This document discusses personal information and its uses. Personal information includes details like names, addresses, and financial histories. Companies collect personal information from customers to deliver services, manage accounts, and direct marketing offers. The document provides tips for protecting personal information on social media and online, such as limiting shared details, using strong passwords, and adjusting privacy settings on accounts.
Attached for your reference are “Quick Tips” regarding methods one can use to minimize your becoming a victim of cyber crime while using social media.
You are encouraged to share these tips with your friends, family and co-workers.
Also included is this “smart card” for LinkedIn for increased security awareness.
UNCLASSIFIED - TLP: WHITE. TLP: WHITE information may be distributed without restriction, subject to copyright controls.
Source: FBI.
This training slides is to help you achieve quick wins in meeting session. It is action based and would help in quick decision making. Please visit www.facebook.com/SalesEnergyTraning for the conversation on this training.
Attached for your reference are “Quick Tips” regarding methods one can use to minimize your becoming a victim of cyber crime while using social media.
You are encouraged to share these tips with your friends, family and co-workers.
Also included is this “smart card” for LinkedIn for increased security awareness.
UNCLASSIFIED - TLP: WHITE. TLP: WHITE information may be distributed without restriction, subject to copyright controls.
Source: FBI.
This training slides is to help you achieve quick wins in meeting session. It is action based and would help in quick decision making. Please visit www.facebook.com/SalesEnergyTraning for the conversation on this training.
99 % of this documents and images are from WikiHow.com I have made it into a presentation format. I can send you the power point on request. I made it for myself for my tablet as a morning dose. I hope it helps you too. Visit WikiHow.com for more details
It’s the summer of 1971. The Vietnam War rages on. Nixon declares the War on Drugs. Jim Morrison dies in a bathtub. And all a nice Jewish boy from Miami wants is escape Paradise so he can find Utopia. Doug is a 17-year old hippie-wannabe who has all the answers. It’s just the questions that elude him. So he sets off on a psychedelic journey across America in his steel-toed boots. It’s a drug-hazed time of shag carpets and free love while trying to steer clear of farm-bred mosquitoes, a chainsaw attack, escaped convicts, angry villagers, a satanic cult and a pack of wild dogs. Doug’s journey becomes a wild ride with a merry band of folks looking for their piece of the American Dream. Instead he stumbles into the most notorious get-rich-quick scheme of the twentieth century, and learns the true meaning of American Karma.
A dozen slides previewing the Center for Rural Policy and Development's State of Rural Minnesota 2013. View maps and charts on population, education, health, poverty, income, and more.
Outline:
Introduction
Privacy In Web
Privacy Challenges
Security In Web
Security Principles
Security Challenges
Security Tips For Your Website
Privacy Vs. Security
Recent Trend
Security Hints
99 % of this documents and images are from WikiHow.com I have made it into a presentation format. I can send you the power point on request. I made it for myself for my tablet as a morning dose. I hope it helps you too. Visit WikiHow.com for more details
It’s the summer of 1971. The Vietnam War rages on. Nixon declares the War on Drugs. Jim Morrison dies in a bathtub. And all a nice Jewish boy from Miami wants is escape Paradise so he can find Utopia. Doug is a 17-year old hippie-wannabe who has all the answers. It’s just the questions that elude him. So he sets off on a psychedelic journey across America in his steel-toed boots. It’s a drug-hazed time of shag carpets and free love while trying to steer clear of farm-bred mosquitoes, a chainsaw attack, escaped convicts, angry villagers, a satanic cult and a pack of wild dogs. Doug’s journey becomes a wild ride with a merry band of folks looking for their piece of the American Dream. Instead he stumbles into the most notorious get-rich-quick scheme of the twentieth century, and learns the true meaning of American Karma.
A dozen slides previewing the Center for Rural Policy and Development's State of Rural Minnesota 2013. View maps and charts on population, education, health, poverty, income, and more.
