SlideShare a Scribd company logo
By Chitrita
What is digital footprint ?
● A digital footprint - sometimes called a digital shadow or an electronic
footprint - refers to the trail of data you leave when using the internet. It
includes websites you visit, emails you send, and information you submit
online.
● A digital footprint can be used to track a person’s online activities and devices.
Internet uses create their digital footprint either actively or passively.
Active digital footprints
● An active digital footprint is where the user has
deliberately shared information about
themselves.
● For example, through posting or participating
on social networking sites or online forums.
● Other activities that contribute to active digital
footprints include completing an online form -
such as subscribing to a newsletter - or
agreeing to accept cookies on your browser.
Passive digital footprints
● A passive digital footprint is created when
information is collected about the user without
them being aware that this is happening.
● For example, this occurs when websites collect
information about how many times users visit,
where they come from, and their IP address.
● This is a hidden process, which users may not
realize is taking place.
Why do digital footprints matter?
● They are relatively permanent, and once the data is public - or even semi-public, as may
be the case with Facebook posts - the owner has little control over how others will use it.
● Words and photos which you post online can be misinterpreted or altered, causing
unintentional offense.
● Content intended for a private group can spread to a broader circle, potentially
damaging relationships and friendships.
● Cybercriminals can exploit your digital footprint - using it for purpose such as phishing
for account access or creating false identities based on your data.
Digital footprints example
Online Shopping Online Banking
Social Media
Reading the News Health and Fitness
What are some ways to protect your digital footprint ?
● Use search engine to check your digital footprint
● Reduce the number of information sources that mention you
● Limit the amount of data you share
● Double check your privacy settings
● Avoid oversharing on social media
● Avoid unsafe websites
● Keep software up to date
Digital Footprint

More Related Content

What's hot

Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
Radhika Sharma
 
online education ppt
online education pptonline education ppt
online education ppt
Sudip Das
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
SultanaShaikh7
 
First step to internet
First step to internet First step to internet
First step to internet
Disani Neranjala
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sites
Nidhi Vats
 
Aspects of online teaching and learning
Aspects of online teaching and learningAspects of online teaching and learning
Aspects of online teaching and learning
KimRhyne
 
Internet
InternetInternet
Intro To Scratch
Intro To ScratchIntro To Scratch
Intro To Scratch
Patrick Woessner
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
Dr. Michael England
 
Social media platforms
Social media platformsSocial media platforms
Social media platforms
Angelito Pera
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
Maricrs Alfarö
 
Impact and effects
Impact and effectsImpact and effects
Impact and effects
SarahPaynandos
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Gabriela Teixeira
 
Impacts of e learning
Impacts of e learningImpacts of e learning
Impacts of e learning
karyangquimpan
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
plandeen
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
JannahAboulhassan
 
socialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptx
socialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptxsocialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptx
socialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptx
TanayMalhotra
 
Online Education
Online EducationOnline Education
Online Education
Muhammad Abrar Aqeel
 
Use of social networks
Use of social networksUse of social networks
Use of social networks
Škola Futura
 

What's hot (20)

Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
 
online education ppt
online education pptonline education ppt
online education ppt
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
First step to internet
First step to internet First step to internet
First step to internet
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sites
 
Aspects of online teaching and learning
Aspects of online teaching and learningAspects of online teaching and learning
Aspects of online teaching and learning
 
Internet
InternetInternet
Internet
 
Intro To Scratch
Intro To ScratchIntro To Scratch
Intro To Scratch
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Social media platforms
Social media platformsSocial media platforms
Social media platforms
 
Introduction to ict
Introduction to ictIntroduction to ict
Introduction to ict
 
Impact and effects
Impact and effectsImpact and effects
Impact and effects
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Impacts of e learning
Impacts of e learningImpacts of e learning
Impacts of e learning
 
