SlideShare a Scribd company logo
1 of 12
PRIVACY ONLINE
    By: Sarah Khela
DEFINITION OF ONLINE
               P R I VAC Y

 Internet privacy consists of privacy over the media of the Internet: the
ability to control what information one reveals about oneself over the
Internet, and to control who can access that information. Many people
use the term to mean universal Internet privacy: every user of the Internet
possessing Internet privacy.
Internet privacy forms a subset of computer privacy. Experts in the field
of Internet privacy have a consensus that Internet privacy does not really
exist. Privacy advocates believe that it should exist
#1 DON’T REVEAL PERSONAL
       I N F O R M AT I O N

 Most people are sharing personal information that almost anyone
   can find without even knowing it. You should use a fake name
   except if you need to do banking or your e-mail. Don’t give
   information to pop-ups or any sort of advertisement. Don’t leave
   your internet on at night because you may get viruses or people
   will hack into your internet and get information.
# 2 U S E C O O K I E M A N AG E M E N T
             S O F T WA R E

 Cookies are tidbits of information that websites store on your
computer. They also may be passwords or user ID’s so you don’t
have to keep typing them when you load a new page. Most cookies
can only be read by whoever created them. Cookies track everything
that you do on your computer.
#3 DON’T REVEAL PERSONAL
  INFORMATION TO STRANGERS OR JUST
            MET FRIENDS



 You should be careful with who you talk to online. Some people
could make accounts pretending to be your friend when it could be
anybody. You should talk to your friends and create a passcode that
you say at the beginning of your conversations so you know it’s them.
It’s not a good idea to go out and meet face to face with someone you
don’t know but talk to online.
#4 BEWARE OF SITES THAT OFFER
 R E WA R D S O R P R I Z E S I N E XC H A N G E F O R
      YOUR PERSONAL INFORMATION



 They use your information for direct marketing purposes. Once
marketers have your information they sell it to other marketers and
it’s a long chain that doesn’t end quickly. Be especially wary of
sweepstakes and contests. You probably won't win, but the marketer
sure will if you give them your information.
# 5 D O N ’ T R E P LY TO
                 S PA M M E R S

 Spam on your e-mail is something your probably aware with. This
simply confirms that your address is being read by a real person, and
you'll find yourself on dozens more spammers' lists in no time. If you
have a good Internet service provider, you may be able to forward
copies of spam e-mail to the system administrators who can route a
complaint to the ISP of the spammer.
#6 BE CAUTIOUS OF WEB
            SECURITY

 Never submit a credit card number or other highly sensitive
personal information without first making sure your connection is
secure. In any browser, look at the URL (Web address) line - a secure
connection will begin "https://" instead of "http://". If you are at
page that asks for such information but shows "http://" try adding
the "s" yourself and hitting enter to reload the page. Your browser
itself gives away information about you, if your IP address.
#7 BE CONSCIOUS OF HOME
          COMPUTER SECURITY

 Your own computer may be a trouble spot for Internet security. If you have a
DSL line, broadband cable modem or other connection to the Internet that is up
and running 24 hours be sure to turn your computer off. System crackers search for
vulnerable, unattended DSL-connected home computers, and can invade them with
surprising ease, rifling through files looking for credit card numbers or other
sensitive data, or even "taking over" the computer and quietly using it for their own
purposes, such as launching attacks on other computers elsewhere - attacks you
could initially be blamed for. Firewall hardware and software is another option that
can protect you from these kinds of attacks.
# 8 E X A M I N E P R I VA C Y
          POLICIES AND SEALS.

 When you are considering whether or not to do business with a Web
site, there are other factors than a secure connection you have to consider
that are equally important to Web security. Just because they call it a
"privacy policy" doesn't mean it will protect you, read it for yourself.
Check with the seal-issuing site to make sure the seal isn't a fake, and
examine terms carefully, especially if you are subscribing to a service
rather than buying a product. Look out for auto-rebilling scams and
hidden fees.
#9 RE ME MB E R T HAT YOU D E CID E W HAT
  IN FORMAT ION AB OUT YOURSE L F T O
                  REVEAL


 Don't give out personally-identifiable information too easily. Just as
you might think twice about giving some clerk at the mall your home
address and phone number, keep in mind that simply because a site asks
for or demands personal information from you does not mean you have
to give it. You do have to give accurate billing information if you are
buying something, of course, but if you are registering with a free site that
is a little too nosy for you, there is no law against providing them with
pseudonymous information.
#10 USE ENCRYPTION!

 Last but certainly not least, there are other privacy threats besides abusive
marketers, nosy bosses, spammers and scammers. Some of the threats include
industrial espionage, government surveillance, identity theft, disgruntled
former associates, and system crackers. Relatively easy-to-use e-mail and file
encryption software is available for free, such as Pretty Good Privacy
(PGP, available at: HREF="http://www.pgpi.org/">http://www.pgpi.org/
), which runs on almost all computers and even integrates seamlessly with
most major e-mail software.

