SlideShare a Scribd company logo
1 of 19
ALL ABOUT
FACEBOOK
SECURITY
Introduction To
Facebook Security

ID fraudsters
target Facebook and
other social networking
sites to harvest
information about you.
Here's how we
recommend you to set
your Facebook privacy
options to protect
against online identity
theft.
How to Adjust your Settings?
This guide walks you
through recommended
privacy settings in
Facebook and shows
you how to set more
secure levels of
privacy and reduce the
chance of becoming a
victim of online identity
theft.
General Security Tips
for Facebook
Adjust Facebook Privacy
Settings to Help Protect Your
Identity

Unlike some other
social networking
sites, Facebook
provides some
powerful options to
protect you online —

but it's up to you
STEP 1 : BE AWARE OF WHAT
INFORMATION FACEBOOK
RECEIVES ABOUT YOU!
What Information does Facebook Receive about
You?

Facebook receives a number of different
types of information about you, including your
registration information (for example : name,
email address, date of birth and gender). In
some cases, you may be able to register
using other information, like your telephone
number. Besides, Facebook also receives
information about what information you wish
to share on Facebook (for example : your
posts and your comments).
What Information does Facebook Receive about
You?

It also includes the information you choose to
share when you take an action (for example :
when you add a friend, like a page or website,
add a place to your story, use Facebook’s
contact importers or indicate you are in a
relationship). Your name, profile pictures, cover
photos, gender, networks, username and user ID
are treated just like information you choose to
make public. Your birthday allows Facebook to
do things, like show you age-appropriate
contents and advertisements.
What Information Others Share About You does
Facebook Receive?

Facebook receives information about you
from your friends and others, such as when
they upload your contact information, post a
photo of you, tag you in a photo or status
update, or at a location, or add you to a
group.
When people use Facebook, they may store
and share information about you and others
that they have, such as when they upload
and manage their invites and contacts.
What Other Information Facebook Receives
About You?
Facebook gets data from their affiliates or advertising
partners, customers and other third parties that help them
deliver ads, understand online activity, and generally make
Facebook better. For example, an advertiser may tell the
information about you (like how you responded to an ad on
Facebook or on another site) in order to measure the
effectiveness and improve the quality of the ads.
Facebook also puts together data from the information
they already have about you and your friends. For example,
Facebook may put together data about you to determine which
friends Facebook should show you in your News Feed or
suggest you tag in the photos you post. Facebook may put

together your current city with location information we
have about you to tell you and your friends about people or
events nearby. Facebook may also put together data about you
to serve you ads that might be more relevant to you.
What Other Information Facebook Receives
About You?

Facebook receives data from the device you use to
access Facebook, including when multiple users log in
from the same device. This may include your IP
address, your internet service, location, the
type of browser you use, or the pages you

visit.
Facebook also receives data whenever you visit a
game, application, or website that
uses Facebook Platform or visit a site with a
Facebook feature. This may include the date and
time you visit the site; or the web address
you're on; technical information about the

browser and the operating system you
What Information About You That is Always
Publicly Available does Facebook Receive?

•
•
•
•
•
•
•
•

The types of information listed below are
always publicly available, and are treated just
like information you decide to make public.
Name
Profile Pictures
Cover Photos
Timeline Photos
Network
Gender
Username
User ID
STEP 2 : THINK CAREFULLY ABOUT
WHO YOU ALLOW TO BECOME AS
YOUR FRIEND!
Once you have accepted
someone as your friend, they
will be able to access ANY
INFORMATION about you
(including photos) that you have
marked as viewable by
your friends. You can remove
friends at any time if you change
your mind about someone.
STEP 3 : USE
“ACQUAINTANCES”, SLIM
DOWN YOUR PROFILE
You can choose to make people
'acquaintances' who only have
access to a slimmed-down
version of your profile if you
wish. This can be useful if you
have associates who you do not
wish to give close friend status
to, or feel uncomfortable sharing
personal information with.
STEP 4 : DISABLE OPTIONS
AND OPEN THEM ONE BY
ONE
Think about how you want to use
Facebook. If it's only to keep in
touch with people and be able to
contact them then maybe it's
better to turn off the bells and
whistles. It makes a lot of sense to
disable an option until you have
decided you do want and need it,
rather than start with everything
accessible.
That’s All From Us
Thanks For Watching 

More Related Content

What's hot (17)

Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Dangers facebook
Dangers facebookDangers facebook
Dangers facebook
 
