This document provides 6 considerations for soldiers and their families regarding social media use: 1) Be mindful of conduct and what you post; 2) Be cautious who you connect with and what personal information you share; 3) Adjust privacy settings to limit what information is visible; 4) Be aware of geotagging and turn off location services when necessary; 5) Educate family members on operational security concerns; 6) Avoid posting sensitive information that could damage operations or put yourself or others at risk. It also provides tips and resources on privacy settings, geotagging, and educating family members on safe social media use.
This document provides instructions for customizing privacy settings on Facebook. It begins by emphasizing the importance of logging out of Facebook after use to prevent others from accessing the account. It then guides the reader through the privacy settings, explaining each option and recommending settings like limiting friends lists and current city/hometown to friends only. Screenshots illustrate the steps to access privacy settings and customize who can view profile information, send messages, search for the account, and more. The goal is to help users safely enjoy social networking by controlling what information is visible to others.
This document provides a summary of key photo sharing services and their privacy settings. It describes nine popular photo sharing platforms and provides guidance on optimizing privacy settings for each one. The document emphasizes only sharing photos with trusted contacts, avoiding posting identifiable photos, and disabling location services and EXIF data to help protect privacy. It stresses choosing a platform based on intended audience and desired control over images.
This document provides information about Facebook privacy settings and tools. It discusses Facebook's privacy shortcut menu which allows quick access to settings like privacy, notifications, blocking and more. It also summarizes individual privacy settings for items like profile information, posts, tags, search, apps and advertisements. The document emphasizes limiting personal information shared and customizing privacy settings to the user's needs. It notes third party apps and websites may be able to access user information without consent.
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theftSarah M. Smart
This document provides 6 tips for staying safe on Facebook and protecting your identity:
1. Limit the personal information on your profile like your full name, birthdate, address. Only accept friend requests from people you actually know.
2. Proactively manage your privacy settings for sharing, connecting, apps and websites to control who sees your information.
3. Be wary of oversharing your schedule and locations through check-ins or status updates as this reveals when you may not be home.
4. Remember that friends and family can also be identity thieves. Take steps to protect your information even from people you know.
5. Consider using an identity theft protection service to monitor your credit and personal
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
1. The document provides guidance on setting up a Facebook profile, including using your real name, adding personal information, adjusting privacy settings, finding friends, and customizing your profile and experience.
2. It emphasizes the importance of privacy settings, explaining how to control what information is visible and to whom. Various options are described to allow fine-grained control over profile details, photos, videos, and more.
3. Tips are provided on organizing friends lists, removing people, securing your account, and using additional apps and tools to customize your Facebook experience while maintaining privacy and security. Comprehensive guidance is given on all aspects of using the platform.
This document provides instructions for customizing privacy settings on Facebook. It begins by emphasizing the importance of logging out of Facebook after use to prevent others from accessing the account. It then guides the reader through the privacy settings, explaining each option and recommending settings like limiting friends lists and current city/hometown to friends only. Screenshots illustrate the steps to access privacy settings and customize who can view profile information, send messages, search for the account, and more. The goal is to help users safely enjoy social networking by controlling what information is visible to others.
This document provides a summary of key photo sharing services and their privacy settings. It describes nine popular photo sharing platforms and provides guidance on optimizing privacy settings for each one. The document emphasizes only sharing photos with trusted contacts, avoiding posting identifiable photos, and disabling location services and EXIF data to help protect privacy. It stresses choosing a platform based on intended audience and desired control over images.
This document provides information about Facebook privacy settings and tools. It discusses Facebook's privacy shortcut menu which allows quick access to settings like privacy, notifications, blocking and more. It also summarizes individual privacy settings for items like profile information, posts, tags, search, apps and advertisements. The document emphasizes limiting personal information shared and customizing privacy settings to the user's needs. It notes third party apps and websites may be able to access user information without consent.
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theftSarah M. Smart
This document provides 6 tips for staying safe on Facebook and protecting your identity:
1. Limit the personal information on your profile like your full name, birthdate, address. Only accept friend requests from people you actually know.
2. Proactively manage your privacy settings for sharing, connecting, apps and websites to control who sees your information.
3. Be wary of oversharing your schedule and locations through check-ins or status updates as this reveals when you may not be home.
4. Remember that friends and family can also be identity thieves. Take steps to protect your information even from people you know.
5. Consider using an identity theft protection service to monitor your credit and personal
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
1. The document provides guidance on setting up a Facebook profile, including using your real name, adding personal information, adjusting privacy settings, finding friends, and customizing your profile and experience.
2. It emphasizes the importance of privacy settings, explaining how to control what information is visible and to whom. Various options are described to allow fine-grained control over profile details, photos, videos, and more.
3. Tips are provided on organizing friends lists, removing people, securing your account, and using additional apps and tools to customize your Facebook experience while maintaining privacy and security. Comprehensive guidance is given on all aspects of using the platform.
This document provides tips for securing privacy settings on Facebook. It recommends limiting who can see your profile information, posts, timeline and tags to just friends or only yourself. It also advises disabling third party access to your profile through apps and login services to prevent sharing of personal data. Additionally, it suggests refraining from checking in to locations or posting photos that clearly show your face. The privacy, timeline and tagging, security, ads and apps tabs all allow adjustment of settings to conceal information from public view.
