The document provides guidance on selecting and securing a social networking platform. It recommends carefully reviewing privacy policies to understand how personal data is used and shared. It also suggests choosing privacy settings that allow sharing only with close contacts, and being aware of a platform's server locations and compliance with government data requests. Location of servers and compliance with government requests impact privacy and security.
Final slide show for basic training for Facebook, with Beginning Twitter information and industry updates for other platforms. Taken from Coldwell Banker Bain training 6/23/15
This document provides tips for securing privacy settings on Facebook. It recommends limiting who can see your profile information, posts, timeline and tags to just friends or only yourself. It also advises disabling third party access to your profile through apps and login services to prevent sharing of personal data. Additionally, it suggests refraining from checking in to locations or posting photos that clearly show your face. The privacy, timeline and tagging, security, ads and apps tabs all allow adjustment of settings to conceal information from public view.
The document provides instructions for maximizing privacy settings on Facebook to limit what personal information is visible to others. It recommends adjusting settings on the Privacy, Timeline and Tagging, Followers, Security, Ads, and Apps tabs to restrict who can see posts, profile information, and activity. Examples include limiting audiences for posts to "Friends Only", restricting who can follow the user, and preventing third parties from accessing or sharing the user's data. The document also advises reviewing connections regularly, assuming information is public, and avoiding revealing photos or oversharing personal details on social media profiles.
The document provides instructions for maximizing privacy settings on Facebook to limit what personal information is visible to others. It recommends adjusting settings on the Privacy, Timeline and Tagging, Followers, Security, Ads, and Apps tabs to restrict who can see posts, profile information, and activity. Examples include limiting audiences for posts to "Friends Only", restricting who can follow the user, and preventing third parties from accessing or sharing the user's data. The document also advises reviewing connections regularly, assuming information is public, and avoiding revealing photos or oversharing personal details on social media profiles.
This document outlines 9 critical steps that Facebook users can take to better protect their personal information and privacy on the platform. It recommends adjusting privacy settings to share only with friends, limiting what information is shared and accessible to others, removing unwanted apps, and disabling features like public searches and targeted ads. Facebook's default privacy settings often make too much information public, so taking these steps like customizing sharing options and access is important for security. The 9 steps provide guidance on specific privacy settings to update for each recommended adjustment.
The document provides instructions for creating profiles and pages on social media platforms like LinkedIn, Twitter, Facebook, and TweetDeck. It outlines 7 steps for creating a LinkedIn profile, 8 steps for creating a Twitter account, and 8 steps for using the TweetDeck application. For Facebook, it describes a 6 step process for creating a basic profile and options for creating official pages, community pages, or groups. It also discusses measuring engagement on Facebook pages and creating Facebook badges for websites.
This document provides an overview of cyber security topics related to social media usage. It discusses that individuals need to take responsibility for educating themselves on security issues when using social media. The document outlines specific steps users should take, including frequently checking privacy settings, using strong unique passwords, reviewing posts before sharing, and being aware of any third-party applications connected to their accounts. Regularly following security best practices like logging out after use and directly entering website URLs can help protect users' personal information and online presence.
Final slide show for basic training for Facebook, with Beginning Twitter information and industry updates for other platforms. Taken from Coldwell Banker Bain training 6/23/15
This document provides tips for securing privacy settings on Facebook. It recommends limiting who can see your profile information, posts, timeline and tags to just friends or only yourself. It also advises disabling third party access to your profile through apps and login services to prevent sharing of personal data. Additionally, it suggests refraining from checking in to locations or posting photos that clearly show your face. The privacy, timeline and tagging, security, ads and apps tabs all allow adjustment of settings to conceal information from public view.
The document provides instructions for maximizing privacy settings on Facebook to limit what personal information is visible to others. It recommends adjusting settings on the Privacy, Timeline and Tagging, Followers, Security, Ads, and Apps tabs to restrict who can see posts, profile information, and activity. Examples include limiting audiences for posts to "Friends Only", restricting who can follow the user, and preventing third parties from accessing or sharing the user's data. The document also advises reviewing connections regularly, assuming information is public, and avoiding revealing photos or oversharing personal details on social media profiles.
