SlideShare a Scribd company logo
1 of 11
A Brief Guide to Facebook
Privacy
(June 2013)
Larry Magid
Co-director
ConnectSafely.org
Inline Privacy Settings
• You can control the audience for each post, each time you post
• Click on the icon (globe means it’s public) below each post to change
the audience
Audience Choices
• Public – Everyone
• Friends – People you have friended
• Friends of Friends: Your extended network of people your
friends are friends with
• Acquaintances – “Friends you don’t need to stay in close
touch with.”
• Close Friends: People you interact with a lot
• Custom: You get to chose who to include or exclude
Privacy Settings and Tools
• Facebook has a couple of settings that are “permanent” (until you
change them)
• Who can see my stuff
• Who can look me up
• You can access them from the settings menu
Tagging
• Anyone can tag you in a photo or a post
• Once tagged, that photo or post can be found by searching for you
• Tagged images of you can also show up on your Timeline
• You can remove a tag of yourself from Activity log or from your
Timeline
You can tag
yourself or others
To Remove a Tag
• From Your Activity Log
• Click on the post or picture
• Click Options below the picture
• Select Report/Remove tag
• From your Timeline
• Click on pencil to select “edit/remove”
• Select Report/Remove
Using the Activity Log to Find and
Remove Content
• You can use the Activity Log to see photos you're tagged in and posts that
may appear in News Feed, search and other places on Facebook
• Use "Shared with" and "On timeline" filters to review who can still see
things you may have hidden from your time line that could show up in news
feed, search and other places.
• You can remove something you don’t like by clicking on the pencil icon and
selecting Delete.
• You can report abusive posts from others by Report/Remove Tag
A Lot Can Be Found With Graph Search
• Graph Search is a powerful search tool that can help people find
people places and things including photos you’ve been tagged in
• If someone is part of the audience of a post, they can find it using
graph search
• Anything posted to “public” can be found by anyone
• Anything posted to friends can be found by your friends
• If you don’t want it found, don’t post it or limit the audience
• Content hidden from your Timeline may still be found via search
Timeline Vs. News Feed Vs. Search
• Your Timline is “you central” – the place where people can see what
you post, what’s posted about you and what (including pictures)
you’re tagged in
• But it’s not the only place people can find content about you. It can
also be found:
• In News Feed (those posts that show up on people’s home pages)
• Via search
• On other people’s TImelines
Hiding vs. Deleting
• There are ways to hide content from your
Timeline but it might still surface elsewhere
• In News feed
• In Search
• On someone else’s Timeline
• If you really want it gone, you must delete it, not
just hide it
Larry Magid
larry@connectsafely.org
Thank You!

More Related Content

Viewers also liked

Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Nicole C. Engard
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenWhat Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenHome
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 

Viewers also liked (7)

Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenWhat Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 

Similar to A Brief Guide to Facebook Privacy

Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529dinica
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Becky Benishek
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesKelly Anderson
 
Facebook privacy settings by Lynn
Facebook privacy settings by LynnFacebook privacy settings by Lynn
Facebook privacy settings by LynnLynnOng Jia Hui
 
Facebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesFacebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesTory Starr
 
Google+ features for business and users
Google+ features for business and usersGoogle+ features for business and users
Google+ features for business and usersEnconexo
 
Google plus chapter 2 - circles
Google plus   chapter 2 - circlesGoogle plus   chapter 2 - circles
Google plus chapter 2 - circlesBobby Wan
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingVictor Castelo
 
Google+ posting
Google+ postingGoogle+ posting
Google+ postingmattgasior
 
Google+ posting
Google+ postingGoogle+ posting
Google+ postingAngelMcru
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for scepticsHelen Webster
 
Social Branding for Student Journalists
Social Branding for Student JournalistsSocial Branding for Student Journalists
Social Branding for Student JournalistsMandy Jenkins
 
Print screen and Script
Print screen and ScriptPrint screen and Script
Print screen and Scriptmenger89
 
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...News Leaders Association's NewsTrain
 
Oachc Presentation2
Oachc Presentation2Oachc Presentation2
Oachc Presentation2Kknepper
 
How to Use Flipboard
How to Use FlipboardHow to Use Flipboard
How to Use FlipboardLisa Sicard
 

