SlideShare ist ein Scribd-Unternehmen logo
1 von 67
By: Rachel Brock, Alyssa Budhoo,
Claire Keating & Yuxing Zeng












Why Do People Use Social Media?
Legal Issues With Social Media
Facebook – Privacy Issues
Twitter – Privacy Issues
YouTube – Privacy Issues
LinkedIn – Privacy Issues
Protecting Your Privacy
Online Threats
Steps To Ensuring Online Privacy
National Privacy Day






Social Interaction- allows people to be social.
They meet new people and keep in touch with
family, friends, and acquaintances.
Seek Information- used to find information
about products/services, keeping up with
real-world social events, and learning new
things.
Pass Time- great tool to kill time and when
you’re bored.

Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/

Alyssa Budhoo








Entertainment-social media gives access to
games, music and videos.
Relaxation- social media helps relieve stress
and escape reality.
Expression of Opinions- people express
thoughts and opinions through social media.
Things to Talk About- social media provides
topics for people to talk and gossip about
with others.

Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/

Alyssa Budhoo






Convenience- social media is easily
accessible anywhere at any time. People can
talk to numerous people at the same time.
Sharing Information- people market their
own image through social media by
broadcasting things about themselves
through publishing updates, videos and
pictures.

Know about others- social media gives
people a display into the lives of others, by
being able to check out other profiles.

Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from
https://www.onepoll.com/10-reasons-people-use-social-media/

Alyssa Budhoo
Why Use Social Media in Business?

The video states facts about social media networks
and how much popularity they are gaining due to the
fact that there are more users and people joining
these sites. Therefore, giving businesses an effective
reason to use social media in their business
practices.

Alyssa Budhoo






Branding- creates a noticeable identity for the
product/service.
Creates a Buzz- word gets out about the
products/services through online
conversation.
Online Reputation Management- Easy to see
what other people and sites are saying about
the name, company, or brand online.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






Established as an Expert- using forums and
message boards to answer questions
professionally, honestly, and correctly will earn
businesses respect as an expert.
Word of Mouth- market products through word
of mouth virtually. Customers trust friends and
family; they need to trust before
purchasing, therefore hearing about the product
from someone trustworthy, will insist them to
buy.

Builds relationships and Becomes More Personalusing a variety of social media will build
relationships with customers and potential
customers.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






Open up the line of communication between
business owner and millions of potential
customers- Millions of people use social media
everyday and can become potential customers,
this does not come so easily in the offline world.
Small businesses can compete with large
companies- with the right type of viral social
media, an immense amount of traffic can grow
quickly with natural links, and keep traffic
coming for a long time.
Social networking with potential clients and
customers from all over the globe- with all the
social networking sites available, businesses can
hold personal conversations with each of their
customers.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






Generates Traffic- If an item becomes viral and
makes it to the front page of a big social news
site, the viewership can grow tremendously.
Increased link-ability- in order to move up in
search engines, having links from other sites
pointed to the business site is essential. Natural
links-or links that come from a great post, video,
or picture, are best for the business.
Cheaper than traditional Marketing and
Advertising- social media is a portion of the cost
of traditional marketing and advertising.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo






The company is more accessible- everyone
can access online interaction anywhere at any
time.
Direct conversation to a specific niche- many
social networking, social bookmarking, and
social news site are directed to specific
niches. Business’ have the ability to speak
directly to them.

Another way for potential customers to find
you- if the business is not high enough in
search engines, customers can still find the
business through social media.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo




A way to explain yourself- it’s always going
to be possible to receive negative comments.
Social media provides a platform to
explain, and fix things to make them right.
Shows your stuff- Universal search is now
accessible through Google, meaning
everything appears on Google Search. So
product images can rank like the business
site, making it easier for customers to see
your product right on the Google search.
Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo




Find out what customers want- social media
allows you to ask customers exactly what
they want.

Customers can play an active role in the
business- customers can offer
suggestions, share their likes and dislikes all
on social media. Therefore, ideas for new
products and services can develop.

Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved
from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/

Alyssa Budhoo
1.

2.
3.
4.
5.

6.
7.
8.
9.
10.

Disclosure of Confidential Information
Unauthorized Use of Trademarks
Unauthorized Use of Copyright-Protected Works
Defamation Issues
Electronic Discovery
Dynamic Information
Human Resources Issues
Securities
Privacy/Publicity
Endorsements

Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from
http://www.bartonchicago.com/pdf/socialmedia.pdf

Alyssa Budhoo
Posting videos and photos without proper releases
may infringe the privacy or publicity rights of
individuals. Companies must make sure that their
employees are not violating specific privacy
regulations in their activities on social media sites.

Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from
http://www.bartonchicago.com/pdf/socialmedia.pdf

Alyssa Budhoo
Top 10 Legal Issues in Social Media
Social networking and Social media is becoming the
“next big thing” for both small and large businesses.
With advertisers, marketers, HR departments, job
seekers, and employees using these tools, they need
to be aware of potential consequences in order to
avoid legal problems. The article lists the top 10
legal problems companies may face when using
social media in their business practices.

Alyssa Budhoo
As you have read, social media sites come with
great advantages and opportunities for people
both in their personal and business world.
They do, however, come with issues and
threats specifically aimed towards our privacy.
The following slides will examine privacy issues
with the most popular social media sites:
Facebook, Twitter, YouTube and LinkedIn.

Rachel Brock
Privacy App Pinpoints Your Exact Location Using
Social Media
With the ongoing popularity among high school
students using Twitter and Instagram, they are not
aware of the amount of information being posted
from their social media updates. In the article,
researchers at the International Computer Science
Institute and UC Berkeley present findings about
geo-tags and the threats they can impose on high
school students who update regularly on social
media.

Alyssa Budhoo


Launched February 2004

"Facebook to offer TV data to networks Comments."
Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013.
<http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.



Created by Mark Zuckerberg
Facebook allows you to connect with
friends, upload photos, and share links and videos



The most popular online Social networking site





In 2013, Facebook reached 750 million unique
visits per month
"Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>.
"Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013.
<http://visual.ly/top-10-most-popular-social-networks-2013>.

Yuxing Zeng




News feed: angered many users by not giving them control
of who could see their updates, or the ability to opt out
◦ Launched in 2006
Beacon (2007)
◦ a Facebook ad system that tracked what users did and
what they purchased on partner websites, even for users
who were not Facebook members
◦ Adding to the privacy concerns, information about
Facebook users' purchases were published without their
explicit consent on their friends' news feeds

"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.