The document provides instructions for maximizing privacy settings on Facebook to limit what personal information is visible to others. It recommends adjusting settings on the Privacy, Timeline and Tagging, Followers, Security, Ads, and Apps tabs to restrict who can see posts, profile information, and activity. Examples include limiting audiences for posts to "Friends Only", restricting who can follow the user, and preventing third parties from accessing or sharing the user's data. The document also advises reviewing connections regularly, assuming information is public, and avoiding revealing photos or oversharing personal details on social media profiles.
This document outlines 9 critical steps that Facebook users can take to better protect their personal information and privacy on the platform. It recommends adjusting privacy settings to share only with friends, limiting what information is shared and accessible to others, removing unwanted apps, and disabling features like public searches and targeted ads. Facebook's default privacy settings often make too much information public, so taking these steps like customizing sharing options and access is important for security. The 9 steps provide guidance on specific privacy settings to update for each recommended adjustment.
The document provides instructions for creating profiles and pages on social media platforms like LinkedIn, Twitter, Facebook, and TweetDeck. It outlines 7 steps for creating a LinkedIn profile, 8 steps for creating a Twitter account, and 8 steps for using the TweetDeck application. For Facebook, it describes a 6 step process for creating a basic profile and options for creating official pages, community pages, or groups. It also discusses measuring engagement on Facebook pages and creating Facebook badges for websites.
This document provides an overview of cyber security topics related to social media usage. It discusses that individuals need to take responsibility for educating themselves on security issues when using social media. The document outlines specific steps users should take, including frequently checking privacy settings, using strong unique passwords, reviewing posts before sharing, and being aware of any third-party applications connected to their accounts. Regularly following security best practices like logging out after use and directly entering website URLs can help protect users' personal information and online presence.
This document is a seminar report submitted by Abhishek Gupta to his faculty on the topic of Facebook security settings. It provides an overview of Facebook and its history and growth. It then details various Facebook security settings that users can configure to help protect their privacy and security, such as using secure browsing, adjusting privacy settings, enabling login approvals and notifications, opting out of facial recognition, and removing information from social ads. The report provides step-by-step instructions for configuring these various security settings on Facebook. It concludes with some additional security considerations for Facebook users.
This document provides summaries of popular social media platforms including Facebook, Twitter, LinkedIn, Pinterest, Instagram, Vine, Snapchat, Flickr, Tumblr, and Goodreads. It describes the basic purpose and functionality of each site, how to create an account, privacy and deletion options. Key points are that Facebook allows profile creation and photo/comment sharing, Twitter focuses on short message posts, and LinkedIn facilitates professional and employment networking. Privacy and deletion processes generally involve account settings pages.
A step-by-step guide to your Facebook privacy settings. Easy instructions to help you safeguard your privacy while enjoying the benefits of socializing online.
Networking Considerations for Soldiers and FamiliesKelly Anderson
This document provides 6 considerations for soldiers and their families regarding social media use: 1) Be mindful of conduct and what you post; 2) Be cautious who you connect with and what personal information you share; 3) Adjust privacy settings to limit what information is visible; 4) Be aware of geotagging and turn off location services when necessary; 5) Educate family members on operational security concerns; 6) Avoid posting sensitive information that could damage operations or put yourself or others at risk. It also provides tips and resources on privacy settings, geotagging, and educating family members on safe social media use.
This document provides a beginner's guide to using Facebook. It covers how to set up an account, build a profile, find friends, and navigate the various parts of Facebook. Key sections include the homepage layout, news feed, messages, notifications, search, and account settings. It also describes how to interact with others through posting on walls and timelines, liking/commenting on posts, sharing photos, and joining groups and events. The document concludes with information on deactivating a Facebook account.
Safer Internet Day 2014: social media, best practices and privacy settings.pptxE-Achieve Ltd
A presentation for the Safer Internet Day 2014 on three main topics: how to use Facebook and Twitter for job search; the Dos and Don’ts of social media to benefit careers opportunities; and how to set up private settings on Facebook for sensible data protection.
