Presentation on theme: "DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media (email, photos,"— Presentation transcript:
DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media (email, photos, blogs, and social web site content) is easily replicated, altered and distributed. If you want to maintain absolute ownership and control of your creations, don’t share them online. Even if you delete your account, your creations may be archived on a server somewhere. Email security is dependent on how much you trust your recipients. Email is easily forwarded -- either intentionally or inadvertently. NEVER put anything in an email you wouldn’t want distributed widely. Social Networks (e.g. Facebook, Flickr) can retain ownership of the content you post and upload…and they can make it available to search engines like Google and Yahoo. Read the privacy policies and check your settings, OFTEN…as they can and do change. NEVER post anything you wouldn’t want widely distributed (e.g. photos of your family, your address or work schedule, photos of you or your friends doing indiscrete things). Use an anonymous account to protect your identity & prevent spam. Create a “side” account with Google or Yahoo to use with non-trusted sites such as forums or for shopping. Marianne Hebert SUNY Potsdam College Libraries Searching Conversations Who is listening? Find out what people are saying… Mailing list (e.g. listserv) messages are not always restricted to members-only. Many are archived for decades and searchable by anybody, even by non- members. What you flamed about 10 year ago may still be out there… Data-mining: Are you worried that the NSA or other agencies are searching your email conversations or blogs? Embed text in images to protect your content from being searched by data- miners. http://www.hidetext.net/http://www.hidetext.net/ Spokeo will track and report on user activities on 41 social network sites. A bit spooky? A bit helpful? http://search.twitter.com Advanced Twitter Search lets you search by geographic location, user name, or keyword. Protect your Identity and Privacy: http://www.getnetwise.org/ http://www.staysafeonline.info/ http://www.onguardonline.gov/ http://www.eff.org/wp/effs-top-12-ways-protect- your-online-privacy http://www.eff.org/wp/six-tips-protect-your- search-privacy Beware of Facebook applications Have Fun With Your Name 1. YOUR SPY NAME (middle name and current street name): 2. YOUR MOVIE STAR NAME (grandfather/mother on your dad's side and your favorite candy-bar): 3. YOUR RAP NAME (first initial of first name and first 3,4 or 5 letters of your last name): 4. YOUR GAMER TAG (a favorite color, a favorite animal) 5. YOUR SOAP OPERA NAME (middle name, and city you were born in) 6. YOUR STAR WARS NAME (first three letters of your last name, last three letters of mother's maiden name, first three letters of your pet's name) 7. JEDI NAME (middle name spelled backwards, your mom's maiden name spelled backwards): 8. PORN STAR NAME (first pet's name, the street you grew up on): 9. SUPERHERO NAME: ("The", your favorite color and the automobile your dad drives) 10. YOUR ACTION HERO NAME (first name of the main character in the last film you watched, last food you ate) Many of these seemingly harmless “fun” questions are the same security questions used by banks and campus security systems. Find People: http://pipl.comhttp://pipl.com Search by name, email or phone number GeoTagging: Does your fancy new digital camera have a built in GPS? Be careful when you upload your photos to Flickr or other photo-sharing sites. You may be telling EVERYONE exactly where you live, work and play… Search engines may be retaining your search histories…Google, Yahoo, etc. do not have ”patron scrubbing” and search histories can be subpoenaed. Use a variety of search engines, don’t login and clear your cookies. SUNYLA2009
Your consent to our cookies if you continue to use this website.