SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Protecting Your Privacy Online
[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object]
[object Object]
[object Object]
http://123people.com
http://spokeo.com
 
[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object]
[object Object]
 
 
[object Object]
 
 
[object Object]
 
Open Book:  http://youropenbook.org/   (warning: potentially offensive language)
[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object]
 
[object Object],[object Object]
http://www.facebook.com/help/?safety
http://foursquare.com
Who owns your contact information? Are they company assets? National Strategy for Trusted Identities in Cyberspace (draft)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

L.O.W Reliable Sites
L.O.W Reliable SitesL.O.W Reliable Sites
L.O.W Reliable Sitesguest2d537
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
WordPress in Libraries
WordPress in LibrariesWordPress in Libraries
WordPress in LibrariesBuffy Hamilton
 
WordPress in School Libraries
WordPress in School LibrariesWordPress in School Libraries
WordPress in School LibrariesPolly Farrington
 
World press in libraries
World press in librariesWorld press in libraries
World press in librariesAlex Yankov
 
Dark Clouds & Silver Linings: Presentation for FAM11
Dark Clouds & Silver Linings: Presentation for FAM11Dark Clouds & Silver Linings: Presentation for FAM11
Dark Clouds & Silver Linings: Presentation for FAM11Martin Hamilton
 
Dark Clouds & Silver Linings - Martin Hamilton
Dark Clouds & Silver Linings - Martin HamiltonDark Clouds & Silver Linings - Martin Hamilton
Dark Clouds & Silver Linings - Martin HamiltonEduserv
 
Facebook Hacking and Prevention
Facebook Hacking and Prevention Facebook Hacking and Prevention
Facebook Hacking and Prevention SakibHaqueZisan
 

Was ist angesagt? (9)

L.O.W Reliable Sites
L.O.W Reliable SitesL.O.W Reliable Sites
L.O.W Reliable Sites
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
WordPress in Libraries
WordPress in LibrariesWordPress in Libraries
WordPress in Libraries
 
WordPress in School Libraries
WordPress in School LibrariesWordPress in School Libraries
WordPress in School Libraries
 
World press in libraries
World press in librariesWorld press in libraries
World press in libraries
 
List backlink
List backlinkList backlink
List backlink
 
Dark Clouds & Silver Linings: Presentation for FAM11
Dark Clouds & Silver Linings: Presentation for FAM11Dark Clouds & Silver Linings: Presentation for FAM11
Dark Clouds & Silver Linings: Presentation for FAM11
 
Dark Clouds & Silver Linings - Martin Hamilton
Dark Clouds & Silver Linings - Martin HamiltonDark Clouds & Silver Linings - Martin Hamilton
Dark Clouds & Silver Linings - Martin Hamilton
 
Facebook Hacking and Prevention
Facebook Hacking and Prevention Facebook Hacking and Prevention
Facebook Hacking and Prevention
 

Andere mochten auch

Tech Tuesday March 2010 Twitter
Tech Tuesday March 2010 TwitterTech Tuesday March 2010 Twitter
Tech Tuesday March 2010 TwitterMolly Immendorf
 
Cloud Computing & Choosing Educational Technologies Jcep 0410
Cloud Computing & Choosing Educational Technologies Jcep 0410Cloud Computing & Choosing Educational Technologies Jcep 0410
Cloud Computing & Choosing Educational Technologies Jcep 0410Molly Immendorf
 
WASAC presentation June 2010: Social Networking and Media for Education, Outr...
WASAC presentation June 2010: Social Networking and Media for Education, Outr...WASAC presentation June 2010: Social Networking and Media for Education, Outr...
WASAC presentation June 2010: Social Networking and Media for Education, Outr...Molly Immendorf
 
School bfast conference social networking nov2010
School bfast conference social networking nov2010School bfast conference social networking nov2010
School bfast conference social networking nov2010Molly Immendorf
 
Tech Tuesday: Facebook Tips Jan 2010
Tech Tuesday: Facebook Tips Jan 2010Tech Tuesday: Facebook Tips Jan 2010
Tech Tuesday: Facebook Tips Jan 2010Molly Immendorf
 
