SlideShare a Scribd company logo
1 of 11
A Brief Guide to Facebook
Privacy
(June 2013)
Larry Magid
Co-director
ConnectSafely.org
Inline Privacy Settings
• You can control the audience for each post, each time you post
• Click on the icon (globe means it’s public) below each post to change
the audience
Audience Choices
• Public – Everyone
• Friends – People you have friended
• Friends of Friends: Your extended network of people your
friends are friends with
• Acquaintances – “Friends you don’t need to stay in close
touch with.”
• Close Friends: People you interact with a lot
• Custom: You get to chose who to include or exclude
Privacy Settings and Tools
• Facebook has a couple of settings that are “permanent” (until you
change them)
• Who can see my stuff
• Who can look me up
• You can access them from the settings menu
Tagging
• Anyone can tag you in a photo or a post
• Once tagged, that photo or post can be found by searching for you
• Tagged images of you can also show up on your Timeline
• You can remove a tag of yourself from Activity log or from your
Timeline
You can tag
yourself or others
To Remove a Tag
• From Your Activity Log
• Click on the post or picture
• Click Options below the picture
• Select Report/Remove tag
• From your Timeline
• Click on pencil to select “edit/remove”
• Select Report/Remove
Using the Activity Log to Find and
Remove Content
• You can use the Activity Log to see photos you're tagged in and posts that
may appear in News Feed, search and other places on Facebook
• Use "Shared with" and "On timeline" filters to review who can still see
things you may have hidden from your time line that could show up in news
feed, search and other places.
• You can remove something you don’t like by clicking on the pencil icon and
selecting Delete.
• You can report abusive posts from others by Report/Remove Tag
A Lot Can Be Found With Graph Search
• Graph Search is a powerful search tool that can help people find
people places and things including photos you’ve been tagged in
• If someone is part of the audience of a post, they can find it using
graph search
• Anything posted to “public” can be found by anyone
• Anything posted to friends can be found by your friends
• If you don’t want it found, don’t post it or limit the audience
• Content hidden from your Timeline may still be found via search
Timeline Vs. News Feed Vs. Search
• Your Timline is “you central” – the place where people can see what
you post, what’s posted about you and what (including pictures)
you’re tagged in
• But it’s not the only place people can find content about you. It can
also be found:
• In News Feed (those posts that show up on people’s home pages)
• Via search
• On other people’s TImelines
Hiding vs. Deleting
• There are ways to hide content from your
Timeline but it might still surface elsewhere
• In News feed
• In Search
• On someone else’s Timeline
• If you really want it gone, you must delete it, not
just hide it
Larry Magid
larry@connectsafely.org
Thank You!

More Related Content

Viewers also liked

Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Nicole C. Engard
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenWhat Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenHome
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 

Viewers also liked (7)

Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenWhat Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 

Similar to A Brief Guide to Facebook Privacy

Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529dinica
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Becky Benishek
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesKelly Anderson
 
Facebook privacy settings by Lynn
Facebook privacy settings by LynnFacebook privacy settings by Lynn
Facebook privacy settings by LynnLynnOng Jia Hui
 
Facebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesFacebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesTory Starr
 
Google+ features for business and users
Google+ features for business and usersGoogle+ features for business and users
Google+ features for business and usersEnconexo
 
Google plus chapter 2 - circles
Google plus   chapter 2 - circlesGoogle plus   chapter 2 - circles
Google plus chapter 2 - circlesBobby Wan
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingVictor Castelo
 
Google+ posting
Google+ postingGoogle+ posting
Google+ postingmattgasior
 
Google+ posting
Google+ postingGoogle+ posting
Google+ postingAngelMcru
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for scepticsHelen Webster
 
Social Branding for Student Journalists
Social Branding for Student JournalistsSocial Branding for Student Journalists
Social Branding for Student JournalistsMandy Jenkins
 
Print screen and Script
Print screen and ScriptPrint screen and Script
Print screen and Scriptmenger89
 
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...News Leaders Association's NewsTrain
 
Oachc Presentation2
Oachc Presentation2Oachc Presentation2
Oachc Presentation2Kknepper
 
How to Use Flipboard
How to Use FlipboardHow to Use Flipboard
How to Use FlipboardLisa Sicard
 

