SlideShare a Scribd company logo
Facebook Privacy And Security
Gonetech.com
Click here for further assistance
What is
It is a Most Popular Social Networking Website
Over 1 billion Users are on Facebook
4.5 billion Likes generates every day
1.18 Billion users log into their accounts each day and
it is increased by 16%
Facebook users are 76% female (out of 100% of all females) and
66% male (out of 100% of all males)
What is Privacy?
• Privacy means to have not to disturb or
observed by anyone else other than you.
What is Security?
• Security means to have a guaranty or the
fulfillment of the state on which your data
will not surely be stolen or observed by
anyone else.
Why it is so Important?
Facebook Privacy
• Facebook currently has over 1.79 billion
active users
• Each users specifies their personal Details
• For example:
What kind of details can a
person gather from facebook?
• Your Name
• Your Location
• Your School
• Hometown
• Even Number
• Your Daily Activity
• …………Many More
Steps to enhance your Privacy
and Security
• Homepage of facebook page
• First is your homepage
• Go to settings
• Then Go to Privacy/Security
• You will get Three options to select
– Everyone
– Friends of Friends
– Friends only
• Select whatever suites according to you!
http://gonetech.net/facebook-helpdesk/how-to-protect-facebook-account
Homepage of Facebook
Your Homepage looks like this!
Click on drop down Menu on top-Right
corner of your account and click on
Setting
Click Here for
Settings
Click on Security on the Left side list
Click Here on Security
Here you will Get many Options
Choose according to you
Login Alerts:
You can choose the
way in which you
want login Alerts
There are many more options
on Security Page
login Approvals App Passwords Public Keys
Trusted contacts Recognize Devices
Where you Have Logged in
Profile Picture Login Deactivate Account
This is two factor Authentication
• Text sms
• Security Keys
• Code generator
• Recovery Code
This is for securing your apps on
facebook (If you have one)
You can use this public key to
encrypt notification emails that
Facebook sends you!
Your trusted contacts are friends
who you chose who can securely
help if you ever have trouble
accessing your account.
By using this option, You can tell
facebook that these are your
devices on which your account
runs
This option will show you in how
many devices has your account
active!
If you find anything odd, You can
end that activity immediately!
You can just click your profile
picture instead of typing a
password to log into your
account.
A legacy contact is someone who
you choose to manage your
account after you pass away.
They'll be able to do things like
pin a post on your Timeline,
respond to new friend requests
and update your profile picture.
Click on Privacy on the Left side list
Click Here on Privacy
Here you will Get mainly Three Options
Who Can see my stuff?
You can Choose Friends
(Only your friends will be
able to see your stuff)
Two more options are there
• Public (Everybody on facebook will be able to see your stuff)
• Only me (Only you on facebook will be able to see your stuff)
• Custom (The friends you have chosen on facebook as “share with” will be
able to see your stuff)
There are Two more options on
Privacy Page
Who can look me up?
You can choose who can send
you the friend request
Who can contact me?
You can choose you are visible by using:
•Phone number
•Search Engine
•Email ID
Latest changes
• There are many security and privacy features are
there:
• Facebook itself Ban people who are spamming on
facebook or have unauthenticated account
• People are not allowed to use facebook who are under 13
years.
• Facebook warns people who use things which has patent
and without having permission of the owner
• ….
What to do if you still find the
problem?
+1 – 844 – 773 – 9313 (US/CANADA)
+44 – 800 – 051 – 3717 (UK)
+61 – 180 – 082 – 5192 (AUS)
http://gonetech.net/facebook-customer-support-number/

More Related Content

What's hot

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
Joint Base Myer-Henderson Hall
 