This document discusses Facebook's privacy policies and legal issues related to using Facebook for business purposes. It provides an overview of Facebook's privacy policy, privacy settings, moderation of posts and comments, and various Facebook policies regarding data use, advertising, promotions and more. It also outlines some common legal issues like defamation, copyright and trademark infringement. Finally, it discusses examples of businesses engaging on Facebook and some issues like cyberbullying.
Facebook provides little privacy for users. Settings can control who sees posts and profile information, but once something is posted online Facebook loses control over its distribution. Apps and third parties may collect user data in ways users don't expect. The only way to fully remove an account and data from Facebook is to deactivate for 14 days and not use any connected sites or apps in that time.
1) When using social media, journalists should consider everything they post as public, even if on a closed network, and presume it could become publicly associated with their real name.
2) Journalists should either use their real name or fully disclose their identity on social media and check with editors on appropriate expressions of opinion.
3) Information on social media should be verified and treated cautiously as some posts contain false or exaggerated claims.
4) Journalists should maintain separate personal and professional social media profiles and discuss guidelines with editors on appropriate discussions of work matters.
This document provides information on managing privacy and security settings across various social media platforms, including Facebook, Twitter, and Instagram. It discusses how to control who sees your posts, how to add friends to customized lists on Facebook, how to protect and manage tweets on Twitter, and how to set your Instagram account to private. The document also briefly mentions tools that can help manage multiple social media accounts and provides some questions to consider when choosing a social media management tool.
How to avoid facebook scams
With more than 800 million users all over the world, Facebook is the perfect breeding ground for scam artists. Every Facebook user has their account interlinked with hundreds or even thousands of their friends. With the exponential amount of users connected to each other Facebook scams require only a few clicks to reach to colossal levels. The peril arises when a scam is spread through someone’s account using the friend list as a medium as this considerably lowers the unsuspecting users guard. So in effect, all it takes is one moment of weakness by one individual on your friend’s list to start off a chain of events that can prove harmful to one and all.
This phenomenon has been termed ‘Social Engineering’ since it involves predicting human behavior based on a study of common user habits and general psychological traits. Piquing a user’s curiosity with a sensational headline can cause one to fall prey to legitimate looking scams. Some scams take the user to a page that asks for their Facebook login credentials, some ask for personal details about the user which are then misused, some direct the user to install a program that is malware in disguise, some ask for money while some account for a lot of spam.
The document announces a community technology workshop hosted by Burlington Public Schools that will cover monthly technology topics. It provides safety tips for using Facebook including thinking carefully about friend requests, using limited friend lists, disabling extra features until needed, organizing friends into lists, setting privacy for photos and information, controlling contact visibility and searchability, and understanding how Facebook collects user data.
Blogger is a free blogging platform launched in 1999. It helped popularize blogging and was acquired by Google in 2003. Blogger allows users to create blogs for free expression as long as content follows Blogger's rules. Blogs can be used for opinions, stories, or links. To start a blog, users create an account and can then add text, photos, or videos. However, Blogger prohibits content like child pornography, hate speech, or copyright infringement and will enforce its policies by potentially disabling accounts or reporting illegal activities to authorities.
This document provides an overview and agenda for a class on using Facebook. It discusses what Facebook is, how to create a profile, how to navigate the site and share updates and photos. It also covers privacy settings and tips for staying safe online, including being cautious about what personal information you share, using strong passwords, and choosing privacy settings carefully. The class encourages users to review privacy settings regularly and uses common sense when using Facebook.
This document provides an overview of cyber security topics related to social media usage. It discusses that individuals need to take responsibility for educating themselves on security issues when using social media. The document outlines specific steps users should take, including frequently checking privacy settings, using strong unique passwords, reviewing posts before sharing, and being aware of any third-party applications connected to their accounts. Regularly following security best practices like logging out after use and directly entering website URLs can help protect users' personal information and online presence.
1) Facebook is a social media platform for connecting with friends and sharing updates. It started as a college networking site and has expanded to include anyone.
2) To create an account, you provide your email and set a password. Your contacts may be searched to find friends. Profile information like photos can be added while controlling privacy settings.
3) A club or group page allows information sharing and events. Only approved content from administrators should be posted. Photos of members require signed releases.
1) Facebook is a social media platform for connecting with friends and sharing updates. It started as a college networking site and has expanded globally.
2) To create an account, you provide your email and set a password. Adding photos and details about your interests helps you connect with friends.
3) When creating a group or club page, only share approved photos and limit access to approved members to maintain privacy and prevent misuse of information. Monitor the page to prevent inappropriate content.
Public Affairs Council: Balancing Your Personal and Professional Life OnlineMolly Nichelson
Ever wonder how to balance your professional and personal voices online? By no means am I an expert, but here is what I presented to the Public Affairs Council National Grassroots Conference in January 2010.
This document discusses the risks of using social media for both personal and business use. For personal use, some key risks discussed are disclosure of private information, bullying, cyber-stalking, and access to inappropriate content. Strategies provided to mitigate these risks include using privacy settings, avoiding sharing sensitive details, and monitoring children's online activities. For business use, risks include damage to brand reputation, disclosure of confidential information, corporate identity theft, and legal/compliance issues. The document recommends that businesses establish social media guidelines for employees and appoint a trained professional to handle company social media accounts.
