Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.

Slides:



Advertisements
Similar presentations
Netscape Mail. Starting Out Launch Netscape From the menu bar select Edit - Preferences The next slides show the configuration for the mail preferences.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
Understanding Computers, Ch. 21 Chapter 2 Using Your PC, Windows, and the Web.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Security for Seniors SeniorNet Help Desk
(2) C OMPUTER AND I NTERNET T ECHNICAL J ARGON. (2)C OMPUTER AND I NTERNET T ECHNICAL T ERMS (J ARGONS ) access : connection to the Internet account:
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Browsing the Web Session 3. Objectives Student will knowhow to search on the internet, how to complete a form.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
1 IE in the Classroom The Internet Explorer Web Browser EDW647 Internet for Educators Roger Webster, Ph.D. Millersville University Department of Computer.
Introduction To Internet
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
بسم الله الرحمن الرحيم The Internet and the World Wide Web.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
XP Practical PC, 3e Chapter 8 1 Browsing and Searching the Web.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
ONE® Pages Training Presentation North York General Hospital.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Any criminal action perpetrated primarily through the use of a computer.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Tutorial 5 Protecting Your Computer
Internet Business Associate v2.0
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Unit 11 Using the Internet & Browsing the Web
Browsing and Searching the Web
Internet and security.
Importance of Privacy Internet Safety
What is it? Why do I keep getting from Barracuda? SPAM.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
ONE® Pages Training Presentation
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Top Ten Ways to Protect Privacy Online -Abdul M

Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit -- what computer you use, what type of hardware and software you have, what Web sites you have visited. Web sites that ask you to provide even a small amount of personal information can tie the data you provide to your browsing habits.

Get a separate account for your personal  Often, online users do not realize that sent from their work accounts is likely to be an open book to their employers. Even if you send an from your home, a copy is often stored on your employer's main computer server. Your boss has a legal right to read any and all correspondence in this account or on your work computer at any time.  Getting a separate account for home allows you to check your personal messages without using your workplace e- mail server. Some private accounts can be configured to enable you to check your personal mail from work without downloading it onto your company computer.

Teach your kids that giving out personal information online means giving it to strangers  Teach your children that they need your permission before they can give out their name, address or other information about themselves or the family.  Several years ago, a number of Web sites encouraged children to give information about themselves or their family; some enticed kids with games and free gifts. In 1998, a law was passed requiring companies to gain parental consent before collecting personal information from children under 13 years old. If you are concerned about a Web site collecting information from children without consent, you should communicate your concern to the Federal Trade Commission at

Clear your memory cache after browsing  After you browse the Web, copies of all accessed pages and images are saved on your computer's memory. While these copies make subsequent visits to the same sites faster, the browsing record has grave implications for personal privacy, particularly if you share a computer or browse at work. You can delete most of your online trail by simply going to the "Preferences" folder in your browser and clicking on the "Empty Cache" button. Sometimes this option is in the "Advanced" menu of the browser preferences. In Internet Explorer, go to "Internet Options" from the "Tools" menu and click on "Clear History".

Reject unnecessary cookies  Cookies enable Web sites to store information about your visit on your own hard drive. Cookies inform site operators if you have visited the site and, if you have obtained a username and password, cookies remember that information for you. Many of the "personalized" search engines use cookies to deliver news topics that users select; sites often use these same preferences to target advertisement. Cookies can be rejected by accessing the "Advanced" screen of the "Preferences" menu. In Internet Explorer, delete cookies by clicking on the "Delete Files" button in the "General" icon of "Tools"' "Internet Options" menu.

Use anonymous r ers  Anonymity is essential to protect free speech. It can be used to protect human rights workers reporting abuses, political dissidents commenting on government actions, writers publishing controversial literature and other important functions where revealing a person's identity would threaten a person's life or wellbeing. Anonymous publishing has been recognized in the United States as being protected by the First Amendment.  One very good r er was created as a joint project of the George Mason Society and the Global Internet Liberty Campaign and is available on the Web at

Keep your private, use encryption!  is not as secure a medium as many believe.  can be easily rerouted and read by unintended third parties; messages are often saved for indefinite periods of time. Presently, there exist technologies that allow you to encrypt your messages in order to protect their privacy. Some programs (i.e., Internet Explorer Outlook and Netscape Messenger) have encryption. Pretty Good Privacy (PGP), a popular encryption software, is free for non- commercial use

Use anonymizers while browsing  New Internet scams are born everyday so it's critical to protect your identity and personal information on the Web. Anonymizer solutions empower you to control the amount of personal information that you share when visiting Web sites, sending s, chatting, or posting to message boards.  Anonymizer Anonymous Surfing combines the protection of rotating anonymous IP addresses with the security of 128-bit SSL technology.

Opt-out of third party information sharing  Are you tired of getting all that junk mail? Telephone calls during dinner? Worried about who has your name on a list and what they're doing with it? If so, this site is for you.  You may not realize it, but a company you have done business with may have sold or shared your personal information to other companies. In some cases, you have the power to stop this practice.  Many online companies provide you with the option to get off (or "opt-out") the lists that share your information. Some companies enable users to easily opt out -- users are often able to do so online. A number of companies go a step further and ask your permission (opt-in) before sharing personal information that they have collected. Often, however, companies make opting out difficult or virtually impossible: addresses are buried, one cannot opt-out online, etc. CDT (Center for Democracy and Technology) has created Operation Opt-Out to help you control how your personal data is collected and distributed.Operation Opt-Out