SlideShare una empresa de Scribd logo
1 de 11
By John Curry
Firewalls A firewall filters information through connection via hardware or software. Information gets flagged and will not pass through firewall. Proper configuration is crucial because if it isn’t, it is basically useless.
Cookies Cookies are a piece of text format information that a website embeds into your computer as a file to navigate more efficiently next time you visit that website. But this creates files and records of your activities, websites Ordering, anything you have done on the computer. Personal data is stored on both ends and both are susceptible to personal information falling into the wrong hands.
Privacy Policies A reliable website is responsible for making the privacy policies easy to access and recognize their own agreements.  The policy should inform you about the use of information collected by that website and what the intentions are the company. As the consumer you have an option to either share that info with third parties or “op-out” which restricts the release of your personal info.
E Mail Email has quickened chain letters, sharing of videos, gossip, and maybe even water cooler talk about your boss. But did you know if all that was through a corporate or company account for you, they have a right to access that information. To ensure your privacy you can create a separate email account using a number of free hosting servers. Msn, Yahoo, Or search Google and you can find a number of options for free email options.
What To Look For Better Business Bureau and TrustE provide a seal of approval on select websites that are affiliated with a reputable company. When you see either of these you don’t have to worry about spam or any privacy violations. Truste is non profit to build consumer trust, these companies offer third party verification and monitor information.
Kids & Internet Many children have access to a computer either at home or school or even a friends house. Following trends as most do websites for public use creates a very friendly and sharing environment , allowing people to share their information. Children fall prey too easy useless supervised or at least run through situations with their parents making them aware of the dangers. Children Under 13 Should Always Ask Permission To Release Any Personal Info.
Software & Hardware ,[object Object],[object Object],[object Object],[object Object],[object Object]
Facebook & Myspace  Websites such as these create a friendly networking environment if set properly. To ensure no one is getting your personal information settings should be changed according to what you want. Many people have the world checking out what they look like , who their friend Dennis is and where they live…. Enable the settings to allow someone to view your site that you know is looking at it. Just be careful.
Privacy Tips Checking the authenticity of a website by checking the domain name at  www.domainwatch.com  , this will provide all info about that specific company. Clearing all history once you are done using the computer, especially if it is a communal computer and you have just used personal info while you were using it. Disabling the cookies removes traces of what and where you did during your session online. Always look for a privacy policy or a seal of approval from one of the preceding companies I had mentioned before.
Resources Privacy Guide :  www.privacy.gov.au www.domainwatch.com www.consumerprivacyguide.com www.howstuffworks.com

Más contenido relacionado

La actualidad más candente

Internet Safety
Internet SafetyInternet Safety
Internet Safety
Nani Owen
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
ankitgadgil
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
Jennifer Whitt
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Final%20 presentation
Final%20 presentationFinal%20 presentation
Final%20 presentation
Puravida925
 

La actualidad más candente (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Final%20 presentation
Final%20 presentationFinal%20 presentation
Final%20 presentation
 

Destacado

Jenny Natalie Garden Design
Jenny  Natalie Garden DesignJenny  Natalie Garden Design
Jenny Natalie Garden Design
epgroup
 
FAFSA Completion Presentation - 2009
FAFSA Completion Presentation - 2009FAFSA Completion Presentation - 2009
FAFSA Completion Presentation - 2009
bradleyuniversity
 
Vichinghi Su Power Point
Vichinghi Su Power PointVichinghi Su Power Point
Vichinghi Su Power Point
guest7ec778
 

Destacado (18)

Freedom 2030
Freedom 2030Freedom 2030
Freedom 2030
 
Searching the Web for Your Next Job
Searching the Web for Your Next JobSearching the Web for Your Next Job
Searching the Web for Your Next Job
 
Jenny Natalie Garden Design
Jenny  Natalie Garden DesignJenny  Natalie Garden Design
Jenny Natalie Garden Design
 
Sant Antoni In Artà
Sant Antoni In ArtàSant Antoni In Artà
Sant Antoni In Artà
 
Sermon gratitude equation nov 3 2013
Sermon gratitude equation nov 3 2013Sermon gratitude equation nov 3 2013
Sermon gratitude equation nov 3 2013
 
Profitably Introduction for Accountants
Profitably Introduction for AccountantsProfitably Introduction for Accountants
Profitably Introduction for Accountants
 
Chinese New Year by Kimberly Yong
Chinese New Year by Kimberly YongChinese New Year by Kimberly Yong
Chinese New Year by Kimberly Yong
 
FAFSA Completion Presentation - 2009
FAFSA Completion Presentation - 2009FAFSA Completion Presentation - 2009
FAFSA Completion Presentation - 2009
 
Moving Off-Campus
Moving Off-CampusMoving Off-Campus
Moving Off-Campus
 
Sermon extreme makeover dec_2 2012
Sermon extreme makeover dec_2 2012Sermon extreme makeover dec_2 2012
Sermon extreme makeover dec_2 2012
 