Outline:
Introduction
Privacy In Web
Privacy Challenges
Security In Web
Security Principles
Security Challenges
Security Tips For Your Website
Privacy Vs. Security
Recent Trend
Security Hints
How Law Firms Build Trust for Your Business Online (Social Media Policy)Mike Mintz
This presentation gives the legal and business framework for corporations looking to build trust online with their customers. Through partnering with a law firm to craft a custom social media policy, deploy it to staff, and maintain continuous monitoring and litigation support, businesses can more effectively enter the social media space with confidence.
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfAdzappier
How to get data?
How do businesses make it successful in the age of ever-evolving data privacy regulations?
How can your business genuinely gain loyal customers in the future?
These are some serious questions that businesses must ask themselves before it's too late.
A Marketer's Dilemma: Collecting Data beyond third party cookies
Since the EU's General Data Protection Regulation (GDPR) fined large to small-medium-sized enterprises for violating the cookie consent policy, businesses have needed clarification about how to ask people for personalized marketing and advertising data. And that’s what consent preference management does.
As if stringent privacy laws were not enough, famous internet browsers like Apple's Safari and Mozilla's Firefox have already deprecated third-party cookies. And even Google is following suit and plans to deprecate third-party cookies by 2024.
For those who don't know, third-party cookies are small text files deployed onto the user's devices to collect their data for behavioral profiling and targeting by any entity other than the website.
Third parties have long been marketers and advertisers' abode to collect personal data from the user and devise a marketing or advertising campaign targeting specific people based on their behavior patterns.
Though third-party data has been beneficial for marketers to provide a better customer experience, the customers have yet to be at ease knowing how their data has traveled and been exposed to unknown companies without their consent.
Marketers need to adapt to the ever-changing business and data privacy landscape. Big tech doesn't want to come off as arrogant and deceitful, and that's why some of them have stopped third-party cookies by default.
They are building strict privacy safeguards in their platforms, which will discourage and limit the use and sharing of data with third parties.
For example, Facebook is currently developing a Limited Data Use (LDU) feature that will disable the use of personal data of California's citizens with Third parties. Apple has created a stricter data policy for app developers and ad publishers. Also, Google is testing out its Privacy Sandbox, which they say will help advertisers process data without hurting personal privacy and privacy laws.
However, some top advertising companies are concerned that Google's Privacy Sandbox might give google a monopoly in the advertising industry, leaving them only a bit.
https://adzapier.com/consent-preference-management-marketers-guide
Designing for Privacy in an Increasingly Public World — Speed TalkRobert Stribley
Lightning talk version of my Designing for Privacy in an Increasingly Public World presentation for Design Museum Week, presented Wednesday, April 27, 2022
Online Privacy in the Year of the DragonPhil Cryer
Description: Businesses change online privacy policies to make user's data, and their interaction with websites, more profitable for the website's owners. Users need to understand what privacy is being lost, how their data is being used and how they can improve their online privacy with knowledge and open source software.
Social media is a computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities. By design, social media is Internet-based and gives users quick electronic communication of content.
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
My slide deck used in People Management Association of the Philippines' (PMAP) Data Privacy Act Forum held last 18 SEP 2017 at Ace Hotel & Suites, Pasig City.
This presentation handles about dealing with negative feedback and rumours in Social Media.
-How can you avoid a "shitstorm?"
-How can you protect yourself from cyberbullying?
2. Table of contents
• Slide 3: Definition of personal information
• Slide 4: Special elements and uses in personal
information
• Slide 5: The use of personal information
• Slide 6: 5 Design Tricks Facebook Uses To Affect
Your Privacy Decisions
• Slide 7: Tips for guarding your information
• Slide 8: Five Ways to Boost Your Facebook Privacy
• Slide 9: Bibliography
3. Personal information
is recorded information about an identifiable individual
that may include his or her:
1. name, address, email address, phone number
2. race, nationality, ethnicity, origin, colour, religious or political
beliefs or associations,
3. age, sex, sexual orientation, marital status, family status,
4. identifying number, code, symbol,
5. finger prints, blood type, inherited characteristics,
6. health care history including information on physical/mental
disability,
7. educational, financial, criminal, employment history,
8. others' opinion about the individual, and
9. personal views except those about other individuals.
