Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

5 a module online privacy


Published on

Published in: Technology, Economy & Finance
  • Be the first to comment

  • Be the first to like this

5 a module online privacy

  1. 1. Online Privacy A Module of the CYC Course – Personal Security 8-9-10
  2. 2. The Realities of Digital Communications: <ul><li>Deleting a digital post is not as permanent as setting fire to a handwritten note. </li></ul><ul><li>Digital content is easily forwarded and reposted. </li></ul><ul><li>Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. </li></ul><ul><li>Your online reputation has offline implications. </li></ul>
  3. 3. Privacy Levels on Social Networking Sites <ul><li>What is the default privacy setting on most social networks? </li></ul><ul><li>You control who sees what content. </li></ul><ul><li>BUT, even though you are restricting access, remember content can be forwarded. </li></ul>
  4. 4. Social Engineering <ul><li>Manipulating people into providing personal information. Often uses human interaction/emotions to obtain information. </li></ul><ul><li>Phishing - Tries to attack you personally. Looks to be from a trusted company asking you to for your personal information. </li></ul><ul><li>Occurs via email, websites and social networks. </li></ul>
  5. 5. Bogus Email Example
  6. 6. Understanding URLs <ul><li>Top level domains </li></ul><ul><li>Domain names </li></ul><ul><li>Text before the domain name </li></ul><ul><li>/ after the top level domain </li></ul><ul><li>Common tactic – URLs that look legitimate but are not. Example – </li></ul>
  7. 7. Example
  8. 8. Passwords <ul><li>Choose a password that can’t be easily guessed. </li></ul><ul><li>Don’t write your password down in any easily findable place. </li></ul><ul><li>Don’t send your password to anyone through e-mail. </li></ul>
  9. 9. Passwords <ul><li>Don’t allow public computers to remember your password. </li></ul><ul><li>Don’t tell anyone your passwords. </li></ul><ul><li>Don’t use the same password for all your accounts, especially the important accounts such as email, banks, credit cards. </li></ul><ul><li>Create a system for remembering your passwords. </li></ul><ul><li>Check the strength of your password - </li></ul>
  10. 10. Shopping Online <ul><li>Make sure YOU initiated the contact. </li></ul><ul><li>Don’t follow an email link. </li></ul><ul><li>Type web addresses carefully. </li></ul><ul><li>Don’t give out SSN, DOB, or your Mother’s Maiden name. </li></ul><ul><li>Do not accept free trial offers. </li></ul><ul><li>Don’t rely on a site “looking” professional. </li></ul>
  11. 11. Credit Card Security <ul><li>When possible, choose a credit card NOT a debit card. </li></ul><ul><li>Best choice - choose one card for online use only or a prepaid credit card. </li></ul><ul><li> - Most companies online accept payments from PayPal. Paypal acts as an intermediary for payment. If you don’t have a credit card you can set it up to take payment out of a checking/savings account. </li></ul>
  12. 12. Identity Theft <ul><li>Someone uses your personal information without your knowledge to commit fraud or theft. </li></ul>
  13. 13. Identity Theft Prevention Tips <ul><li>Do not store personal financial information on laptop computers. </li></ul><ul><li>Before disposing of a computer delete all personal information. </li></ul><ul><li>Review websites’ privacy policies. </li></ul><ul><li>Request free credit report - </li></ul><ul><li>A company or organization that initiated contact with you will not request your password via email or phone. </li></ul>
  14. 14. Identity Theft - Public Computer Safety Tips <ul><li>Beware of “Shoulder Surfers” </li></ul><ul><li>Do NOT allow public computers to remember your log in and password. </li></ul><ul><li>ALWAYS Sign Out or Log Off. </li></ul><ul><li>Clear browser history. </li></ul><ul><li>Close the browser window. </li></ul>
  15. 15. Sources <ul><li>This curriculum was adapted from a workshop created by N. Riesgraf for the Hibbing Public Library (MN). Funding provided by IRRRA Do I.T. Community Technology Awareness Program. </li></ul><ul><li>Additional content created by Connect Your Community, a project of OneCommunity , funded by the federal Broadband Technology Opportunities Program . </li></ul>
  16. 16. Creative Commons License <ul><li>This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit </li></ul>