Pros and Cons of Facebook
Pros and Cons of  FacebookPros and Cons of  Facebook
Pros and Cons of Facebook
Atmadeep Das
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
Lyn Antonette Guadayo Rosal
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
Bryan Tran
 
introduction of facebook
introduction of facebookintroduction of facebook
introduction of facebook
Cygnet Infotech Pvt. Ltd.
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Facebook Privacy Settings
Facebook Privacy SettingsFacebook Privacy Settings
Facebook Privacy Settings
Greater Cleveland PC Users Group
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
SocialNetworkingGroup
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking pptpatricia
 
whats app
whats appwhats app
whats app
tamil selvan
 
facebook power point presentation ppt 2017
facebook power point presentation ppt 2017 facebook power point presentation ppt 2017
facebook power point presentation ppt 2017
Phanindra Mannepalli
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings ReportAbhishek Gupta
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & Impact
Gaurav Wadhwa
 
Social networking
Social networkingSocial networking
Social networking
athiya salagram
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
Kristin Briney
 
Role of social media in education
Role of social media in educationRole of social media in education
Role of social media in education
The Asian School
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sitesNidhi Vats
 

What's hot (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
Pros and Cons of Facebook
Pros and Cons of  FacebookPros and Cons of  Facebook
Pros and Cons of Facebook
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
introduction of facebook
introduction of facebookintroduction of facebook
introduction of facebook
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Facebook Privacy Settings
Facebook Privacy SettingsFacebook Privacy Settings
Facebook Privacy Settings
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
whats app
whats appwhats app
whats app
 
facebook power point presentation ppt 2017
facebook power point presentation ppt 2017 facebook power point presentation ppt 2017
facebook power point presentation ppt 2017
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
 
social media
social mediasocial media
social media
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & Impact
 
Social networking
Social networkingSocial networking
Social networking
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Role of social media in education
Role of social media in educationRole of social media in education
Role of social media in education
 
Ppt of social networking sites
Ppt of social networking sitesPpt of social networking sites
Ppt of social networking sites
 

Viewers also liked

Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
Arya KrishnaKanth
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentation
Dianne McKenzie
 
password (facebook)
password (facebook) password (facebook)
password (facebook)
Mr. FM
 
Facebook Privacy options
Facebook Privacy optionsFacebook Privacy options
Facebook Privacy options
Phil Bradley
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy IssuesBusinessOnline
 

Viewers also liked (6)

Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
 
Facebook privacy presentation
Facebook privacy presentationFacebook privacy presentation
Facebook privacy presentation
 
password (facebook)
password (facebook) password (facebook)
password (facebook)
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
Facebook Privacy options
Facebook Privacy optionsFacebook Privacy options
Facebook Privacy options
 
Facebook Privacy Issues
Facebook Privacy IssuesFacebook Privacy Issues
Facebook Privacy Issues
 

Similar to Facebook privacy and security

it.pptx
it.pptxit.pptx
it.pptx
ssuser8b4eb21
 
Facebook Privacy 101
Facebook Privacy 101Facebook Privacy 101
Facebook Privacy 101
St. Petersburg College
 
How to stay safe on facebook! (3)
How to stay safe on facebook! (3)How to stay safe on facebook! (3)
How to stay safe on facebook! (3)Paige Shirley
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
Whitney Moore
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
Sarah K Miller
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
Dee Tutino
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
Dee Tutino
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...
Carl B. Forkner, Ph.D.
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
Jamie Edmondson
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
San Diego Continuing Education
 
presentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptxpresentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptx
kanurukarthikeya
 
Facebook
FacebookFacebook
Facebook
Gulfam Hussain
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...
Ida Olsson
 
Social media is our new friends presentations
Social media is our new friends presentationsSocial media is our new friends presentations
Social media is our new friends presentations
16mdarmanalam
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
Towa Beer
 

Similar to Facebook privacy and security (20)

it.pptx
it.pptxit.pptx
it.pptx
 
Facebook Privacy 101
Facebook Privacy 101Facebook Privacy 101
Facebook Privacy 101
 
How to stay safe on facebook! (3)
How to stay safe on facebook! (3)How to stay safe on facebook! (3)
How to stay safe on facebook! (3)
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
T.m.p.m.dissanayaka
T.m.p.m.dissanayakaT.m.p.m.dissanayaka
T.m.p.m.dissanayaka
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
presentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptxpresentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptx
 
Facebook
FacebookFacebook
Facebook
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...Digital Sobriety - How tech companies are controlling you and what to do abou...
Digital Sobriety - How tech companies are controlling you and what to do abou...
 
