SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
Teen Privacy Online

   Social Networking, Privacy Policies
   and Security Risks: How to protect
   your personal information online.
Brought to you by . . .




   Intel and the International Association of Privacy Professionals
   proudly join in the celebration of Data Privacy Day 2008. We
   encourage all students to learn as much as possible about how to
   use the Internet and its many communication and ecommerce
   tools as safely as possible in ways that protect the privacy of your
   personal information.



                                                                          2
Online Privacy for Teens
   Online Privacy: Why It is
   Important
   Social Networking
       You Can’t Get Something for
       Nothing
       Know the Basics: Disclosure
       of Personal Information and
       Networking Behavior
       It Isn’t All About Common
       Sense
       Think About Tomorrow
       When You Act Today
   Privacy Policies and How to
   Read Them
   Security Risks
   Sources and Resources



                                     3
Online Privacy: Why It’s Important

                      Teens and young adults
                      among most knowledgeable
                      and creative users of the
                      Internet
                      Personal Information (PII)
                         Name, address, phone
                         numbers, birth date,
                         social security number,
                         credit card numbers,
                         photos, shopping
                         history
                      Technology Increases Risk of
                      Inadvertent Sharing



                                                     4
Data Privacy Day 2008

                  28 January 2008
                  United States and 27
                  European countries
                  celebrating Data
                  Privacy Day
                  Raising awareness
                  about data privacy,
                  protection of
                  personal information,
                  and online safety

                                          5
Privacy: What Is it?

   Privacy is the right or opportunity to decide
   who has access to your personal information
   and how that information should be used.
   Knowledge is power.
   When you go online, KNOW:
     Who has access to your personal information?
     How will your information be used?
     Is that okay with you?



                                                    6
Social Networking




                    7
Social Networking: What Is It?

   Facebook, MySpace, Friendster, and
   other social networking sites
   Creating personal profiles
   Interacting with other people online
   You can interact with school friends,
   people from your city, people you work
   with, people from your region, people in
   a particular “network,” or people all over
   the world

                                                8
Data Protection and Privacy in
Social Networks: The Main Ideas
   You usually can’t get
   something for nothing
   Know the Basics:
   Disclosure of Personal
   Information and
   Networking Behavior
   It isn’t all about common
   sense
   Think about tomorrow
   when you are acting
   today


                                  9
You Can’t Get Something for
Nothing: The Cost of Networking
 You can participate in many social
  networks for free. BUT . . .
  you must provide personal information to
  participate.
  Who can benefit from that information?
  How do they use your information?
  How can you protect your privacy?


                                             10
Who can benefit from your Personal
Information?
   Web Site Operators
     Make money by advertising. The more users they
     attract, the bigger the audience, the more valuable
     the ad space, the greater the ad revenue.
   Companies that want to sell you things
     Want to advertise and sell you their products
     Want to know about you and your brand loyalties,
     preferences and interests
     May want to track and tell your “friends” about items
     you purchase as another form of advertising

                                                           11
Who Else Could Access your
Personal Information?
   Colleges
     May want to know more about you than just your
     grades and test scores. Your profile may be a
     good resource.
   Current and Future Employers
     May want to know what kind of person you really
     are – beyond your resume and interview.
   Parents
   Sexual predators and pedophiles


                                                       12
Know the Basics

  Disclosure of Personal Information
  and Social Networking Behavior
Basic Guidelines for disclosure of
personally identifiable information:
   Be sparing with
   personal
   information. If you
   network socially,
   provide only that
   information you need
   to provide to network
   effectively.



                                       14
Basic Guidelines for disclosure of
personally identifiable information
   If you have a username, avoid including your
   actual name or birth date. Never share your
   password with anyone.
   In a profile, generally speaking, do not provide
   your last name, your phone numbers, home
   address, date of birth, school or team name, or
   travel plans. Do not provide your social
   security number, family financial information,
   bank or credit card numbers.


                                                  15
Exceptions to basic guidelines:

   Birth Date: You may be required to provide
   your birth date to sign up for a social network
   or other online service because federal law
   prohibits the collection of information from
   children under 13 years old.
   Arrange your privacy settings so the birth date
   is not visible on your profile. If you want to
   display your birthday, show the day of the
   month but not your birth year.