1. The document provides instructions for configuring privacy and security settings on Facebook to help secure one's social networking experience. It describes how to change personal details like name and contact information.
2. Settings like login alerts, login approvals, and trusted contacts are recommended to receive notifications of unauthorized access attempts and get help accessing your account if locked out.
3. Additional security tools like recognizing devices used to login, viewing active sessions, and limiting who can see posts are described to audit access and restrict profile visibility. Comprehensive password guidelines and regularly auditing settings are advised.
Managing FACEBOOK for a business organizationPepovski Darko
Key Points in this presentation:
Develop a Corporate Facebook Presence
Creating Facebook Page
Dimensions for Facebook Page
Corporate Facebook Page Privacy
Communicating and using timeline
How to create post
Facebook Event
Applications and Search
Tips and Tricks
Facebook allows users to connect with friends, share updates, and play games. It is important to set privacy settings to control who can see your posts, tag you in things, add you as a friend, and send you messages. Users should also be careful about oversharing personal information and use strong, unique passwords to stay safe online. The document provides steps for getting started on Facebook safely, including how to create an account, adjust privacy settings, block unwanted users, and manage app permissions.
This document discusses Facebook's privacy policies and legal issues related to using Facebook for business purposes. It provides an overview of Facebook's privacy policy, privacy settings, moderation of posts and comments, and various Facebook policies regarding data use, advertising, promotions and more. It also outlines some common legal issues like defamation, copyright and trademark infringement. Finally, it discusses examples of businesses engaging on Facebook and some issues like cyberbullying.
Facebook was started in 2004 by Mark Zuckerberg and was originally called Thefacebook. It is now the largest social network worldwide with over 750 million users. Users can connect with friends, share photos and updates, and join groups. The document provides details on Facebook's history and growth, how to create an account, customize privacy settings, and control what information is shared through apps.
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
The document discusses Facebook's privacy policies and legal issues related to using Facebook for business purposes. It outlines Facebook's privacy policy, privacy settings, moderation of posts and comments, and various Facebook policies. It also discusses potential legality issues like defamation, copyright, and trademark infringement. Additionally, it provides an example of how Coca-Cola engaged with its Facebook page and changes to Facebook's page policies over time.
Log off from the internet, step by stepniraj joshi
This document outlines 9 steps to remove personal information from the internet:
1. Delete all social media accounts like Facebook, Instagram, and LinkedIn.
2. Delete accounts from obscure websites you may have forgotten about by searching your name online.
3. Unsubscribe from all mailing lists and newsletters.
4. Uninstall apps on your phone and delete associated accounts to remove data collected by apps.
5. Request search engines and individual websites remove search results and mentions of your name.
6. Browse anonymously using incognito modes, ad blockers, and privacy tools to prevent tracking.
7. Replace genuine personal information on company accounts with fake details.
8. Contact website
The document provides information on connecting to the internet using different connection types like LAN, VPN, modem, etc. It discusses using browser software like Firefox to navigate web pages and search for information. Specific browser tools are described like the address bar, bookmarks, back and forward buttons. The document also covers using email and social media to communicate online and the importance of privacy and safety practices when browsing like using strong passwords, privacy settings, and avoiding clicking suspicious links.
This document discusses Facebook privacy and settings. It provides tips for keeping a private profile, including checking privacy settings before posting, using the Privacy Checkup tool, and keeping settings updated as they change. However, it notes that Facebook collects various user data through user activity and interactions, as well as from other sources like friends and advertising partners. Some public profile information like name, profile pictures, gender and username cannot be fully hidden. The document advises being conscious of all online activity and data shared since Facebook uses this for advertising and has broad legal rights to collect and use personal information.
Cyber Security aware society is the need of the hour, there is a growing need for Cyber Security awareness, every user of internet should know at least the basics of cyber security, an educated and aware user can help in minimizing the impact and rate of cyber crimes, particularly of those that are related with online transactions and phishing…
The document provides an overview of using Facebook for both personal and professional purposes. It discusses setting up a Facebook profile, privacy settings, connecting with friends and promoting pages or groups. It emphasizes the importance of privacy and maintaining a professional online presence, as potential employers may search Facebook profiles. The document recommends using Facebook strategically to tell people you are looking for work, join relevant groups, and request connections with people in your industry.
