Privacy Primer

PRIVACY PRIMER
A short course on online privacy by
Larry Magid
Co-director, ConnectSafely.org
Founder, SafeKids.com

larry@ConnectSafely.org
Watch what you post
• The biggest risk to our privacy is what we post ourselves


• Be aware that anything you post online can be copied and
 pasted

• If it’s really embarrassing or really a secret, don’t post it
 online, even if you have the tightest possible privacy
 settings
Keep hackers at bay
• All privacy bets are off if hackers get user names and passwords
 or break into one of your accounts
• Even if you practice great security, there is always a chance of a
 data breach at some company or agency with access to your
 data
Security tips
• Use strong passwords, change them periodically and don’t use
 the same password for multiple accounts
• Check your online credit and bank accounts
• Use security software and keep it and your operating system
 and applications up-to-date
• Use WiFi security
• Use the privacy tools associated with your social networks
• Only provide personal or financial information to websites you
 know and trust
• Be aware of the mobile and social networking apps you’re
 using
• Know how to use your browser’s private or “ingonito” mode and
 how to erase the history from your browser.
How tracking cookies work
1. You visit a website that has an ad on it that’s placed by
   one of the advertising networks. The ad is delivered
   from a server owned by the advertising network
2. The network puts a cookie on your machine that
   records the ad that was shown and the site you visited
3. When you visit another site that displays ads from the
   same network, the cookie is updated
   with information about the current ad and current site.
4. Over a period of time the network can get a pretty good
   idea of sites in its network that you’ve visited
How to delete & block tracking cookies
• Many security products can be used to remove tracking
  cookies and the major browsers also have tools to
  remove them
• DoubleClick, which is owned by
  Google, offers instructions on how to opt out of cookies
• All the browser companies have agreed to include a “do
  not track” feature in future browsers, but tracking will be
  the default setting unless you change it. Mozilla
  Firefox, the first to implement this feature
Control mobile location sharing

      • Some mobile apps are designed to share your
       location: Use them thoughtfully and only share
       with those you trust.

      • Review setting periodically. A “friend” could
       become an ex-friend.

      • Pay attention to the permissions on all mobile
       apps. Only use location-aware apps that you
       trust
Don’t overlook the “obvious”
• Watch what you say on your phone while you’re in
 public — people around you might be listening
• Be aware of others viewing your screen. Consider
 getting a privacy screen for your laptop
• Shred your old financial records and other confidential
 documents before throwing them in the trash
 or recycling bin
Facebook privacy settings
 Access general privacy settings by clicking down arrow in upper
 right corner




   And then clicking on “Privacy Settings”
Facebook inline privacy controls




    • Whenever you add content, you can select the audience
    • Be aware that whatever audience you last
      selected remains for subsequent posts until you
      change it
Facebook system-wide settings
Control those apps
THANK YOU
Larry Magid
Co-director, ConnectSafely.org
Founder, SafeKids.com

larry@ConnectSafely.org
1 of 13

Recommended

App Privacy by
App PrivacyApp Privacy
App PrivacyConnectSafely
2K views12 slides
Filters and monitoring: Panacea or band-aid by
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
9.8K views8 slides
Digital Citizenship Redefined by
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
23.4K views22 slides
3Rs of Internet Safety: Rights, Responsibilities and Risk Management by
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
11.4K views27 slides
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014 by
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
3.1K views12 slides
Online Safety for Seniors by
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
1.4K views16 slides

More Related Content

What's hot

Securityguide by
SecurityguideSecurityguide
SecurityguideOleg Kostyukevich
195 views9 slides
Cyber Security for 5th and 6th Graders by
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
465 views12 slides
Social Media Security by
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
642 views18 slides
Social Media Basics: Security Loopholes with Twitter & Other Social Media by
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
1.3K views31 slides
Online Safety Tips for Parents by
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
1.2K views15 slides
Pp e safe online p2 n by
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
289 views8 slides

What's hot(20)