                                                     16
Exceptions to basic guidelines:

   School Name: Although you generally
   should not provide your school name
   online, some sites feature school-specific
   networks, and the name of the network
   will reveal your school online.
   Limiting your social networking participation to
     a school group, as opposed to the world at
     large, may provide an extra degree of
     protection and privacy for you.

                                                  17
Back to the Basics:
   Use Privacy Settings!
      Only share the
      information you are
      comfortable sharing.
      Limit your audience.

   Default settings usually
   allow sharing. Take
   affirmative steps to limit
   disclosure.



                                18
Adjusting privacy settings can be a
multi-step process:
   Access the Privacy Settings page on the
   social network of your choice and learn
   how to protect the privacy of your
   information.
   Some sites offer you the ability to set
   different privacy settings for different
   parts of your profile page.


                                              19
Privacy Settings are not Foolproof

   Maintaining privacy requires diligence and
   maintenance.
   Learn about the privacy settings of each site
   you use. If you don’t understand the options,
   contact the site and ask.
   Regardless of the settings you use, privacy
   settings are not foolproof. You should always
   continue to be cautious about information
   about yourself you place online regardless of
   how restricted you believe your audience is.

                                                   20
Basics of On-line Social Networking
Behavior: The Number One Rule
   Unless you would be willing to attach
   something to a college application or
   resume, share it with your parents, your
   grandparents, current or future
   employers, don’t post it. If you wouldn’t
   put it on a poster and hang it on your
   locker or your dorm room door, don’t
   post it.

                                               21
Basics of Behavior (cont.): Blogging,
Journals, The Wall
   When you journal or blog online, these entries are
   archived, or saved, and the content of these entries
   can be searched.
      Some blogging sites offer you the ability to choose which
      subscribers can see what you have written, and some allow
      you to block any anonymous replies.
   Think about why and how you are using your profile
   page. If you are blogging about your daily activities or
   your social life, be extremely cautious what personal
   information you provide about yourself and others in
   those contexts.



                                                                  22
Basics of Behavior (cont.):
“Friends”
   Don’t invite people to be
   your friends on-line if
   you do not know them in
   the real world.
   If you must accept a
   “friend” that you do not
   know, do so cautiously,
   recognizing that often
   people are not who they
   claim to be.



                               23
Basics of Behavior (cont): Photos

   Do not post images of yourself that you
   wouldn’t want to share with grandparents,
   colleges, and future employers.
   Don’t post images of other people that they
   wouldn’t post of themselves.
   If possible, ask permission before posting
   an image of someone else on your site.
   Always honor any individual’s request to
   remove a specific photo of him or her from
   your page.

                                                 24
Basics of Behavior (cont.):
Avoiding Risky Behavior
   Sex -- Just don’t
   talk about it on the
   Internet, particularly
   with people you do
   not know.

   Never agree to meet
   someone in person
   that you “met” on the
   Internet.

                              25
Other Ways to Protect your Privacy

   Use services with age and identity
   verification systems
   Use services that allow you to report
   inappropriate content
   Look for sites with privacy seals like
   TRUSTe and the Better Business
   Bureau


                                            26
More Ways to Protect your Privacy

   Talk with a parent, older sibling, or other adult
   you trust about your Internet use.
   Educate your parents about technologies that
   are new to them.
   Check out any safety tips provided by the site
   you are using. Use online resources to find
   additional safety and privacy information.
   ALWAYS KNOW how your information is
   being used and stored by others.

                                                       27
It’s not just common sense.
                    “Don’t get in a car with
                    someone you don’t
                    know.”
                    “Don’t open your door to
                    a stranger.”
                    But . . . Don’t talk to
                    strangers? Isn’t that the
                    whole point for some
                    users?
                    Common sense only
                    takes you so far. Some
                    technological
                    understanding is helpful.


                                                28
Caching

  If you put something on the Internet, it is
  difficult if not impossible to take it back.
  Search engines and browsers cache
  websites, allowing photos, videos and
  text to be retrieved long after the website
  has been deleted.