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
This document is a seminar report submitted by Abhishek Gupta to his faculty on the topic of Facebook security settings. It provides an overview of Facebook and its history and growth. It then details various Facebook security settings that users can configure to help protect their privacy and security, such as using secure browsing, adjusting privacy settings, enabling login approvals and notifications, opting out of facial recognition, and removing information from social ads. The report provides step-by-step instructions for configuring these various security settings on Facebook. It concludes with some additional security considerations for Facebook users.
This document provides summaries of popular social media platforms including Facebook, Twitter, LinkedIn, Pinterest, Instagram, Vine, Snapchat, Flickr, Tumblr, and Goodreads. It describes the basic purpose and functionality of each site, how to create an account, privacy and deletion options. Key points are that Facebook allows profile creation and photo/comment sharing, Twitter focuses on short message posts, and LinkedIn facilitates professional and employment networking. Privacy and deletion processes generally involve account settings pages.
A step-by-step guide to your Facebook privacy settings. Easy instructions to help you safeguard your privacy while enjoying the benefits of socializing online.
Networking Considerations for Soldiers and FamiliesKelly Anderson
This document provides 6 considerations for soldiers and their families regarding social media use: 1) Be mindful of conduct and what you post; 2) Be cautious who you connect with and what personal information you share; 3) Adjust privacy settings to limit what information is visible; 4) Be aware of geotagging and turn off location services when necessary; 5) Educate family members on operational security concerns; 6) Avoid posting sensitive information that could damage operations or put yourself or others at risk. It also provides tips and resources on privacy settings, geotagging, and educating family members on safe social media use.
This document provides a beginner's guide to using Facebook. It covers how to set up an account, build a profile, find friends, and navigate the various parts of Facebook. Key sections include the homepage layout, news feed, messages, notifications, search, and account settings. It also describes how to interact with others through posting on walls and timelines, liking/commenting on posts, sharing photos, and joining groups and events. The document concludes with information on deactivating a Facebook account.
Safer Internet Day 2014: social media, best practices and privacy settings.pptxE-Achieve Ltd
A presentation for the Safer Internet Day 2014 on three main topics: how to use Facebook and Twitter for job search; the Dos and Don’ts of social media to benefit careers opportunities; and how to set up private settings on Facebook for sensible data protection.
1. The document provides instructions for configuring privacy and security settings on Facebook to help secure one's social networking experience. It describes how to change personal details like name and contact information.
2. Settings like login alerts, login approvals, and trusted contacts are recommended to receive notifications of unauthorized access attempts and get help accessing your account if locked out.
3. Additional security tools like recognizing devices used to login, viewing active sessions, and limiting who can see posts are described to audit access and restrict profile visibility. Comprehensive password guidelines and regularly auditing settings are advised.
Managing FACEBOOK for a business organizationPepovski Darko
Key Points in this presentation:
Develop a Corporate Facebook Presence
Creating Facebook Page
Dimensions for Facebook Page
Corporate Facebook Page Privacy
Communicating and using timeline
How to create post
Facebook Event
Applications and Search
Tips and Tricks
Facebook allows users to connect with friends, share updates, and play games. It is important to set privacy settings to control who can see your posts, tag you in things, add you as a friend, and send you messages. Users should also be careful about oversharing personal information and use strong, unique passwords to stay safe online. The document provides steps for getting started on Facebook safely, including how to create an account, adjust privacy settings, block unwanted users, and manage app permissions.
This document discusses Facebook's privacy policies and legal issues related to using Facebook for business purposes. It provides an overview of Facebook's privacy policy, privacy settings, moderation of posts and comments, and various Facebook policies regarding data use, advertising, promotions and more. It also outlines some common legal issues like defamation, copyright and trademark infringement. Finally, it discusses examples of businesses engaging on Facebook and some issues like cyberbullying.