Yuxing Zeng




Privacy settings
◦ Facebook changed their privacy settings, sharing
information with everyone became the default setting
◦ Terrible guide for the privacy settings of Facebook
Private messages
◦ A glitch in February 2010 caused some private
messages on Facebook to be sent to unintended
recipients
◦ A coding error opened Facebook chats, which are
supposed to be private, for others to see

"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.

Yuxing Zeng




The anti-Google campaign (2011):
◦ Facebook wanted it kept private that they were behind
the anti-Google campaign in 2011. Once
exposed, Facebook admitted that they should have
behaved "in a serious and transparent way.”
Timeline:
◦ Users could decide who could see that information
but not if it was on their friends' Facebook pages.

"8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28
Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>.

Yuxing Zeng






Tech Yeah! Facebook privacy issues
This video shows that Facebook is relaxing its
rules such as “Follow” button puts posts in
News feeds which will cause more privacy
issues among teenagers.
http://video.cnbc.com/gallery/?video=30002
08666

Yuxing Zeng
"Twitter Now Covered by Analysts at Wells Fargo & Co.
(TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov.
2013.
<http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.



Created in 2006



Global real-time communications platform



400 million monthly visitors



One billion tweets every 2.5 days

"Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013.
<http://www.crunchbase.com/company/twitter>.

Yuxing Zeng




Design
◦ Mostly dodged privacy concerns
◦ Anyone can see your tweets

Twitter collects data
(tweets, retweets, location, people who you follow)
◦ Twitter than promotes “Promoted Tweets” on your
timeline that relates to your profile

"Here&apos;s How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013.
<http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>.

Yuxing Zeng




Judge Napolitano on Twitter Privacy Ruling in
Occupy Wall Street Case
This video shows that the tweet isn’t your
own anymore and they even can be the
evidence that are against yourself at the
court.

http://www.youtube.com/watch?v=2JRxoXqVix
g
Yuxing Zeng
"Buy YouTube Views." Buy Likes and Followers.
N.p., n.d. Web. 27 Nov. 2013.
<http://www.buylikesandfollowers.net/buyyoutube-views.html>.







A platform for users to create, connect and
discover the world’s videos
Was founded in 2005 by Chad Hurley, Steve
Chen and Jawed Karim
Received funding from Sequoia Capital, and
was acquired by Google Inc. in 2006

"YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov.
2013. <http://www.crunchbase.com/company/youtube>.

Yuxing Zeng




Creating people’s YouTube channels without
their permissions
YouTube put web banners or rich media by
collecting your search history

"Laura Bruno&apos;s Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and
Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013.
<http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>.

Yuxing Zeng


YouTube's video privacy and sharing options:
◦ If a YouTube user doesn't want to offend anyone
but also happens to be popular (having a
substantial amount of subscribers), this user will
want to reach more than 25 people. This situation
renders the entire option of privatizing videos
pointless.

"Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013.
<http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>.

Yuxing Zeng




New Google/YouTube Privacy Issues
This video shows that Google announced
privacy settings that will affect YouTube on
January 24,2012. Google will require users to
follow by the companies for their activates on
YouTube.

http://www.youtube.com/watch?v=jm8J9OHCv
iM
Yuxing Zeng
"How Can Agencies Step Beyond LinkedIn to Gain a Competitive
Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013.
<http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.



The Social network for work professionals



Created by Reid Hoffman in 2002



4.2 billions “ professionally-oriented
searches” in 2011

"Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>.

Yuxing Zeng




Managed to lose millions of users' email and
password combinations
A LinkedIn user who indicates they want their
profile to remain anonymous to the person
whose profile they've viewed, that
occasionally the searcher's profile comes up
on the said viewed member's page as
someone who they might like to connect
with.

"LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d.
Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>.

Yuxing Zeng




Not taking the measures it needs to acquire
the support of individuals who want to be as
private as possible on the Internet
Exposing users’ Google searches

"privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web.
28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>.
"LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d.
Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>.

Yuxing Zeng




Protecting your privacy on LinkedIn
This video shows that how to protect your
LinkedIn profile by disenable the activities
broadcasts. It already became a privacy issues
for the LinkedIn that other people can see
your own news feed.

http://www.youtube.com/watch?v=vnJ4Tv_4p
Mk
Yuxing Zeng


Consumers using online social networking
sites need to remember that once you post
something online it is there FOREVER. You
can erase, delete, backspace what ever you
want, but the fact of the matter is that once
posted online, NOTHING IS DELETABLE.

Rachel Brock










Because there are a number of dishonest people
online who aim to steal your personal information
for financial gain, personal gain, or just plain fun.
Types of Online Threats:
Fraudsters
Hackers
Hoaxsters
Cyber-Bullies
Online Predators
Cyber Stalkers
Rachel Brock


People who use the internet to take advantage of
victims, usually involving theft of personal or
financial information. These people may use the
internet to present fraudulent
solicitations, fraudulent transactions, or transmit
the proceeds of fraud to institutions or other
individuals connected with the scheme.

"Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013.
http://legal-dictionary.thefreedictionary.com/Internet+Fraud

Claire Keating


15 People Arrested in RCMP Raids On Alleged
Fraudsters in Montreal
•

Fifteen people working at a call center in
Montreal were arrested on charges of massmarket fraud that spanned Canada and the
U.S., targeting thousands of victims and
robbing approximately $20 million.

"680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal
Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>.

Claire Keating


An individual with extensive computer programming
knowledge, that seeks and exploits weaknesses in a
computer system or computer network (ex – social media
sites). Through these software weaknesses they may gain
access to personal files and information, and the lengths to
which they may use this information is endless. They may be
motivated by a number of reasons including profit, protest, or
challenge.

"hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>.

Rachel Brock
Recent Hacker Attacks in Canada
This article discusses the hacker software titles
“Citadel” and how it was discovered by the RCMP in
Burnaby. The software is estimated to have effected
more that 5 million people in over 90
countries, stealing over $500 million dollars from
victims bank accounts.

"B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews.
CBC/Radio Canada, n.d. Web. 27 Nov. 2013.

Rachel Brock
Top 10 Infamous Computer Hackers

This video shows the top 10 most infamous
computer hackers, and the effect they had on
people and businesses around the world.

Rachel Brock


Hoax: Noun

1. to trick into believing or accepting as genuine something
false and often preposterous.
2. something accepted or established by fraud or fabrication


Hoaxsters are people who deliberately fabricate
false information and spread it virally. This
information is heard and seen by others, and
passed around because it is perceived to be
factual.

"Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013.

Rachel Brock


Hacked Fox News Twitter Account Declares
Obama Died

This article released to the public through the
online press "The Free Library," states how Fox
News' Twitter account was hacked by a hoaxer
group called "The Script Kiddies." They
released false information that went viral
stating that Obama had been assassinated.

"Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013.

Rachel Brock


The use of technology, specifically the internet and
social media websites, to harass or harm people in
a deliberate and hostile manner. It can involve
anything from gossiping, to spreading false
rumours, to making harmful threats to people.
Cyber-bullying has become common among young
social media users.

"Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013.
<http://definetheline.ca/dtl/category/cyberbullying/>.

Claire Keating




95% of social media-using teens who have
witnessed cruel behavior on social
networking sites say they have seen others
ignoring the mean behavior; 55% witness this
frequently
66% of teens who have witnessed online
cruelty have also witnessed others joining;
21% say they have also joined in the
harassment
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm

Claire Keating




Only 7% of U.S. parents are worried about
cyberbullying, even though 33% of teenagers
have been victims of cyberbullying

One million children were
harassed, threatened or subjected to other
forms of cyberbullying on Facebook during
the past year

"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm

Claire Keating




68% of teens agree that cyberbullying is a serious
problem with today’s youth.[6]Reasons cyberbullies said
they engaged in cyberbullying:
◦ To show off to friends (11%)
◦ To be mean (14%)
◦ Something else (16%)
◦ To embarrass them (21%)
◦ For fun or entertainment (28%)
◦ They deserved it (58%)
◦ To get back at someone (58%)
81% of youth agree that bullying online is easier to get
away with than bullying in person
"Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.
http://www.internetsafety101.org/cyberbullyingstatistics.htm

Claire Keating


Delete Cyber Bullying

This YouTube video explains what cyber-bullying
really is and describes the characteristics of a cyberbully. They believe they have an advantage online
because they are secured online and there actions
have no consequences. Cyber-bullying is a monster
that we as consumers of social media have created
ourselves. The YouTube video encourages online
consumer to “Be The Change” and spread positive
thoughts, messages, images and videos online.

Claire Keating


The Case of Tyler Clementi

Attention to the issue of cyber-bullying was first brought to the
public eye through the case of the suicide of Tyler Clementi.
Tyler Cementi’s roommate set up a web-cam and recorded
Tyler having homosexual intercourse with another man, and
broadcasted it on the internet. After Tyler’s suicide, his
roommate, Dharun Ravi, was sentenced to 30 days in jail.

"Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013.

Claire Keating


Online predators are arguably the most dangerous
internet users. Online predators are people who
look for weakness in others online, and intend to
inflict harm on them. The most common type of
online predators are mature men and females
using open chat sites to lure in minors and commit
lewd and perverse acts with them. These people
are often pedophiles, and attack young naïve
children who agree to meet with them in person.

"The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013.
<http://www.familysafecomputers.org/predators.htm>.

Rachel Brock
Child Internet Safety PSA – Online Predators

This video shows how easily a child can be
manipulated into giving out personal
information to predators.

Rachel Brock






In 82% of online sex crimes against minors, the
offender used the victim's social networking site to
gain information about the victim's likes and
dislikes
65% of online sex offenders used the victim's social
networking site to gain home and school
information about the victim
Only 1 in 3 people will report sexual crimes to a
trusted adult

"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.

Rachel Brock






26% of online sex offenders used the victim's social
networking site to gain information about the victim's
whereabouts at a specific time
There are over 747,408 registered sex offenders in the
United States, and over 100,000 are lost in the system

Four percent of all youth Internet users received aggressive
sexual solicitations, which threatened to spill over into “real
life”. These solicitors asked to meet the youth in
person, called them on the telephone or sent offline
mail, money or gifts. Also, four percent of youth had
distressing sexual solicitations that left them feeling upset of
extremely afraid.
"InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013.

Rachel Brock




Virtual Girl "Sweetie" Helps Track Thousands
of Online Sexual Predators
Another example is the virtual girl “Sweetie,”
a 10 year old Pilipino girl designed through
computer software, who helps to track online
predators.

Rachel Brock
THE NUMBER ONE RULE!:


The only way to ensure your information is safe
online, is to be careful of and responsible for
everything that you post. Since nothing can ever
be removed from the online world, you must
make sure you don’t post personal
information, reputation damaging
pictures, blogs, ANYTHING that may come back
to haunt you. Future employers may access your
social networking sites and choose not to hire
you based on pictures and posts they find.
Rachel Brock
2. Do not trust strangers you meet online


People you meet online should not be trusted with
your personal information. People are able to
create multiple cyber identities, and may not really
be the trustworthy person you think you are talking
to behind the computer screen.

Rachel Brock
3. Do not share personal information over the
Internet or through social networking sites.


Sharing your banking information, your
whereabouts, our address, phone number, or
contact information on social networking sites or
with people you talk to online can be a threat to
your privacy and safety.

Rachel Brock
4. Have multiple passwords and security
questions.


Many people make the mistake of having one
simple password for all of their online accounts. If
this password were to be compromised, this could
have devastating results.

Claire Keating
5. Report online abuse.


If you are a witness to cyber bullying, fraud, or any
other illegal online activity it is important to report
it immediately. The failure to report could have
devastating effects for not only you, but others
around you. If someone is cyber-bullying you, the
odd are high that they are doing it to others as
well.

Claire Keating
6. Format Your Privacy Settings


Make sure your privacy settings are limited to the
public. Allowing only your friends and family to
have access to your profiles prevents strangers
from viewing your personal information.

Claire Keating


Online Privacy

Online privacy animation video, that makes us
wonder “what if online actions were set in the
physical, tangible world?” The YouTube video shares
with consumers that we have to be aware of what we
are posting online and who we are sharing it with
because there could be consequences. Remember…
Think before you click!

Claire Keating
Protecting Your Privacy On The Internet

This page posts tips on how to protect personal
privacy on the Internet, through Microsoft’s Safety &
Security Center. It details topics such as thinking
before sharing personal information, monitoring
what others post, guarding personal
information, and protecting yourself from fraud.