                                                 29
Caching and Public Computers
  Caching also raises issues
  you should be aware of when
  you use computers in public
  libraries or other public
  spaces.

  Web browsers cache sites
  that you have visited.

  Web browsers can also
  cache temporary internet
  files, cookies, info that you
  enter into websites and
  address bars as well as
  passwords.



                                  30
Think About Tomorrow When You
are Acting Today
   Do you know how much money it
   costs to remove a tattoo? Hundreds
   or thousands of dollars, depending
   on the size and quality of the tattoo.

   This doesn’t mean you should never
   get a tattoo – it just means you
   should be well aware of the costs
   and consequences associated with
   making such a decision, now and in
   the future, before you do it.

   Social networking and blogging
   online are the same –
       information and images can be
       extremely difficult if not impossible
       to take back. Even when you
       delete information from your profile
       or site, older versions are still
       accessible to others.



                                               31
Think About Tomorrow (cont.)

   Do not jeopardize the privacy of others.
     Treat others the way you would want to be
     treated online.
     Respect the privacy and personal
     information of others.
     Don’t identify others on your page in a way
     they would not identify themselves or post
     photos they would not post.


                                                   32
Privacy Policies

                   Many websites have
                   privacy policies or
                   statements.
                   Main function: to
                   describe what
                   personal information
                   they will collect,
                   whether they share
                   it, how they will use
                   it, and how they will
                   secure it.

                                           33
Privacy Policies should provide:
  Notice     Exactly what information they collect
             and how they use it
  Choice     You should be given a choice about
             the collection and use of your
             information
  Access     The ability to access your information
             maintained by the site and the
             opportunity to correct inaccurate
             information
  Security   Reasonable security measures to
             protect your information from loss,
             misuse, or alteration
                                                      34
Privacy Policies (cont.)

   The language can be
   confusing.
   Look for:
     Whether the site will
     sell or share your
     information with
     third parties
     The chance to opt-
     out of practices you
     do not like

                             35
BUT . . . .

   Always keep in mind that a policy is merely a
   policy.
   Because the policy is essentially the measure
   of your rights on the site in which you are
   participating, pay careful attention to the ways
   in which the policy limits the site’s exposure
   and accountability.
   Look for a web seal that lets you know the site
   takes its policy and your privacy seriously.

                                                      36
Recap:

  Find the privacy
  policy and read it.
  But always continue
  to act cautiously
  online with your
  personal information
  regardless of a
  policy’s
  representations.


                         37
Security Risks

   Passwords, File-Sharing, Spyware,
   Phishing and Updating
Protecting your personal
information: Passwords
     Keep your passwords in a secure place.
     Do not share passwords.
     Experts suggest: the strongest passwords have at
     least 8 characters and include numbers and
     symbols as well as letters.
     Do not use your personal information, your login
     name, or adjacent keys on the keyboard as
     passwords.
     Change your password every 90 days or so.
     Use a different password for every online account
     you access (or at least a good variety).


                                                         39
File-sharing software

   Avoid down-loading file-sharing software.
   If you use this software be extremely
   careful about the information you share
   in order to protect your personal
   information.
   Read end user agreements, understand
   whether you are allowing spyware to be
   installed on your machine, and
   understand the risks of free downloads.

                                           40
Spyware
          Spyware is a program
          that can be installed on
          your computer from a
          remote location to steal
          your personal or
          financial information or
          to monitor your online
          transactions to capture
          that information.

          Install antispyware
          software to detect and
          remove these spyware
          programs.

                                     41
Phishing
  A phishing scam is one
  designed to elicit your
  personal information
  (username, password,
  account information) on
  a fake website.
  When you receive a
  suspicious email, do not
  click on a link provided
  and provide personal
  information.



                             42
Phishing Protection


   When you receive a suspicious email, go
   to your browser, contact the company,
   and ask whether it is trying to reach you
   or if there is a problem with your
   account.
   Use anti-phishing software.


                                           43
Automatic Updates

  As a final note, automatically updating
  your computer helps ensure that your
  computer is protected against the latest
  threats.