Social Media Security by Del Belcher
Social Media SecuritySocial Media Security
Social Media Security
Del Belcher642 views
Social Media Basics: Security Loopholes with Twitter & Other Social Media by Tyler Shields
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields1.3K views
Online Safety Tips for Parents by Kristi Richburg
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
Kristi Richburg1.2K views
Pp e safe online p2 n by FatimaAmin26
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
FatimaAmin26289 views
10 most important cyber security tips for your users by Simpliv LLC
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC36 views
Social Networking and Cyberbullying by Louise Jones
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
Louise Jones1K views
Cybersafeelementary by Rick Ohren
CybersafeelementaryCybersafeelementary
Cybersafeelementary
Rick Ohren152 views
Traveling safely with smartphones 16 jun14 by Naval OPSEC
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
Naval OPSEC6K views
Internet Safety for Parents by Scott Burnett
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett401 views
Cybercrime by Fraz Ali
CybercrimeCybercrime
Cybercrime
Fraz Ali94 views
Parent GuideBook Internet Safety (1) by Matt Forney
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney70 views
Internet Safety by tonyh1
Internet SafetyInternet Safety
Internet Safety
tonyh1550 views
A (very) brief history of Internet safety by ConnectSafely
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
ConnectSafely8.5K views
Dos and don's on social media by sanjeev kumar
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
sanjeev kumar40 views

Viewers also liked

How to Create (use use) Strong & Unique Passwords by
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
348.8K views11 slides
cyberbulllying presentation by
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
733 views14 slides
Cybersafey by
Cybersafey Cybersafey
Cybersafey Vanessa Assumpção
1.6K views20 slides
phishing by
phishingphishing
phishingGarth Bruen
143 views10 slides
Cyber Safety How Children Can Protect Themselves From Online Threats by
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
7.4K views41 slides
Teens and social media by
Teens and social mediaTeens and social media
Teens and social mediaAndrew Campbell
12.8K views28 slides

Viewers also liked(10)

How to Create (use use) Strong & Unique Passwords by ConnectSafely
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely348.8K views
cyberbulllying presentation by renumann
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
renumann733 views
Cyber Safety How Children Can Protect Themselves From Online Threats by mkinzie
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie7.4K views
Bullying Presentation by dreamingmoi
Bullying PresentationBullying Presentation
Bullying Presentation
dreamingmoi128.1K views
Bullying Powerpoint by Prissykrissy
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
Prissykrissy174.8K views
Anti-bullying Presentation #1 by itunaschool
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
itunaschool157.8K views
Bully Powerpoint by thesnapecape
Bully PowerpointBully Powerpoint
Bully Powerpoint
thesnapecape126.2K views

Similar to Privacy Primer

User's Guide to Online Privacy by
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
280 views17 slides
Webinar: 12 Tips to Stay Safer Online - 2018-10-16 by
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
525 views23 slides
Users awarness programme for Online Privacy by
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
102 views33 slides
Online privacy & security by
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
6K views21 slides
Judy Taylour's Digital Privacy Day 2014 Presentation by
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationGreater Cleveland PC Users Group
751 views57 slides
Basic Security Training for End Users by
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End UsersCommunity IT Innovators
5K views25 slides

Similar to Privacy Primer(20)

User's Guide to Online Privacy by cdunk12
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12280 views
Webinar: 12 Tips to Stay Safer Online - 2018-10-16 by TechSoup
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
TechSoup 525 views
Security best practices for regular users by Geoffrey Vaughan
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan255 views
Nat'l Cyber Security Awareness Month (NCSAM) Posters by NetLockSmith
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith 1.6K views
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx by RoNTertainmentTV
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptxTOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx
RoNTertainmentTV22 views
Lock it or Lose It: Why Every Company Should be Concerned About Data Security by SmartCompliance
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance14 views
Onlinesecurityrecomendations2014 141230081030-conversion-gate02 by amiinaaa
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa289 views
Digital Safety, Data Privacy, and Online Netiquette by Gab Billones
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
Gab Billones180 views
An Introduction on Design and Implementation on BYOD and Mobile Security by Sina Manavi
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi1.4K views
Wfh security risks - Ed Adams, President, Security Innovation by Priyanka Aash
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash1.9K views
Module 1 content EN.pptx by ITStudy Ltd.
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
ITStudy Ltd.18 views