Facebook was started in 2004 by Mark Zuckerberg and was originally called Thefacebook. It is now the largest social network worldwide with over 750 million users. Users can connect with friends, share photos and updates, and join groups. The document provides details on Facebook's history and growth, how to create an account, customize privacy settings, and control what information is shared through apps.
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
The document discusses Facebook's privacy policies and legal issues related to using Facebook for business purposes. It outlines Facebook's privacy policy, privacy settings, moderation of posts and comments, and various Facebook policies. It also discusses potential legality issues like defamation, copyright, and trademark infringement. Additionally, it provides an example of how Coca-Cola engaged with its Facebook page and changes to Facebook's page policies over time.
Log off from the internet, step by stepniraj joshi
This document outlines 9 steps to remove personal information from the internet:
1. Delete all social media accounts like Facebook, Instagram, and LinkedIn.
2. Delete accounts from obscure websites you may have forgotten about by searching your name online.
3. Unsubscribe from all mailing lists and newsletters.
4. Uninstall apps on your phone and delete associated accounts to remove data collected by apps.
5. Request search engines and individual websites remove search results and mentions of your name.
6. Browse anonymously using incognito modes, ad blockers, and privacy tools to prevent tracking.
7. Replace genuine personal information on company accounts with fake details.
8. Contact website
The document provides information on connecting to the internet using different connection types like LAN, VPN, modem, etc. It discusses using browser software like Firefox to navigate web pages and search for information. Specific browser tools are described like the address bar, bookmarks, back and forward buttons. The document also covers using email and social media to communicate online and the importance of privacy and safety practices when browsing like using strong passwords, privacy settings, and avoiding clicking suspicious links.
This document discusses Facebook privacy and settings. It provides tips for keeping a private profile, including checking privacy settings before posting, using the Privacy Checkup tool, and keeping settings updated as they change. However, it notes that Facebook collects various user data through user activity and interactions, as well as from other sources like friends and advertising partners. Some public profile information like name, profile pictures, gender and username cannot be fully hidden. The document advises being conscious of all online activity and data shared since Facebook uses this for advertising and has broad legal rights to collect and use personal information.
Cyber Security aware society is the need of the hour, there is a growing need for Cyber Security awareness, every user of internet should know at least the basics of cyber security, an educated and aware user can help in minimizing the impact and rate of cyber crimes, particularly of those that are related with online transactions and phishing…
The document provides an overview of using Facebook for both personal and professional purposes. It discusses setting up a Facebook profile, privacy settings, connecting with friends and promoting pages or groups. It emphasizes the importance of privacy and maintaining a professional online presence, as potential employers may search Facebook profiles. The document recommends using Facebook strategically to tell people you are looking for work, join relevant groups, and request connections with people in your industry.
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
it.pptx
1.
2. SOCIAL NETWORKING PLATFORMS
• Before choosing one you should consider the following points:
• Does it provide connection over SSL (like https) for all uses of the site, rather than just
during login? Are there no problems related to encryption, such as problems related to
encryption certificates?
• Read the End User License Agreement and Privacy Policy or Data Use Policy carefully.
How are your content and personal data treated? With whom are they shared? For a
useful add-on which helps users undestand the Terms of Service of many popular sites,
see Terms of Service; Didn't Read.
• What privacy options are provided for users? Can you choose to share your videos
securely with a small number of individuals, or are they all public by default?
• Do you know the geographical location of the servers, under which territorial
jurisdiction they fall or where the company is registered? Are you aware of how this
information relates to the privacy and security of your email activity and information?
Will the site's owners hand over information if they receive a governmental request to
do so?
3. 2.1 HOW TO CREATE A FACEBOOK ACCOUNT
• To create Facebook account open your web browser, (we recommend
Firefox web browser with security add-ons or Tor Browser), and type
https://www.facebook.com into address bar, to arrive at Facebook's
homepage.
4. Step 1 • If you use your public or work-related e-mail address, this will
make it easier for possible adversaries to find you. Note also
that Facebook's Terms of Use require you to use your real
name when using Facebook.
• You can provide a false name, although it should be noted
that this goes against Facebook's Terms of Use and you
may still be identifiable according to your IP address, among
other things.
