Protecting Your Privacy Online.  No mute button?  Mute: dial 611#  Unmute: dial 600#

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Promoting yourself on Facebook Lindsey Jacobs. Facebook.com The 2nd most used website next to Google More than 800 million active users About 700,000.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Protecting Your Privacy Online Molly Immendorf CE Technology Services.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
How to protect yourself Hacked Construction Sign: MIT, April 2007 at intersection of Vassar & Main Streets Information Security:
Information for Students and Families
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
How To Protect Your Privacy and Avoid Identity Theft Online.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety Portage Department of Public Safety.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Enter User Id and Password Click on Submit Press Place Order Button.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Staying Safe Online Keep your Information Secure.
PRIVACY BOOTCAMP YpJU.
Scams & Schemes Common Sense Media.
Protecting Your Personal Information November 15, 2013.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Marketing Your School & Social Media.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Scenarios Grab your headphones to listen. Press F5 to play.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
What’s the difference between Internet friends and in-person friends? Talking Safely Online Hueneme Elementary School District Digital Citizenship 5th.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Caroline Carrico Sabrina Chacón Sang Hoon Chae Aaron Hauber Jasmine Ellison.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
How & Why 1 of 8 security. 2 of 8 security – Why? 1.Your address is your online identity If it is not secure you may get s (including.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
How to set up an account- Non-Technical Aimee Lilley.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
KS2 E-Safety assembly How to be smart and keep safe online.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
1 Tech Tuesday: Setting up Emai content/uploads/2015/06/PRC- TechTuesday-SettingUp .pptxhttp://pbdd.org/wp- content/uploads/2015/06/PRC-
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Protecting What’s Yours: Your Identity
Protecting your personal information and privacy
Cybersecurity Awareness
How Can I Create A Gmail Account
Travel Portal Overview for Integrys Group
Internet Safety – Social Media
Presentation transcript:

Protecting Your Privacy Online

 No mute button?  Mute: dial 611#  Unmute: dial 600#

 Do as I say, not as I do

 Passwords  Lie  Secure connection (SSL)  Vanity search  Junk Account  Terms of Service  Billboards/T-Shirt

 Don’t use your banking password for anything else  Use strong passwords (min 8 characters, alpha-numeric, mixed case)  Consider using a password keeper (i.e., LastPass)

 Create a free account for online registrations

 Don’t use your correct birth date  Make up your mother’s maiden name, elementary school name, favorite pet name, etc.  "123 No Such Street, Nowhere, WI 01010"

 When filling out sensitive data on surveys, make sure that it is a secure connection (SSL) 

 Put your name in quotes in the search engine.

 Activity: Take a post-it or piece of paper and write on it the funniest thing that ever happened to you… last week, last month, last year or in your lifetime.  Un-mute your phone (button or 600#) and wait for instructions…

 Work account  Vacation status  Friends and followers  Micro-manage  Tagging photos  Kids’ names  Games, quizzes  Location-sharing tools

 Create separate work and personal accounts

Create Lists of Friends and Pages

 Most FB users accept the defaults

 Use the friends list to personalize your privacy settings

Open Book: (warning: potentially offensive language)

 Photo releases  Avoid identifiable photos  Don’t tag in Facebook  Use initials for ID

 Most ask for access to your personal information

 Weird status messages = potential virus  If it sounds too good to be true…

Who owns your contact information? Are they company assets? National Strategy for Trusted Identities in Cyberspace (draft)

 Electronic Frontier Foundation   Lifehacker   Federal Trade Commission:    Snopes Scam Checker 

Presentation available on SlideShare.net: