SlideShare a Scribd company logo
1 of 17
commercial
Digital footprints
Digital Footprints
Benefits
• Don’t have to repeatedly log in
• Submit personal details
Cost
• Which websites you frequent
• What things you search for
• Who is in your social circle
Commercial Purposes
 Track you
 Customize for you
 Market to you
Three ways to manage and
control
1. Improve your
understanding
of basic issues
2. Develop “basic
hygiene” habits
1. Use privacy
tools
Understanding the basics
everything shared on the Internet
being a privacy risk to some degree
Develop your 'basic hygiene”
habits.
keep different parts of your
digital footprint separate
Use Privacy Settings
default settings for browsers, devices and
apps are set to disclose,
rather than secure, your personal data
Define
terms
Virus a self-replicating program that
is designed to infect a
computer
Malware
intentionally malicious
software or code
Spam
unsolicited email or junk mail
Define terms
Clickjackingtechnique that tricks users into
clicking on a malicious link
Mousetrapping
keeps visitors from leaving a website b
locking them into a window,
opening multiple windows
on the desktop, or relaunching their
website in a window that can't be clos
Define terms
Sockpuppet a fake identify
Troll a person who posts comments just
to get a rise out of people
Flame Warinsulting comments and
personal attacks
are focus of conversation
FlamebaitA comment posted by
someone trying to provoke a
flame
Teens online
•Creating a hate group about someone.
•Posting mean comments online.
•Photoshopping someone’s photo to
embarrass them.
•Recording and posting fight videos.
•Spreading rumors and gossip through
text messages.
•Stealing someone’s identity to create a
fake profile

More Related Content

What's hot

Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber securitybrn8brwn
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1Arbab Usmani
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 

What's hot (20)

Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
spyware
spywarespyware
spyware
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Internet security
Internet securityInternet security
Internet security
 
C 7
C 7C 7
C 7
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security
Cyber securityCyber security
Cyber security
 
spyware
spyware spyware
spyware
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 

Similar to Digital Footprints: Manage and Control Your Online Presence

CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Things Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingThings Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingKiwasoft Technologies
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxafiyashaikh25
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Being online
Being onlineBeing online
Being onlinehpinn
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldExpeed Software
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 

Similar to Digital Footprints: Manage and Control Your Online Presence (20)

CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Things Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingThings Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You Realizing
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Being online
Being onlineBeing online
Being online
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 

More from Jennifer Tecla

Discovering mercy and forgiveness links
Discovering mercy and forgiveness linksDiscovering mercy and forgiveness links
Discovering mercy and forgiveness linksJennifer Tecla
 
Online safety for teens
Online safety for teensOnline safety for teens
Online safety for teensJennifer Tecla
 
Online safety for tweens
Online safety for tweensOnline safety for tweens
Online safety for tweensJennifer Tecla
 
Movies todays parables
Movies todays parablesMovies todays parables
Movies todays parablesJennifer Tecla
 
Social media top 5 sites
Social media top 5 sitesSocial media top 5 sites
Social media top 5 sitesJennifer Tecla
 
Navigating Today's Media (Media literacy workshop)
Navigating Today's Media (Media literacy workshop)Navigating Today's Media (Media literacy workshop)
Navigating Today's Media (Media literacy workshop)Jennifer Tecla
 
Think media talk junior high 1
Think media talk junior high 1Think media talk junior high 1
Think media talk junior high 1Jennifer Tecla
 
J club evangelization encounter1
J club evangelization encounter1J club evangelization encounter1
J club evangelization encounter1Jennifer Tecla
 
Pop culture & media mindfulness1
Pop culture & media mindfulness1Pop culture & media mindfulness1
Pop culture & media mindfulness1Jennifer Tecla
 

More from Jennifer Tecla (9)

Discovering mercy and forgiveness links
Discovering mercy and forgiveness linksDiscovering mercy and forgiveness links
Discovering mercy and forgiveness links
 
Online safety for teens
Online safety for teensOnline safety for teens
Online safety for teens
 
Online safety for tweens
Online safety for tweensOnline safety for tweens
Online safety for tweens
 
Movies todays parables
Movies todays parablesMovies todays parables
Movies todays parables
 
Social media top 5 sites
Social media top 5 sitesSocial media top 5 sites
Social media top 5 sites
 
Navigating Today's Media (Media literacy workshop)
Navigating Today's Media (Media literacy workshop)Navigating Today's Media (Media literacy workshop)
Navigating Today's Media (Media literacy workshop)
 
Think media talk junior high 1
Think media talk junior high 1Think media talk junior high 1
Think media talk junior high 1
 