Alyssa Budhoo
“Data Privacy Day, held annually on January
28, encourages everyone to make protecting
privacy and data a greater priority. DPD is an effort
to empower and educate people to protect their
privacy and control their digital footprint.
Contribute to the success of Data Privacy Day by
sharing resources and advice on social
media, hosting an event, or having your
organization become a DPD Champion. You can
make a difference in just a few minutes Jan. 28!”
"Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013

Claire Keating


Privacy and Social Networks

Social networking sites are a commercial operation
where they focus on making money by collecting
user data. By knowing what we like, where we
live, and what are interest
are, companies, advertisers, marketers and
employers make money. The data that we post
online on social networking sites such as Facebook
and Twitter make decisions about you.

Claire Keating
The Future of Online Privacy

This video discovers how digital footprints are
everywhere through facial recognition software, for
example, among all online personal users. The video
features the speaker, Jonathan Stickland, who
investigates the future of online privacy and what to
expect.

Alyssa Budhoo
“Once conversations that should be private are
undertaken in a public forum, they become
theater – meant for the onlookers more than
the participants.”
-ANNONYMOUS

Claire Keating

Weitere ähnliche Inhalte

Was ist angesagt?

Syracuse Public
Syracuse PublicSyracuse Public
Syracuse PublicMatt Hames
 
Being Your Own Best Publicist
Being Your Own Best PublicistBeing Your Own Best Publicist
Being Your Own Best Publicistjosephhansen
 
What the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year LaterWhat the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year LaterMartafy!
 
Social Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit GrantorSocial Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit GrantorArielMcCurdy
 
Social Media, Employment, and Disability
Social Media, Employment, and DisabilitySocial Media, Employment, and Disability
Social Media, Employment, and DisabilityPaul Smith
 
Social Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul HolmesSocial Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul HolmesSocial Media Camp
 
Social Media Rocket Matter
Social Media Rocket MatterSocial Media Rocket Matter
Social Media Rocket MatterSamantha Collier
 
Navigating Ethical Problems Social Media
Navigating Ethical Problems Social MediaNavigating Ethical Problems Social Media
Navigating Ethical Problems Social MediaLisa Borodkin
 
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"Lisa Borodkin
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
Social Media hosted by RocketMatter
Social Media hosted by RocketMatterSocial Media hosted by RocketMatter
Social Media hosted by RocketMatterNatalie Alesi
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationWobbeMassage
 
Your voice on the Web
Your voice on the Web Your voice on the Web
Your voice on the Web robin fay
 
Using Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job SearchUsing Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job SearchReinfranck
 

Was ist angesagt? (20)

Syracuse Public
Syracuse PublicSyracuse Public
Syracuse Public
 
Being Your Own Best Publicist
Being Your Own Best PublicistBeing Your Own Best Publicist
Being Your Own Best Publicist
 
What the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year LaterWhat the F**K is Social Media: One Year Later
What the F**K is Social Media: One Year Later
 
Social Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit GrantorSocial Media & Ethical Concerns for the Credit Grantor
Social Media & Ethical Concerns for the Credit Grantor
 
Social Media, Employment, and Disability
Social Media, Employment, and DisabilitySocial Media, Employment, and Disability
Social Media, Employment, and Disability
 
Social Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul HolmesSocial Media Camp Workshop - Victoria, paul Holmes
Social Media Camp Workshop - Victoria, paul Holmes
 
Unit 35
Unit 35Unit 35
Unit 35
 
Social Media Rocket Matter
Social Media Rocket MatterSocial Media Rocket Matter
Social Media Rocket Matter
 
Navigating Ethical Problems Social Media
Navigating Ethical Problems Social MediaNavigating Ethical Problems Social Media
Navigating Ethical Problems Social Media
 
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
NAELA Summit "Navigating Ethical and Legal Issues in Social Media"
 
Rochester
RochesterRochester
Rochester
 
Who is watching facebook
Who is watching facebookWho is watching facebook
Who is watching facebook
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Web pp
Web ppWeb pp
Web pp
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Albany
AlbanyAlbany
Albany
 
Social Media hosted by RocketMatter
Social Media hosted by RocketMatterSocial Media hosted by RocketMatter
Social Media hosted by RocketMatter
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Your voice on the Web
Your voice on the Web Your voice on the Web
Your voice on the Web
 
Using Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job SearchUsing Social Media Tools To Leverage Your Job Search
Using Social Media Tools To Leverage Your Job Search
 

Ähnlich wie Social media and the future of privacy

Personal Branding Online
Personal Branding OnlinePersonal Branding Online
Personal Branding OnlineLisa Harris
 
Social media for employement and personal brand
Social media for employement and personal brandSocial media for employement and personal brand
Social media for employement and personal brandKatie Fellenz
 
Social Media For Employement And Personal Brand
Social Media For Employement And Personal BrandSocial Media For Employement And Personal Brand
Social Media For Employement And Personal BrandMelonie Gallegos
 
Trade brookln presentation social media seminar
Trade brookln presentation social media seminarTrade brookln presentation social media seminar
Trade brookln presentation social media seminarBasil Puglisi
 
Social Media Presentation2
Social Media Presentation2Social Media Presentation2
Social Media Presentation2Jasmeet Nagra
 
Social Media For Employment
Social Media For EmploymentSocial Media For Employment
Social Media For EmploymentKatie Fellenz
 
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09Dawn Crawford
 
Social Media Introduction
Social Media IntroductionSocial Media Introduction
Social Media IntroductionRobin Low
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310Rick Morgan
 
Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009Team Eleven
 
Trade nassau presentation social media seminar
Trade nassau presentation social media seminarTrade nassau presentation social media seminar
Trade nassau presentation social media seminarBasil Puglisi
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterMichael Pranikoff
 
Social media ethics
Social media ethicsSocial media ethics
Social media ethicsAndy Huckaba
 
CCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH ProfessionalsCCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH ProfessionalsAlpha 180
 
Baby Boomers and Social Media Success
Baby Boomers and Social Media SuccessBaby Boomers and Social Media Success
Baby Boomers and Social Media SuccessNancy Cavanaugh
 
Intermediate social media business march 2011
Intermediate social media business march 2011Intermediate social media business march 2011
Intermediate social media business march 2011HubSpot
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bresslerhillarybressler
 
Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011social3i
 
Quadruplicity Presentation
Quadruplicity PresentationQuadruplicity Presentation
Quadruplicity Presentationjhull
 

Ähnlich wie Social media and the future of privacy (20)

Personal Branding Online
Personal Branding OnlinePersonal Branding Online
Personal Branding Online
 