Sermon from perdition to pardon dec15 2013
Sermon from perdition to pardon dec15 2013Sermon from perdition to pardon dec15 2013
Sermon from perdition to pardon dec15 2013
 
Sermon incredible truth march 3 2013 sermon
Sermon incredible truth march 3 2013 sermonSermon incredible truth march 3 2013 sermon
Sermon incredible truth march 3 2013 sermon
 
Sermon i love you terms and conditions march 18 2013
Sermon i love you terms and conditions march 18 2013Sermon i love you terms and conditions march 18 2013
Sermon i love you terms and conditions march 18 2013
 
Azure DocumentDB: Advanced Features for Large Scale-Apps
Azure DocumentDB: Advanced Features for Large Scale-AppsAzure DocumentDB: Advanced Features for Large Scale-Apps
Azure DocumentDB: Advanced Features for Large Scale-Apps
 
Vichinghi Su Power Point
Vichinghi Su Power PointVichinghi Su Power Point
Vichinghi Su Power Point
 
[PASS Summit 2016] Azure DocumentDB: A Deep Dive into Advanced Features
[PASS Summit 2016] Azure DocumentDB: A Deep Dive into Advanced Features[PASS Summit 2016] Azure DocumentDB: A Deep Dive into Advanced Features
[PASS Summit 2016] Azure DocumentDB: A Deep Dive into Advanced Features
 
Aprender a-dibujar
Aprender a-dibujarAprender a-dibujar
Aprender a-dibujar
 
[PASS Summit 2016] Blazing Fast, Planet-Scale Customer Scenarios with Azure D...
[PASS Summit 2016] Blazing Fast, Planet-Scale Customer Scenarios with Azure D...[PASS Summit 2016] Blazing Fast, Planet-Scale Customer Scenarios with Azure D...
[PASS Summit 2016] Blazing Fast, Planet-Scale Customer Scenarios with Azure D...
 

Similar a Privacy Online

Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
mafer23
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
lilyanariz
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 

Similar a Privacy Online (20)

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Protect
ProtectProtect
Protect
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Mozilla privacy policy
Mozilla privacy policyMozilla privacy policy
Mozilla privacy policy
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Do not track me
Do not track meDo not track me
Do not track me
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Privacy Online

  • 2. Firewalls A firewall filters information through connection via hardware or software. Information gets flagged and will not pass through firewall. Proper configuration is crucial because if it isn’t, it is basically useless.
  • 3. Cookies Cookies are a piece of text format information that a website embeds into your computer as a file to navigate more efficiently next time you visit that website. But this creates files and records of your activities, websites Ordering, anything you have done on the computer. Personal data is stored on both ends and both are susceptible to personal information falling into the wrong hands.
  • 4. Privacy Policies A reliable website is responsible for making the privacy policies easy to access and recognize their own agreements. The policy should inform you about the use of information collected by that website and what the intentions are the company. As the consumer you have an option to either share that info with third parties or “op-out” which restricts the release of your personal info.
  • 5. E Mail Email has quickened chain letters, sharing of videos, gossip, and maybe even water cooler talk about your boss. But did you know if all that was through a corporate or company account for you, they have a right to access that information. To ensure your privacy you can create a separate email account using a number of free hosting servers. Msn, Yahoo, Or search Google and you can find a number of options for free email options.
  • 6. What To Look For Better Business Bureau and TrustE provide a seal of approval on select websites that are affiliated with a reputable company. When you see either of these you don’t have to worry about spam or any privacy violations. Truste is non profit to build consumer trust, these companies offer third party verification and monitor information.
  • 7. Kids & Internet Many children have access to a computer either at home or school or even a friends house. Following trends as most do websites for public use creates a very friendly and sharing environment , allowing people to share their information. Children fall prey too easy useless supervised or at least run through situations with their parents making them aware of the dangers. Children Under 13 Should Always Ask Permission To Release Any Personal Info.
  • 8.
  • 9. Facebook & Myspace Websites such as these create a friendly networking environment if set properly. To ensure no one is getting your personal information settings should be changed according to what you want. Many people have the world checking out what they look like , who their friend Dennis is and where they live…. Enable the settings to allow someone to view your site that you know is looking at it. Just be careful.
  • 10. Privacy Tips Checking the authenticity of a website by checking the domain name at www.domainwatch.com , this will provide all info about that specific company. Clearing all history once you are done using the computer, especially if it is a communal computer and you have just used personal info while you were using it. Disabling the cookies removes traces of what and where you did during your session online. Always look for a privacy policy or a seal of approval from one of the preceding companies I had mentioned before.
  • 11. Resources Privacy Guide : www.privacy.gov.au www.domainwatch.com www.consumerprivacyguide.com www.howstuffworks.com