This document discusses various social media platforms and strategies for using social media. It provides statistics on popular platforms like Facebook, Twitter, LinkedIn, and SlideShare. It also outlines key concepts for different platforms including followers, likes, shares, and hashtags. The document recommends observing a platform before interacting and developing a long-term social media strategy focused on telling your own story over time.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Planning your Job Search from beginning to end requires a personalized Plan.
Ever wonder why some people are successful at finding a job and others are not?
And did you know there are New Rules all job seekers should be following in order to find a job?
Applying for jobs through the want ads, job sites and directly applying with the employer to fill out an application is not enough. You will need a job search plan to help you target how and where to find employment.
Job search planning is NOT a Science but an Art. The stages of the job search planning process work together to help you create a plan to finding a job that is a good fit for you.
The RESEARCH Stage is all about YOU, your skills and what you want/need from an employer to be productive. You will need to Research Companies to learn who they are as a business, their goals and their needs. The NETWORKING Stage is about selling your skills in a 2 minute pitch that will connect you with strangers who will later become part of your professional contacts. The COVER LETTER is a short personalized letter invites the reader to take a closer look at your individualized resume. At the RESUME Stage it’s all about your accomplishments. An individualized skill based resume targets the needs of the employer and gets you the interview. They call the INTERVIEW Stage the most critical stage of the job search planning process. Preparation, preparation, and more preparation before, during, and after the interview are very important to getting the job.
Finding a job will vary for everyone pending the industry and job title you are searching for. According to career development and outplacement agencies like the Five O’clock Club statistics show that for professionals and middle managers it can take 4 to 6 months on average to find a job they want. And for career changes it takes longer. And for people currently employed, it usually takes longer to find a new job because they do not work as hard at the job hunt.
Remember, it can take 35 to 40 hours every week with practice, practice and more practice before you will see results. Therefore, AIM for the job you want and put your Plan into Action.
Remember when you are job searching you are in the business of one…..YOU!
Final slide show for basic training for Facebook, with Beginning Twitter information and industry updates for other platforms. Taken from Coldwell Banker Bain training 6/23/15
This document outlines 9 critical steps that Facebook users can take to better protect their personal information and privacy on the platform. It recommends adjusting privacy settings to share only with friends, limiting what information is shared and accessible to others, removing unwanted apps, and disabling features like public searches and targeted ads. Facebook's default privacy settings often make too much information public, so taking these steps like customizing sharing options and access is important for security. The 9 steps provide guidance on specific privacy settings to update for each recommended adjustment.
This document provides tips for securing your Facebook account in 8 steps:
1. Check your privacy settings and limit who can see your past and future posts.
2. Review your timeline and tagging preferences to control who can post to your timeline and tag you.
3. Check your public posts settings to ensure only what you want is publicly visible.
4. Block users as needed from seeing your profile or sending you requests.
5. Consider who can share your stories on Facebook.
6. Keep your location private.
7. Check where you're logged in and remotely close sessions for security.
8. Opt out of having your interests used in Facebook ads.
This document provides tips for securing privacy settings on Facebook. It recommends limiting who can see your profile information, posts, timeline and tags to just friends or only yourself. It also advises disabling third party access to your profile through apps and login services to prevent sharing of personal data. Additionally, it suggests refraining from checking in to locations or posting photos that clearly show your face. The privacy, timeline and tagging, security, ads and apps tabs all allow adjustment of settings to conceal information from public view.
This document discusses Facebook's privacy policies and legal issues related to using Facebook for business purposes. It provides an overview of Facebook's privacy policy, privacy settings, moderation of posts and comments, and various Facebook policies regarding data use, advertising, promotions and more. It also outlines some common legal issues like defamation, copyright and trademark infringement. Finally, it discusses examples of businesses engaging on Facebook and some issues like cyberbullying.
Facebook provides little privacy for users. Settings can control who sees posts and profile information, but once something is posted online Facebook loses control over its distribution. Apps and third parties may collect user data in ways users don't expect. The only way to fully remove an account and data from Facebook is to deactivate for 14 days and not use any connected sites or apps in that time.
1) When using social media, journalists should consider everything they post as public, even if on a closed network, and presume it could become publicly associated with their real name.
2) Journalists should either use their real name or fully disclose their identity on social media and check with editors on appropriate expressions of opinion.
3) Information on social media should be verified and treated cautiously as some posts contain false or exaggerated claims.
4) Journalists should maintain separate personal and professional social media profiles and discuss guidelines with editors on appropriate discussions of work matters.
This document provides information on managing privacy and security settings across various social media platforms, including Facebook, Twitter, and Instagram. It discusses how to control who sees your posts, how to add friends to customized lists on Facebook, how to protect and manage tweets on Twitter, and how to set your Instagram account to private. The document also briefly mentions tools that can help manage multiple social media accounts and provides some questions to consider when choosing a social media management tool.
How to avoid facebook scams
With more than 800 million users all over the world, Facebook is the perfect breeding ground for scam artists. Every Facebook user has their account interlinked with hundreds or even thousands of their friends. With the exponential amount of users connected to each other Facebook scams require only a few clicks to reach to colossal levels. The peril arises when a scam is spread through someone’s account using the friend list as a medium as this considerably lowers the unsuspecting users guard. So in effect, all it takes is one moment of weakness by one individual on your friend’s list to start off a chain of events that can prove harmful to one and all.