Social media for employement and personal brand
Social media for employement and personal brandSocial media for employement and personal brand
Social media for employement and personal brand
 
Social Media For Employement And Personal Brand
Social Media For Employement And Personal BrandSocial Media For Employement And Personal Brand
Social Media For Employement And Personal Brand
 
Trade brookln presentation social media seminar
Trade brookln presentation social media seminarTrade brookln presentation social media seminar
Trade brookln presentation social media seminar
 
Social Media Presentation2
Social Media Presentation2Social Media Presentation2
Social Media Presentation2
 
Social Media For Employment
Social Media For EmploymentSocial Media For Employment
Social Media For Employment
 
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
Utilizing Social Media To Promote Your Nonprofit Cna Fall 09
 
Social Media Introduction
Social Media IntroductionSocial Media Introduction
Social Media Introduction
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310
 
Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009Social Media Disruption B2B IBM Seminar October 2009
Social Media Disruption B2B IBM Seminar October 2009
 
Trade nassau presentation social media seminar
Trade nassau presentation social media seminarTrade nassau presentation social media seminar
Trade nassau presentation social media seminar
 
Social Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and WaterSocial Media & Investor Relations: It’s NOT Oil and Water
Social Media & Investor Relations: It’s NOT Oil and Water
 
Social media ethics
Social media ethicsSocial media ethics
Social media ethics
 
CCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH ProfessionalsCCSAD - Social Media for BH Professionals
CCSAD - Social Media for BH Professionals
 
Baby Boomers and Social Media Success
Baby Boomers and Social Media SuccessBaby Boomers and Social Media Success
Baby Boomers and Social Media Success
 
Intermediate social media business march 2011
Intermediate social media business march 2011Intermediate social media business march 2011
Intermediate social media business march 2011
 
Social media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary BresslerSocial media success strategies June 2010 by CEO Hillary Bressler
Social media success strategies June 2010 by CEO Hillary Bressler
 
Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011Social Media Strategies - Social3i - School of Visual Concepts - April 2011
Social Media Strategies - Social3i - School of Visual Concepts - April 2011
 
Quadruplicity Presentation
Quadruplicity PresentationQuadruplicity Presentation
Quadruplicity Presentation
 
Driving Social Media PR
Driving Social Media PRDriving Social Media PR
Driving Social Media PR
 

Kürzlich hochgeladen

Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Music Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxMusic Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxjenrobinson12
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhidelhiescort
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 

Kürzlich hochgeladen (20)

Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
Music Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxMusic Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptx
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 

