SlideShare a Scribd company logo
Social Media Security Tips
By
Suad Hassan
TIP NUMBER 1:
STAY AS FAR AWAY AS
YOU CAN FROM SOIAL
NETWORKS
NO? OKAY, AT LEAST
LET ME HELP YOU BE
SAFE WHILE YOU ARE
ONLINE.
AS WELL AS OFFLINE.
-
BECAUSE WHAT HAPPENS
ONLINE DOESN’T ALWAYS
STAY ONLINE.
“In order to become social, we must
give up some of our private time and
space, so as to share it with others.”
Opening up and sharing
information with “friends” doesn’t
mean full disclosure.
You want to protect yourself
from identity theft as well as
physical harm
The basic information that
shouldn’t be circling the web:
Social security number
Your birthday
Your home address
BUT
There are other kinds of information that you may think
cant do any harm but
could get someone access to that information.
SECURE YOUR PRIVACY
Get very acquainted with your
private settings.
FROM THE BEGINNING
You can’t trust default private setting on
social networking sites to protect you
Today on Facebook the default privacy
setting shares with everyone your:
Name
Wall posts
Birthday
Friends
Extended Profile
Data
Photos
Gender
Contact Info
Networks
Likes
A helpful way of finding out what
information is available to the
general public is to search your
name on Google.
“When we engage in
communication there is an
expectation of privacy--we
assume the information will not
go beyond the person with
whom we’re talking.”
Along with safety, essentially nothing is
private on the Internet
Do not get comfortable on the Internet
Once you post something it
is out there forever
AND
Could come back to
haunt you.
Being cautious about what you post
does not give you the control of what
other people can do with it.
What’s not hurtful or embarrassing can be made
to be hurtful or embarrassing:
People can alter or cut your posts.
Always think ahead:
The information you post online can
alter the decisions of future employers
and college admission staff
Avoid Micro-blogging
The social network small information snowball
effect:
You might think that little random
information you post online can’t hurt you.
This is wrong:
Someone who pays close attention could
create a big picture collecting and putting
together the little information you post.
You wouldn’t let strangers in your town know
when and how long you will be out of town,
leaving your house to possibly be burglarized
The same rule applies for social networks
Think twice, or maybe more when
answering the question: What are you
doing right now?
AT THE END
THE BEST TIP I
COULD GIVE YOU
IS
…
You don’t have to share everything.
There was once a world where people took
pictures and didn’t post them …
Had conversations and didn’t share them …
Go outside. Enjoy life.
Works Cited
• http://firstmonday.org/ojs/index.php/fm/artic
le/view/3075/2581
•
• http://www.mattmckeon.com/facebook-
privacy/
•
• https://www.commonsensemedia.org/blog/s
ocial-networking-tips

More Related Content

What's hot

Connect with Care
Connect with CareConnect with Care
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
Washington Trafficking Prevention
 
heath matters topic 2. planning 10
heath matters topic 2. planning 10heath matters topic 2. planning 10
heath matters topic 2. planning 10Munroe Renouf
 
Lesson 1 - How to set up a blog
Lesson 1 -  How to set up a blogLesson 1 -  How to set up a blog
Lesson 1 - How to set up a blog
Seth dickens
 
Your e identity and social media etiquette for xcite
Your e identity and social media etiquette for xciteYour e identity and social media etiquette for xcite
Your e identity and social media etiquette for xcite
Sarah Jones
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
FiolaManabat
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquetteCarla Ferreira
 
What is social media and what could it do for me?
What is social media and what could it do for me?What is social media and what could it do for me?
What is social media and what could it do for me?
Bryony Taylor
 
The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)
Lauren McSwain-Starrett
 
2016 Social Media & Networking for University Students: Study Abroad & Intern...
2016 Social Media & Networking for University Students: Study Abroad & Intern...2016 Social Media & Networking for University Students: Study Abroad & Intern...
2016 Social Media & Networking for University Students: Study Abroad & Intern...
Renée Tentori
 
Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media Etiquette
Paul Maynard
 
Who are you online using social media ?
Who are you online using social media ?Who are you online using social media ?
Who are you online using social media ?
The KittyRose LyfeStyle
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Parenting & Education
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
Jamie Edmondson
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
Muneendra Rasamsetty
 
Social media advice
Social media advice Social media advice
Social media advice
madelynewatkins
 

What's hot (20)

Connect with Care
Connect with CareConnect with Care
Connect with Care
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
heath matters topic 2. planning 10
heath matters topic 2. planning 10heath matters topic 2. planning 10
heath matters topic 2. planning 10
 
Lesson 1 - How to set up a blog
Lesson 1 -  How to set up a blogLesson 1 -  How to set up a blog
Lesson 1 - How to set up a blog
 
Project
ProjectProject
Project
 
Your e identity and social media etiquette for xcite
Your e identity and social media etiquette for xciteYour e identity and social media etiquette for xcite
Your e identity and social media etiquette for xcite
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
What is social media and what could it do for me?
What is social media and what could it do for me?What is social media and what could it do for me?
What is social media and what could it do for me?
 