Dangers facebook
Dangers facebookDangers facebook
Dangers facebook
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
project1lis3353 (1)
project1lis3353 (1)project1lis3353 (1)
project1lis3353 (1)
 
Facebook
FacebookFacebook
Facebook
 
Dangers of facebook by sani
Dangers of facebook by saniDangers of facebook by sani
Dangers of facebook by sani
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
1)danger of facebook
1)danger of facebook1)danger of facebook
1)danger of facebook
 
1) Danger of facebook
1) Danger of facebook1) Danger of facebook
1) Danger of facebook
 
Dangers of facebook
Dangers of facebookDangers of facebook
Dangers of facebook
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Facebot
FacebotFacebot
Facebot
 

Viewers also liked

Viewers also liked (12)

JavaCro'15 - Secure Web Services Development - Askar Akhmerov
JavaCro'15 - Secure Web Services Development - Askar AkhmerovJavaCro'15 - Secure Web Services Development - Askar Akhmerov
JavaCro'15 - Secure Web Services Development - Askar Akhmerov
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
LAY_Leangsros_brouillions_finale
LAY_Leangsros_brouillions_finaleLAY_Leangsros_brouillions_finale
LAY_Leangsros_brouillions_finale
 
3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
 
Ms word 2010 a5 new khmer
Ms word 2010 a5 new khmerMs word 2010 a5 new khmer
Ms word 2010 a5 new khmer
 
Important Comment used in AutoCAD 2D Khmer Guide
Important Comment used in AutoCAD 2D Khmer Guide Important Comment used in AutoCAD 2D Khmer Guide
Important Comment used in AutoCAD 2D Khmer Guide
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Facebook Security

Facebook Privacy and YOU
Facebook Privacy and YOUFacebook Privacy and YOU
Facebook Privacy and YOUemmahodkinson
 
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
CIS 2015-Rationing Identity in the  Internet of Things-  Steve WilsonCIS 2015-Rationing Identity in the  Internet of Things-  Steve Wilson
CIS 2015-Rationing Identity in the Internet of Things- Steve WilsonCloudIDSummit
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookDaniel Ilunga
 
Facebook slideshare
Facebook slideshareFacebook slideshare
Facebook slidesharepravin koli
 
Facebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy PrimerFacebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy PrimerDon Spinosa
 
Facebook a Beginner's Guide
Facebook a Beginner's GuideFacebook a Beginner's Guide
Facebook a Beginner's GuideKaran Jaiswal
 
Facebook 101 personal usage
Facebook 101 personal usageFacebook 101 personal usage
Facebook 101 personal usageKristi Kirkland
 
TheWebMarketer - Facebook 101 Guide
TheWebMarketer - Facebook 101 GuideTheWebMarketer - Facebook 101 Guide
TheWebMarketer - Facebook 101 GuideAlfonso Alcala
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to FacebookSophia Guevara
 

Similar to Facebook Security (20)

Facebook Privacy and YOU
Facebook Privacy and YOUFacebook Privacy and YOU
Facebook Privacy and YOU
 
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
CIS 2015-Rationing Identity in the  Internet of Things-  Steve WilsonCIS 2015-Rationing Identity in the  Internet of Things-  Steve Wilson
CIS 2015-Rationing Identity in the Internet of Things- Steve Wilson
 
Facebook
FacebookFacebook
Facebook
 
Facebook1
Facebook1Facebook1
Facebook1
 
Facebooking
FacebookingFacebooking
Facebooking
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
 
Facebook slideshare
Facebook slideshareFacebook slideshare
Facebook slideshare
 
Facebook 101
Facebook 101Facebook 101
Facebook 101
 
Policy primer
Policy primer Policy primer
Policy primer
 
Facebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy PrimerFacebook Terms of Service and Privacy Policy Primer
Facebook Terms of Service and Privacy Policy Primer
 
Alan
AlanAlan
Alan
 
It's Time for Facebook Timeline - January 2012
It's Time for Facebook Timeline - January 2012It's Time for Facebook Timeline - January 2012
It's Time for Facebook Timeline - January 2012
 
Facebook.docx
Facebook.docxFacebook.docx
Facebook.docx
 
Facebook a Beginner's Guide
Facebook a Beginner's GuideFacebook a Beginner's Guide
Facebook a Beginner's Guide
 
Facebook and privacy policy
Facebook and privacy policyFacebook and privacy policy
Facebook and privacy policy
 
Facebook 101 personal usage
Facebook 101 personal usageFacebook 101 personal usage
Facebook 101 personal usage
 
