1 / 1

DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE

DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE. Internet Privacy How private is your identity? How private are your activities?. DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE. SUNYLA2009.

kellan
Télécharger la présentation

DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE SUNYLA2009 DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE DO NOT USE THIS SPACE Marianne Hebert SUNY Potsdam College Libraries Searching Conversations Who is listening? Find out what people are saying… Social Networks (e.g. Facebook, Flickr) can retain ownership of the content you post and upload…and they can make it available to search engines like Google and Yahoo. Read the privacy policies and check your settings, OFTEN…as they can and do change. NEVER post anything you wouldn’t want widely distributed (e.g. photos of your family, your address or work schedule, photos of you or your friends doing indiscrete things). Beware of Facebook applications Have Fun With Your Name 1. YOUR SPY NAME (middle name and current street name): 2. YOUR MOVIE STAR NAME (grandfather/mother on your dad's side and your favorite candy-bar): 3. YOUR RAP NAME (first initial of first name and first 3,4 or 5 letters of your last name): 4. YOUR GAMER TAG (a favorite color, a favorite animal) 5. YOUR SOAP OPERA NAME (middle name, and city you were born in) 6. YOUR STAR WARS NAME (first three letters of your last name, last three letters of mother's maiden name, first three letters of your pet's name) 7. JEDI NAME (middle name spelled backwards, your mom's maiden name spelled backwards): 8. PORN STAR NAME (first pet's name, the street you grew up on): 9. SUPERHERO NAME: ("The", your favorite color and the automobile your dad drives) 10. YOUR ACTION HERO NAME (first name of the main character in the last film you watched, last food you ate) Many of these seemingly harmless “fun” questions are the samesecurity questions used by banks and campus security systems. Spokeowill track and report on user activities on 41 social network sites. A bit spooky? A bit helpful? Digital media (email, photos, blogs, and social web site content) is easily replicated, altered and distributed. If you want to maintain absolute ownership and control of your creations, don’t share them online. Even if you delete your account, your creations may be archived on a server somewhere. Find People: http://pipl.com Search by name, email or phone number Email security is dependent on how much you trust your recipients. Email is easily forwarded -- either intentionally or inadvertently. NEVER put anything in an email you wouldn’t want distributed widely. http://search.twitter.com Advanced Twitter Search lets you search by geographic location, user name, or keyword. GeoTagging: Does your fancy new digital camera have a built in GPS? Be careful when you upload your photos to Flickr or other photo-sharing sites. You may be telling EVERYONE exactly where you live, work and play… Search engines may be retaining your search histories…Google, Yahoo, etc. do not have ”patron scrubbing” and search histories can be subpoenaed. Use a variety of search engines, don’t login and clear your cookies. Mailing list (e.g. listserv) messages are not always restricted to members-only. Many are archived for decades and searchable by anybody, even by non-members. What you flamed about 10 year ago may still be out there… Data-mining: Are you worried that the NSA or other agencies are searching your email conversations or blogs? Embed text in images to protect your content from being searched by data-miners. http://www.hidetext.net/ Use an anonymous account to protect your identity & prevent spam. Create a “side” account with Google or Yahoo to use with non-trusted sites such as forums or for shopping. • Protect your Identity and Privacy: • http://www.getnetwise.org/ • http://www.staysafeonline.info/ • http://www.onguardonline.gov/ • http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy • http://www.eff.org/wp/six-tips-protect-your-search-privacy

More Related