

10 online privacy module samedit1

on

  • 1,449 views

 

Statistics

Views

Total Views
1,449
Views on SlideShare
1,290
Embed Views
159

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 159

http://www.buckeyenest.com 159

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • This module is intended to help class participants be more aware of how to protect themselves online while still enjoying and making full use of the Internet.
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  • Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  • Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  • Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  • Social Engineering Tactics - Someone claiming to be doing research or survey for your bank, a new employee at a company you use, or a repair person that NEEDS your help. They may seem to ask round about or harmless questions that they then use against you. Verify they really are who they say they are before answering questions.
  • Phishing, and spyware attacks are occurring often on social networking sites, especially Facebook. Anyone received a message via email or a social network that was not sent by the person it appeared to have been sent by? Most likely Michelle has no idea this message went out in her name. What is the top level domain in this message? Do a search of .in domain. What do you find? It’s the country domain for India.
  • Why not trust this email? No such thing as free cash. Most likely they will ask for your bank account and password in order to supposedly deposit your check.
  • Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  • You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  • You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  • Use a combination of letters (capital and lower case), numbers and symbols if allowed. Example are: EmilyP05 – Emily Pietilia was my great grandmother and she was born in 1905 – However, don’t do this with a spouse or child that relationship is too close and too obvious. Or use a mnemonic i.e. – mbsfe530 – my brother sells fire extinguishers and his birthday. Don’t use names or words in a dictionary, names, addresses, or birthdates. Or use a full sentence - ilovecats If you must write them down, don’t keep it in a file labeled passwords or on your calendar.
  • If you are using public computers be alert to who is around you, if your password is too easy or too hard so you type it very slowly, it could be possible to watch what you type & learn your password. Why is your email account an important account? Because with access to your email account, someone could get access to your other accounts. Instructor – provide suggestions on how to create and keep track of passwords. Examples – use one string of letters and number but add a code to each one per application – such as having 135fox as a password and adding fb for Facebook to the beginning or end of 135fox, resulting in fb135fox. Your internet provider can access your account without your password – they would never contact you and ask for it. However, if you call them about a problem, they may ask for it so they can try and duplicate the problem you are having. If the incorrect password allows you to log into a site then you are on a spoofed site and not the company’s legitimate site. Most important – if you suspect someone is using your accounts, change the password and contact the company it is with immediately!
  • Who has shopped online? What did you purchase? You initiate with a known and trusted company. Don’t use sites from unsolicited websites or pop up ads. www.hoogle.com vs. www.google.com
  • MOST Credit cards have a maximum liability of $50.00 in the event of fraud, debit cards may have a higher or no limit check with your bank for information about the cards you have or read that little tiny print! One card lets you easily review online purchases and request a card with a lower limit Online transactions are said to be safer since there is no human interaction – you are not giving your card to a person.
  • Anyone been a victim of identity theft?
  • In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine!
  • In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine! the ONLY authorized source for the free annual credit report that's yours by law. The Fair Credit Reporting Act guarantees you access to your credit report for free from each of the three nationwide credit reporting companies — Experian, Equifax, and TransUnion — every 12 months. The Federal Trade Commission has received complaints from consumers who thought they were ordering their free annual credit report, and yet couldn't get it without paying fees or buying other services. TV ads, email offers, or online search results may tout "free" credit reports, but there is only one authorized source for a truly free credit report.
  • In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine! the ONLY authorized source for the free annual credit report that's yours by law. The Fair Credit Reporting Act guarantees you access to your credit report for free from each of the three nationwide credit reporting companies — Experian, Equifax, and TransUnion — every 12 months. The Federal Trade Commission has received complaints from consumers who thought they were ordering their free annual credit report, and yet couldn't get it without paying fees or buying other services. TV ads, email offers, or online search results may tout "free" credit reports, but there is only one authorized source for a truly free credit report.