(Business Dictionary 2012)
4. Special elements and uses in personal
information
Companies collect and use
information about
customers and website
visitors for a variety of
purposes.
Information is obtained
when you interact, use
products and services, and
when you visit websites.
5. The use of personal information
This information can be used to:
• deliver, provide, and repair products or services
• establish and maintain customer accounts and billing
records
• contact you about products and services and direct specific
offers or promotions to you
• monitor website statistics
• manage and protect company’s networks
• monitor the company’s customer service employees
• establish your online account
• predict customer preferences and to direct marketing offers
by the company or by third parties.
(Verizon 2012)
6. 5 Design Tricks Facebook Uses To
Affect Your Privacy Decisions
#1: The Single Button Trick (old design:
Facebook keeps “improving” their 2 buttons = choice)
design so that more of us will add
apps without realising we’re #2: The Tiny Gray Font Trick (old
granting those apps (and their design: bold black font + prominent
creators) access to our personal permission icon)
information.
#3: The Tiny Hidden Info Symbol Trick
(old design: detailed & visible
After all, this access to our permissions)
information and identity is the
currency Facebook is trading in #4: The Action Line Trick (old design:
and what is driving its stock up or permissions visible above action line)
down.
#5: The Friendly Talk Trick (old design:
clear messaging)
(Charkham, A. 25.8.2012.)
7. Tips for guarding your information
• Limit the information you share
• Set up strong passwords
• Limit Unwanted Marketing Emails (Spam)
• Don’t open suspicious emails -> If you receive a
suspicious email, you should not reply to it, nor should
you open any attachments, click on links contained in
the email or provide any information in response to it.
• Protect your computer from viruses, hackers and
spyware by anti-virus and anti-spyware software
• Get an unlisted telephone number
(Verizon 2012; Consumer Action 2007)
8. Five Ways to Boost Your Facebook
Privacy
1. Limit Who Can Post to Your Timeline (prevent and fine-tune)
2. Block Tagged Photos From Your Timeline (posts and photos your friends
tag don't appear on your timeline without your explicit approval)
3. Prevent Friends' Apps From Gathering Your Info (Many apps ask users for
access to their friends' info.)
4. Disable "Instant Personalization“ (By default, Facebook provides a
handful of "partner websites," including Yelp and Bing, with information
about you and your friends when you visit them.
5. Change Your Default Post Privacy (Facebook uses the privacy setting of
your most recent post as the default privacy setting for your next post—
except for on certain mobile apps.
(The Wall Street Journal 12.10.2012)
9. Bibliography
Slide 3: Business Dictionary 2012. Personal information. URL:
http://www.businessdictionary.com/definition/personal-information.html#ixzz29bD9BI00.
Quoted 18.10.2012
Slide 4: Verizon 2012. Privacy Policy Summary. URL: https://www22.verizon.com/about/privacy/.
Quoted 18.10.2012
Slide 5: Verizon 2012. Privacy Policy Summary. URL:
https://www22.verizon.com/about/privacy/. Quoted 18.10.2012
Slide 6: Charkham, A. 25.8.2012. 5 Design Tricks Facebook Uses To Affect Your Privacy Decisions.
URL: http://techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy-
decisions/. Quoted 18.10.2012
Slide 7: Verizon 2012. Privacy Policy Tips for Guarding Your Information . URL:
https://www22.verizon.com/about/privacy/personalinformation/. Quoted 18.10.2012
Slide 7: Consumer Action 2007. Protect Your Phone Records. URL: http://www.consumer-
action.org/english/articles/protect_your_phone_records/. Quoted 18.10.2012
Slide 8: The Wall Street Journal 2012. Five Ways to Boost Your Facebook Privacy. URL:
http://blogs.wsj.com/digits/2012/10/12/five-ways-to-boost-your-facebook-privacy/?mod=e2fb.
Quoted 18.10.2012