• Connecting to Facebook through software such as Tor
Browser is also difficult as Facebook remembers your
location and may mistake your logins for attempted break-
ins.
• Considering all of the above, if you are concerned that your
identification, or the linking of your Facebook activities to
your offline work or personal life, might pose a threat to your
life, liberty, health, or work, or that of your family or friends,
perhaps it is better not to register or use Facebook.
5. • Step 2. Make sure you have read and understood Facebook's Terms
of Use and Data Use Policy before clicking sign up. These contain
important information about what information you are handing over
to Facebook and how it will be used by them.
•
• Step 3. On the Find Your Friends screen Facebook asks you to provide
your email address and password in order to look for contacts from
your e-mail account on Facebook, who you can later add as
Facebook contacts. We very strongly recommend that you skip this
step.
6.
7. • Step 4. On the Profile Information screen Facebook asks you to
provide information such as the High school, College or University you
attended, and your current Employer. While this information may
make it easier for friends to find you, it will also make it easier for
adversaries to find you too. We recommend that you click skip this
step.
8.
9. • Step 5. On the Profile Picture screen Facebook asks you to provide a
picture of yourself, either by uploading one or taking a picture with
your webcam.
10. 2.2 GENERAL SETTINGS
• Step 6. From your Facebook Home page, click on the small arrow
beside Home in the top right-hand corner and select Settings.
11. • Step 7. You should update your password regularly, preferably at least
once every three months. Remember, it is extremely important that
you choose a strong password to protect your account and your
information.
• Step 8. Your network: Facebook allows you to join networks, based
on criteria such as your high school, university, employer, hometown
or current city, as a means of making it easier for people to find and
connect with you. While this may make it easier for you to find
contacts, it will also make it easier for people, including adversaries,
to find you. Considering the volume of users of the site, it is
improbable that you need to join a network in order to connect with
the people you know and trust on Facebook.
12. • Step 9. Click on in the menu on the left
hand side. This will open the Security Settings
page.
13.
14. • Step 10. Click on the Login Notifications tab. Here, you can choose to
be notified if an attempt is made to log in to your Facebook page
from a device which you have not used before. Choose whether to
receive by Email or Text Message/Push Notification.
• Note: If you select to receive alerts via Text Message, this means you
will link your mobile phone number to your Facebook account,
making your activities on the site more easily identifiable.
15.
16. • Step 11. Login Approvals: For added security, you can choose to have
to enter a security code every time your account is accessed from a
computer or device Facebook does not recognise. The security code
will be send as SMS to your mobile phone.
• Note: Enabling this option will make it more difficult for someone else
to access your account unless they also have access to your mobile
phone. However, as mentioned above, it also involves associating
your mobile phone number with your Facebook account. You should
consider the pros and cons of this for your own situation and make
the choice which you consider more secure for you.
17. • Step 12. Code Generator: This setting allows you to use the Facebook
mobile app on your smartphone in order to generate login codes or
new passwords.
18. • Step 13. Application Passwords: If you use applications on Facebook,
this option allows you to generate individual passwords for them.
Unless you have a specific need to do so, however, we recommend
avoiding Facebook applications.
• Step 14. Trusted Contacts: This option allows you to select certain
contacts from your Facebook friends who can help you to log-in to
your account if for some reason you are otherwise unable to. This is
done through sharing a secret code with your contact. If you decide
to use this option, be sure to choose your trusted contacts carefully
and establish a secure means of communication for sharing the code.
19. • Step 15. Trusted Browsers: Here you can review the browsers most
frequently used to access your Facebook account.
• Step 16. Active Sessions: This shows details of any Facebook session
that you may have forgotten to log out of - for example in an internet
café, or a friend's computer - and therefore is still active. The location is
determined by the IP address.
• It is very important to close these sessions in order to prevent anyone
else accessing your Facebook account, especially if you note any devices
in the list which are not yours or you do not recognise. To do this,
simply click End Activity beside each active session.