Social media and the future of privacy

  • 1. By: Rachel Brock, Alyssa Budhoo, Claire Keating & Yuxing Zeng
  • 2.
  • 3.           Why Do People Use Social Media? Legal Issues With Social Media Facebook – Privacy Issues Twitter – Privacy Issues YouTube – Privacy Issues LinkedIn – Privacy Issues Protecting Your Privacy Online Threats Steps To Ensuring Online Privacy National Privacy Day
  • 4.    Social Interaction- allows people to be social. They meet new people and keep in touch with family, friends, and acquaintances. Seek Information- used to find information about products/services, keeping up with real-world social events, and learning new things. Pass Time- great tool to kill time and when you’re bored. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
  • 5.     Entertainment-social media gives access to games, music and videos. Relaxation- social media helps relieve stress and escape reality. Expression of Opinions- people express thoughts and opinions through social media. Things to Talk About- social media provides topics for people to talk and gossip about with others. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
  • 6.    Convenience- social media is easily accessible anywhere at any time. People can talk to numerous people at the same time. Sharing Information- people market their own image through social media by broadcasting things about themselves through publishing updates, videos and pictures. Know about others- social media gives people a display into the lives of others, by being able to check out other profiles. Connor, O. (2013, July 5). 10 reasons people use social media. Retrieved from https://www.onepoll.com/10-reasons-people-use-social-media/ Alyssa Budhoo
  • 7. Why Use Social Media in Business? The video states facts about social media networks and how much popularity they are gaining due to the fact that there are more users and people joining these sites. Therefore, giving businesses an effective reason to use social media in their business practices. Alyssa Budhoo
  • 8.    Branding- creates a noticeable identity for the product/service. Creates a Buzz- word gets out about the products/services through online conversation. Online Reputation Management- Easy to see what other people and sites are saying about the name, company, or brand online. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 9.    Established as an Expert- using forums and message boards to answer questions professionally, honestly, and correctly will earn businesses respect as an expert. Word of Mouth- market products through word of mouth virtually. Customers trust friends and family; they need to trust before purchasing, therefore hearing about the product from someone trustworthy, will insist them to buy. Builds relationships and Becomes More Personalusing a variety of social media will build relationships with customers and potential customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 10.    Open up the line of communication between business owner and millions of potential customers- Millions of people use social media everyday and can become potential customers, this does not come so easily in the offline world. Small businesses can compete with large companies- with the right type of viral social media, an immense amount of traffic can grow quickly with natural links, and keep traffic coming for a long time. Social networking with potential clients and customers from all over the globe- with all the social networking sites available, businesses can hold personal conversations with each of their customers. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 11.    Generates Traffic- If an item becomes viral and makes it to the front page of a big social news site, the viewership can grow tremendously. Increased link-ability- in order to move up in search engines, having links from other sites pointed to the business site is essential. Natural links-or links that come from a great post, video, or picture, are best for the business. Cheaper than traditional Marketing and Advertising- social media is a portion of the cost of traditional marketing and advertising. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 12.    The company is more accessible- everyone can access online interaction anywhere at any time. Direct conversation to a specific niche- many social networking, social bookmarking, and social news site are directed to specific niches. Business’ have the ability to speak directly to them. Another way for potential customers to find you- if the business is not high enough in search engines, customers can still find the business through social media. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 13.   A way to explain yourself- it’s always going to be possible to receive negative comments. Social media provides a platform to explain, and fix things to make them right. Shows your stuff- Universal search is now accessible through Google, meaning everything appears on Google Search. So product images can rank like the business site, making it easier for customers to see your product right on the Google search. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 14.   Find out what customers want- social media allows you to ask customers exactly what they want. Customers can play an active role in the business- customers can offer suggestions, share their likes and dislikes all on social media. Therefore, ideas for new products and services can develop. Albert, S. (n.d.). 20 reasons your small business should use social media . Retrieved from http://blissfullydomestic.com/life-bliss/20-reasons-small-businessesshould-use-social-media/7414/ Alyssa Budhoo
  • 15. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Disclosure of Confidential Information Unauthorized Use of Trademarks Unauthorized Use of Copyright-Protected Works Defamation Issues Electronic Discovery Dynamic Information Human Resources Issues Securities Privacy/Publicity Endorsements Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
  • 16. Posting videos and photos without proper releases may infringe the privacy or publicity rights of individuals. Companies must make sure that their employees are not violating specific privacy regulations in their activities on social media sites. Neal & McDevitt. (2010). Top 10 legal issues in social media. Retrieved from http://www.bartonchicago.com/pdf/socialmedia.pdf Alyssa Budhoo
  • 17. Top 10 Legal Issues in Social Media Social networking and Social media is becoming the “next big thing” for both small and large businesses. With advertisers, marketers, HR departments, job seekers, and employees using these tools, they need to be aware of potential consequences in order to avoid legal problems. The article lists the top 10 legal problems companies may face when using social media in their business practices. Alyssa Budhoo
  • 18. As you have read, social media sites come with great advantages and opportunities for people both in their personal and business world. They do, however, come with issues and threats specifically aimed towards our privacy. The following slides will examine privacy issues with the most popular social media sites: Facebook, Twitter, YouTube and LinkedIn. Rachel Brock
  • 19. Privacy App Pinpoints Your Exact Location Using Social Media With the ongoing popularity among high school students using Twitter and Instagram, they are not aware of the amount of information being posted from their social media updates. In the article, researchers at the International Computer Science Institute and UC Berkeley present findings about geo-tags and the threats they can impose on high school students who update regularly on social media. Alyssa Budhoo
  • 20.  Launched February 2004 "Facebook to offer TV data to networks Comments." Digital TV Europe . N.p., n.d. Web. 28 Nov. 2013. <http://www.digitaltveurope.net/106962/facebook-tooffer-tv-data-to-networks/>.  Created by Mark Zuckerberg Facebook allows you to connect with friends, upload photos, and share links and videos  The most popular online Social networking site   In 2013, Facebook reached 750 million unique visits per month "Facebook." Answers.com. Answers, n.d. Web. 28 Nov. 2013. <http://www.answers.com/topic/facebook>. "Visual.Ly." Top 10 Most Popular Social Networks 2013. N.p., n.d. Web. 28 Nov. 2013. <http://visual.ly/top-10-most-popular-social-networks-2013>. Yuxing Zeng
  • 21.   News feed: angered many users by not giving them control of who could see their updates, or the ability to opt out ◦ Launched in 2006 Beacon (2007) ◦ a Facebook ad system that tracked what users did and what they purchased on partner websites, even for users who were not Facebook members ◦ Adding to the privacy concerns, information about Facebook users' purchases were published without their explicit consent on their friends' news feeds "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
  • 22.   Privacy settings ◦ Facebook changed their privacy settings, sharing information with everyone became the default setting ◦ Terrible guide for the privacy settings of Facebook Private messages ◦ A glitch in February 2010 caused some private messages on Facebook to be sent to unintended recipients ◦ A coding error opened Facebook chats, which are supposed to be private, for others to see "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
  • 23.   The anti-Google campaign (2011): ◦ Facebook wanted it kept private that they were behind the anti-Google campaign in 2011. Once exposed, Facebook admitted that they should have behaved "in a serious and transparent way.” Timeline: ◦ Users could decide who could see that information but not if it was on their friends' Facebook pages. "8 Facebook privacy flaps - Technology & Science - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 28 Nov. 2013. <http://www.cbc.ca/news/technology/8-facebook-privacy-flaps-1.1140969>. Yuxing Zeng
  • 24.    Tech Yeah! Facebook privacy issues This video shows that Facebook is relaxing its rules such as “Follow” button puts posts in News feeds which will cause more privacy issues among teenagers. http://video.cnbc.com/gallery/?video=30002 08666 Yuxing Zeng
  • 25. "Twitter Now Covered by Analysts at Wells Fargo & Co. (TWTR)." WKRB News RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.wkrb13.com/markets/232262/twitternow-covered-by-analysts-at-wells-fargo-co-twtr/>.  Created in 2006  Global real-time communications platform  400 million monthly visitors  One billion tweets every 2.5 days "Twitter." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 27 Nov. 2013. <http://www.crunchbase.com/company/twitter>. Yuxing Zeng
  • 26.   Design ◦ Mostly dodged privacy concerns ◦ Anyone can see your tweets Twitter collects data (tweets, retweets, location, people who you follow) ◦ Twitter than promotes “Promoted Tweets” on your timeline that relates to your profile "Here&apos;s How Twitter Can Track You on All of Your Devices." Mother Jones. N.p., n.d. Web. 26 Nov. 2013. <http://www.motherjones.com/politics/2013/09/twitter-could-threaten-your-privacy-more-facebook>. Yuxing Zeng
  • 27.   Judge Napolitano on Twitter Privacy Ruling in Occupy Wall Street Case This video shows that the tweet isn’t your own anymore and they even can be the evidence that are against yourself at the court. http://www.youtube.com/watch?v=2JRxoXqVix g Yuxing Zeng
  • 28. "Buy YouTube Views." Buy Likes and Followers. N.p., n.d. Web. 27 Nov. 2013. <http://www.buylikesandfollowers.net/buyyoutube-views.html>.    A platform for users to create, connect and discover the world’s videos Was founded in 2005 by Chad Hurley, Steve Chen and Jawed Karim Received funding from Sequoia Capital, and was acquired by Google Inc. in 2006 "YouTube." CrunchBase, The Free Tech Company Database. N.p., n.d. Web. 28 Nov. 2013. <http://www.crunchbase.com/company/youtube>. Yuxing Zeng
  • 29.   Creating people’s YouTube channels without their permissions YouTube put web banners or rich media by collecting your search history "Laura Bruno&apos;s Blog Medical Intuition, Soul Readings, Intuitive Coaching, Tarot, Reiki: Inspiring and Empowering Visionaries and Healers." Laura Brunos Blog. N.p., n.d. Web. 28 Nov. 2013. <http://laurabruno.wordpress.com/tag/youtube-privacy-issues/>. Yuxing Zeng
  • 30.  YouTube's video privacy and sharing options: ◦ If a YouTube user doesn't want to offend anyone but also happens to be popular (having a substantial amount of subscribers), this user will want to reach more than 25 people. This situation renders the entire option of privatizing videos pointless. "Google Groups." Google Groups. N.p., n.d. Web. 28 Nov. 2013. <http://productforums.google.com/forum/#!topic/youtube/aFLbzsGU66w>. Yuxing Zeng
  • 31.   New Google/YouTube Privacy Issues This video shows that Google announced privacy settings that will affect YouTube on January 24,2012. Google will require users to follow by the companies for their activates on YouTube. http://www.youtube.com/watch?v=jm8J9OHCv iM Yuxing Zeng
  • 32. "How Can Agencies Step Beyond LinkedIn to Gain a Competitive Edge?." Blog FireFish Software. N.p., n.d. Web. 28 Nov. 2013. <http://blog.firefishsoftware.com/bid/101435/How-CanAgencies-Step-Beyond-LinkedIn-to-Gain-a-Competitive-Edge>.  The Social network for work professionals  Created by Reid Hoffman in 2002  4.2 billions “ professionally-oriented searches” in 2011 "Mashable." Mashable. N.p., n.d. Web. 25 Nov. 2013. <http://mashable.com/category/linkedin/>. Yuxing Zeng
  • 33.   Managed to lose millions of users' email and password combinations A LinkedIn user who indicates they want their profile to remain anonymous to the person whose profile they've viewed, that occasionally the searcher's profile comes up on the said viewed member's page as someone who they might like to connect with. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
  • 34.   Not taking the measures it needs to acquire the support of individuals who want to be as private as possible on the Internet Exposing users’ Google searches "privacy issue? linkedin exposing my google searches???." - LinkedIn Help Center. N.p., n.d. Web. 28 Nov. 2013. <http://community.linkedin.com/questions/73446/privacy-issue-linkedinexposing-my-google-searches.html>. "LinkedIn (LNKD) Has Major Privacy Issues." Insider Monkey Free Hedge Fund and Insider Trading Data RSS. N.p., n.d. Web. 28 Nov. 2013. <http://www.insidermonkey.com/blog/linkedin-lnkd-has-major-privacy-issues23328/#3HEy13RT35rpjrB2.99>. Yuxing Zeng
  • 35.   Protecting your privacy on LinkedIn This video shows that how to protect your LinkedIn profile by disenable the activities broadcasts. It already became a privacy issues for the LinkedIn that other people can see your own news feed. http://www.youtube.com/watch?v=vnJ4Tv_4p Mk Yuxing Zeng
  • 36.  Consumers using online social networking sites need to remember that once you post something online it is there FOREVER. You can erase, delete, backspace what ever you want, but the fact of the matter is that once posted online, NOTHING IS DELETABLE. Rachel Brock
  • 37.         Because there are a number of dishonest people online who aim to steal your personal information for financial gain, personal gain, or just plain fun. Types of Online Threats: Fraudsters Hackers Hoaxsters Cyber-Bullies Online Predators Cyber Stalkers Rachel Brock
  • 38.  People who use the internet to take advantage of victims, usually involving theft of personal or financial information. These people may use the internet to present fraudulent solicitations, fraudulent transactions, or transmit the proceeds of fraud to institutions or other individuals connected with the scheme. "Internet Fraud." TheFreeDictionary.com. N.p., n.d. Web. 27 Nov. 2013. http://legal-dictionary.thefreedictionary.com/Internet+Fraud Claire Keating
  • 39.  15 People Arrested in RCMP Raids On Alleged Fraudsters in Montreal • Fifteen people working at a call center in Montreal were arrested on charges of massmarket fraud that spanned Canada and the U.S., targeting thousands of victims and robbing approximately $20 million. "680News." 680News Fifteen people arrested in RCMP raids on alleged fraudsters in Montreal Comments. N.p., n.d. Web. 28 Nov. 2013. <http://www.680news.com/2013/11/19/fifteenpeople-arrested-in-rcmp-raids-on-alleged-fraudsters-in-montreal/>. Claire Keating
  • 40.  An individual with extensive computer programming knowledge, that seeks and exploits weaknesses in a computer system or computer network (ex – social media sites). Through these software weaknesses they may gain access to personal files and information, and the lengths to which they may use this information is endless. They may be motivated by a number of reasons including profit, protest, or challenge. "hacker." hacker. N.p., n.d. Web. 28 Nov. 2013. <http://www.catb.org/jargon/html/H/hacker.html>. Rachel Brock
  • 41. Recent Hacker Attacks in Canada This article discusses the hacker software titles “Citadel” and how it was discovered by the RCMP in Burnaby. The software is estimated to have effected more that 5 million people in over 90 countries, stealing over $500 million dollars from victims bank accounts. "B.C. Computer Servers Linked to $500M Global Theft Ring - British Columbia - CBC News." CBCnews. CBC/Radio Canada, n.d. Web. 27 Nov. 2013. Rachel Brock
  • 42. Top 10 Infamous Computer Hackers This video shows the top 10 most infamous computer hackers, and the effect they had on people and businesses around the world. Rachel Brock
  • 43.  Hoax: Noun 1. to trick into believing or accepting as genuine something false and often preposterous. 2. something accepted or established by fraud or fabrication  Hoaxsters are people who deliberately fabricate false information and spread it virally. This information is heard and seen by others, and passed around because it is perceived to be factual. "Hoax." Merriam-Webster. Merriam-Webster, n.d. Web. 27 Nov. 2013. Rachel Brock
