Protecting your privacy online june 2012 tech tuesday
Upcoming SlideShare
Loading in...5

Protecting your privacy online june 2012 tech tuesday






Total Views
Slideshare-icon Views on SlideShare
Embed Views



4 Embeds 160 145 10 4 1


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • doesn't offer to remove any of its information. Instead, you have to remove the data from the site the service scraped it from and then wait for's temporary cache to be emptied, which the site claims may take several days. The service lets you register, but all you get in return is its e-mail newsletters and regular updates on your searches.Read more:
  • Read them – they might spell out if they can be changed without notice.
  • Instructions: ask participants to speak up when they reach their own limit of sharingAsk if they are willing to share this story with their close family…Extended familyFriendsOfficematesCooperative ExtensionCounty residentsWisconsin residentsUSA residentsThe whole worldSummary: anything written in electronic form and shared can be shared without your knowledge to anyone. There is a long life to electronic data that is stored and cached. “Copy and Paste” works on just about any website.
  • Create a separate work account for social networking/social media tools – minimize personal data sharedRemember that the true customer of Facebook are advertisers, Facebook’s product is your data.
  • Add intermediary step – “Edit Friends” between click friends and create a list.
  • Add intermediary step – “Edit Friends” between click friends and create a list.
  • Any application developer

Protecting your privacy online june 2012 tech tuesday Protecting your privacy online june 2012 tech tuesday Presentation Transcript

  • Molly Immendorf CE Technology ServicesProtecting Your Privacy Online
  •  Do as I say, not as I do
  •  Passwords Lie Secure connection (SSL) Vanity search Junk Account Terms of Service Billboards/T-Shirt
  •  Don’t use your banking password for anything else Use strong passwords (min 8 characters, alpha-numeric, mixed case) Consider using a password keeper (i.e., LastPass)
  •  Create a free email account for online registrations
  •  Don’t use your correct birth date Make up your mother’s maiden name, elementary school name, favorite pet name, etc. "123 No Such Street, Nowhere, WI 01010"
  •  When filling out sensitive data on surveys, make sure that it is a secure connection (SSL) Https://
  •  Put your name in quotes in the search engine.
  •  Activity: Take a post-it or piece of paper and write on it the funniest thing that ever happened to you… last week, last month, last year or in your lifetime. Wait for instructions…
  •  Work account Vacation status Friends and followers Micro-manage Facebook Secure Connection Tagging photos Kids’ names Games, quizzes Location-sharing tools
  •  Create separate work and personal accounts
  • •Create Lists of Friends and Pages
  •  Most FB users accept the defaults
  •  Use the friends list to personalize your privacy settings
  •  Photo releases Avoid identifiable photos (signs) Don’t tag in Facebook Use initials for ID
  •  Weird status messages = potential virus If it sounds too good to be true…
  •  Electronic Frontier Foundation  Lifehacker  Federal Trade Commission:   Snopes Scam Checker 
  • Molly Immendorf Instructional Technology SpecialistCooperative Extension Technology Services Facebook: Molly Cargill Immendorf Twitter: Immendorf, CETechServices Slideshare: mimmendorf