This phenomenon has been termed ‘Social Engineering’ since it involves predicting human behavior based on a study of common user habits and general psychological traits. Piquing a user’s curiosity with a sensational headline can cause one to fall prey to legitimate looking scams. Some scams take the user to a page that asks for their Facebook login credentials, some ask for personal details about the user which are then misused, some direct the user to install a program that is malware in disguise, some ask for money while some account for a lot of spam.
The document announces a community technology workshop hosted by Burlington Public Schools that will cover monthly technology topics. It provides safety tips for using Facebook including thinking carefully about friend requests, using limited friend lists, disabling extra features until needed, organizing friends into lists, setting privacy for photos and information, controlling contact visibility and searchability, and understanding how Facebook collects user data.
Blogger is a free blogging platform launched in 1999. It helped popularize blogging and was acquired by Google in 2003. Blogger allows users to create blogs for free expression as long as content follows Blogger's rules. Blogs can be used for opinions, stories, or links. To start a blog, users create an account and can then add text, photos, or videos. However, Blogger prohibits content like child pornography, hate speech, or copyright infringement and will enforce its policies by potentially disabling accounts or reporting illegal activities to authorities.
This document provides an overview and agenda for a class on using Facebook. It discusses what Facebook is, how to create a profile, how to navigate the site and share updates and photos. It also covers privacy settings and tips for staying safe online, including being cautious about what personal information you share, using strong passwords, and choosing privacy settings carefully. The class encourages users to review privacy settings regularly and uses common sense when using Facebook.
This document provides an overview of cyber security topics related to social media usage. It discusses that individuals need to take responsibility for educating themselves on security issues when using social media. The document outlines specific steps users should take, including frequently checking privacy settings, using strong unique passwords, reviewing posts before sharing, and being aware of any third-party applications connected to their accounts. Regularly following security best practices like logging out after use and directly entering website URLs can help protect users' personal information and online presence.
1) Facebook is a social media platform for connecting with friends and sharing updates. It started as a college networking site and has expanded to include anyone.
2) To create an account, you provide your email and set a password. Your contacts may be searched to find friends. Profile information like photos can be added while controlling privacy settings.
3) A club or group page allows information sharing and events. Only approved content from administrators should be posted. Photos of members require signed releases.
1) Facebook is a social media platform for connecting with friends and sharing updates. It started as a college networking site and has expanded globally.
2) To create an account, you provide your email and set a password. Adding photos and details about your interests helps you connect with friends.
3) When creating a group or club page, only share approved photos and limit access to approved members to maintain privacy and prevent misuse of information. Monitor the page to prevent inappropriate content.
Public Affairs Council: Balancing Your Personal and Professional Life OnlineMolly Nichelson
Ever wonder how to balance your professional and personal voices online? By no means am I an expert, but here is what I presented to the Public Affairs Council National Grassroots Conference in January 2010.
This document discusses the risks of using social media for both personal and business use. For personal use, some key risks discussed are disclosure of private information, bullying, cyber-stalking, and access to inappropriate content. Strategies provided to mitigate these risks include using privacy settings, avoiding sharing sensitive details, and monitoring children's online activities. For business use, risks include damage to brand reputation, disclosure of confidential information, corporate identity theft, and legal/compliance issues. The document recommends that businesses establish social media guidelines for employees and appoint a trained professional to handle company social media accounts.
This document discusses various social media platforms and strategies for using social media. It provides statistics on popular platforms like Facebook, Twitter, LinkedIn, and SlideShare. It also outlines key concepts for different platforms including followers, likes, shares, and hashtags. The document recommends observing a platform before interacting and developing a long-term social media strategy focused on telling your own story over time.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Planning your Job Search from beginning to end requires a personalized Plan.
Ever wonder why some people are successful at finding a job and others are not?
And did you know there are New Rules all job seekers should be following in order to find a job?
Applying for jobs through the want ads, job sites and directly applying with the employer to fill out an application is not enough. You will need a job search plan to help you target how and where to find employment.
Job search planning is NOT a Science but an Art. The stages of the job search planning process work together to help you create a plan to finding a job that is a good fit for you.
The RESEARCH Stage is all about YOU, your skills and what you want/need from an employer to be productive. You will need to Research Companies to learn who they are as a business, their goals and their needs. The NETWORKING Stage is about selling your skills in a 2 minute pitch that will connect you with strangers who will later become part of your professional contacts. The COVER LETTER is a short personalized letter invites the reader to take a closer look at your individualized resume. At the RESUME Stage it’s all about your accomplishments. An individualized skill based resume targets the needs of the employer and gets you the interview. They call the INTERVIEW Stage the most critical stage of the job search planning process. Preparation, preparation, and more preparation before, during, and after the interview are very important to getting the job.
Finding a job will vary for everyone pending the industry and job title you are searching for. According to career development and outplacement agencies like the Five O’clock Club statistics show that for professionals and middle managers it can take 4 to 6 months on average to find a job they want. And for career changes it takes longer. And for people currently employed, it usually takes longer to find a new job because they do not work as hard at the job hunt.