10 online privacy module samedit1 Presentation Transcript

  • 1. Online Privacy A Module of the CYC Course – Personal Security 8-9-10
  • 2. The Realities of Digital Communications:
    • Deleting a digital post is not as permanent as setting fire to a handwritten note.
  • 3. The Realities of Digital Communications:
    • Edit > undo
    • Clipboard (copy >paste)
    • Trash (when was it emptied last?)
    • Other people
  • 4. The Realities of Digital Communications:
    • Digital content is easily forwarded and reposted.
  • 5. The Realities of Digital Communications:
    • Have you ever…
      • Forwarded an email
      • “ reposted” a story or comment on facebook or myspace
      • Shared something you found on the internet with a friend or family member
      • Downloaded pictures through a photo sharing site like Flicker or Shutterfly?
  • 6. The Realities of Digital Communications:
    • Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so.
  • 7. The Realities of Digital Communications:
    • Check your settings:
      • Your email client
        • Yahoo, hotmail, gmail
      • Your online subscription sites
        • Newspaper subscriptions, weightwatchers, coupon sites
      • Online commerce sites
        • Amazon, itunes, overstock.com, ebay, etsy,
  • 8. The Realities of Digital Communications:
    • Go to a site where you have set up a profile before – look for where you can access the privacy settings.
    • Raise your hand if you need help.
  • 9. The Realities of Digital Communications:
    • Your online reputation has offline implications.
  • 10. Privacy Levels on Social Networking Sites
    • Social Networks – the new “Wild West”
    • What is the default privacy setting on most social networks?
  • 11. Privacy Levels on Social Networking Sites
    • Taming the Wild Bull…. controlling who sees what content.
      • Privacy settings
      • Creating personal guidelines for what is and isn’t appropriate to post.
        • rule of thumb – would I want my boss/mother to see this?
      • Being selective with your connections.
        • Not everyone HAS to be your “friend”
  • 12. Privacy Levels on Social Networking Sites
    • Even though you are restricting access, remember content can be forwarded.
  • 13. Privacy Levels on Social Networking Sites
    • Everyone search the internet for a story or image you like.
    • Go to EDIT>COPY
    • Open an email program
    • Choose “New message”
    • In the body of the new message go to EDIT>PASTE
    • Send this to a friend
  • 14. Social Engineering
    • Calling their Bluff….
      • email, websites and social networks represent a point of contact between you and the online world.
        • Social Engineering often uses manipulates people by appealing to human interaction/emotions in order to obtain information.
        • Phishing - Tries to attack you personally. Looks to be from a trusted company asking you for your personal information.
  • 15. Example
  • 16. Bogus Email Example
  • 17. Privacy Levels on Social Networking Sites
    • Everyone open a browser window and search for information on an email scam.
    • You can start by typing in the words “Email scam” into Google, or go to:
      • www.ripoffreport.com
  • 18. Understanding URLs
    • Top level domains
    • Domain names
    • Text before the domain name
    • / after the top level domain
  • 19. Understanding URLs
    • Common tactic – URLs that look legitimate but are not.
      • Example – citybank.com.jumbleofletters.com/jumbleofletters
  • 20. Passwords
    • Choose a password that can’t be easily guessed.
    • Don’t write your password down in any easily findable place.
    • Don’t send your password to anyone through e-mail.
  • 21. Passwords
    • Don’t allow public computers to remember your password.
    • Don’t tell anyone your passwords.
    • Don’t use the same password for all your accounts, especially the important accounts such as email, banks, credit cards.
    • Create a system for remembering your passwords.
    • Check the strength of your password - http://www.passwordmeter.com/
  • 22. Shopping Online
    • Make sure YOU initiated the contact.
    • Don’t follow an email link.
    • Type web addresses carefully.
    • Don’t give out SSN, DOB, or your Mother’s Maiden name.
    • Do not accept free trial offers.
    • Don’t rely on a site “looking” professional.
  • 23. Credit Card Security
    • When possible, choose a credit card NOT a debit card.
    • Best choice - choose one card for online use only or a prepaid credit card.
    • Paypal.com - Most companies online accept payments from PayPal. Paypal acts as an intermediary for payment. If you don’t have a credit card you can set it up to take payment out of a checking/savings account.
  • 24. Identity Theft
    • What is Identity Theft?
    • Someone uses your personal information without your knowledge to commit fraud or theft.
  • 25. Identity Theft Prevention Tips
    • Do not store personal financial information on laptop computers.
    • Before disposing of a computer delete all personal information.
    • Review websites’ privacy policies.
    • A company or organization that you initiated contact with will not request your password via email or phone.
  • 26. Identity Theft Prevention Tips
    • Know the status of your Credit Rating
    • Don’t search Google for “Free credit report”
      • These sites rarely turn out to be truly free
    • Go to the Federal Trade Commission (FTC) website to learn more.
    • Request free credit report annually https://www.annualcreditreport.com /
      • the ONLY authorized source for the free annual credit report that's yours by law.
  • 27. Identity Theft Prevention Tips
    • Everyone go to the Federal Trade Commission (FTC) website and locate the link to free credit reports
  • 28. Identity Theft - Public Computer Safety Tips
    • Beware of “Shoulder Surfers”
    • Do NOT allow public computers to remember your log in and password.
    • ALWAYS Sign Out or Log Off.
    • Clear browser history.
    • Close the browser window.
  • 29. Identity Theft - Public Computer Safety Tips
    • In this class you were asked to browse the internet, and send email. Since we are on public computers – let’s all do the following:
      • Go back to your email client and log off.
      • In your browser window – empty the cache/clear your browsing history.
      • Close all programs and windows.
  • 30. Safety Checklist
    • ALWAYS check your privacy settings when you join an online community, or store.
    • Think before you post
    • Choose STRONG passwords
      • and do not save them in in a file labeled “Passwords”
    • Do NOT allow public computers to remember your log in and password.
    • ALWAYS Sign Out or Log Off.
    • Clear browser history.
    • Empty the cache regularly.
  • 31. Sources
    • This curriculum was adapted from a workshop created by N. Riesgraf for the Hibbing Public Library (MN). Funding provided by IRRRA Do I.T. Community Technology Awareness Program.
    • Additional content created by Connect Your Community, a project of OneCommunity , funded by the federal Broadband Technology Opportunities Program .
  • 32. Creative Commons License
    • This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0