SlideShare a Scribd company logo
Controlling Your Social Networking Privacy Settings Stay safe online!
Facebook Privacy Settings
Click on “Settings” Then on “Privacy Settings”
Use these options to control the information people see about you!
“ Only friends” is the BEST option to limit who sees  your info.
Check to see what your friends can see about you.  If you don’t like what they are able to see, change it!
Do you want your cousin to know that you watch Judge Judy?  If not, you can restrict that information!
You can choose what can be seen about you through the sites applications! Choose your games and applications wisely!
This is the most secure setting for applications  (uncheck all)
Twitter Privacy Settings
Search for your username on the Twitter homepage to find out what other people are saying about you!  Hopefully it’s all good.  If not, you can block those people from following you or direct messaging you!  (or talk to Twitter owners)
You can control your privacy on Twitter by clicking on “Settings.”
Click on “Notices” so that you find out when people are following you or direct messaging you.  This way you can remove the people you don’t want following you.  Or better: protect your tweets!
Do not reveal your location.  Your real friends know where you are.  Protect your “tweets” so that only trusted friends can follow you.
The Lock means you’ve “protected your tweets.”  This is a great Twitter privacy setting.
If you’ve “Protected Your Tweets,” people will have to request to follow you.  Block people you don’t know in person.
If you see followers on your profile that you do not want following you, you can remove them by “Blocking” them.  Block people you don’t know.
MySpace Privacy Settings
In MySpace, click on “My Account” to maintain your privacy settings.
Click on the “Privacy” tab to fix your privacy settings.  Your birthday and location are sensitive pieces of information.  It’s nice for your friends to wish you an online “Happy Birthday,” but it’s nicer to be safe!
Adjust your settings so that only your  friends can  see your info!
Remember to customize your MySpace Instant Messaging (IM) settings as well!
Hi5 Privacy Settings
Rating people is a type of cyber-bullying!  Don’t do it!
This person is a male named Sonia with a sunset for a picture.  Seems nice (or a little strange), but it could be dangerous! Don’t ever try to “meet” someone unless you know them in person.
Again, don’t give your email address book information to social networks.  Your email contacts should remain  private. It will be embarrassing when your grandmother gets  an email invitation from you to join you on “Hi5.”
In General…
[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Look to the future   ,[object Object],[object Object]
Set Up Your Privacy Settings It may be the best 10 minutes you spend on the Internet!

More Related Content

What's hot

Cybersafety
CybersafetyCybersafety
Cybersafetymitch
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
Jamie Edmondson
 
Darius jones internet safety
Darius jones internet safetyDarius jones internet safety
Darius jones internet safetyJennifer Spann
 
Sadie Rudge\'s Esaftey quiz
Sadie Rudge\'s Esaftey quizSadie Rudge\'s Esaftey quiz
Sadie Rudge\'s Esaftey quiz
tonybattista
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1Anja Junginger
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Safety And Ethics on the Internet
Safety And Ethics on the InternetSafety And Ethics on the Internet
Safety And Ethics on the Internet
CompApps
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
MsCCostello
 
Cell phone safty
Cell phone saftyCell phone safty
Cell phone safty
cupcakequeen
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Ben Woelk, CISSP, CPTC
 

What's hot (19)

Cybersafety
CybersafetyCybersafety
Cybersafety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Darius jones internet safety
Darius jones internet safetyDarius jones internet safety
Darius jones internet safety
 
Sadie Rudge\'s Esaftey quiz
Sadie Rudge\'s Esaftey quizSadie Rudge\'s Esaftey quiz
Sadie Rudge\'s Esaftey quiz
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1
 
Kirstin's i safe ppt
Kirstin's i safe pptKirstin's i safe ppt
Kirstin's i safe ppt
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Safety And Ethics on the Internet
Safety And Ethics on the InternetSafety And Ethics on the Internet
Safety And Ethics on the Internet
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cell phone safty
Cell phone saftyCell phone safty
Cell phone safty
 
Esafety Quiz
Esafety QuizEsafety Quiz
Esafety Quiz
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 

Similar to Setting privacy controls on social networks

Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
Kelly Anderson
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
MentorIT
 
Digital identity
Digital identityDigital identity
Digital identitymarudiaz77
 
Social Networking Tips - Teens
Social Networking Tips - TeensSocial Networking Tips - Teens
Social Networking Tips - Teens
- Mark - Fullbright
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
Crackerjack Marketing
 
Script Outline For Cyber Safety Video
Script Outline For Cyber Safety VideoScript Outline For Cyber Safety Video
Script Outline For Cyber Safety VideoAlice Mercer
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Parenting & Education
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
Sarah M. Smart
 
Digital Identity - Junior 5
Digital Identity - Junior 5 Digital Identity - Junior 5
Digital Identity - Junior 5 marudiaz77
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
itmadesimple
 
Heads up!
Heads up!Heads up!
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
Dee Tutino
 
How to Protect Yourself and Your Famlily on Social Media
How to Protect Yourself and Your Famlily on Social MediaHow to Protect Yourself and Your Famlily on Social Media
How to Protect Yourself and Your Famlily on Social Media
Wired Flare
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
Dee Tutino
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
catherinelibranda
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)
Lauren McSwain-Starrett
 

Similar to Setting privacy controls on social networks (20)

Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
 
Digital identity
Digital identityDigital identity
Digital identity
 
Social Networking Tips - Teens
Social Networking Tips - TeensSocial Networking Tips - Teens
Social Networking Tips - Teens
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
7th grade digital security
7th grade digital security7th grade digital security
7th grade digital security
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Script Outline For Cyber Safety Video
Script Outline For Cyber Safety VideoScript Outline For Cyber Safety Video
Script Outline For Cyber Safety Video
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
Digital Identity - Junior 5
Digital Identity - Junior 5 Digital Identity - Junior 5
Digital Identity - Junior 5
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Heads up!
Heads up!Heads up!
Heads up!
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
How to Protect Yourself and Your Famlily on Social Media
How to Protect Yourself and Your Famlily on Social MediaHow to Protect Yourself and Your Famlily on Social Media
How to Protect Yourself and Your Famlily on Social Media
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)
 