Remember, it can take 35 to 40 hours every week with practice, practice and more practice before you will see results. Therefore, AIM for the job you want and put your Plan into Action.
Remember when you are job searching you are in the business of one…..YOU!
Final slide show for basic training for Facebook, with Beginning Twitter information and industry updates for other platforms. Taken from Coldwell Banker Bain training 6/23/15
This document outlines 9 critical steps that Facebook users can take to better protect their personal information and privacy on the platform. It recommends adjusting privacy settings to share only with friends, limiting what information is shared and accessible to others, removing unwanted apps, and disabling features like public searches and targeted ads. Facebook's default privacy settings often make too much information public, so taking these steps like customizing sharing options and access is important for security. The 9 steps provide guidance on specific privacy settings to update for each recommended adjustment.
This document provides tips for securing your Facebook account in 8 steps:
1. Check your privacy settings and limit who can see your past and future posts.
2. Review your timeline and tagging preferences to control who can post to your timeline and tag you.
3. Check your public posts settings to ensure only what you want is publicly visible.
4. Block users as needed from seeing your profile or sending you requests.
5. Consider who can share your stories on Facebook.
6. Keep your location private.
7. Check where you're logged in and remotely close sessions for security.
8. Opt out of having your interests used in Facebook ads.
Facebook's new Ticker news feature organizes real-time news much better than the previous “Top-News” and “Most Recent” set up. This new Facebook ticker is live, everything that happens will pop up here, no matter how minute the activity.
PRIVATE - Social networking and privacy article Intranet Future
This document provides tips on managing social media privacy and profiles. It advises that employers may monitor employees' social media, so employees should be careful about any negative posts. All social media information is publicly available unless privacy settings are adjusted. The most sensitive information to share is one's birthday, as it could enable identity theft if combined with other data. The document recommends reviewing privacy settings regularly and avoiding sharing full birthdays publicly.
Setting privacy controls on social networkssraslim
The document provides tips for setting privacy settings on various social media platforms like Facebook, Twitter, MySpace, and Hi5. It recommends choosing the "Only Friends" option on Facebook to limit who sees your information and checking your Twitter notifications so you can remove unwanted followers. For MySpace and other sites, it suggests adjusting your settings so only friends can see your personal details like birthdays and locations. Finally, it stresses the importance of customizing privacy and blocking strangers to stay safe online.
A step-by-step guide to your Facebook privacy settings. Easy instructions to help you safeguard your privacy while enjoying the benefits of socializing online.
The document provides guidance on selecting and securing a social networking platform. It recommends carefully reviewing privacy policies to understand how personal data is used and shared. It also suggests choosing privacy settings that allow sharing only with close contacts, and being aware of a platform's server locations and compliance with government data requests. Location of servers and compliance with government requests impact privacy and security.
The document provides instructions for maximizing privacy settings on Facebook to limit what personal information is visible to others. It recommends adjusting settings on the Privacy, Timeline and Tagging, Followers, Security, Ads, and Apps tabs to restrict who can see posts, profile information, and activity. Examples include limiting audiences for posts to "Friends Only", restricting who can follow the user, and preventing third parties from accessing or sharing the user's data. The document also advises reviewing connections regularly, assuming information is public, and avoiding revealing photos or oversharing personal details on social media profiles.
The document provides instructions for maximizing privacy settings on Facebook to limit what personal information is visible to others. It recommends adjusting settings on the Privacy, Timeline and Tagging, Followers, Security, Ads, and Apps tabs to restrict who can see posts, profile information, and activity. Examples include limiting audiences for posts to "Friends Only", restricting who can follow the user, and preventing third parties from accessing or sharing the user's data. The document also advises reviewing connections regularly, assuming information is public, and avoiding revealing photos or oversharing personal details on social media profiles.
The document provides guidance on managing personal information and privacy settings on Facebook to balance personal and professional use. It recommends:
1. Creating customized "Friend Lists" to organize contacts into groups and selectively sharing information.
2. Carefully controlling access to personal information like birthdays, hometowns, and contact details that could aid identity theft.
3. Making profile details like employer, education, and activities appropriate to share professionally by restricting sensitive details to personal lists.
4. Regularly reviewing settings and content to ensure a professional online presence is maintained.
This document provides instructions for setting privacy and security settings on Facebook. It explains how to control who can see your posts, who can find your profile, who can message you, and who can post on your timeline. It also describes how to block users and restrict activities if someone is making you feel unsafe. The instructions emphasize selecting privacy settings that make you feel most comfortable and remembering that it's okay to say no to friend requests or messages from strangers.
This document provides instructions for setting privacy settings on Facebook. It explains how to control who can see posts, how to review past posts and tags, how to block users, and other privacy and security settings. Key settings include choosing the privacy of posts, reviewing past activities, selecting who can find your profile, send messages or friend requests, and blocking specific users if needed. The document emphasizes setting privacy to "friends" for safety, and checking settings regularly as Facebook can change things.
LinkedIn is a professional networking platform with over 330 million users worldwide. It allows users to connect with colleagues and share information about employment history, education, and interests. While profiles and activities are publicly visible by default, users can manage privacy settings to limit what information is visible to others. The document provides tips on privacy settings and recommendations for managing a LinkedIn profile securely.