                                             44
Sources and Resources
 The foregoing information was drawn largely from
   information found in a number of articles and on
   websites concerned about online safety and data
   protection. These sources and resources will provide
   additional, helpful information for you if you are
   interested in learning more about any of the privacy
   issues discussed today.

 Please visit www.privacyassociation.org for a full list of
   sources and resources, along with links to educational
   videos about data protection and online safety.



                                                              45
Sponsors

.




               46
Sponsors




           47
Creative Commons License

This work is licensed under the Creative
  Commons Attribution 3.0 Unported License. To
  view a copy of this license, visit
  http://creativecommons.org/licenses/by/3.0/
Or send a letter to Creative Commons, 171
  Second Street, Suite 300, San Francisco,
  California, 94105, USA.
Any use of these materials requires attribution to
  the IAPP and Intel.

                                                 48
Thank you!




             49

Más contenido relacionado

La actualidad más candente

Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Resourceful Nonprofit
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Social media and the Christian Disciple
Social media and the Christian DiscipleSocial media and the Christian Disciple
Social media and the Christian DiscipleRichard Chamberlain
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
What is social media presentation
What is social media presentationWhat is social media presentation
What is social media presentationmasterterium
 
Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social MediaBaljot Saral
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 

La actualidad más candente (20)

Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 
Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Social media and the Christian Disciple
Social media and the Christian DiscipleSocial media and the Christian Disciple
Social media and the Christian Disciple
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Internet safety
Internet safety Internet safety
Internet safety
 
Social Media
Social MediaSocial Media
Social Media
 
What is social media presentation
What is social media presentationWhat is social media presentation
What is social media presentation
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Social Media: Kids & Teens
Social Media: Kids & TeensSocial Media: Kids & Teens
Social Media: Kids & Teens
 
Privacy Issues in Social Media
Privacy Issues in Social MediaPrivacy Issues in Social Media
Privacy Issues in Social Media
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Social networking
Social networkingSocial networking
Social networking
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 

Destacado

Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
 
Comfort food for all
Comfort food for allComfort food for all
Comfort food for allInfomanjjb
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
 
Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sitesdariphagen
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 

Destacado (6)

Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Comfort food for all
Comfort food for allComfort food for all
Comfort food for all
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sites
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 

Similar a Teen Privacy Online: Social Networking, Privacy Policies and Security Risks

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Digitalrights
DigitalrightsDigitalrights
Digitalrightscdavis12
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipMsCCostello
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipMsCCostello
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@MsCCostello
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
A Privacy Primer
A Privacy PrimerA Privacy Primer
A Privacy PrimerK Covintree
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSIMNchannel
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 

Similar a Teen Privacy Online: Social Networking, Privacy Policies and Security Risks (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Digitalrights
DigitalrightsDigitalrights
Digitalrights
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship@
Digital citizenship@Digital citizenship@
Digital citizenship@
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
A Privacy Primer
A Privacy PrimerA Privacy Primer
A Privacy Primer
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 

Más de tomasztopa

Biznes w 140/160 znakach. Mikroblogowanie.
Biznes w 140/160 znakach. Mikroblogowanie.Biznes w 140/160 znakach. Mikroblogowanie.
Biznes w 140/160 znakach. Mikroblogowanie.tomasztopa
 
Bezpieczenstwo Danych W Firmie
Bezpieczenstwo Danych W FirmieBezpieczenstwo Danych W Firmie
Bezpieczenstwo Danych W Firmietomasztopa
 
Blogi firmowe i eksperckie
Blogi firmowe i eksperckieBlogi firmowe i eksperckie
Blogi firmowe i eksperckietomasztopa
 
OTOZ Animals - schronisko w Dabrowce k. Wejherowa
OTOZ Animals - schronisko w Dabrowce k. WejherowaOTOZ Animals - schronisko w Dabrowce k. Wejherowa
OTOZ Animals - schronisko w Dabrowce k. Wejherowatomasztopa
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
How NOT To Make Presentations
How NOT To Make PresentationsHow NOT To Make Presentations
How NOT To Make Presentationstomasztopa
 
Wizerunek w internecie
Wizerunek w internecieWizerunek w internecie
Wizerunek w internecietomasztopa
 

Más de tomasztopa (7)

Biznes w 140/160 znakach. Mikroblogowanie.
Biznes w 140/160 znakach. Mikroblogowanie.Biznes w 140/160 znakach. Mikroblogowanie.
Biznes w 140/160 znakach. Mikroblogowanie.
 
