DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media (email, photos,

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

1 How To Use a Browser A Module of the CYC Course – Computer Basics
Six Things to Remember for Web Safety
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Principles of Information Technology
Surrey Libraries Computer Learning Centres January 2012 Internet Searching Teaching Script Totally New to Computers Internet Searching.
Cyber Safety Assessment Review
Association of Registered Nurses of British Columbia Social Media Guide.
Is This You? Internet Safety Day
The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
Don’t be bullied, or be a bully.
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
PRIVACY CONSIDERATIONS Privacy for Children Under 13 1 February 2013.
Internet Safety Basic Internet Safety Involves: You have all of this information and more on one website!
Technology SafeKEY.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
 Keep your anti-virus software current  Download patches when available  Only open s from friends and family  Only open EXPECTED attachments.
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
 1. You must have a personal page to create a Club page. You will use this account to manage your Club account. Your personal account profile is separate.
FLORIDA STATE UNIVERSITY College of Communication & Information Your Digital Footprint Michael Helfrich Milton Ramer Courtney Lisenbee MH.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
What you don’t know CAN hurt you!
This week is anti-bullying week.
E-Safety Support e-Safety Presentation D Flynn and L Findon.
Netiquette Rules.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
How To Protect Your Privacy and Avoid Identity Theft Online.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
1 WELCOME TO BASIC Instructor Donna DeMedicis ♦ 22 Years of Library Service ♦ BPL Support Staff In Opening The Regional Library Computer Center (Gates.
How To Protect Your Privacy and Avoid Identity Theft Online.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter
PRIVACY BOOTCAMP YpJU.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
NY Public Library Student Cards LOGIN at NYPL.ORG.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
DIGITAL WORLDWIDE Ashish. s  107 trillion – The number of s sent on the Internet in  294 billion – Average number of messages.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Library Technology Hub
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Christian Citizenship in a Digital World Lesson 2: Personal Identity: Your brand and reputation Your brand and reputation.
Safety.
3.2 Introduction to .
Creating your online identity
Social Network.
Internet Identity, Safety, & Security
Personal spaces.
Class 2 - Transitional Internet Basics
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Social Media: What You Should Know
Jim Barton Librarian Glenside Public Library District
Instructor Name Instructor Title Library Name
Digital Footprints.
3.2 Introduction to .
SOCIAL RESPONSIBILITY
Unit# 5: Internet and Worldwide Web
Internet Safety – Social Media
Web Browsers Sarah Bradley.
Presentation transcript:

DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media ( , photos, blogs, and social web site content) is easily replicated, altered and distributed. If you want to maintain absolute ownership and control of your creations, don’t share them online. Even if you delete your account, your creations may be archived on a server somewhere. security is dependent on how much you trust your recipients. is easily forwarded -- either intentionally or inadvertently. NEVER put anything in an you wouldn’t want distributed widely. Social Networks (e.g. Facebook, Flickr) can retain ownership of the content you post and upload…and they can make it available to search engines like Google and Yahoo. Read the privacy policies and check your settings, OFTEN…as they can and do change. NEVER post anything you wouldn’t want widely distributed (e.g. photos of your family, your address or work schedule, photos of you or your friends doing indiscrete things). Use an anonymous account to protect your identity & prevent spam. Create a “side” account with Google or Yahoo to use with non-trusted sites such as forums or for shopping. Marianne Hebert SUNY Potsdam College Libraries Searching Conversations Who is listening? Find out what people are saying… Mailing list (e.g. listserv) messages are not always restricted to members-only. Many are archived for decades and searchable by anybody, even by non- members. What you flamed about 10 year ago may still be out there… Data-mining: Are you worried that the NSA or other agencies are searching your conversations or blogs? Embed text in images to protect your content from being searched by data- miners. Spokeo will track and report on user activities on 41 social network sites. A bit spooky? A bit helpful? Advanced Twitter Search lets you search by geographic location, user name, or keyword. Protect your Identity and Privacy: your-online-privacy search-privacy Beware of Facebook applications Have Fun With Your Name 1. YOUR SPY NAME (middle name and current street name): 2. YOUR MOVIE STAR NAME (grandfather/mother on your dad's side and your favorite candy-bar): 3. YOUR RAP NAME (first initial of first name and first 3,4 or 5 letters of your last name): 4. YOUR GAMER TAG (a favorite color, a favorite animal) 5. YOUR SOAP OPERA NAME (middle name, and city you were born in) 6. YOUR STAR WARS NAME (first three letters of your last name, last three letters of mother's maiden name, first three letters of your pet's name) 7. JEDI NAME (middle name spelled backwards, your mom's maiden name spelled backwards): 8. PORN STAR NAME (first pet's name, the street you grew up on): 9. SUPERHERO NAME: ("The", your favorite color and the automobile your dad drives) 10. YOUR ACTION HERO NAME (first name of the main character in the last film you watched, last food you ate) Many of these seemingly harmless “fun” questions are the same security questions used by banks and campus security systems. Find People: Search by name, or phone number GeoTagging: Does your fancy new digital camera have a built in GPS? Be careful when you upload your photos to Flickr or other photo-sharing sites. You may be telling EVERYONE exactly where you live, work and play… Search engines may be retaining your search histories…Google, Yahoo, etc. do not have ”patron scrubbing” and search histories can be subpoenaed. Use a variety of search engines, don’t login and clear your cookies. SUNYLA2009