LinkedIn is a professional networking platform with over 330 million users worldwide. It allows users to connect with colleagues and share information about employment history, education, and interests. While profiles and activities are publicly visible by default, users can manage privacy settings to limit what information is visible to others. The document provides tips on optimizing LinkedIn privacy settings to share information only with intended connections and avoid oversharing personal details.
Digital DNA (Toronto Public Library) May 26 2016Towa Beer
Digital DNA
Tools like resumes and business cards were what we used to introduce ourselves and our personal brand to others when wanting to do business. Now we have digital tools to do this for us, so it is easier than ever to get information about someone online. But what if that information is wrong? How do you change what exists online about you or your business? In this interactive discussion, learn how to choose the right tools to set up your online DNA and most importantly ... how to monitor and correct what is already public online. Learn the dangers involved in working online, safety tips for your family and what to do if your security is breached. Leave with a solid understanding of how to set up your Facebook, Twitter, LinkedIn and website so you are secure in your Digital DNA.
If you are a Facebook user, I suggest you view the presentation attached, and resolve to protect your privacy by following the practical steps to maximise your privacy settings. A few simple clicks are all that is required.
This document provides tips for keeping your digital identity safe on social media and the internet. It recommends being cautious about accepting friend requests from strangers, googling yourself to understand your online presence, using strong and unique passwords, disabling geotagging to avoid sharing your location, and regularly checking privacy settings on social media accounts. The overall message is that people should thoughtfully manage what personal information they share online to avoid potential risks to their security and privacy.
This document provides tips for keeping your digital identity safe on social media and the internet. It recommends being careful about accepting friend requests from strangers, googling yourself to understand your online presence, using strong and unique passwords, turning off geotagging to avoid sharing your location, and regularly checking privacy settings on social media accounts. The overall message is that people should thoughtfully manage what personal information they share online to avoid potential risks to their security and privacy.
This document provides tips for keeping your digital identity safe on social media. It recommends being cautious about accepting friend requests from strangers, googling yourself to understand your online presence, using strong and unique passwords, disabling geotagging to avoid sharing your location, and carefully managing privacy settings on social media profiles. Regularly reviewing and updating privacy settings helps control what information is visible to the public online.
Similar to Networking Considerations for Soldiers and Families (20)
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
2. Social Media Roundup
Agenda
This week’s Social Media Roundup
Introduction
#1 Social media/online conduct
#2 Who you connect with
#3 Privacy settings
#4 Geotagging safety
#5 Educating your family
#6 What not to post
Resources
3. Social Media Roundup
Introduction
Social media has become a big part of
our lives. Social media can help people
and Army organizations share information
during deployments. Social media also
helps Soldiers, family members and Army
civilians stay connected to loved ones.
As a culture, we depend on social media,
but social media use can be extremely
dangerous if you’re not careful, especially
when deployed.
Operations security (OPSEC) and
personal privacy concerns should be
paramount when using social media
whether you’re deployed, or you’re simply
staying in touch with your deployed
Soldier.
4. Social Media Roundup
#1 Social media/online conduct
Soldiers are personally responsible for all
content they publish on social media sites,
blogs, or other websites.
Soldiers must be thoughtful about mission-
related and non-Soldier related content they
post. The lines between a Soldier’s personal and
professional life often blur in the online space.
A Soldier who violates Federal law, regulations
or policies through inappropriate personal online
activity is subject to disciplinary action under the
Uniform Code of Military Justice (UCMJ).
The Army is always working to protect itself
against security breaches. It is vitally important
that Army leaders, Soldiers and Army civilians
understand what kind of data they are
broadcasting and what they can do to protect
themselves and their families.
5. Social Media Roundup
#1 Social media/online conduct
The posting or disclosure of
internal Army documents or
information that the Army has
not officially released to the
public is prohibited. This
policy applies no matter how
a Soldier comes into
possession of a document,
video or photo.
A few examples of
unreleased information
Soldiers are prohibited from
posting include information
about causalities, detainees
or military operations.
6. Social Media Roundup
#2 Who you connect with
Be cautious when accepting friend requests and interacting with people online. You
should never accept a friend request from someone you do not know, even if they
know a friend of yours. For more on this, check out this article about the Robin
Sage Experiment: “Fictitious femme fatale fooled cybersecurity”
Don’t share information that you don’t want to become public. Be careful about what
you post about yourself on social media platforms. Once you put something out
there, you can’t control where it goes. Someone might target you based simply
because you work in the Department of Defense. Be cautious when listing your job,
military organization, education and contact information.
Providing too much information in your profile can leave you exposed to people who
want to steal your identity or steal sensitive operational information.
Pvt. Creeper
7. Social Media Roundup
#3 Privacy settings
Understanding what you can and cannot
post on social media platforms goes a
long way in protecting yourself online,
but more can be done by adjusting your
privacy settings on social media sites.
Facebook’s default privacy settings are
often public, but Facebook provides
various setting options that help
Facebook users adjust privacy settings.
Twitter allows users to keep their Tweets
private and Flickr gives users the option
of keeping photos private. The settings
are easily accessible, the trick is setting
them to meet your privacy needs. Similar
privacy settings can be found on other
social media sites like Myspace and
LinkedIn.
