3.
Why Do People Use Social Media?
Legal Issues With Social Media
Facebook – Privacy Issues
Twitter – Privacy Issues
YouTube – Privacy Issues
LinkedIn – Privacy Issues
Protecting Your Privacy
Online Threats
Steps To Ensuring Online Privacy
National Privacy Day
4.
Social Interaction- allows people to be social.
They meet new people and keep in touch with
family, friends, and acquaintances.
Seek Information- used to find information
about products/services, keeping up with
real-world social events, and learning new
things.
Pass Time- great tool to kill time and when
you’re bored.
Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/
Alyssa Budhoo
5.
Entertainment-social media gives access to
games, music and videos.
Relaxation- social media helps relieve stress
and escape reality.
Expression of Opinions- people express
thoughts and opinions through social media.
Things to Talk About- social media provides
topics for people to talk and gossip about
with others.
Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/
Alyssa Budhoo
6.
Convenience- social media is easily
accessible anywhere at any time. People can
talk to numerous people at the same time.
Sharing Information- people market their
own image through social media by
broadcasting things about themselves
through publishing updates, videos and
pictures.
Know about others- social media gives
people a display into the lives of others, by
being able to check out other profiles.
Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/
Alyssa Budhoo
7. Why Use Social Media in Business?
The video states facts about social media networks
and how much popularity they are gaining due to the
fact that there are more users and people joining
these sites. Therefore, giving businesses an effective
reason to use social media in their business
practices.
Alyssa Budhoo
8.
Branding- creates a noticeable identity for the
product/service.
Creates a Buzz- word gets out about the
products/services through online
conversation.
Online Reputation Management- Easy to see
what other people and sites are saying about
the name, company, or brand online.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
9.
Established as an Expert- using forums and
message boards to answer questions
professionally, honestly, and correctly will earn
businesses respect as an expert.
Word of Mouth- market products through word
of mouth virtually. Customers trust friends and
family; they need to trust before
purchasing, therefore hearing about the product
from someone trustworthy, will insist them to
buy.
Builds relationships and Becomes More Personalusing a variety of social media will build
relationships with customers and potential
customers.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
10.
Open up the line of communication between
business owner and millions of potential
customers- Millions of people use social media
everyday and can become potential customers,
this does not come so easily in the offline world.
Small businesses can compete with large
companies- with the right type of viral social
media, an immense amount of traffic can grow
quickly with natural links, and keep traffic
coming for a long time.
Social networking with potential clients and
customers from all over the globe- with all the
social networking sites available, businesses can
hold personal conversations with each of their
customers.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
11.
Generates Traffic- If an item becomes viral and
makes it to the front page of a big social news
site, the viewership can grow tremendously.
Increased link-ability- in order to move up in
search engines, having links from other sites
pointed to the business site is essential. Natural
links-or links that come from a great post, video,
or picture, are best for the business.
Cheaper than traditional Marketing and
Advertising- social media is a portion of the cost
of traditional marketing and advertising.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
12.
The company is more accessible- everyone
can access online interaction anywhere at any
time.
Direct conversation to a specific niche- many
social networking, social bookmarking, and
social news site are directed to specific
niches. Business’ have the ability to speak
directly to them.
Another way for potential customers to find
you- if the business is not high enough in
search engines, customers can still find the
business through social media.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
13.
A way to explain yourself- it’s always going
to be possible to receive negative comments.
Social media provides a platform to
explain, and fix things to make them right.
Shows your stuff- Universal search is now
accessible through Google, meaning
everything appears on Google Search. So
product images can rank like the business
site, making it easier for customers to see
your product right on the Google search.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
14.
Find out what customers want- social media
allows you to ask customers exactly what
they want.
Customers can play an active role in the
business- customers can offer
suggestions, share their likes and dislikes all
on social media. Therefore, ideas for new
products and services can develop.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/
Alyssa Budhoo
15. 1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Disclosure of Confidential Information
Unauthorized Use of Trademarks
Unauthorized Use of Copyright-Protected Works
Defamation Issues
Electronic Discovery
Dynamic Information
Human Resources Issues
Securities
Privacy/Publicity
Endorsements
Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from
http://www.bartonchicago.com/pdf/socialmedia.pdf
Alyssa Budhoo
16. Posting videos and photos without proper releases
may infringe the privacy or publicity rights of
individuals. Companies must make sure that their
employees are not violating specific privacy
regulations in their activities on social media sites.
Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from
http://www.bartonchicago.com/pdf/socialmedia.pdf
Alyssa Budhoo
17. Top 10 Legal Issues in Social Media
Social networking and Social media is becoming the
“next big thing” for both small and large businesses.
With advertisers, marketers, HR departments, job
seekers, and employees using these tools, they need
to be aware of potential consequences in order to
avoid legal problems. The article lists the top 10
legal problems companies may face when using
social media in their business practices.
Alyssa Budhoo
18. As you have read, social media sites come with
great advantages and opportunities for people
both in their personal and business world.
They do, however, come with issues and
threats specifically aimed towards our privacy.
The following slides will examine privacy issues
with the most popular social media sites:
Facebook, Twitter, YouTube and LinkedIn.
Rachel Brock
19. Privacy App Pinpoints Your Exact Location Using
Social Media
With the ongoing popularity among high school
students using Twitter and Instagram, they are not
aware of the amount of information being posted
from their social media updates. In the article,
researchers at the International Computer Science
Institute and UC Berkeley present findings about
geo-tags and the threats they can impose on high
school students who update regularly on social
media.
Alyssa Budhoo
20.
Launched February 2004
"Facebook to offer TV data to networks Comments."
Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013.
<http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.
Created by Mark Zuckerberg
Facebook allows you to connect with
friends, upload photos, and share links and videos
The most popular online Social networking site
In 2013, Facebook reached 750 million unique
visits per month
"Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>.
"Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013.
<http://visual.ly/top-10-most-popular-social-networks-2013>.
Yuxing Zeng
21.
News feed: angered many users by not giving them control
of who could see their updates, or the ability to opt out
◦ Launched in 2006
Beacon (2007)
◦ a Facebook ad system that tracked what users did and
what they purchased on partner websites, even for users
who were not Facebook members
◦ Adding to the privacy concerns, information about
Facebook users' purchases were published without their
explicit consent on their friends' news feeds
"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.
Yuxing Zeng
22.
Privacy settings
◦ Facebook changed their privacy settings, sharing
information with everyone became the default setting
◦ Terrible guide for the privacy settings of Facebook
Private messages
◦ A glitch in February 2010 caused some private
messages on Facebook to be sent to unintended
recipients
◦ A coding error opened Facebook chats, which are
supposed to be private, for others to see
"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.
Yuxing Zeng
23.
The anti-Google campaign (2011):
◦ Facebook wanted it kept private that they were behind
the anti-Google campaign in 2011. Once
exposed, Facebook admitted that they should have
behaved "in a serious and transparent way.”
Timeline:
◦ Users could decide who could see that information
but not if it was on their friends' Facebook pages.
"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.
Yuxing Zeng
24.
Tech Yeah! Facebook privacy issues
This video shows that Facebook is relaxing its
rules such as “Follow” button puts posts in
News feeds which will cause more privacy
issues among teenagers.
http://video.cnbc.com/gallery/?video=30002
08666
Yuxing Zeng
25. "Twitter Now Covered by Analysts at Wells Fargo & Co.
(TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov.
2013.
<http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.
Created in 2006
Global real-time communications platform
400 million monthly visitors
One billion tweets every 2.5 days
"Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013.
<http://www.crunchbase.com/company/twitter>.
Yuxing Zeng
26.
Design
◦ Mostly dodged privacy concerns
◦ Anyone can see your tweets
Twitter collects data
(tweets, retweets, location, people who you follow)
◦ Twitter than promotes “Promoted Tweets” on your
timeline that relates to your profile
"Here's How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013.
<http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>.
Yuxing Zeng
27.
