Protecting your privacy online county leadership conference


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • doesn't offer to remove any of its information. Instead, you have to remove the data from the site the service scraped it from and then wait for's temporary cache to be emptied, which the site claims may take several days. The service lets you register, but all you get in return is its e-mail newsletters and regular updates on your searches. Read more:
  • Read them – they might spell out if they can be changed without notice.
  • Instructions: ask participants to speak up when they reach their own limit of sharing Ask if they are willing to share this story with their close family… Extended family Friends Officemates Cooperative Extension County residents Wisconsin residents USA residents The whole world Summary: anything written in electronic form and shared can be shared without your knowledge to anyone. There is a long life to electronic data that is stored and cached. “Copy and Paste” works on just about any website.
  • Create a separate work account for social networking/social media tools – minimize personal data shared Remember that the true customer of Facebook are advertisers, Facebook’s product is your data.
  • Add intermediary step – “Edit Friends” between click friends and create a list.
  • Add intermediary step – “Edit Friends” between click friends and create a list.
  • When writing a status update/tweet, don’t announce that you are going on or are on vacation.
  • Any application developer
  • Linked to GPS/phones Twitter Facebook
  • Contact information as capital assets (bankrupted companies, aquired companies) Homeland Security National Strategy for Trusted Identities in Cyberspace (draft) Enhanced privacy protection
  • Protecting your privacy online county leadership conference

    1. 1. Protecting Your Privacy Online
    2. 2. <ul><li>Do as I say, not as I do </li></ul>
    3. 3. <ul><li>Passwords </li></ul><ul><li>Lie </li></ul><ul><li>Secure connection (SSL) </li></ul><ul><li>Vanity search </li></ul><ul><li>Junk Account </li></ul><ul><li>Terms of Service </li></ul><ul><li>Billboards/T-Shirt </li></ul>
    4. 4. <ul><li>Don’t use your banking password for anything else </li></ul><ul><li>Use strong passwords (min 8 characters, alpha-numeric, mixed case) </li></ul><ul><li>Consider using a password keeper (i.e., LastPass) </li></ul>
    5. 5. <ul><li>Create a free email account for online registrations </li></ul>
    6. 6. <ul><li>Don’t use your correct birth date </li></ul><ul><li>Make up your mother’s maiden name, elementary school name, favorite pet name, etc. </li></ul><ul><li>&quot;123 No Such Street, Nowhere, WI 01010&quot; </li></ul>
    7. 7. <ul><li>When filling out sensitive data on surveys, make sure that it is a secure connection (SSL) </li></ul><ul><li>Https:// </li></ul>
    8. 8. <ul><li>Put your name in quotes in the search engine. </li></ul>
    9. 9.
    10. 10.
    11. 12. <ul><li>Activity : Take a post-it or piece of paper and write on it the funniest thing that ever happened to you… last week, last month, last year or in your lifetime. </li></ul><ul><li>Wait for instructions… </li></ul>
    12. 14. <ul><li>Work account </li></ul><ul><li>Vacation status </li></ul><ul><li>Friends and followers </li></ul><ul><li>Micro-manage </li></ul><ul><li>Facebook Secure Connection </li></ul><ul><li>Tagging photos </li></ul><ul><li>Kids’ names </li></ul><ul><li>Games, quizzes </li></ul><ul><li>Location-sharing tools </li></ul>
    13. 15. <ul><li>Create separate work and personal accounts </li></ul>
    14. 17. <ul><li>Create Lists of Friends and Pages </li></ul>
    15. 18. <ul><li>Create Lists of Friends and Pages </li></ul>
    16. 20. <ul><li>Most FB users accept the defaults </li></ul>
    17. 23. <ul><li>Use the friends list to personalize your privacy settings </li></ul>
    18. 26. Open Book: (warning: potentially offensive language)
    19. 27. <ul><li>Photo releases </li></ul><ul><li>Avoid identifiable photos </li></ul><ul><li>Don’t tag in Facebook </li></ul><ul><li>Use initials for ID </li></ul>
    20. 28. <ul><li>Most ask for access to your personal information </li></ul>
    21. 29. <ul><ul><li> </li></ul></ul>
    22. 31. <ul><li>Weird status messages = potential virus </li></ul><ul><li>If it sounds too good to be true… </li></ul>
    23. 32.
    24. 33.
    25. 34. Who owns your contact information? Are they company assets? National Strategy for Trusted Identities in Cyberspace (draft)
    26. 35. <ul><li>Electronic Frontier Foundation </li></ul><ul><ul><li> </li></ul></ul><ul><li>Lifehacker </li></ul><ul><ul><li> </li></ul></ul><ul><li>Federal Trade Commission: </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul><ul><li>Snopes Scam Checker </li></ul><ul><ul><li> </li></ul></ul>
    27. 36. <ul><li>[email_address] </li></ul><ul><li>Presentation available on </li></ul><ul><li> </li></ul>