On the top are Facebook’s sharing
recommendations, below that are the Army’s
sharing recommendations. For more information
about protecting yourself on Facebook, check out
this Social Media Roundup: http://goo.gl/2WAlu
Facebook
Twitter
8. Locking Down Facebook
• Even if you think you already
have them set correctly,
Facebook changes its
settings and where they're
located frequently so you
should double-check
regularly. Don't forget to
share this tip with your
friends and family so they
can be safe, too!
• Start by logging in to your
Facebook account. Then
click the downward arrow in
the upper-right corner and
choose Settings.
9. General
• Your name and username are visible to anyone who searches
for you, although you can minimize this in later settings. If you
don't want people to find you easily, don't use the same
username you use for other social media or as your email
address
10. Security• The Security tab is where you set up login security, trusted contacts and browser, manage your
sessions and deactivate your account.
• Let's move to the Security tab by clicking the Security link in the left column. The Security tab is where
you set up login security, trusted contacts and browser, manage your sessions and deactivate your
account.
• Make sure you turn on "Login Notifications." This alerts you when someone logs in to your account from
an unfamiliar gadget.
• "Login Approvals" means you can only log in on a new computer or gadget if you have your phone with
you to receive a special code. Even if a hacker gets your information, they'd need your phone as well to
get in to your account. It's a little annoying at times, but the extra security is worth it.
• Review your "Trusted Browsers." You might have logged in on a computer in the past – belonging to a
friend or ex.
11. Privacy
• The Privacy tab controls who can see what you post and who can
contact and find you. If you only change the settings in one place, this
should be it.
• "Who can see my stuff?" menu, set "Who can see your future posts?"
to Friends. Then click the "Limit Past Posts" link and then the "Limit Old
Posts" button. This changes any old posts you marked as Public to
Friends.
• "Who can contact me?" change "Who can send you friend requests?"
to Friends of Friends.
• "Who can look me up?"
you want to change the
settings to "Friends,"
"Friends" and "No."
12. Timeline & Tagging
• We've already limited who can see your posts, but the Timeline
and Tagging tab has a few privacy loopholes you need to close.
13. Timeline & Tagging
• In "Who can add things to my timeline?" you definitely want to limit who can post on your
timeline to just "Friends." If you really want to make sure you control everything people see
on your timeline, you can change that to "Only Me."
• I would also set "Review posts..." to "On." That way if a friend posts you in something you
don't necessarily agree with or would make you look bad to your friends, you can stop it
before it appears.
• In "Who can see things on my timeline?" you can leave "Who can see posts you've been
tagged in..." to "Friends of Friends," since they'll be able to see the post on your friend's
timeline anyway. If you want to be extra cautious though, set it to "Friends." You do,
however, want "Who can see what others post on your timeline?" set to "Friends."
• Bonus Tip: Click the "View As..." link to see what your timeline looks like to friends and
strangers. This will quickly reveal if there's something showing that shouldn't be.
• In "How can I manage tags people add and tagging suggestions?" you can set the settings
to "On," "Only Me," and "No One." This keeps things you're tagged in, like photos, from
automatically being visible to all your friends. It also keeps you from being tagged in photos
you don't control, which can give away your face and name to people you don't know.
14. Followers
• You can allow people who aren't your friends to see your posts
in their News Feed. This is handy if you're an aspiring writer or
artists looking to get a wider audience. But for most people, you
want to make sure "Who Can Follow Me" is set to "Friends."
15. APPS
• The Apps is more important than controlling what Facebook
apps you have linked to your account. It has a few settings that
are serious privacy problems if they aren't changed.
• A huge hidden privacy danger is "Apps others use." This
controls what information about YOU apps your friends install
can share with the app developer. Edit this and uncheck every
box.
"Instant personalization" means
that Facebook can share your
information with select third-party
sites to give you a better
experience when you visit. I've
never seen that it does anything
interesting, and it is a privacy risk,
so set it to "Off."
16. ADS
• Ads controls how Facebook can use your
information in ads.
• "Third Party Sites" controls whether or not
Facebook can share use your information
in ads on third-party sites in the future.
Click "Edit" and set "If we allow this in the
future..." to "No one."
• "Ads and Friends" sets whether or not
your name can appear in ads that your
friends see. Again, click "Edit" and
change "Pair my social actions with ads
for" to "No one."
• Finally, under "Website and Mobile App
Custom Audiences," You can click the
"Opt out" link if you don't want Facebook
showing you targeted ads.
• That wraps up your privacy and security
settings on Facebook. That is, until
Facebook decides it has to change
everything all over again!
17. Social Media Roundup
#4 Geotagging safety
• Geotagging is the process of adding
geographical identification to photographs,
video, websites and SMS messages. It is the
equivalent of adding a 10-digit grid
coordinate to everything you post on the
internet.
• Geotags are automatically embedded in
some pictures taken with smartphones.
Many people are unaware of the fact that the
photos they take with their smartphones and
load to the Internet have been geotagged.
• Photos posted to photo sharing sites like
Flickr and Picasa can also be tagged with
location, but it is not an automatic function.
• For more information about geotagging,
check out this website: http://goo.gl/DmJoq
18. Social Media Roundup
#4 Geotagging safety
Location-based social networking is quickly growing in popularity. A variety of
applications are capitalizing on users’ desire to broadcast their geographic location.
The increased popularity of these applications is changing the way we as a digital
culture view security and privacy on an individual level. These changes in
perception are also creating OPSEC concerns on an Army level.