20. 2.4 PRIVACY SETTINGS AND TOOLS
• Step 1. To edit your Facebook Privacy Settings, click on the small
arrow beside Home in the top right-hand corner and select Settings.
21. • Step 2. This will take you to the Settings menu. On the left-hand side,
choose Privacy.
22. • Who can see my stuff?
• Step 3. The first option here creates a default rule for your future
status updates: Who can see your future posts?. Here, you can choose
between making them available to the entire public, your Facebook
friends, yourself only, or a custom group which you can determine.
• Step 4. The second option allows you to review the posts which other
Facebook users have tagged you in. To see this, click on Use Activity
Log.
23.
24. • Step 5. The thrid option allows you to restrict access to previous
status updates of yours which may have been public. Note, however,
the limitation that individuals you tagged and their friends will still be
able to see this content.
25. • Who can contact me?
• Step 6. In this section, you can decide who is able to send you a friend
request. This is not particularly important in terms of information security,
since in the end, it is still you who decides who to accept as a friend, and
you should always exercise caution and avoid adding people who are
unknown or untrusted. If you want to change this setting, click Edit.
• Step 7. Whose messages do I want filtered into my inbox?: Facebook allows
you to filter the messages you receive into two folders: Inbox and Other.
Here you can choose between Basic Filtering, which is more permissive of
messages from people who are not on your friend list, and Strict Filtering,
which is less permissive.
26.
27. • Who can look me up?
• Step 8. Here, you can limit the ease with which people can look you
up by knowing your phone number or e-mail address (although this is
still technically possible), as well as limiting people's ability to find
your Facebook page via search engines. The default settings make it
as easy as possible for individuals to find you this way, including
possible adversaries. Click Edit on the first two options and ensure
that only Friends can search for you by your e-mail address and
phone number. For the third option, click Edit and uncheck the box
which says Let other search engines link to your timeline.
28.
29. 2.5 TIMELINE AND TAGGING
• Step 1. In the left-hand sidebar, click on the Timeline and Tagging
menu.
30. • Step 2. If you want your timeline to be truly yours, it's advisable to
disallow posts on your timeline from anyone but yourself. To do this,
click edit beside Who can post on your timeline and select Only Me.
• Step 3. Here, you can decide what happens when other friends tag
you in their posts and photographs. It is advisable that you click edit
and enable the Review posts that friends tag you in... option so that
you can prevent any irresponsible tagging from friends appearing on
your timeline. However, this won't prevent their posts (including your
tag) from being visible to their friends, or perhaps even the public,
depending on their settings
31.
32. • Step 4. Who can see things on my timeline? This item is associated
with the previous options. Previously, we've decided who gets to
publish material to your timeline, and here, you get to decide who
can read them. If you click Edit, you can change these settings so that
either everyone, friends of friends, a custom group of people, or only
yourself can see posts you've been tagged in, or things others post on
your timeline.
• The first option, View As, is an interesting way to see what certain
individuals can see on your timeline. However, keep in mind that
Facebook can still record all of the above and share it with third
parties including law enforcement.
33.
34. • Step 5. How can I manage tags people add and tagging suggestions?
This refers to tags of you by other users of Facebook. It's best if you
switch on the Review tags people add to your own posts before the
tags appear on Facebook option, and limit the audience for the
second option to Only Me. Facebook has begun using a form of facial
recognition technology which allows it to identify photographs that
look like you among your friends' and contacts' photos and suggest
that they tag you in the photos. Naturally, for rights advocates, this
could be particularly sensitive and therefore it's strongly
recommended that you deactivatethis option if it is available to you.
35. 2.6 BLOCKING USERS AND APPS
• Step 6. In the menu on the left, select Blocking. Here, Facebook offers
ample opportunities for blocking unwanted, intrusive, and sometimes
potentially dangerous information.
36. • Step 7. Restricted List. Here, you can discretely add Facebook friends
to a list which will limit them to only being able to view information
you share publicly on your timeline (per the settings we explored
above). To add friends to the list, click Edit List.
37. • Step 8. Block users. Here you can block a user from accessing your
Facebook page, any of your content, or adding you as a friend.