More from sraslim

Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
sraslim
 
Flip It! Flipped Learning for Teacher Librarians
Flip It!  Flipped Learning for Teacher LibrariansFlip It!  Flipped Learning for Teacher Librarians
Flip It! Flipped Learning for Teacher Librarians
sraslim
 
CSLAsr eBooks Presentation - May 31, 2012
CSLAsr eBooks Presentation - May 31, 2012CSLAsr eBooks Presentation - May 31, 2012
CSLAsr eBooks Presentation - May 31, 2012
sraslim
 
Passwords and Digital Safety
Passwords and Digital SafetyPasswords and Digital Safety
Passwords and Digital Safety
sraslim
 
Sonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer PresentationSonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer Presentation
sraslim
 
Inspiring Students
Inspiring StudentsInspiring Students
Inspiring Students
sraslim
 
Crocodoc Guide
Crocodoc Guide   Crocodoc Guide
Crocodoc Guide
sraslim
 
Livebinders Guide
Livebinders GuideLivebinders Guide
Livebinders Guide
sraslim
 
Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7
sraslim
 
Wikis for Education
Wikis for EducationWikis for Education
Wikis for Education
sraslim
 
Web 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy TeachersWeb 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy Teachers
sraslim
 
Using Web 2 0 Tools To Enliven Projects Nov 20
Using Web 2 0 Tools To Enliven Projects Nov 20Using Web 2 0 Tools To Enliven Projects Nov 20
Using Web 2 0 Tools To Enliven Projects Nov 20
sraslim
 

More from sraslim (12)

Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
 
Flip It! Flipped Learning for Teacher Librarians
Flip It!  Flipped Learning for Teacher LibrariansFlip It!  Flipped Learning for Teacher Librarians
Flip It! Flipped Learning for Teacher Librarians
 
CSLAsr eBooks Presentation - May 31, 2012
CSLAsr eBooks Presentation - May 31, 2012CSLAsr eBooks Presentation - May 31, 2012
CSLAsr eBooks Presentation - May 31, 2012
 
Passwords and Digital Safety
Passwords and Digital SafetyPasswords and Digital Safety
Passwords and Digital Safety
 
Sonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer PresentationSonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer Presentation
 
Inspiring Students
Inspiring StudentsInspiring Students
Inspiring Students
 
Crocodoc Guide
Crocodoc Guide   Crocodoc Guide
Crocodoc Guide
 
Livebinders Guide
Livebinders GuideLivebinders Guide
Livebinders Guide
 
Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7
 
Wikis for Education
Wikis for EducationWikis for Education
Wikis for Education
 
Web 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy TeachersWeb 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy Teachers
 
Using Web 2 0 Tools To Enliven Projects Nov 20
Using Web 2 0 Tools To Enliven Projects Nov 20Using Web 2 0 Tools To Enliven Projects Nov 20
Using Web 2 0 Tools To Enliven Projects Nov 20
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Setting privacy controls on social networks

  • 1. Controlling Your Social Networking Privacy Settings Stay safe online!
  • 3. Click on “Settings” Then on “Privacy Settings”
  • 4. Use these options to control the information people see about you!
  • 5. “ Only friends” is the BEST option to limit who sees your info.
  • 6. Check to see what your friends can see about you. If you don’t like what they are able to see, change it!
  • 7. Do you want your cousin to know that you watch Judge Judy? If not, you can restrict that information!
  • 8. You can choose what can be seen about you through the sites applications! Choose your games and applications wisely!
  • 9. This is the most secure setting for applications (uncheck all)
  • 11. Search for your username on the Twitter homepage to find out what other people are saying about you! Hopefully it’s all good. If not, you can block those people from following you or direct messaging you! (or talk to Twitter owners)
  • 12. You can control your privacy on Twitter by clicking on “Settings.”
  • 13. Click on “Notices” so that you find out when people are following you or direct messaging you. This way you can remove the people you don’t want following you. Or better: protect your tweets!
  • 14. Do not reveal your location. Your real friends know where you are. Protect your “tweets” so that only trusted friends can follow you.
  • 15. The Lock means you’ve “protected your tweets.” This is a great Twitter privacy setting.
  • 16. If you’ve “Protected Your Tweets,” people will have to request to follow you. Block people you don’t know in person.
  • 17. If you see followers on your profile that you do not want following you, you can remove them by “Blocking” them. Block people you don’t know.
  • 19. In MySpace, click on “My Account” to maintain your privacy settings.
  • 20. Click on the “Privacy” tab to fix your privacy settings. Your birthday and location are sensitive pieces of information. It’s nice for your friends to wish you an online “Happy Birthday,” but it’s nicer to be safe!
  • 21. Adjust your settings so that only your friends can see your info!
  • 22. Remember to customize your MySpace Instant Messaging (IM) settings as well!
  • 24. Rating people is a type of cyber-bullying! Don’t do it!
  • 25. This person is a male named Sonia with a sunset for a picture. Seems nice (or a little strange), but it could be dangerous! Don’t ever try to “meet” someone unless you know them in person.
  • 26. Again, don’t give your email address book information to social networks. Your email contacts should remain private. It will be embarrassing when your grandmother gets an email invitation from you to join you on “Hi5.”
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Set Up Your Privacy Settings It may be the best 10 minutes you spend on the Internet!