TheWebMarketer - Facebook 101 Guide
TheWebMarketer - Facebook 101 GuideTheWebMarketer - Facebook 101 Guide
TheWebMarketer - Facebook 101 Guide
 
Facebook Mobile Smart Card
Facebook Mobile Smart CardFacebook Mobile Smart Card
Facebook Mobile Smart Card
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to Facebook
 
Facebook basics
Facebook basicsFacebook basics
Facebook basics
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Facebook Security

  • 2. Introduction To Facebook Security ID fraudsters target Facebook and other social networking sites to harvest information about you. Here's how we recommend you to set your Facebook privacy options to protect against online identity theft.
  • 3. How to Adjust your Settings? This guide walks you through recommended privacy settings in Facebook and shows you how to set more secure levels of privacy and reduce the chance of becoming a victim of online identity theft.
  • 5. Adjust Facebook Privacy Settings to Help Protect Your Identity Unlike some other social networking sites, Facebook provides some powerful options to protect you online — but it's up to you
  • 6. STEP 1 : BE AWARE OF WHAT INFORMATION FACEBOOK RECEIVES ABOUT YOU!
  • 7. What Information does Facebook Receive about You? Facebook receives a number of different types of information about you, including your registration information (for example : name, email address, date of birth and gender). In some cases, you may be able to register using other information, like your telephone number. Besides, Facebook also receives information about what information you wish to share on Facebook (for example : your posts and your comments).
  • 8. What Information does Facebook Receive about You? It also includes the information you choose to share when you take an action (for example : when you add a friend, like a page or website, add a place to your story, use Facebook’s contact importers or indicate you are in a relationship). Your name, profile pictures, cover photos, gender, networks, username and user ID are treated just like information you choose to make public. Your birthday allows Facebook to do things, like show you age-appropriate contents and advertisements.
  • 9. What Information Others Share About You does Facebook Receive? Facebook receives information about you from your friends and others, such as when they upload your contact information, post a photo of you, tag you in a photo or status update, or at a location, or add you to a group. When people use Facebook, they may store and share information about you and others that they have, such as when they upload and manage their invites and contacts.
  • 10. What Other Information Facebook Receives About You? Facebook gets data from their affiliates or advertising partners, customers and other third parties that help them deliver ads, understand online activity, and generally make Facebook better. For example, an advertiser may tell the information about you (like how you responded to an ad on Facebook or on another site) in order to measure the effectiveness and improve the quality of the ads. Facebook also puts together data from the information they already have about you and your friends. For example, Facebook may put together data about you to determine which friends Facebook should show you in your News Feed or suggest you tag in the photos you post. Facebook may put together your current city with location information we have about you to tell you and your friends about people or events nearby. Facebook may also put together data about you to serve you ads that might be more relevant to you.
  • 11. What Other Information Facebook Receives About You? Facebook receives data from the device you use to access Facebook, including when multiple users log in from the same device. This may include your IP address, your internet service, location, the type of browser you use, or the pages you visit. Facebook also receives data whenever you visit a game, application, or website that uses Facebook Platform or visit a site with a Facebook feature. This may include the date and time you visit the site; or the web address you're on; technical information about the browser and the operating system you
  • 12. What Information About You That is Always Publicly Available does Facebook Receive? • • • • • • • • The types of information listed below are always publicly available, and are treated just like information you decide to make public. Name Profile Pictures Cover Photos Timeline Photos Network Gender Username User ID
  • 13. STEP 2 : THINK CAREFULLY ABOUT WHO YOU ALLOW TO BECOME AS YOUR FRIEND!
  • 14. Once you have accepted someone as your friend, they will be able to access ANY INFORMATION about you (including photos) that you have marked as viewable by your friends. You can remove friends at any time if you change your mind about someone.
  • 15. STEP 3 : USE “ACQUAINTANCES”, SLIM DOWN YOUR PROFILE
  • 16. You can choose to make people 'acquaintances' who only have access to a slimmed-down version of your profile if you wish. This can be useful if you have associates who you do not wish to give close friend status to, or feel uncomfortable sharing personal information with.
  • 17. STEP 4 : DISABLE OPTIONS AND OPEN THEM ONE BY ONE
  • 18. Think about how you want to use Facebook. If it's only to keep in touch with people and be able to contact them then maybe it's better to turn off the bells and whistles. It makes a lot of sense to disable an option until you have decided you do want and need it, rather than start with everything accessible.
  • 19. That’s All From Us Thanks For Watching 