Similar to A Brief Guide to Facebook Privacy (20)

Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
Facebook privacy settings by Lynn
Facebook privacy settings by LynnFacebook privacy settings by Lynn
Facebook privacy settings by Lynn
 
Facebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesFacebook 101 for WGBH Employees
Facebook 101 for WGBH Employees
 
Facebook and privacy policy
Facebook and privacy policyFacebook and privacy policy
Facebook and privacy policy
 
Google+ features for business and users
Google+ features for business and usersGoogle+ features for business and users
Google+ features for business and users
 
Google plus chapter 2 - circles
Google plus   chapter 2 - circlesGoogle plus   chapter 2 - circles
Google plus chapter 2 - circles
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and tagging
 
Google+ posting
Google+ postingGoogle+ posting
Google+ posting
 
Google+ posting
Google+ postingGoogle+ posting
Google+ posting
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Google+ workshop presentation
Google+ workshop presentationGoogle+ workshop presentation
Google+ workshop presentation
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for sceptics
 
Google+ Smart Card 070314
Google+ Smart Card 070314Google+ Smart Card 070314
Google+ Smart Card 070314
 
Social Branding for Student Journalists
Social Branding for Student JournalistsSocial Branding for Student Journalists
Social Branding for Student Journalists
 
Print screen and Script
Print screen and ScriptPrint screen and Script
Print screen and Script
 
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
 
Oachc Presentation2
Oachc Presentation2Oachc Presentation2
Oachc Presentation2
 
How to Use Flipboard
How to Use FlipboardHow to Use Flipboard
How to Use Flipboard
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 

More from ConnectSafely (11)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 

Recently uploaded

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

A Brief Guide to Facebook Privacy

  • 1. A Brief Guide to Facebook Privacy (June 2013) Larry Magid Co-director ConnectSafely.org
  • 2. Inline Privacy Settings • You can control the audience for each post, each time you post • Click on the icon (globe means it’s public) below each post to change the audience
  • 3. Audience Choices • Public – Everyone • Friends – People you have friended • Friends of Friends: Your extended network of people your friends are friends with • Acquaintances – “Friends you don’t need to stay in close touch with.” • Close Friends: People you interact with a lot • Custom: You get to chose who to include or exclude
  • 4. Privacy Settings and Tools • Facebook has a couple of settings that are “permanent” (until you change them) • Who can see my stuff • Who can look me up • You can access them from the settings menu
  • 5. Tagging • Anyone can tag you in a photo or a post • Once tagged, that photo or post can be found by searching for you • Tagged images of you can also show up on your Timeline • You can remove a tag of yourself from Activity log or from your Timeline You can tag yourself or others
  • 6. To Remove a Tag • From Your Activity Log • Click on the post or picture • Click Options below the picture • Select Report/Remove tag • From your Timeline • Click on pencil to select “edit/remove” • Select Report/Remove
  • 7. Using the Activity Log to Find and Remove Content • You can use the Activity Log to see photos you're tagged in and posts that may appear in News Feed, search and other places on Facebook • Use "Shared with" and "On timeline" filters to review who can still see things you may have hidden from your time line that could show up in news feed, search and other places. • You can remove something you don’t like by clicking on the pencil icon and selecting Delete. • You can report abusive posts from others by Report/Remove Tag
  • 8. A Lot Can Be Found With Graph Search • Graph Search is a powerful search tool that can help people find people places and things including photos you’ve been tagged in • If someone is part of the audience of a post, they can find it using graph search • Anything posted to “public” can be found by anyone • Anything posted to friends can be found by your friends • If you don’t want it found, don’t post it or limit the audience • Content hidden from your Timeline may still be found via search
  • 9. Timeline Vs. News Feed Vs. Search • Your Timline is “you central” – the place where people can see what you post, what’s posted about you and what (including pictures) you’re tagged in • But it’s not the only place people can find content about you. It can also be found: • In News Feed (those posts that show up on people’s home pages) • Via search • On other people’s TImelines
  • 10. Hiding vs. Deleting • There are ways to hide content from your Timeline but it might still surface elsewhere • In News feed • In Search • On someone else’s Timeline • If you really want it gone, you must delete it, not just hide it