More Related Content

What's hot

Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!WebConnect Pvt Ltd
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroJared Broker
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Alin Adrian Florea
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online One-IT
 
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media One-IT
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidhacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidChandra Pr. Singh
 

What's hot (20)

Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!List 10 Points to Ensure your Digital Privacy!
List 10 Points to Ensure your Digital Privacy!
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
travel Safely
travel Safelytravel Safely
travel Safely
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guidhacking into computer systems - a beginners guid
hacking into computer systems - a beginners guid
 

Viewers also liked

Online privacy Josh's Version
Online privacy Josh's VersionOnline privacy Josh's Version
Online privacy Josh's Versionmegg16
 
Online privacy
Online privacyOnline privacy
Online privacymegg16
 
Justin bieber
Justin bieberJustin bieber
Justin biebermegg16
 
Video game addiction
Video game addictionVideo game addiction
Video game addictionmegg16
 
Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel
Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel
Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel XZ3
 
The New Athletic American Dream Draft 1
The New Athletic American Dream Draft 1The New Athletic American Dream Draft 1
The New Athletic American Dream Draft 1alexgaertner
 
The New Athletic American Dream- Draft 2
The New Athletic American Dream- Draft 2The New Athletic American Dream- Draft 2
The New Athletic American Dream- Draft 2alexgaertner
 
Cell Phone Usage During the School Day- Draft 1
Cell Phone Usage During the School Day- Draft 1Cell Phone Usage During the School Day- Draft 1
Cell Phone Usage During the School Day- Draft 1alexgaertner
 
Debian com Android para Sequestro de Credencias
Debian com Android para Sequestro de CredenciasDebian com Android para Sequestro de Credencias
Debian com Android para Sequestro de Credenciaswilbertofilho
 

Viewers also liked (10)

Online privacy Josh's Version
Online privacy Josh's VersionOnline privacy Josh's Version
Online privacy Josh's Version
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Justin bieber
Justin bieberJustin bieber
Justin bieber
 
Video game addiction
Video game addictionVideo game addiction
Video game addiction
 
Devils claw
Devils clawDevils claw
Devils claw
 
Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel
Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel
Compression Ignition Engine Modifications for Straight Vegetable Oil Fuel
 
The New Athletic American Dream Draft 1
The New Athletic American Dream Draft 1The New Athletic American Dream Draft 1
The New Athletic American Dream Draft 1
 
The New Athletic American Dream- Draft 2
The New Athletic American Dream- Draft 2The New Athletic American Dream- Draft 2
The New Athletic American Dream- Draft 2
 
Cell Phone Usage During the School Day- Draft 1
Cell Phone Usage During the School Day- Draft 1Cell Phone Usage During the School Day- Draft 1
Cell Phone Usage During the School Day- Draft 1
 
Debian com Android para Sequestro de Credencias
Debian com Android para Sequestro de CredenciasDebian com Android para Sequestro de Credencias
Debian com Android para Sequestro de Credencias
 

Similar to Slideshow - Lil Rat

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHemantSharma134028
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.RobbiePaterson2
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 

Similar to Slideshow - Lil Rat (20)

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Users guide
Users guideUsers guide
Users guide
 

More from megg16

His story of video games - copy
His story of video games - copyHis story of video games - copy
His story of video games - copymegg16
 
Video games
Video gamesVideo games
Video gamesmegg16
 
Toyota supra mkiv
Toyota supra mkivToyota supra mkiv
Toyota supra mkivmegg16
 
Presentation1
Presentation1Presentation1
Presentation1megg16
 
Online privacy
Online privacyOnline privacy
Online privacymegg16
 
Video games - Megan
Video games - MeganVideo games - Megan
Video games - Meganmegg16
 
Meerkats prac slideshow by kelly
Meerkats prac slideshow by kellyMeerkats prac slideshow by kelly
Meerkats prac slideshow by kellymegg16
 
Penguins Slide Show Palveer
Penguins Slide Show PalveerPenguins Slide Show Palveer
Penguins Slide Show Palveermegg16
 
power point on sarah
power point on sarah power point on sarah
power point on sarah megg16
 
Justin bieber
Justin bieberJustin bieber
Justin biebermegg16
 

More from megg16 (10)

His story of video games - copy
His story of video games - copyHis story of video games - copy
His story of video games - copy
 
Video games
Video gamesVideo games
Video games
 
Toyota supra mkiv
Toyota supra mkivToyota supra mkiv
Toyota supra mkiv
 
Presentation1
Presentation1Presentation1
Presentation1
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Video games - Megan
Video games - MeganVideo games - Megan
Video games - Megan
 
Meerkats prac slideshow by kelly
Meerkats prac slideshow by kellyMeerkats prac slideshow by kelly
Meerkats prac slideshow by kelly
 