38. • Step 9. Block app invites. Often, we will have Facebook friends who
are enthusiastic about a particular application, often a game, and
they will continuously send us invites to join this game. Here, you can
block application invites from such friends.
39. • Step 10. Block event invites. Similarly, here you can block invitations
to events from certain Facebook friends.
40. • Step 11. Block application. As the name suggests, here you can
prevent an application from accessing all but your public information.
41. 2.7 FOLLOWERS
• Step 16. Click on Followers from the menu on the left.
• Step 17. Ensure that Friends is selected.
42. 2.8 APPLICATIONS
Many Facebook users love and actively use applications — for example,
games and ways to empower communications, such as social readers. Each
application is associated with your Facebook account, and the basic data of
your Facebook account will be available to any application (such as your
name, gender, public pictures and network). Also, when installing a new
application, it may ask for your permission to have access to the same or
other information about you and your friends. This includes a variety of data,
such as age, place of residence, education, circle of friends and contacts.
Thus, the application can gather and share information such as what country
you come from and where you currently are. Some of this information you
may consider sensitive. Therefore, for safety reasons, we recommend not to
use Facebook applications unless you really need to.
43. • Step 1. Click on Apps in the menu on the left.
44. Step 2. Apps you use. Here, you can enable or disable the so-called
"Facebook Platform" which allows you to use Apps. By default, this option is
enabled. It allows you, for example, to register for other sites using your
Facebook account. On the one hand, this is convenient: no need to spend
time on the registration form and fill in all the fields, especially if you do not
intend to make frequent use of this site (for example, you want to leave a
comment on a news story, or sign a petition). On the other hand, your
comment will be linked to your Facebook account, recorded and possibly
shared. If using Apps isn't important to you or your work, it's recommended
that you click Turn Off Platform in order to better protect your privacy. If you
do decide to leave the option enabled, then pay attention to the list of
applications already installed at this point. Do you really need them all?
Step 3. By clicking on an app you can see what information it has access
to.
45.
46. • Step 4. To remove an application, click on the 'x' beside the
app in the list, and then click Remove in the warning window
which pops up.
47. Step 5 Apps others use. We also have to consider that some of
our Facebook friends bring our information into the apps that
they use. By clicking on Apps others use, you can un-check the
boxes beside categories of your information which you don't want
to share with your friends' applications.
48.
49. Step 6. Instant personalisation. Facebook's Instant Personalization
also grants certain websites access to your public profile information
when you visit them. What these sites do is that they adjust their web
contents to suit your wants and needs, thus creating a personalized
experience. To be more secure, if this service is available in your
region, you should disable it.
Step 7. Click on the screen which will appear to explain
what Instant Personalisation is, and at the bottom of the
next page, make sure the box marked Enable instant
personalisation on partner websites is unchecked.
50. 2.9 ADVERTISING SETTINGS
Step 1. In the column on the left, select Ads.
Facebook currently promises not to associate your name or
picture with third-party advertisements, although they leave
space for this to be possible in the future. It's a good idea to
change these settings so that your details still remain private in
case advertising rules change in the future:
Step 2. Click Edit beside Third Party Sites.
Step 3. Select No-one and select Save Changes.
51.
52. • Step 4. Social Ads. Here, Facebook encourages users to become
ambassadors for products or pages they have 'liked'. This means that
you could be used to advertise a page or product to your friends. If
this makes you uncomfortable, it's recommended that you disable it.
• Step 5. Under Ads and friends, click Edit and select No-One from the
drop-down menu.
53.
54. • Step 6. Website and mobile app custom audiences. Facebook by
default tries to pick to display targeted advertising on your tastes and
interests. To get rid of this, you need to click on the Opt Out link in
this paragraph.
55. • This will open a page titled Custom Audiences from your Website and
Mobile App, where Facebook gives more information about its
advertising policy. In the middle of the text is the Opt Out button for
you to confirm.
56. • After a request for confirmation, you will see the result:
Note that changes made to this setting are not recorded by Facebook, but are
rather stored in your browser. Unfortunately, you must repeat this process for
every browser, app and device you use to connect to Facebook.