Social media is our new friends presentations
Social media is our new friends presentationsSocial media is our new friends presentations
Social media is our new friends presentations
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Facebook privacy and security

  • 1. Facebook Privacy And Security Gonetech.com Click here for further assistance
  • 2. What is It is a Most Popular Social Networking Website Over 1 billion Users are on Facebook 4.5 billion Likes generates every day 1.18 Billion users log into their accounts each day and it is increased by 16% Facebook users are 76% female (out of 100% of all females) and 66% male (out of 100% of all males)
  • 3. What is Privacy? • Privacy means to have not to disturb or observed by anyone else other than you.
  • 4. What is Security? • Security means to have a guaranty or the fulfillment of the state on which your data will not surely be stolen or observed by anyone else.
  • 5. Why it is so Important?
  • 6. Facebook Privacy • Facebook currently has over 1.79 billion active users • Each users specifies their personal Details • For example:
  • 7. What kind of details can a person gather from facebook? • Your Name • Your Location • Your School • Hometown • Even Number • Your Daily Activity • …………Many More
  • 8. Steps to enhance your Privacy and Security • Homepage of facebook page • First is your homepage • Go to settings • Then Go to Privacy/Security • You will get Three options to select – Everyone – Friends of Friends – Friends only • Select whatever suites according to you! http://gonetech.net/facebook-helpdesk/how-to-protect-facebook-account
  • 10. Your Homepage looks like this!
  • 11. Click on drop down Menu on top-Right corner of your account and click on Setting Click Here for Settings
  • 12. Click on Security on the Left side list Click Here on Security
  • 13. Here you will Get many Options Choose according to you Login Alerts: You can choose the way in which you want login Alerts
  • 14. There are many more options on Security Page login Approvals App Passwords Public Keys Trusted contacts Recognize Devices Where you Have Logged in Profile Picture Login Deactivate Account This is two factor Authentication • Text sms • Security Keys • Code generator • Recovery Code This is for securing your apps on facebook (If you have one) You can use this public key to encrypt notification emails that Facebook sends you! Your trusted contacts are friends who you chose who can securely help if you ever have trouble accessing your account. By using this option, You can tell facebook that these are your devices on which your account runs This option will show you in how many devices has your account active! If you find anything odd, You can end that activity immediately! You can just click your profile picture instead of typing a password to log into your account. A legacy contact is someone who you choose to manage your account after you pass away. They'll be able to do things like pin a post on your Timeline, respond to new friend requests and update your profile picture.
  • 15. Click on Privacy on the Left side list Click Here on Privacy
  • 16. Here you will Get mainly Three Options Who Can see my stuff? You can Choose Friends (Only your friends will be able to see your stuff) Two more options are there • Public (Everybody on facebook will be able to see your stuff) • Only me (Only you on facebook will be able to see your stuff) • Custom (The friends you have chosen on facebook as “share with” will be able to see your stuff)
  • 17. There are Two more options on Privacy Page Who can look me up? You can choose who can send you the friend request Who can contact me? You can choose you are visible by using: •Phone number •Search Engine •Email ID
  • 18. Latest changes • There are many security and privacy features are there: • Facebook itself Ban people who are spamming on facebook or have unauthenticated account • People are not allowed to use facebook who are under 13 years. • Facebook warns people who use things which has patent and without having permission of the owner • ….
  • 19. What to do if you still find the problem? +1 – 844 – 773 – 9313 (US/CANADA) +44 – 800 – 051 – 3717 (UK) +61 – 180 – 082 – 5192 (AUS) http://gonetech.net/facebook-customer-support-number/