J club evangelization encounter1
J club evangelization encounter1J club evangelization encounter1
J club evangelization encounter1
 
Pop culture & media mindfulness1
Pop culture & media mindfulness1Pop culture & media mindfulness1
Pop culture & media mindfulness1
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Digital Footprints: Manage and Control Your Online Presence

  • 1.
  • 4. Digital Footprints Benefits • Don’t have to repeatedly log in • Submit personal details Cost • Which websites you frequent • What things you search for • Who is in your social circle
  • 5. Commercial Purposes  Track you  Customize for you  Market to you
  • 6. Three ways to manage and control 1. Improve your understanding of basic issues 2. Develop “basic hygiene” habits 1. Use privacy tools
  • 7. Understanding the basics everything shared on the Internet being a privacy risk to some degree
  • 8. Develop your 'basic hygiene” habits. keep different parts of your digital footprint separate
  • 9. Use Privacy Settings default settings for browsers, devices and apps are set to disclose, rather than secure, your personal data
  • 10. Define terms Virus a self-replicating program that is designed to infect a computer Malware intentionally malicious software or code Spam unsolicited email or junk mail
  • 11. Define terms Clickjackingtechnique that tricks users into clicking on a malicious link Mousetrapping keeps visitors from leaving a website b locking them into a window, opening multiple windows on the desktop, or relaunching their website in a window that can't be clos
  • 12. Define terms Sockpuppet a fake identify Troll a person who posts comments just to get a rise out of people Flame Warinsulting comments and personal attacks are focus of conversation FlamebaitA comment posted by someone trying to provoke a flame
  • 14.
  • 15.
  • 16.
  • 17. •Creating a hate group about someone. •Posting mean comments online. •Photoshopping someone’s photo to embarrass them. •Recording and posting fight videos. •Spreading rumors and gossip through text messages. •Stealing someone’s identity to create a fake profile