Technology Presentation
Technology PresentationTechnology Presentation
Technology Presentation
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
socialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptx
socialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptxsocialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptx
socialnetworkingsitespresentation-150625215131-lva1-app6891 (1)-converted.pptx
 
Online Education
Online EducationOnline Education
Online Education
 
Use of social networks
Use of social networksUse of social networks
Use of social networks
 

Similar to Digital Footprint

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
T Tanujha
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
Danielle De Martin
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
TejasSingh70
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 
Leafcutter's presentation- gifts in wills (Melbourne)
Leafcutter's presentation- gifts in wills (Melbourne)Leafcutter's presentation- gifts in wills (Melbourne)
Leafcutter's presentation- gifts in wills (Melbourne)
James Hornitzky
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
LyndaWillett
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
Simeon Bala
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
IWMW
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
Oodit Jethwa
 
Positive Digital Footprints.pptx
Positive Digital Footprints.pptxPositive Digital Footprints.pptx
Positive Digital Footprints.pptx
MicahNidea2
 
Digital footprint by claire de martin
Digital footprint by claire de martinDigital footprint by claire de martin
Digital footprint by claire de martin
Claire De Martin
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
YellowSlice1
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
Anjan Mahanta
 
ETECH-3.0.pptx
ETECH-3.0.pptxETECH-3.0.pptx
ETECH-3.0.pptx
Eidene Joy Manuel
 
Presentation networking
Presentation networkingPresentation networking
Presentation networking
Ammara Malik
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Sri023
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 

Similar to Digital Footprint (20)

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Leafcutter's presentation- gifts in wills (Melbourne)
Leafcutter's presentation- gifts in wills (Melbourne)Leafcutter's presentation- gifts in wills (Melbourne)
Leafcutter's presentation- gifts in wills (Melbourne)
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Positive Digital Footprints.pptx
Positive Digital Footprints.pptxPositive Digital Footprints.pptx
Positive Digital Footprints.pptx
 
Digital footprint by claire de martin
Digital footprint by claire de martinDigital footprint by claire de martin
Digital footprint by claire de martin
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
ETECH-3.0.pptx
ETECH-3.0.pptxETECH-3.0.pptx
ETECH-3.0.pptx
 
Presentation networking
Presentation networkingPresentation networking
Presentation networking
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Digital Footprint

  • 2. What is digital footprint ? ● A digital footprint - sometimes called a digital shadow or an electronic footprint - refers to the trail of data you leave when using the internet. It includes websites you visit, emails you send, and information you submit online. ● A digital footprint can be used to track a person’s online activities and devices. Internet uses create their digital footprint either actively or passively.
  • 3. Active digital footprints ● An active digital footprint is where the user has deliberately shared information about themselves. ● For example, through posting or participating on social networking sites or online forums. ● Other activities that contribute to active digital footprints include completing an online form - such as subscribing to a newsletter - or agreeing to accept cookies on your browser.
  • 4. Passive digital footprints ● A passive digital footprint is created when information is collected about the user without them being aware that this is happening. ● For example, this occurs when websites collect information about how many times users visit, where they come from, and their IP address. ● This is a hidden process, which users may not realize is taking place.
  • 5. Why do digital footprints matter? ● They are relatively permanent, and once the data is public - or even semi-public, as may be the case with Facebook posts - the owner has little control over how others will use it. ● Words and photos which you post online can be misinterpreted or altered, causing unintentional offense. ● Content intended for a private group can spread to a broader circle, potentially damaging relationships and friendships. ● Cybercriminals can exploit your digital footprint - using it for purpose such as phishing for account access or creating false identities based on your data.
  • 6. Digital footprints example Online Shopping Online Banking Social Media Reading the News Health and Fitness
  • 7. What are some ways to protect your digital footprint ? ● Use search engine to check your digital footprint ● Reduce the number of information sources that mention you ● Limit the amount of data you share ● Double check your privacy settings ● Avoid oversharing on social media ● Avoid unsafe websites ● Keep software up to date