Final blog post
Final blog postFinal blog post
Final blog post
 
The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)
 
2016 Social Media & Networking for University Students: Study Abroad & Intern...
2016 Social Media & Networking for University Students: Study Abroad & Intern...2016 Social Media & Networking for University Students: Study Abroad & Intern...
2016 Social Media & Networking for University Students: Study Abroad & Intern...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media Etiquette
 
Who are you online using social media ?
Who are you online using social media ?Who are you online using social media ?
Who are you online using social media ?
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Social media advice
Social media advice Social media advice
Social media advice
 

Similar to Socialmediatips

Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
Crackerjack Marketing
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
Dee Tutino
 
How to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsHow to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College Students
Logan Boggs
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
Dee Tutino
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
Techno World 4 U
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
MentorIT
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
MsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
MsCCostello
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
MsCCostello
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
MsCCostello
 
Heads up!
Heads up!Heads up!
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintMike Fisher
 

Similar to Socialmediatips (20)

Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
How to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsHow to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College Students
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
social networking
social networkingsocial networking
social networking
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Heads up!
Heads up!Heads up!
Heads up!
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Socialmediatips

  • 1. Social Media Security Tips By Suad Hassan
  • 2. TIP NUMBER 1: STAY AS FAR AWAY AS YOU CAN FROM SOIAL NETWORKS
  • 3.
  • 4.
  • 5. NO? OKAY, AT LEAST LET ME HELP YOU BE SAFE WHILE YOU ARE ONLINE.
  • 6. AS WELL AS OFFLINE. - BECAUSE WHAT HAPPENS ONLINE DOESN’T ALWAYS STAY ONLINE.
  • 7.
  • 8. “In order to become social, we must give up some of our private time and space, so as to share it with others.”
  • 9. Opening up and sharing information with “friends” doesn’t mean full disclosure. You want to protect yourself from identity theft as well as physical harm
  • 10.
  • 11. The basic information that shouldn’t be circling the web: Social security number Your birthday Your home address
  • 12. BUT There are other kinds of information that you may think cant do any harm but could get someone access to that information.
  • 13. SECURE YOUR PRIVACY Get very acquainted with your private settings. FROM THE BEGINNING
  • 14. You can’t trust default private setting on social networking sites to protect you
  • 15. Today on Facebook the default privacy setting shares with everyone your: Name Wall posts Birthday Friends Extended Profile Data Photos Gender Contact Info Networks Likes
  • 16. A helpful way of finding out what information is available to the general public is to search your name on Google.
  • 17. “When we engage in communication there is an expectation of privacy--we assume the information will not go beyond the person with whom we’re talking.”
  • 18. Along with safety, essentially nothing is private on the Internet
  • 19. Do not get comfortable on the Internet
  • 20. Once you post something it is out there forever AND Could come back to haunt you.
  • 21. Being cautious about what you post does not give you the control of what other people can do with it.
  • 22. What’s not hurtful or embarrassing can be made to be hurtful or embarrassing: People can alter or cut your posts.
  • 23. Always think ahead: The information you post online can alter the decisions of future employers and college admission staff
  • 25. The social network small information snowball effect: You might think that little random information you post online can’t hurt you.
  • 26. This is wrong: Someone who pays close attention could create a big picture collecting and putting together the little information you post.
  • 27. You wouldn’t let strangers in your town know when and how long you will be out of town, leaving your house to possibly be burglarized
  • 28. The same rule applies for social networks Think twice, or maybe more when answering the question: What are you doing right now?
  • 29. AT THE END THE BEST TIP I COULD GIVE YOU IS …
  • 30. You don’t have to share everything. There was once a world where people took pictures and didn’t post them … Had conversations and didn’t share them … Go outside. Enjoy life.
  • 31. Works Cited • http://firstmonday.org/ojs/index.php/fm/artic le/view/3075/2581 • • http://www.mattmckeon.com/facebook- privacy/ • • https://www.commonsensemedia.org/blog/s ocial-networking-tips