Judge Napolitano on Twitter Privacy Ruling in
Occupy Wall Street Case
This video shows that the tweet isn’t your
own anymore and they even can be the
evidence that are against yourself at the
court.
http://www.youtube.com/watch?v=2JRxoXqVix
g
Yuxing Zeng
28. "Buy YouTube Views." Buy Likes and Followers.
N.p., n.d. Web. 27 Nov. 2013.
<http://www.buylikesandfollowers.net/buyyoutube-views.html>.
A platform for users to create, connect and
discover the world’s videos
Was founded in 2005 by Chad Hurley, Steve
Chen and Jawed Karim
Received funding from Sequoia Capital, and
was acquired by Google Inc. in 2006
"YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov.
2013. <http://www.crunchbase.com/company/youtube>.
Yuxing Zeng
29.
Creating people’s YouTube channels without
their permissions
YouTube put web banners or rich media by
collecting your search history
"Laura Bruno's Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and
Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013.
<http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>.
Yuxing Zeng
30.
YouTube's video privacy and sharing options:
◦ If a YouTube user doesn't want to offend anyone
but also happens to be popular (having a
substantial amount of subscribers), this user will
want to reach more than 25 people. This situation
renders the entire option of privatizing videos
pointless.
"Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013.
<http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>.
Yuxing Zeng
31.
New Google/YouTube Privacy Issues
This video shows that Google announced
privacy settings that will affect YouTube on
January 24,2012. Google will require users to
follow by the companies for their activates on
YouTube.
http://www.youtube.com/watch?v=jm8J9OHCv
iM
Yuxing Zeng
32. "How Can Agencies Step Beyond LinkedIn to Gain a Competitive
Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013.
<http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.
The Social network for work professionals
Created by Reid Hoffman in 2002
4.2 billions “ professionally-oriented
searches” in 2011
"Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>.
Yuxing Zeng
33.
Managed to lose millions of users' email and
password combinations
A LinkedIn user who indicates they want their
profile to remain anonymous to the person
whose profile they've viewed, that
occasionally the searcher's profile comes up
on the said viewed member's page as
someone who they might like to connect
with.
"LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d.
Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>.
Yuxing Zeng
34.
Not taking the measures it needs to acquire
the support of individuals who want to be as
private as possible on the Internet
Exposing users’ Google searches
"privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web.
28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>.
"LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d.
Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>.
Yuxing Zeng
35.
Protecting your privacy on LinkedIn
This video shows that how to protect your
LinkedIn profile by disenable the activities
broadcasts. It already became a privacy issues
for the LinkedIn that other people can see
your own news feed.
http://www.youtube.com/watch?v=vnJ4Tv_4p
Mk
Yuxing Zeng
36.
Consumers using online social networking
sites need to remember that once you post
something online it is there FOREVER. You
can erase, delete, backspace what ever you
want, but the fact of the matter is that once
posted online, NOTHING IS DELETABLE.
Rachel Brock
37.
Because there are a number of dishonest people
online who aim to steal your personal information
for financial gain, personal gain, or just plain fun.
Types of Online Threats:
Fraudsters
Hackers
Hoaxsters
Cyber-Bullies
Online Predators
Cyber Stalkers
Rachel Brock
38.
People who use the internet to take advantage of
victims, usually involving theft of personal or
financial information. These people may use the
internet to present fraudulent
solicitations, fraudulent transactions, or transmit
the proceeds of fraud to institutions or other
individuals connected with the scheme.
"Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013.
http://legal-dictionary.thefreedictionary.com/Internet+Fraud
Claire Keating
39.
15 People Arrested in RCMP Raids On Alleged
Fraudsters in Montreal
•
Fifteen people working at a call center in
Montreal were arrested on charges of massmarket fraud that spanned Canada and the
U.S., targeting thousands of victims and
robbing approximately $20 million.
"680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal
Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>.
Claire Keating
40.
An individual with extensive computer programming
knowledge, that seeks and exploits weaknesses in a
computer system or computer network (ex – social media
sites). Through these software weaknesses they may gain
access to personal files and information, and the lengths to
which they may use this information is endless. They may be
motivated by a number of reasons including profit, protest, or
challenge.
"hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>.