Penguins Slide Show Palveer
Penguins Slide Show PalveerPenguins Slide Show Palveer
Penguins Slide Show Palveer
 
power point on sarah
power point on sarah power point on sarah
power point on sarah
 
Justin bieber
Justin bieberJustin bieber
Justin bieber
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Slideshow - Lil Rat

  • 1. PRIVACY ONLINE By: Sarah Khela
  • 2. DEFINITION OF ONLINE P R I VAC Y  Internet privacy consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. Many people use the term to mean universal Internet privacy: every user of the Internet possessing Internet privacy. Internet privacy forms a subset of computer privacy. Experts in the field of Internet privacy have a consensus that Internet privacy does not really exist. Privacy advocates believe that it should exist
  • 3. #1 DON’T REVEAL PERSONAL I N F O R M AT I O N  Most people are sharing personal information that almost anyone can find without even knowing it. You should use a fake name except if you need to do banking or your e-mail. Don’t give information to pop-ups or any sort of advertisement. Don’t leave your internet on at night because you may get viruses or people will hack into your internet and get information.
  • 4. # 2 U S E C O O K I E M A N AG E M E N T S O F T WA R E  Cookies are tidbits of information that websites store on your computer. They also may be passwords or user ID’s so you don’t have to keep typing them when you load a new page. Most cookies can only be read by whoever created them. Cookies track everything that you do on your computer.
  • 5. #3 DON’T REVEAL PERSONAL INFORMATION TO STRANGERS OR JUST MET FRIENDS  You should be careful with who you talk to online. Some people could make accounts pretending to be your friend when it could be anybody. You should talk to your friends and create a passcode that you say at the beginning of your conversations so you know it’s them. It’s not a good idea to go out and meet face to face with someone you don’t know but talk to online.
  • 6. #4 BEWARE OF SITES THAT OFFER R E WA R D S O R P R I Z E S I N E XC H A N G E F O R YOUR PERSONAL INFORMATION  They use your information for direct marketing purposes. Once marketers have your information they sell it to other marketers and it’s a long chain that doesn’t end quickly. Be especially wary of sweepstakes and contests. You probably won't win, but the marketer sure will if you give them your information.
  • 7. # 5 D O N ’ T R E P LY TO S PA M M E R S  Spam on your e-mail is something your probably aware with. This simply confirms that your address is being read by a real person, and you'll find yourself on dozens more spammers' lists in no time. If you have a good Internet service provider, you may be able to forward copies of spam e-mail to the system administrators who can route a complaint to the ISP of the spammer.
  • 8. #6 BE CAUTIOUS OF WEB SECURITY  Never submit a credit card number or other highly sensitive personal information without first making sure your connection is secure. In any browser, look at the URL (Web address) line - a secure connection will begin "https://" instead of "http://". If you are at page that asks for such information but shows "http://" try adding the "s" yourself and hitting enter to reload the page. Your browser itself gives away information about you, if your IP address.
  • 9. #7 BE CONSCIOUS OF HOME COMPUTER SECURITY  Your own computer may be a trouble spot for Internet security. If you have a DSL line, broadband cable modem or other connection to the Internet that is up and running 24 hours be sure to turn your computer off. System crackers search for vulnerable, unattended DSL-connected home computers, and can invade them with surprising ease, rifling through files looking for credit card numbers or other sensitive data, or even "taking over" the computer and quietly using it for their own purposes, such as launching attacks on other computers elsewhere - attacks you could initially be blamed for. Firewall hardware and software is another option that can protect you from these kinds of attacks.
  • 10. # 8 E X A M I N E P R I VA C Y POLICIES AND SEALS.  When you are considering whether or not to do business with a Web site, there are other factors than a secure connection you have to consider that are equally important to Web security. Just because they call it a "privacy policy" doesn't mean it will protect you, read it for yourself. Check with the seal-issuing site to make sure the seal isn't a fake, and examine terms carefully, especially if you are subscribing to a service rather than buying a product. Look out for auto-rebilling scams and hidden fees.
  • 11. #9 RE ME MB E R T HAT YOU D E CID E W HAT IN FORMAT ION AB OUT YOURSE L F T O REVEAL  Don't give out personally-identifiable information too easily. Just as you might think twice about giving some clerk at the mall your home address and phone number, keep in mind that simply because a site asks for or demands personal information from you does not mean you have to give it. You do have to give accurate billing information if you are buying something, of course, but if you are registering with a free site that is a little too nosy for you, there is no law against providing them with pseudonymous information.
  • 12. #10 USE ENCRYPTION!  Last but certainly not least, there are other privacy threats besides abusive marketers, nosy bosses, spammers and scammers. Some of the threats include industrial espionage, government surveillance, identity theft, disgruntled former associates, and system crackers. Relatively easy-to-use e-mail and file encryption software is available for free, such as Pretty Good Privacy (PGP, available at: HREF="http://www.pgpi.org/">http://www.pgpi.org/ ), which runs on almost all computers and even integrates seamlessly with most major e-mail software.