Your SlideShare is downloading. ×
0
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Social Media & Privacy (Nov 2012)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Social Media & Privacy (Nov 2012)

338

Published on

Privacy on Social Media is constantly changing. Join Diana Silveira as she reviews privacy and security policies from popular social media sites like Facebook, LinkedIn, Twitter and Pinterest. Take …

Privacy on Social Media is constantly changing. Join Diana Silveira as she reviews privacy and security policies from popular social media sites like Facebook, LinkedIn, Twitter and Pinterest. Take what is learned here to help you, your library, and your users stay safe on the Internet while learning the implications of recent hacks, big data breaches, and more.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
338
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Tags >
  • Tags >
  • 70% of employers do an online search as part of their hiring procedures
  • Get online and establish a STRONG & POSITIVE presence.
  • Transcript

    • 1. Diana SilveiraNovare Library Services
    • 2. • Learn what privacy means to a variety of social media sites• Learn how to change these settings• Learn to monitor your library’s & your own online reputation.
    • 3. Source: http://www.merriam-webster.com/dictionary/privacy
    • 4. Don’t publish what youdon’t want others to know.There is no true “Privacy” on the web.
    • 5. When you shareinformation withothers, they can also choose to make it public.
    • 6.  Name This helps your friends and family find you. If you are uncomfortable sharing your real name, you can always deactivate or delete your account. Profile Pictures This helps your friends and family recognize you. If you are uncomfortable making your profile picture public, you can always delete it by hovering over your photo and clicking "Change Picture.“ Network This helps you see whom you will be sharing information with before you choose "Friends and Networks" as a custom audience. If you are uncomfortable making your network public, you can leave the network. Username and User ID These allow you to give out a custom link to your profile or Page, receive email at your Facebook email address, and help make Facebook Platform possible. Learn more.
    • 7.  Status Photos Comments Our “Likes” Our Friends
    • 8.  “As a general rule, you should assume that if you do not see a sharing icon, the information will be publicly available.” Default is “Public” Your lists
    • 9.  Take some time to review your timeline Delete at will!
    • 10. http://goo.gl/ElsqO
    • 11.  Cookies - tracking when not logged in Profiles for nonmembers Deleting from view - but not really deleting
    • 12.  “Our Services are primarily designed to help you share information with the world. Most of the information you provide to us is information you are asking us to make public.”  Your public information is broadly and instantly disseminatedhttps://twitter.com/privacy
    • 13. • Messages you Tweet • Metadata provided with Tweets, • Lists you create, • People you follow • Tweets you mark as favorites or Retweet and many other bits of information. • Tweets are searchable by many search engines • Delivered via SMS and our APIs to a wide range of users and services.Think this is obvious – check out http://bit.ly/ROc7Od or http://bit.ly/ROcbgP
    • 14.  Activity Feed and broadcasts Ads What people see when you view their profile Who can see your picture Data sharing with 3rd parties
    • 15.  Up to 3 secret boards Can be collaborative Pins are hidden Located at the bottom of boards page
    • 16.  A different password for each site Use advanced passwords and …. Change them Don’t set auto-sharing between sites…share selectively
    • 17. - Publilius Syrus- Ernest Bramah
    • 18.  Get online Take ownership of social media sites Think!! Pause!! before you post Secure accounts Keep things private Google Alerts Image from http://chzb.gr/ROdiwV
    • 19.  Deal with issue as soon as possible Ask others to remove unwanted photos/information Post often about yourself Overwhelm the negative Cartoon: http://dilbert.com/strips/comic/2009-02-01/
    • 20. Big Data Everyday we are scattering "digital breadcrumbs" into the data-verse. Credit card purchases, cell phone calls, Internet searches: Big Data means memory storage has become so cheap that all data about all those aspects of our lives can be harvested and put to use. And its exactly the use of all that harvested data that can pose a threat to society. – NPR (http://n.pr/TmsQtQ)• Creating “Customer Profiles”• Make decisions on credit, loans, based upon where you shop
    • 21. Diana Silveira diana@novarelibrary.com Delicious.com/dee987/privacy slideshare.net/dee987https://www.facebook.com/NovareLibraryServices 877-816-9638

    ×