Bezpieczenstwo Danych W Firmie
Bezpieczenstwo Danych W FirmieBezpieczenstwo Danych W Firmie
Bezpieczenstwo Danych W Firmie
 
Blogi firmowe i eksperckie
Blogi firmowe i eksperckieBlogi firmowe i eksperckie
Blogi firmowe i eksperckie
 
OTOZ Animals - schronisko w Dabrowce k. Wejherowa
OTOZ Animals - schronisko w Dabrowce k. WejherowaOTOZ Animals - schronisko w Dabrowce k. Wejherowa
OTOZ Animals - schronisko w Dabrowce k. Wejherowa
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
How NOT To Make Presentations
How NOT To Make PresentationsHow NOT To Make Presentations
How NOT To Make Presentations
 
Wizerunek w internecie
Wizerunek w internecieWizerunek w internecie
Wizerunek w internecie
 

Último

WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 

Último (20)

WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 

Teen Privacy Online: Social Networking, Privacy Policies and Security Risks

  • 1. Teen Privacy Online Social Networking, Privacy Policies and Security Risks: How to protect your personal information online.
  • 2. Brought to you by . . . Intel and the International Association of Privacy Professionals proudly join in the celebration of Data Privacy Day 2008. We encourage all students to learn as much as possible about how to use the Internet and its many communication and ecommerce tools as safely as possible in ways that protect the privacy of your personal information. 2
  • 3. Online Privacy for Teens Online Privacy: Why It is Important Social Networking You Can’t Get Something for Nothing Know the Basics: Disclosure of Personal Information and Networking Behavior It Isn’t All About Common Sense Think About Tomorrow When You Act Today Privacy Policies and How to Read Them Security Risks Sources and Resources 3
  • 4. Online Privacy: Why It’s Important Teens and young adults among most knowledgeable and creative users of the Internet Personal Information (PII) Name, address, phone numbers, birth date, social security number, credit card numbers, photos, shopping history Technology Increases Risk of Inadvertent Sharing 4
  • 5. Data Privacy Day 2008 28 January 2008 United States and 27 European countries celebrating Data Privacy Day Raising awareness about data privacy, protection of personal information, and online safety 5
  • 6. Privacy: What Is it? Privacy is the right or opportunity to decide who has access to your personal information and how that information should be used. Knowledge is power. When you go online, KNOW: Who has access to your personal information? How will your information be used? Is that okay with you? 6
  • 8. Social Networking: What Is It? Facebook, MySpace, Friendster, and other social networking sites Creating personal profiles Interacting with other people online You can interact with school friends, people from your city, people you work with, people from your region, people in a particular “network,” or people all over the world 8
  • 9. Data Protection and Privacy in Social Networks: The Main Ideas You usually can’t get something for nothing Know the Basics: Disclosure of Personal Information and Networking Behavior It isn’t all about common sense Think about tomorrow when you are acting today 9
  • 10. You Can’t Get Something for Nothing: The Cost of Networking You can participate in many social networks for free. BUT . . . you must provide personal information to participate. Who can benefit from that information? How do they use your information? How can you protect your privacy? 10
  • 11. Who can benefit from your Personal Information? Web Site Operators Make money by advertising. The more users they attract, the bigger the audience, the more valuable the ad space, the greater the ad revenue. Companies that want to sell you things Want to advertise and sell you their products Want to know about you and your brand loyalties, preferences and interests May want to track and tell your “friends” about items you purchase as another form of advertising 11
  • 12. Who Else Could Access your Personal Information? Colleges May want to know more about you than just your grades and test scores. Your profile may be a good resource. Current and Future Employers May want to know what kind of person you really are – beyond your resume and interview. Parents Sexual predators and pedophiles 12
  • 13. Know the Basics Disclosure of Personal Information and Social Networking Behavior
  • 14. Basic Guidelines for disclosure of personally identifiable information: Be sparing with personal information. If you network socially, provide only that information you need to provide to network effectively. 14
  • 15. Basic Guidelines for disclosure of personally identifiable information If you have a username, avoid including your actual name or birth date. Never share your password with anyone. In a profile, generally speaking, do not provide your last name, your phone numbers, home address, date of birth, school or team name, or travel plans. Do not provide your social security number, family financial information, bank or credit card numbers. 15
