2. DEFINITION OF ONLINE
P R I VAC Y
Internet privacy consists of privacy over the media of the Internet: the
ability to control what information one reveals about oneself over the
Internet, and to control who can access that information. Many people
use the term to mean universal Internet privacy: every user of the Internet
possessing Internet privacy.
Internet privacy forms a subset of computer privacy. Experts in the field
of Internet privacy have a consensus that Internet privacy does not really
exist. Privacy advocates believe that it should exist
3. #1 DON’T REVEAL PERSONAL
I N F O R M AT I O N
Most people are sharing personal information that almost anyone
can find without even knowing it. You should use a fake name
except if you need to do banking or your e-mail. Don’t give
information to pop-ups or any sort of advertisement. Don’t leave
your internet on at night because you may get viruses or people
will hack into your internet and get information.
4. # 2 U S E C O O K I E M A N AG E M E N T
S O F T WA R E
Cookies are tidbits of information that websites store on your
computer. They also may be passwords or user ID’s so you don’t
have to keep typing them when you load a new page. Most cookies
can only be read by whoever created them. Cookies track everything
that you do on your computer.
5. #3 DON’T REVEAL PERSONAL
INFORMATION TO STRANGERS OR JUST
MET FRIENDS
You should be careful with who you talk to online. Some people
could make accounts pretending to be your friend when it could be
anybody. You should talk to your friends and create a passcode that
you say at the beginning of your conversations so you know it’s them.
It’s not a good idea to go out and meet face to face with someone you
don’t know but talk to online.
6. #4 BEWARE OF SITES THAT OFFER
R E WA R D S O R P R I Z E S I N E XC H A N G E F O R
YOUR PERSONAL INFORMATION
They use your information for direct marketing purposes. Once
marketers have your information they sell it to other marketers and
it’s a long chain that doesn’t end quickly. Be especially wary of
sweepstakes and contests. You probably won't win, but the marketer
sure will if you give them your information.
7. # 5 D O N ’ T R E P LY TO
S PA M M E R S
Spam on your e-mail is something your probably aware with. This
simply confirms that your address is being read by a real person, and
you'll find yourself on dozens more spammers' lists in no time. If you
have a good Internet service provider, you may be able to forward
copies of spam e-mail to the system administrators who can route a
complaint to the ISP of the spammer.
8. #6 BE CAUTIOUS OF WEB
SECURITY
Never submit a credit card number or other highly sensitive
personal information without first making sure your connection is
secure. In any browser, look at the URL (Web address) line - a secure
connection will begin "https://" instead of "http://". If you are at
page that asks for such information but shows "http://" try adding
the "s" yourself and hitting enter to reload the page. Your browser
itself gives away information about you, if your IP address.
9. #7 BE CONSCIOUS OF HOME
COMPUTER SECURITY
Your own computer may be a trouble spot for Internet security. If you have a
DSL line, broadband cable modem or other connection to the Internet that is up
and running 24 hours be sure to turn your computer off. System crackers search for
vulnerable, unattended DSL-connected home computers, and can invade them with
surprising ease, rifling through files looking for credit card numbers or other
sensitive data, or even "taking over" the computer and quietly using it for their own
purposes, such as launching attacks on other computers elsewhere - attacks you
could initially be blamed for. Firewall hardware and software is another option that
can protect you from these kinds of attacks.
10. # 8 E X A M I N E P R I VA C Y
POLICIES AND SEALS.
When you are considering whether or not to do business with a Web
site, there are other factors than a secure connection you have to consider
that are equally important to Web security. Just because they call it a
"privacy policy" doesn't mean it will protect you, read it for yourself.
Check with the seal-issuing site to make sure the seal isn't a fake, and
examine terms carefully, especially if you are subscribing to a service
rather than buying a product. Look out for auto-rebilling scams and
hidden fees.
11. #9 RE ME MB E R T HAT YOU D E CID E W HAT
IN FORMAT ION AB OUT YOURSE L F T O
REVEAL
Don't give out personally-identifiable information too easily. Just as
you might think twice about giving some clerk at the mall your home
address and phone number, keep in mind that simply because a site asks
for or demands personal information from you does not mean you have
to give it. You do have to give accurate billing information if you are
buying something, of course, but if you are registering with a free site that
is a little too nosy for you, there is no law against providing them with
pseudonymous information.
12. #10 USE ENCRYPTION!
Last but certainly not least, there are other privacy threats besides abusive
marketers, nosy bosses, spammers and scammers. Some of the threats include
industrial espionage, government surveillance, identity theft, disgruntled
former associates, and system crackers. Relatively easy-to-use e-mail and file
encryption software is available for free, such as Pretty Good Privacy
(PGP, available at: HREF="http://www.pgpi.org/">http://www.pgpi.org/
), which runs on almost all computers and even integrates seamlessly with
most major e-mail software.