Editor's Notes

  1. Commercial MT Internet Baby https://www.youtube.com/watch?v=rg37kafMsWk
  2. Digital footprints are the records and traces we leave behind us as we use the Internet. Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most of us contribute to a growing portrait of who we are online; a portrait that is probably more public than we assume. This portrait helps companies target content at specific markets and consumers, helps employers look into your background, and helps advertisers track your movements across multiple websites. Whatever you do online, you might be leaving digital footprints behind. So no matter what you do online it’s important that you know what kind of trail you’re leaving, and what the possible effects can be.  While it's not possible to have ZERO footprints, the first steps toward reducing your digital footprint and managing your digital identity are not that hard.
  3. Your own digital footprint may contribute to your online reputation. Your digital footprint can mean you don't have to repeatedly log in or submit personal details to web sites. On the other hand, your digital footprints may allow others to follow your actions, such as which web sites you use, what things you search for, and who is in your social circle. Our digital footprints are visible to organizations with whom we have no relationship, and over whom we often have no control. Many organizations also work behind the scenes to build profiles about us based on our digital footprints.
  4. Your digital footprints are bigger than you may have thought, and they are being used - usually for commercial purposes, but sometimes for other reasons - to track you, customize for you, and market to you. These activities are primarily for the benefit of the organisation concerned. In short, your digital footprint is a monetizable asset... but any direct gain does not usually come to you, the individual.
  5. There are four levels at which you can choose to manage and control your digital footprints. First. Improve your understanding of the basic issues. Second. Develop your “basic hygiene” habits. Third . Become a sophisticated user of your online tools and services. And, fourth. Find and use specific privacy-enhancing tools. Before we can learn how to protect ourselves, we need to understand what the threats are on the Internet.
  6. Think about the implications of everything shared on the Internet being a privacy risk to some degree. Most people are aware that when they share information about themselves on the Internet, such as with social networking services, and when they use on-line services, such as email, instant messaging, or voice calling, they have given up some control over their privacy. This loss of control is frequently the result of explicit acts: making a Skype call, sharing something on Facebook, uploading pictures to Tumblr, sending an email to a Hotmail user. We may expect some privacy, but we know we’ve given something up, and we’ve left a clear imprint at each of these individual services.
  7. Privacy is a contextual thing. If you use different “personas” for different aspects of your online life – whether that's one email address for work and another for home, or a one credit card for online shopping and another for everything else – it will help keep different parts of your digital footprint separate. Be mindful about what you share via social sites and elsewhere, because that data is probably more public and persistent than you might anticipate.
  8. Very often, the default settings for browsers, devices and apps are set to disclose, rather than secure, your personal data. It's worth taking the time to investigate those settings and make sure you're comfortable with them, just like it's worth checking whether you latched the windows before you left the house. When an application asks for “permission to send you push notifications and use your location data”, take a moment to reflect on whether that's really what you want. Your camera and smartphone usually record the time and location in each photo you take, and when you share those photos, you may be publishing that data unless you specifically block it. Once you’ve shared anything, in almost any context, you lose the ability to “un- share” it. And once you’ve visited a web site or created an account, you may lose the ability to erase your footprints. Internet users also need to understand that a desire for privacy creates a conflict with many service providers, such as social networks.
  9. A virus is a self-replicating program that is designed to infect a computer by rapidly spreading from one file to another, sometimes causing great harm. *Worms are similar, except they are usually spread over a network without human help. Malware is intentionally malicious software or code that is designed to damage your computer or collect information without your knowledge. Spam is unsolicited email or junk mail. Sometimes, it comes from legitimate companies, but it can also be used for scams, phishing, and malware.
  10. Clickjacking is a technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page. Users think they are clicking on buttons or links in the legitimate page, when in reality they are clicking on the concealed links in the hidden page and often providing access to confidential information in the process. Mousetrapping keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or relaunching their website in a window that can't be closed.
  11. A sockpuppet is a fake identify that someone creates and uses to deceive others for some kind of personal gain. On most websites it is possible to have more than one account, so it is easy to create sockpuppets. For example, John could have a few online identities for the same chat service: John45, Sarah03, and HarmonicasRock12. When he is HarmonicasRock12, he might pretend to be a 30-year-old music enthusiast to find out what music stores you go to. And when he is Sarah03, he might pretend to be a 20-year old college student to find out where you went to college. A troll is a person who posts comments just to get a rise out of people and cause a distraction. Trolls might say something rude, assert incorrect information, or ask questions unrelated to the topic at hand. People who respond to obvious trolling posts are said to be feeding the trolls, which often causes the trolls to return and continue disrupting the discussion. A flame war is a heated argument in a social media outlet such as a web forum, mailing list or chat room, in which intentionally insulting comments and personal attacks become a focus of conversation. A comment posted by someone trying to provoke a flame, or an angry response, is called flamebait. If anyone responds to the comment, they are said to have taken the bait.
  12. CNN study #being13 https://www.youtube.com/watch?v=t-9LtTtkg04
  13. Sexting is one way that some teens share inappropriate information. Sexting is the sharing of nude or suggestive pictures and videos through text messages. Although only 4% of teens are sexting, stories about it have been all over the news. 13 You may even know people who have been asked to do it. Teens who get involved with sexting are usually: Joking around with friends. In a relationship, where a girlfriend or boyfriend asks for a photo. Flirting or trying to impress a crush. Getting a request to sext might make you feel: Flattered, because it means that someone thinks you’re attractive. Angry, because someone is asking you for something so private. Pressured, especially if it comes from a boyfriend, girlfriend or crush.
  14. News clips about 16yr old life changed because of sexting
  15. In groups talk about what things could happen if you decide to take a revealing image of yourself? The girl in the video thinks that only her boyfriend will see the image. But she soon learns that once you share an image, it is out of your control. One study estimated that 88% of the self-made sexual or suggestive images that teens post online are re-posted to adult websites.14 If you take a revealing image of yourself: It could be lost if you misplace or lose your cell phone. It may be passed around without your permission. For example, an ex-boyfriend or girlfriend may share the sext to get revenge. People may bully or judge you because of the image. Some teens have been bullied so badly because of sexting images that they have been afraid to go to school. The person that receives the image might try to use it to blackmail you into sending more images. You may get in trouble with your school or with law enforcement, especially if there is evidence of blackmail, bullying or forwarding without permission. Some teens have been suspended from class, sports teams and other activities. Others have been charged with a crime and had to complete community service or educational programs. Examples from the News Sixteen KY students were suspended and banned from their school’s homecoming dance after nude photos were found on their cell phones.15 Three WA teens who got in trouble for forwarding the nude photo of a classmate had to complete community service, apologize to their classmate and start a program at their school to educate their peers about the dangers of texting.16 A 16-year-old GA teen was suspended for six days after tweeting a revealing photo that a classmate posted to his Facebook page. The school suspended him on a bullying violation.17
  16. The last risk that we are going to discuss is one that many of you are probably aware of – cyberbullying. Cyberbullying is the use of technology to harass someone. Some examples are: Creating a hate group about someone. Posting mean comments online. Photoshopping someone’s photo to embarrass them. Recording and posting fight videos. Spreading rumors and gossip through text messages. Stealing someone’s identity to create a fake profile. Some of these things may seem more like jokes or pranks than bullying to you. But even if you did not intend to hurt someone’s feelings, it can still be cyberbullying.