Molly protecting your privacy online county leadership conference


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

Molly protecting your privacy online county leadership conference

  1. 1. Protecting Your Privacy Online
  2. 2. <ul><li>Do as I say, not as I do </li></ul>
  3. 3. <ul><li>Passwords </li></ul><ul><li>Lie </li></ul><ul><li>Secure connection (SSL) </li></ul><ul><li>Vanity search </li></ul><ul><li>Junk Account </li></ul><ul><li>Terms of Service </li></ul><ul><li>Billboards/T-Shirt </li></ul>
  4. 4. <ul><li>Don’t use your banking password for anything else </li></ul><ul><li>Use strong passwords (min 8 characters, alpha-numeric, mixed case) </li></ul><ul><li>Consider using a password keeper (i.e., LastPass) </li></ul>
  5. 5. <ul><li>Create a free email account for online registrations </li></ul>
  6. 6. <ul><li>Don’t use your correct birth date </li></ul><ul><li>Make up your mother’s maiden name, elementary school name, favorite pet name, etc. </li></ul><ul><li>&quot;123 No Such Street, Nowhere, WI 01010&quot; </li></ul>
  7. 7. <ul><li>When filling out sensitive data on surveys, make sure that it is a secure connection (SSL) </li></ul><ul><li>Https:// </li></ul>
  8. 8. <ul><li>Put your name in quotes in the search engine. </li></ul>
  9. 9.
  10. 10.
  11. 12. <ul><li>Activity : Take a post-it or piece of paper and write on it the funniest thing that ever happened to you… last week, last month, last year or in your lifetime. </li></ul><ul><li>Un-mute your phone (button or 600#) and wait for instructions… </li></ul>
  12. 14. <ul><li>Work account </li></ul><ul><li>Vacation status </li></ul><ul><li>Friends and followers </li></ul><ul><li>Micro-manage </li></ul><ul><li>Facebook Secure Connection </li></ul><ul><li>Tagging photos </li></ul><ul><li>Kids’ names </li></ul><ul><li>Games, quizzes </li></ul><ul><li>Location-sharing tools </li></ul>
  13. 15. <ul><li>Create separate work and personal accounts </li></ul>
  14. 17. <ul><li>Create Lists of Friends and Pages </li></ul>
  15. 18. <ul><li>Create Lists of Friends and Pages </li></ul>
  16. 20. <ul><li>Most FB users accept the defaults </li></ul>
  17. 23. <ul><li>Use the friends list to personalize your privacy settings </li></ul>
  18. 26. Open Book: (warning: potentially offensive language)
  19. 27. <ul><li>Photo releases </li></ul><ul><li>Avoid identifiable photos </li></ul><ul><li>Don’t tag in Facebook </li></ul><ul><li>Use initials for ID </li></ul>
  20. 28. <ul><li>Most ask for access to your personal information </li></ul>
  21. 29. <ul><ul><li> </li></ul></ul>
  22. 31. <ul><li>Weird status messages = potential virus </li></ul><ul><li>If it sounds too good to be true… </li></ul>
  23. 32.
  24. 33.
  25. 34. Who owns your contact information? Are they company assets? National Strategy for Trusted Identities in Cyberspace (draft)
  26. 35. <ul><li>Electronic Frontier Foundation </li></ul><ul><ul><li> </li></ul></ul><ul><li>Lifehacker </li></ul><ul><ul><li> </li></ul></ul><ul><li>Federal Trade Commission: </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul><ul><li>Snopes Scam Checker </li></ul><ul><ul><li> </li></ul></ul>
  27. 36. <ul><li>[email_address] </li></ul><ul><li>Presentation available on </li></ul><ul><li> </li></ul>