More from ConnectSafely

How to Protect Yourself From Heartbleed Security Flaw by
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
21.3K views16 slides
A Brief Guide to Facebook Privacy by
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
6.5K views11 slides
Online Safety 3.0: From Fear to Empowerment by
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
2.4K views32 slides
Internet Safety: Some Context by
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
6.4K views14 slides
Digital literacy, digital citizenship by
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
2.7K views14 slides
Digital reputations by
Digital reputationsDigital reputations
Digital reputationsConnectSafely
1.1K views7 slides

More from ConnectSafely(10)

How to Protect Yourself From Heartbleed Security Flaw by ConnectSafely
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely21.3K views
A Brief Guide to Facebook Privacy by ConnectSafely
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
ConnectSafely6.5K views
Online Safety 3.0: From Fear to Empowerment by ConnectSafely
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
ConnectSafely2.4K views
Internet Safety: Some Context by ConnectSafely
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
ConnectSafely6.4K views
Digital literacy, digital citizenship by ConnectSafely
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
ConnectSafely2.7K views
Making the case for digital citizenship by ConnectSafely
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
ConnectSafely976 views
Digital citizenship, briefly by ConnectSafely
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
ConnectSafely9.2K views
Putting online risks into perspective by ConnectSafely
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
ConnectSafely841 views
ConnectSafely Slide Show for Ministry of Communications and Information Techn... by ConnectSafely
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely1.1K views

Recently uploaded

PharoJS - Zürich Smalltalk Group Meetup November 2023 by
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
141 views17 slides
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
57 views25 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
46 views73 slides
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
111 views13 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
96 views7 slides
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
50 views23 slides

Recently uploaded(20)

PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi141 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue57 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue96 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays40 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10369 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T by ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue46 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue63 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn28 views

Privacy Primer

  • 1. PRIVACY PRIMER A short course on online privacy by Larry Magid Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org
  • 2. Watch what you post • The biggest risk to our privacy is what we post ourselves • Be aware that anything you post online can be copied and pasted • If it’s really embarrassing or really a secret, don’t post it online, even if you have the tightest possible privacy settings
  • 3. Keep hackers at bay • All privacy bets are off if hackers get user names and passwords or break into one of your accounts • Even if you practice great security, there is always a chance of a data breach at some company or agency with access to your data
  • 4. Security tips • Use strong passwords, change them periodically and don’t use the same password for multiple accounts • Check your online credit and bank accounts • Use security software and keep it and your operating system and applications up-to-date • Use WiFi security • Use the privacy tools associated with your social networks • Only provide personal or financial information to websites you know and trust • Be aware of the mobile and social networking apps you’re using • Know how to use your browser’s private or “ingonito” mode and how to erase the history from your browser.
  • 5. How tracking cookies work 1. You visit a website that has an ad on it that’s placed by one of the advertising networks. The ad is delivered from a server owned by the advertising network 2. The network puts a cookie on your machine that records the ad that was shown and the site you visited 3. When you visit another site that displays ads from the same network, the cookie is updated with information about the current ad and current site. 4. Over a period of time the network can get a pretty good idea of sites in its network that you’ve visited
  • 6. How to delete & block tracking cookies • Many security products can be used to remove tracking cookies and the major browsers also have tools to remove them • DoubleClick, which is owned by Google, offers instructions on how to opt out of cookies • All the browser companies have agreed to include a “do not track” feature in future browsers, but tracking will be the default setting unless you change it. Mozilla Firefox, the first to implement this feature
  • 7. Control mobile location sharing • Some mobile apps are designed to share your location: Use them thoughtfully and only share with those you trust. • Review setting periodically. A “friend” could become an ex-friend. • Pay attention to the permissions on all mobile apps. Only use location-aware apps that you trust
  • 8. Don’t overlook the “obvious” • Watch what you say on your phone while you’re in public — people around you might be listening • Be aware of others viewing your screen. Consider getting a privacy screen for your laptop • Shred your old financial records and other confidential documents before throwing them in the trash or recycling bin
  • 9. Facebook privacy settings Access general privacy settings by clicking down arrow in upper right corner And then clicking on “Privacy Settings”
  • 10. Facebook inline privacy controls • Whenever you add content, you can select the audience • Be aware that whatever audience you last selected remains for subsequent posts until you change it
  • 13. THANK YOU Larry Magid Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org