Similar to A Brief Guide to Facebook Privacy (20)

Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
Facebook privacy settings by Lynn
Facebook privacy settings by LynnFacebook privacy settings by Lynn
Facebook privacy settings by Lynn
 
Facebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesFacebook 101 for WGBH Employees
Facebook 101 for WGBH Employees
 
Facebook and privacy policy
Facebook and privacy policyFacebook and privacy policy
Facebook and privacy policy
 
Google+ features for business and users
Google+ features for business and usersGoogle+ features for business and users
Google+ features for business and users
 
Google plus chapter 2 - circles
Google plus   chapter 2 - circlesGoogle plus   chapter 2 - circles
Google plus chapter 2 - circles
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and tagging
 
Google+ posting
Google+ postingGoogle+ posting
Google+ posting
 
Google+ posting
Google+ postingGoogle+ posting
Google+ posting
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Google+ workshop presentation
Google+ workshop presentationGoogle+ workshop presentation
Google+ workshop presentation
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for sceptics
 
Google+ Smart Card 070314
Google+ Smart Card 070314Google+ Smart Card 070314
Google+ Smart Card 070314
 
Social Branding for Student Journalists
Social Branding for Student JournalistsSocial Branding for Student Journalists
Social Branding for Student Journalists
 
Print screen and Script
Print screen and ScriptPrint screen and Script
Print screen and Script
 
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
 
Oachc Presentation2
Oachc Presentation2Oachc Presentation2
Oachc Presentation2
 
How to Use Flipboard
How to Use FlipboardHow to Use Flipboard
How to Use Flipboard
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 

More from ConnectSafely (11)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

A Brief Guide to Facebook Privacy

  • 1. A Brief Guide to Facebook Privacy (June 2013) Larry Magid Co-director ConnectSafely.org
  • 2. Inline Privacy Settings • You can control the audience for each post, each time you post • Click on the icon (globe means it’s public) below each post to change the audience
  • 3. Audience Choices • Public – Everyone • Friends – People you have friended • Friends of Friends: Your extended network of people your friends are friends with • Acquaintances – “Friends you don’t need to stay in close touch with.” • Close Friends: People you interact with a lot • Custom: You get to chose who to include or exclude
  • 4. Privacy Settings and Tools • Facebook has a couple of settings that are “permanent” (until you change them) • Who can see my stuff • Who can look me up • You can access them from the settings menu
  • 5. Tagging • Anyone can tag you in a photo or a post • Once tagged, that photo or post can be found by searching for you • Tagged images of you can also show up on your Timeline • You can remove a tag of yourself from Activity log or from your Timeline You can tag yourself or others
  • 6. To Remove a Tag • From Your Activity Log • Click on the post or picture • Click Options below the picture • Select Report/Remove tag • From your Timeline • Click on pencil to select “edit/remove” • Select Report/Remove
  • 7. Using the Activity Log to Find and Remove Content • You can use the Activity Log to see photos you're tagged in and posts that may appear in News Feed, search and other places on Facebook • Use "Shared with" and "On timeline" filters to review who can still see things you may have hidden from your time line that could show up in news feed, search and other places. • You can remove something you don’t like by clicking on the pencil icon and selecting Delete. • You can report abusive posts from others by Report/Remove Tag
  • 8. A Lot Can Be Found With Graph Search • Graph Search is a powerful search tool that can help people find people places and things including photos you’ve been tagged in • If someone is part of the audience of a post, they can find it using graph search • Anything posted to “public” can be found by anyone • Anything posted to friends can be found by your friends • If you don’t want it found, don’t post it or limit the audience • Content hidden from your Timeline may still be found via search
  • 9. Timeline Vs. News Feed Vs. Search • Your Timline is “you central” – the place where people can see what you post, what’s posted about you and what (including pictures) you’re tagged in • But it’s not the only place people can find content about you. It can also be found: • In News Feed (those posts that show up on people’s home pages) • Via search • On other people’s TImelines
  • 10. Hiding vs. Deleting • There are ways to hide content from your Timeline but it might still surface elsewhere • In News feed • In Search • On someone else’s Timeline • If you really want it gone, you must delete it, not just hide it