SlideShare a Scribd company logo
1 of 13
PRIVACY PRIMER
A short course on online privacy by
Larry Magid
Co-director, ConnectSafely.org
Founder, SafeKids.com

larry@ConnectSafely.org
Watch what you post
• The biggest risk to our privacy is what we post ourselves


• Be aware that anything you post online can be copied and
 pasted

• If it’s really embarrassing or really a secret, don’t post it
 online, even if you have the tightest possible privacy
 settings
Keep hackers at bay
• All privacy bets are off if hackers get user names and passwords
 or break into one of your accounts
• Even if you practice great security, there is always a chance of a
 data breach at some company or agency with access to your
 data
Security tips
• Use strong passwords, change them periodically and don’t use
 the same password for multiple accounts
• Check your online credit and bank accounts
• Use security software and keep it and your operating system
 and applications up-to-date
• Use WiFi security
• Use the privacy tools associated with your social networks
• Only provide personal or financial information to websites you
 know and trust
• Be aware of the mobile and social networking apps you’re
 using
• Know how to use your browser’s private or “ingonito” mode and
 how to erase the history from your browser.
How tracking cookies work
1. You visit a website that has an ad on it that’s placed by
   one of the advertising networks. The ad is delivered
   from a server owned by the advertising network
2. The network puts a cookie on your machine that
   records the ad that was shown and the site you visited
3. When you visit another site that displays ads from the
   same network, the cookie is updated
   with information about the current ad and current site.
4. Over a period of time the network can get a pretty good
   idea of sites in its network that you’ve visited
How to delete & block tracking cookies
• Many security products can be used to remove tracking
  cookies and the major browsers also have tools to
  remove them
• DoubleClick, which is owned by
  Google, offers instructions on how to opt out of cookies
• All the browser companies have agreed to include a “do
  not track” feature in future browsers, but tracking will be
  the default setting unless you change it. Mozilla
  Firefox, the first to implement this feature
Control mobile location sharing

      • Some mobile apps are designed to share your
       location: Use them thoughtfully and only share
       with those you trust.

      • Review setting periodically. A “friend” could
       become an ex-friend.

      • Pay attention to the permissions on all mobile
       apps. Only use location-aware apps that you
       trust
Don’t overlook the “obvious”
• Watch what you say on your phone while you’re in
 public — people around you might be listening
• Be aware of others viewing your screen. Consider
 getting a privacy screen for your laptop
• Shred your old financial records and other confidential
 documents before throwing them in the trash
 or recycling bin
Facebook privacy settings
 Access general privacy settings by clicking down arrow in upper
 right corner




   And then clicking on “Privacy Settings”
Facebook inline privacy controls




    • Whenever you add content, you can select the audience
    • Be aware that whatever audience you last
      selected remains for subsequent posts until you
      change it
Facebook system-wide settings
Control those apps
THANK YOU
Larry Magid
Co-director, ConnectSafely.org
Founder, SafeKids.com

larry@ConnectSafely.org

More Related Content

What's hot

Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
Rick Ohren
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
Vinayak Hegde
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 

What's hot (20)

Securityguide
SecurityguideSecurityguide
Securityguide
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
Marc Recommendations For Parents
Marc Recommendations For ParentsMarc Recommendations For Parents
Marc Recommendations For Parents
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

Viewers also liked (10)

How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
phishing
phishingphishing
phishing
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 

Similar to Privacy Primer

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar to Privacy Primer (20)

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 

More from ConnectSafely

Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
ConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely
 

More from ConnectSafely (10)

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Privacy Primer

  • 1. PRIVACY PRIMER A short course on online privacy by Larry Magid Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org
  • 2. Watch what you post • The biggest risk to our privacy is what we post ourselves • Be aware that anything you post online can be copied and pasted • If it’s really embarrassing or really a secret, don’t post it online, even if you have the tightest possible privacy settings
  • 3. Keep hackers at bay • All privacy bets are off if hackers get user names and passwords or break into one of your accounts • Even if you practice great security, there is always a chance of a data breach at some company or agency with access to your data
  • 4. Security tips • Use strong passwords, change them periodically and don’t use the same password for multiple accounts • Check your online credit and bank accounts • Use security software and keep it and your operating system and applications up-to-date • Use WiFi security • Use the privacy tools associated with your social networks • Only provide personal or financial information to websites you know and trust • Be aware of the mobile and social networking apps you’re using • Know how to use your browser’s private or “ingonito” mode and how to erase the history from your browser.
  • 5. How tracking cookies work 1. You visit a website that has an ad on it that’s placed by one of the advertising networks. The ad is delivered from a server owned by the advertising network 2. The network puts a cookie on your machine that records the ad that was shown and the site you visited 3. When you visit another site that displays ads from the same network, the cookie is updated with information about the current ad and current site. 4. Over a period of time the network can get a pretty good idea of sites in its network that you’ve visited
  • 6. How to delete & block tracking cookies • Many security products can be used to remove tracking cookies and the major browsers also have tools to remove them • DoubleClick, which is owned by Google, offers instructions on how to opt out of cookies • All the browser companies have agreed to include a “do not track” feature in future browsers, but tracking will be the default setting unless you change it. Mozilla Firefox, the first to implement this feature
  • 7. Control mobile location sharing • Some mobile apps are designed to share your location: Use them thoughtfully and only share with those you trust. • Review setting periodically. A “friend” could become an ex-friend. • Pay attention to the permissions on all mobile apps. Only use location-aware apps that you trust
  • 8. Don’t overlook the “obvious” • Watch what you say on your phone while you’re in public — people around you might be listening • Be aware of others viewing your screen. Consider getting a privacy screen for your laptop • Shred your old financial records and other confidential documents before throwing them in the trash or recycling bin
  • 9. Facebook privacy settings Access general privacy settings by clicking down arrow in upper right corner And then clicking on “Privacy Settings”
  • 10. Facebook inline privacy controls • Whenever you add content, you can select the audience • Be aware that whatever audience you last selected remains for subsequent posts until you change it
  • 13. THANK YOU Larry Magid Co-director, ConnectSafely.org Founder, SafeKids.com larry@ConnectSafely.org