Rachel Brock
41. Recent Hacker Attacks in Canada
This article discusses the hacker software titles
“Citadel” and how it was discovered by the RCMP in
Burnaby. The software is estimated to have effected
more that 5 million people in over 90
countries, stealing over $500 million dollars from
victims bank accounts.
"B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews.
CBC/Radio Canada, n.d. Web. 27 Nov. 2013.
Rachel Brock
42. Top 10 Infamous Computer Hackers
This video shows the top 10 most infamous
computer hackers, and the effect they had on
people and businesses around the world.
Rachel Brock
43.
Hoax: Noun
1. to trick into believing or accepting as genuine something
false and often preposterous.
2. something accepted or established by fraud or fabrication
Hoaxsters are people who deliberately fabricate
false information and spread it virally. This
information is heard and seen by others, and
passed around because it is perceived to be
factual.
"Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013.
Rachel Brock
44.
Hacked Fox News Twitter Account Declares
Obama Died
This article released to the public through the
online press "The Free Library," states how Fox
News' Twitter account was hacked by a hoaxer
group called "The Script Kiddies." They
released false information that went viral
stating that Obama had been assassinated.
"Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013.
Rachel Brock
45.
The use of technology, specifically the internet and
social media websites, to harass or harm people in
a deliberate and hostile manner. It can involve
anything from gossiping, to spreading false
rumours, to making harmful threats to people.
Cyber-bullying has become common among young
social media users.
"Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013.
<http://definetheline.ca/dtl/category/cyberbullying/>.
Claire Keating
46.
95% of social media-using teens who have
witnessed cruel behavior on social
networking sites say they have seen others
ignoring the mean behavior; 55% witness this
frequently
66% of teens who have witnessed online
cruelty have also witnessed others joining;
21% say they have also joined in the
harassment
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm
Claire Keating
47.
Only 7% of U.S. parents are worried about
cyberbullying, even though 33% of teenagers
have been victims of cyberbullying
One million children were
harassed, threatened or subjected to other
forms of cyberbullying on Facebook during
the past year
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm
Claire Keating
48.
68% of teens agree that cyberbullying is a serious
problem with today’s youth.[6]Reasons cyberbullies said
they engaged in cyberbullying:
◦ To show off to friends (11%)
◦ To be mean (14%)
◦ Something else (16%)
◦ To embarrass them (21%)
◦ For fun or entertainment (28%)
◦ They deserved it (58%)
◦ To get back at someone (58%)
81% of youth agree that bullying online is easier to get
away with than bullying in person
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm
Claire Keating
49.
Delete Cyber Bullying
This YouTube video explains what cyber-bullying
really is and describes the characteristics of a cyberbully. They believe they have an advantage online
because they are secured online and there actions
have no consequences. Cyber-bullying is a monster
that we as consumers of social media have created
ourselves. The YouTube video encourages online
consumer to “Be The Change” and spread positive
thoughts, messages, images and videos online.
Claire Keating
50.
The Case of Tyler Clementi
Attention to the issue of cyber-bullying was first brought to the
public eye through the case of the suicide of Tyler Clementi.
Tyler Cementi’s roommate set up a web-cam and recorded
Tyler having homosexual intercourse with another man, and
broadcasted it on the internet. After Tyler’s suicide, his
roommate, Dharun Ravi, was sentenced to 30 days in jail.
"Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013.
Claire Keating
51.
Online predators are arguably the most dangerous
internet users. Online predators are people who
look for weakness in others online, and intend to
inflict harm on them. The most common type of
online predators are mature men and females
using open chat sites to lure in minors and commit
lewd and perverse acts with them. These people
are often pedophiles, and attack young naïve
children who agree to meet with them in person.
"The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013.
<http://www.familysafecomputers.org/predators.htm>.
Rachel Brock
52. Child Internet Safety PSA – Online Predators
This video shows how easily a child can be
manipulated into giving out personal
information to predators.
Rachel Brock
53.
In 82% of online sex crimes against minors, the
offender used the victim's social networking site to
gain information about the victim's likes and
dislikes
65% of online sex offenders used the victim's social
networking site to gain home and school
information about the victim
Only 1 in 3 people will report sexual crimes to a
trusted adult
"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
Rachel Brock
54.