  • 16. Exceptions to basic guidelines: Birth Date: You may be required to provide your birth date to sign up for a social network or other online service because federal law prohibits the collection of information from children under 13 years old. Arrange your privacy settings so the birth date is not visible on your profile. If you want to display your birthday, show the day of the month but not your birth year. 16
  • 17. Exceptions to basic guidelines: School Name: Although you generally should not provide your school name online, some sites feature school-specific networks, and the name of the network will reveal your school online. Limiting your social networking participation to a school group, as opposed to the world at large, may provide an extra degree of protection and privacy for you. 17
  • 18. Back to the Basics: Use Privacy Settings! Only share the information you are comfortable sharing. Limit your audience. Default settings usually allow sharing. Take affirmative steps to limit disclosure. 18
  • 19. Adjusting privacy settings can be a multi-step process: Access the Privacy Settings page on the social network of your choice and learn how to protect the privacy of your information. Some sites offer you the ability to set different privacy settings for different parts of your profile page. 19
  • 20. Privacy Settings are not Foolproof Maintaining privacy requires diligence and maintenance. Learn about the privacy settings of each site you use. If you don’t understand the options, contact the site and ask. Regardless of the settings you use, privacy settings are not foolproof. You should always continue to be cautious about information about yourself you place online regardless of how restricted you believe your audience is. 20
  • 21. Basics of On-line Social Networking Behavior: The Number One Rule Unless you would be willing to attach something to a college application or resume, share it with your parents, your grandparents, current or future employers, don’t post it. If you wouldn’t put it on a poster and hang it on your locker or your dorm room door, don’t post it. 21
  • 22. Basics of Behavior (cont.): Blogging, Journals, The Wall When you journal or blog online, these entries are archived, or saved, and the content of these entries can be searched. Some blogging sites offer you the ability to choose which subscribers can see what you have written, and some allow you to block any anonymous replies. Think about why and how you are using your profile page. If you are blogging about your daily activities or your social life, be extremely cautious what personal information you provide about yourself and others in those contexts. 22
  • 23. Basics of Behavior (cont.): “Friends” Don’t invite people to be your friends on-line if you do not know them in the real world. If you must accept a “friend” that you do not know, do so cautiously, recognizing that often people are not who they claim to be. 23
  • 24. Basics of Behavior (cont): Photos Do not post images of yourself that you wouldn’t want to share with grandparents, colleges, and future employers. Don’t post images of other people that they wouldn’t post of themselves. If possible, ask permission before posting an image of someone else on your site. Always honor any individual’s request to remove a specific photo of him or her from your page. 24
  • 25. Basics of Behavior (cont.): Avoiding Risky Behavior Sex -- Just don’t talk about it on the Internet, particularly with people you do not know. Never agree to meet someone in person that you “met” on the Internet. 25
  • 26. Other Ways to Protect your Privacy Use services with age and identity verification systems Use services that allow you to report inappropriate content Look for sites with privacy seals like TRUSTe and the Better Business Bureau 26
  • 27. More Ways to Protect your Privacy Talk with a parent, older sibling, or other adult you trust about your Internet use. Educate your parents about technologies that are new to them. Check out any safety tips provided by the site you are using. Use online resources to find additional safety and privacy information. ALWAYS KNOW how your information is being used and stored by others. 27
  • 28. It’s not just common sense. “Don’t get in a car with someone you don’t know.” “Don’t open your door to a stranger.” But . . . Don’t talk to strangers? Isn’t that the whole point for some users? Common sense only takes you so far. Some technological understanding is helpful. 28
  • 29. Caching If you put something on the Internet, it is difficult if not impossible to take it back. Search engines and browsers cache websites, allowing photos, videos and text to be retrieved long after the website has been deleted. 29
  • 30. Caching and Public Computers Caching also raises issues you should be aware of when you use computers in public libraries or other public spaces. Web browsers cache sites that you have visited. Web browsers can also cache temporary internet files, cookies, info that you enter into websites and address bars as well as passwords. 30