Deployed Soldiers, or Soldiers conducting operations in classified areas should not
use location-based social networking services. These services will bring the enemy
right to the Army’s doorstep.
Want to avoid giving away location? Disable the GPS function on your smartphone.
19. Social Media Roundup
Disable Geotagging on your camera only.
• iPhone (4.0):
• 1. Go to Settings.
• 2. Select General.
• 3. Select Location Services.
• 4. Locate Camera from the list of apps
that use Location Services and change
the setting to OFF.
•
• Android (2.2; 2.3):
• 1. Open the Camera app.
• 2. Select the Location icon.
• 3. Select Off.
• Some versions of Android will need you
to open the Camera app, select the
Menu button on their phone, select
Settings and disable Geo-tag photos.
•
• BlackBerry (6.0):
• 1. Open Camera.
• 2. Select the Location icon and set it to
Disabled.
• Previous versions will need to open
Camera, press the Menu button and
select Options. Then set Geotagging to
Disabled.
20. Social Media Roundup
Disable Geotagging on Phone.
• iPhone (4.0):
• 1. Go to Settings.
• 2. Select General.
• 3. Select Location Services.
• 4. Change the setting for Location
Services to OFF.
• Android (2.2; 2.3):
• 1. Open Settings.
• 2. Select Location & security.
• 3. Uncheck both Use wireless
networks and Use GPS satellites.
• BlackBerry (6.0):
• 1. Open Options.
• 2. Select Device.
• 3. Select Location Settings.
• 4. Go to Location Services and change
the setting to Location Off.
• 5. Press the Menu key on the phone.
• 6. Select Save.
• Previous versions will need to open
Options, select Security, and select
Applications Permissions. Press the
Menu key on your phone and select
Edit. Expand Connections and set
Location (GPS) to Deny.
21. Social Media Roundup
#5 Educating your family
Social media helps Family Readiness
Groups and Army family members stay
connected, but OPSEC should always be
the primary concern.
Family Readiness Groups, Army spouses
and Army Family members need to know
that posting sensitive information can be
detrimental to Soldier safety.
Ensure that information posted online has
no significant value to the enemy. Always
assume that the enemy is reading every
post made to a social media platform.
Even seemingly innocent posts about a
family member’s deployment or
redeployment date can put them at risk.
Security items to consider
Take a close look at all privacy settings. Set
security options to allow visibility to “friends only.”
Do not reveal sensitive information about yourself
such as schedules and event locations.
Ask, “What could the wrong person do with this
information?” and “Could it compromise the safety
of myself, my family or my unit?”
Geotagging is a feature that reveals your location
to other people within your network. Consider
turning off the GPS function of your smartphone.
Closely review photos before they go online.
Make sure they do not give away sensitive
information which could be dangerous if released.
Make sure to talk to family about operations
security and what can and cannot be posted.
Videos can go viral quickly, make sure they don’t
give away sensitive information.
22. Pride and support for
service, units, specialties,
and service member
Generalizations about
service or duty
General status of the
location of a unit (“operating
in southern Afghanistan” as
opposed to “operating in the
village of Hajano Kali in
Arghandab district in
southern Afghanistan”)
Any other information
already in the public domain
posted by official sources
Items authorized to discuss on social media platforms
#5 Educating your family
23. Social Media Roundup
What is the best way to protect your kids
online? Talk to them. Research suggests
that when children want important
information, most rely on their parents.
The important thing is to start the
education early. Talk to your children
about online risks and make sure you
create an honest and open environment.
Some social media sites like Facebook,
provide family safety resources and tools
for reporting issues.
Make sure you check out
www.Onguardonline.com to find more
resources that will help protect your
family and yourself online.
#5 Educating your family
24. Social Media Roundup
#6 What not to post
When using Facebook and other social media platforms, do not post personally
identifiable information and any information that can damage Army operations.
Think about what you’re posting before hitting share. Many times, you can avoid
releasing sensitive information by simply rephrasing your social media post.
If you aren’t comfortable placing the same information on a sign in your front yard,
don’t put it online.
25. Social Media Roundup
OPSEC resources
OPSEC resources
Interagency OPSEC Support Staff: www.ioss.gov
Anti-Phishing Phil: http://goo.gl/ZFkY3
OnGuard Online: www.onguardonline.gov
Social media training: http://goo.gl/AqmE1
Social Media Roundups
9 Critical Steps to Protecting Yourself on Facebook: http://goo.gl/igGzN
Geotags and Location-based Social Networking: http://goo.gl/wqKwZ
Social Media For Family Readiness Groups: http://goo.gl/rS88l
Army Slideshare site: http://goo.gl/cJM9T
26. Social Media Roundup
Contact information
Have questions? Please feel free to
reach out to us at the Online and
Social Media Division
OFFICE OF THE CHIEF OF PUBLIC AFFAIRS
PENTAGON
11/30/2011
Email:
Ocpa.osmd@us.army.mil
To review and download past editions of the
Social Media Roundup, visit our Slideshare site
at: http://www.slideshare.net/usarmysocialmedia.
If you do not have access to Slideshare, they can
also be found on AKO at:
https://www.us.army.mil/suite/page/505262. All
Social Media Roundups are authorized to be
distributed to a broader audience.