26% of online sex offenders used the victim's social
networking site to gain information about the victim's
whereabouts at a specific time
There are over 747,408 registered sex offenders in the
United States, and over 100,000 are lost in the system
Four percent of all youth Internet users received aggressive
sexual solicitations, which threatened to spill over into “real
life”. These solicitors asked to meet the youth in
person, called them on the telephone or sent offline
mail, money or gifts. Also, four percent of youth had
distressing sexual solicitations that left them feeling upset of
extremely afraid.
"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
Rachel Brock
55.
Virtual Girl "Sweetie" Helps Track Thousands
of Online Sexual Predators
Another example is the virtual girl “Sweetie,”
a 10 year old Pilipino girl designed through
computer software, who helps to track online
predators.
Rachel Brock
56. THE NUMBER ONE RULE!:
The only way to ensure your information is safe
online, is to be careful of and responsible for
everything that you post. Since nothing can ever
be removed from the online world, you must
make sure you don’t post personal
information, reputation damaging
pictures, blogs, ANYTHING that may come back
to haunt you. Future employers may access your
social networking sites and choose not to hire
you based on pictures and posts they find.
Rachel Brock
57. 2. Do not trust strangers you meet online
People you meet online should not be trusted with
your personal information. People are able to
create multiple cyber identities, and may not really
be the trustworthy person you think you are talking
to behind the computer screen.
Rachel Brock
58. 3. Do not share personal information over the
Internet or through social networking sites.
Sharing your banking information, your
whereabouts, our address, phone number, or
contact information on social networking sites or
with people you talk to online can be a threat to
your privacy and safety.
Rachel Brock
59. 4. Have multiple passwords and security
questions.
Many people make the mistake of having one
simple password for all of their online accounts. If
this password were to be compromised, this could
have devastating results.
Claire Keating
60. 5. Report online abuse.
If you are a witness to cyber bullying, fraud, or any
other illegal online activity it is important to report
it immediately. The failure to report could have
devastating effects for not only you, but others
around you. If someone is cyber-bullying you, the
odd are high that they are doing it to others as
well.
Claire Keating
61. 6. Format Your Privacy Settings
Make sure your privacy settings are limited to the
public. Allowing only your friends and family to
have access to your profiles prevents strangers
from viewing your personal information.
Claire Keating
62.
Online Privacy
Online privacy animation video, that makes us
wonder “what if online actions were set in the
physical, tangible world?” The YouTube video shares
with consumers that we have to be aware of what we
are posting online and who we are sharing it with
because there could be consequences. Remember…
Think before you click!
Claire Keating
63. Protecting Your Privacy On The Internet
This page posts tips on how to protect personal
privacy on the Internet, through Microsoft’s Safety &
Security Center. It details topics such as thinking
before sharing personal information, monitoring
what others post, guarding personal
information, and protecting yourself from fraud.
Alyssa Budhoo
64. “Data Privacy Day, held annually on January
28, encourages everyone to make protecting
privacy and data a greater priority. DPD is an effort
to empower and educate people to protect their
privacy and control their digital footprint.
Contribute to the success of Data Privacy Day by
sharing resources and advice on social
media, hosting an event, or having your
organization become a DPD Champion. You can
make a difference in just a few minutes Jan. 28!”
"Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013
Claire Keating
65.
Privacy and Social Networks
Social networking sites are a commercial operation
where they focus on making money by collecting
user data. By knowing what we like, where we
live, and what are interest
are, companies, advertisers, marketers and
employers make money. The data that we post
online on social networking sites such as Facebook
and Twitter make decisions about you.
Claire Keating
66. The Future of Online Privacy
This video discovers how digital footprints are
everywhere through facial recognition software, for
example, among all online personal users. The video
features the speaker, Jonathan Stickland, who
investigates the future of online privacy and what to
expect.
Alyssa Budhoo
67. “Once conversations that should be private are
undertaken in a public forum, they become
theater – meant for the onlookers more than
the participants.”
-ANNONYMOUS
Claire Keating