  • 44.  Hacked Fox News Twitter Account Declares Obama Died This article released to the public through the online press "The Free Library," states how Fox News' Twitter account was hacked by a hoaxer group called "The Script Kiddies." They released false information that went viral stating that Obama had been assassinated. "Hacked Fox News Twitter Account Declares Obama Died." - Free Online Library. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
  • 45.  The use of technology, specifically the internet and social media websites, to harass or harm people in a deliberate and hostile manner. It can involve anything from gossiping, to spreading false rumours, to making harmful threats to people. Cyber-bullying has become common among young social media users. "Category Archives: Cyberbullying." Cyberbullying. N.p., n.d. Web. 26 Nov. 2013. <http://definetheline.ca/dtl/category/cyberbullying/>. Claire Keating
  • 46.   95% of social media-using teens who have witnessed cruel behavior on social networking sites say they have seen others ignoring the mean behavior; 55% witness this frequently 66% of teens who have witnessed online cruelty have also witnessed others joining; 21% say they have also joined in the harassment "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
  • 47.   Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying One million children were harassed, threatened or subjected to other forms of cyberbullying on Facebook during the past year "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
  • 48.   68% of teens agree that cyberbullying is a serious problem with today’s youth.[6]Reasons cyberbullies said they engaged in cyberbullying: ◦ To show off to friends (11%) ◦ To be mean (14%) ◦ Something else (16%) ◦ To embarrass them (21%) ◦ For fun or entertainment (28%) ◦ They deserved it (58%) ◦ To get back at someone (58%) 81% of youth agree that bullying online is easier to get away with than bullying in person "Cyberbullying Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. http://www.internetsafety101.org/cyberbullyingstatistics.htm Claire Keating
  • 49.  Delete Cyber Bullying This YouTube video explains what cyber-bullying really is and describes the characteristics of a cyberbully. They believe they have an advantage online because they are secured online and there actions have no consequences. Cyber-bullying is a monster that we as consumers of social media have created ourselves. The YouTube video encourages online consumer to “Be The Change” and spread positive thoughts, messages, images and videos online. Claire Keating
  • 50.  The Case of Tyler Clementi Attention to the issue of cyber-bullying was first brought to the public eye through the case of the suicide of Tyler Clementi. Tyler Cementi’s roommate set up a web-cam and recorded Tyler having homosexual intercourse with another man, and broadcasted it on the internet. After Tyler’s suicide, his roommate, Dharun Ravi, was sentenced to 30 days in jail. "Tyler Clementi." Times Topics. N.p., n.d. Web. 27 Nov. 2013. Claire Keating
  • 51.  Online predators are arguably the most dangerous internet users. Online predators are people who look for weakness in others online, and intend to inflict harm on them. The most common type of online predators are mature men and females using open chat sites to lure in minors and commit lewd and perverse acts with them. These people are often pedophiles, and attack young naïve children who agree to meet with them in person. "The Facts About Online Predators." Family Safe Computers. N.p., n.d. Web. 28 Nov. 2013. <http://www.familysafecomputers.org/predators.htm>. Rachel Brock
  • 52. Child Internet Safety PSA – Online Predators This video shows how easily a child can be manipulated into giving out personal information to predators. Rachel Brock
  • 53.    In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes 65% of online sex offenders used the victim's social networking site to gain home and school information about the victim Only 1 in 3 people will report sexual crimes to a trusted adult "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
  • 54.    26% of online sex offenders used the victim's social networking site to gain information about the victim's whereabouts at a specific time There are over 747,408 registered sex offenders in the United States, and over 100,000 are lost in the system Four percent of all youth Internet users received aggressive sexual solicitations, which threatened to spill over into “real life”. These solicitors asked to meet the youth in person, called them on the telephone or sent offline mail, money or gifts. Also, four percent of youth had distressing sexual solicitations that left them feeling upset of extremely afraid. "InternetSafety101.org: Statistics." InternetSafety101.org: Statistics. N.p., n.d. Web. 27 Nov. 2013. Rachel Brock
  • 55.   Virtual Girl "Sweetie" Helps Track Thousands of Online Sexual Predators Another example is the virtual girl “Sweetie,” a 10 year old Pilipino girl designed through computer software, who helps to track online predators. Rachel Brock
  • 56. THE NUMBER ONE RULE!:  The only way to ensure your information is safe online, is to be careful of and responsible for everything that you post. Since nothing can ever be removed from the online world, you must make sure you don’t post personal information, reputation damaging pictures, blogs, ANYTHING that may come back to haunt you. Future employers may access your social networking sites and choose not to hire you based on pictures and posts they find. Rachel Brock
  • 57. 2. Do not trust strangers you meet online  People you meet online should not be trusted with your personal information. People are able to create multiple cyber identities, and may not really be the trustworthy person you think you are talking to behind the computer screen. Rachel Brock
  • 58. 3. Do not share personal information over the Internet or through social networking sites.  Sharing your banking information, your whereabouts, our address, phone number, or contact information on social networking sites or with people you talk to online can be a threat to your privacy and safety. Rachel Brock
  • 59. 4. Have multiple passwords and security questions.  Many people make the mistake of having one simple password for all of their online accounts. If this password were to be compromised, this could have devastating results. Claire Keating
  • 60. 5. Report online abuse.  If you are a witness to cyber bullying, fraud, or any other illegal online activity it is important to report it immediately. The failure to report could have devastating effects for not only you, but others around you. If someone is cyber-bullying you, the odd are high that they are doing it to others as well. Claire Keating
  • 61. 6. Format Your Privacy Settings  Make sure your privacy settings are limited to the public. Allowing only your friends and family to have access to your profiles prevents strangers from viewing your personal information. Claire Keating
  • 62.  Online Privacy Online privacy animation video, that makes us wonder “what if online actions were set in the physical, tangible world?” The YouTube video shares with consumers that we have to be aware of what we are posting online and who we are sharing it with because there could be consequences. Remember… Think before you click! Claire Keating
  • 63. Protecting Your Privacy On The Internet This page posts tips on how to protect personal privacy on the Internet, through Microsoft’s Safety & Security Center. It details topics such as thinking before sharing personal information, monitoring what others post, guarding personal information, and protecting yourself from fraud. Alyssa Budhoo
  • 64. “Data Privacy Day, held annually on January 28, encourages everyone to make protecting privacy and data a greater priority. DPD is an effort to empower and educate people to protect their privacy and control their digital footprint. Contribute to the success of Data Privacy Day by sharing resources and advice on social media, hosting an event, or having your organization become a DPD Champion. You can make a difference in just a few minutes Jan. 28!” "Overview | StaySafeOnline.org." Overview | StaySafeOnline.org. N.p., n.d. Web. 28 Nov. 2013 Claire Keating
  • 65.  Privacy and Social Networks Social networking sites are a commercial operation where they focus on making money by collecting user data. By knowing what we like, where we live, and what are interest are, companies, advertisers, marketers and employers make money. The data that we post online on social networking sites such as Facebook and Twitter make decisions about you. Claire Keating
  • 66. The Future of Online Privacy This video discovers how digital footprints are everywhere through facial recognition software, for example, among all online personal users. The video features the speaker, Jonathan Stickland, who investigates the future of online privacy and what to expect. Alyssa Budhoo
  • 67. “Once conversations that should be private are undertaken in a public forum, they become theater – meant for the onlookers more than the participants.” -ANNONYMOUS Claire Keating

Hinweis der Redaktion

  1. * SOURCE
  2. **ADDED****
  3. *** ADDED
  4. ***ADDED STUFF*****