Presentation on theme: "Online Privacy A Module of the CYC Course – Personal Security 8-9-10."— Presentation transcript:
Online Privacy A Module of the CYC Course – Personal Security 8-9-10
The Realities of Digital Communications: Deleting a digital post is not as permanent as setting fire to a handwritten note. Digital content is easily forwarded and reposted. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. Your online reputation has offline implications.
Privacy Levels on Social Networking Sites What is the default privacy setting on most social networks? You control who sees what content. BUT, even though you are restricting access, remember content can be forwarded.
Social Engineering Manipulating people into providing personal information. Often uses human interaction/emotions to obtain information. Phishing - Tries to attack you personally. Looks to be from a trusted company asking you to for your personal information. Occurs via email, websites and social networks.
Understanding URLs Top level domains Domain names Text before the domain name / after the top level domain Common tactic – URLs that look legitimate but are not. Example – citybank.com.jumbleofletters.com/jumbleofle tters
Passwords Choose a password that cant be easily guessed. Dont write your password down in any easily findable place. Dont send your password to anyone through e-mail.
Passwords Dont allow public computers to remember your password. Dont tell anyone your passwords. Dont use the same password for all your accounts, especially the important accounts such as email, banks, credit cards. Create a system for remembering your passwords. Check the strength of your password - http://www.passwordmeter.co m/
Shopping Online Make sure YOU initiated the contact. Dont follow an email link. Type web addresses carefully. Dont give out SSN, DOB, or your Mothers Maiden name. Do not accept free trial offers. Dont rely on a site looking professional.
Credit Card Security When possible, choose a credit card NOT a debit card. Best choice - choose one card for online use only or a prepaid credit card. Paypal.com - Most companies online accept payments from PayPal. Paypal acts as an intermediary for payment. If you dont have a credit card you can set it up to take payment out of a checking/savings account.
Identity Theft Someone uses your personal information without your knowledge to commit fraud or theft.
Identity Theft Prevention Tips Do not store personal financial information on laptop computers. Before disposing of a computer delete all personal information. Review websites privacy policies. Request free credit report - https://www.annualcreditreport.com/ https://www.annualcreditreport.com/ A company or organization that initiated contact with you will not request your password via email or phone.
Identity Theft - Public Computer Safety Tips Beware of Shoulder Surfers Do NOT allow public computers to remember your log in and password. ALWAYS Sign Out or Log Off. Clear browser history. Close the browser window.
Sources This curriculum was adapted from a workshop created by N. Riesgraf for the Hibbing Public Library (MN). Funding provided by IRRRA Do I.T. Community Technology Awareness Program. Additional content created by Connect Your Community, a project of OneCommunity, funded by the federal Broadband Technology Opportunities Program.OneCommunityBroadband Technology Opportunities Program
Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0 This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0