  • 31. Think About Tomorrow When You are Acting Today Do you know how much money it costs to remove a tattoo? Hundreds or thousands of dollars, depending on the size and quality of the tattoo. This doesn’t mean you should never get a tattoo – it just means you should be well aware of the costs and consequences associated with making such a decision, now and in the future, before you do it. Social networking and blogging online are the same – information and images can be extremely difficult if not impossible to take back. Even when you delete information from your profile or site, older versions are still accessible to others. 31
  • 32. Think About Tomorrow (cont.) Do not jeopardize the privacy of others. Treat others the way you would want to be treated online. Respect the privacy and personal information of others. Don’t identify others on your page in a way they would not identify themselves or post photos they would not post. 32
  • 33. Privacy Policies Many websites have privacy policies or statements. Main function: to describe what personal information they will collect, whether they share it, how they will use it, and how they will secure it. 33
  • 34. Privacy Policies should provide: Notice Exactly what information they collect and how they use it Choice You should be given a choice about the collection and use of your information Access The ability to access your information maintained by the site and the opportunity to correct inaccurate information Security Reasonable security measures to protect your information from loss, misuse, or alteration 34
  • 35. Privacy Policies (cont.) The language can be confusing. Look for: Whether the site will sell or share your information with third parties The chance to opt- out of practices you do not like 35
  • 36. BUT . . . . Always keep in mind that a policy is merely a policy. Because the policy is essentially the measure of your rights on the site in which you are participating, pay careful attention to the ways in which the policy limits the site’s exposure and accountability. Look for a web seal that lets you know the site takes its policy and your privacy seriously. 36
  • 37. Recap: Find the privacy policy and read it. But always continue to act cautiously online with your personal information regardless of a policy’s representations. 37
  • 38. Security Risks Passwords, File-Sharing, Spyware, Phishing and Updating
  • 39. Protecting your personal information: Passwords Keep your passwords in a secure place. Do not share passwords. Experts suggest: the strongest passwords have at least 8 characters and include numbers and symbols as well as letters. Do not use your personal information, your login name, or adjacent keys on the keyboard as passwords. Change your password every 90 days or so. Use a different password for every online account you access (or at least a good variety). 39
  • 40. File-sharing software Avoid down-loading file-sharing software. If you use this software be extremely careful about the information you share in order to protect your personal information. Read end user agreements, understand whether you are allowing spyware to be installed on your machine, and understand the risks of free downloads. 40
  • 41. Spyware Spyware is a program that can be installed on your computer from a remote location to steal your personal or financial information or to monitor your online transactions to capture that information. Install antispyware software to detect and remove these spyware programs. 41
  • 42. Phishing A phishing scam is one designed to elicit your personal information (username, password, account information) on a fake website. When you receive a suspicious email, do not click on a link provided and provide personal information. 42
  • 43. Phishing Protection When you receive a suspicious email, go to your browser, contact the company, and ask whether it is trying to reach you or if there is a problem with your account. Use anti-phishing software. 43
  • 44. Automatic Updates As a final note, automatically updating your computer helps ensure that your computer is protected against the latest threats. 44
  • 45. Sources and Resources The foregoing information was drawn largely from information found in a number of articles and on websites concerned about online safety and data protection. These sources and resources will provide additional, helpful information for you if you are interested in learning more about any of the privacy issues discussed today. Please visit www.privacyassociation.org for a full list of sources and resources, along with links to educational videos about data protection and online safety. 45
  • 47. Sponsors 47
  • 48. Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ Or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Any use of these materials requires attribution to the IAPP and Intel. 48