NETC 08 SoTLwT session 1028
NETC 08 SoTLwT session 1028NETC 08 SoTLwT session 1028
NETC 08 SoTLwT session 1028Molly Immendorf
 
Facebook county facstaff conference oct2010
Facebook county facstaff conference oct2010Facebook county facstaff conference oct2010
Facebook county facstaff conference oct2010Molly Immendorf
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1Molly Immendorf
 
Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509Molly Immendorf
 
Eastern District Technology Showcase Nov17 final
Eastern District Technology Showcase Nov17 finalEastern District Technology Showcase Nov17 final
Eastern District Technology Showcase Nov17 finalMolly Immendorf
 
Facebook Pages Explained Tech Tuesday April 2011
Facebook Pages Explained Tech Tuesday April 2011Facebook Pages Explained Tech Tuesday April 2011
Facebook Pages Explained Tech Tuesday April 2011Molly Immendorf
 
Distance education tips, tools and things to think about 2014
Distance education tips, tools and things to think about 2014Distance education tips, tools and things to think about 2014
Distance education tips, tools and things to think about 2014Molly Immendorf
 
Social Networking Facebook And Twitter Oct2209
Social Networking Facebook And Twitter Oct2209Social Networking Facebook And Twitter Oct2209
Social Networking Facebook And Twitter Oct2209Molly Immendorf
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaMolly Immendorf
 

Andere mochten auch (16)

Tech Tuesday March 2010 Twitter
Tech Tuesday March 2010 TwitterTech Tuesday March 2010 Twitter
Tech Tuesday March 2010 Twitter
 
Cloud Computing & Choosing Educational Technologies Jcep 0410
Cloud Computing & Choosing Educational Technologies Jcep 0410Cloud Computing & Choosing Educational Technologies Jcep 0410
Cloud Computing & Choosing Educational Technologies Jcep 0410
 
WASAC presentation June 2010: Social Networking and Media for Education, Outr...
WASAC presentation June 2010: Social Networking and Media for Education, Outr...WASAC presentation June 2010: Social Networking and Media for Education, Outr...
WASAC presentation June 2010: Social Networking and Media for Education, Outr...
 
School bfast conference social networking nov2010
School bfast conference social networking nov2010School bfast conference social networking nov2010
School bfast conference social networking nov2010
 
IT for Local Foods
IT for Local FoodsIT for Local Foods
IT for Local Foods
 
Apple apps for autism
Apple apps for autismApple apps for autism
Apple apps for autism
 
Tech Tuesday: Facebook Tips Jan 2010
Tech Tuesday: Facebook Tips Jan 2010Tech Tuesday: Facebook Tips Jan 2010
Tech Tuesday: Facebook Tips Jan 2010
 
NETC 08 SoTLwT session 1028
NETC 08 SoTLwT session 1028NETC 08 SoTLwT session 1028
NETC 08 SoTLwT session 1028
 
Facebook county facstaff conference oct2010
Facebook county facstaff conference oct2010Facebook county facstaff conference oct2010
Facebook county facstaff conference oct2010
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1
 
Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509Twitter Social Networking And Social Media Oct1509
Twitter Social Networking And Social Media Oct1509
 
Eastern District Technology Showcase Nov17 final
Eastern District Technology Showcase Nov17 finalEastern District Technology Showcase Nov17 final
Eastern District Technology Showcase Nov17 final
 
Facebook Pages Explained Tech Tuesday April 2011
Facebook Pages Explained Tech Tuesday April 2011Facebook Pages Explained Tech Tuesday April 2011
Facebook Pages Explained Tech Tuesday April 2011
 
Distance education tips, tools and things to think about 2014
Distance education tips, tools and things to think about 2014Distance education tips, tools and things to think about 2014
Distance education tips, tools and things to think about 2014
 
Social Networking Facebook And Twitter Oct2209
Social Networking Facebook And Twitter Oct2209Social Networking Facebook And Twitter Oct2209
Social Networking Facebook And Twitter Oct2209
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
 

Ähnlich wie Protecting your privacy online

Protecting Your Privacy Online
Protecting Your Privacy OnlineProtecting Your Privacy Online
Protecting Your Privacy Onlinesondramilkie
 
Irwin Onlinepresentation
Irwin OnlinepresentationIrwin Onlinepresentation
Irwin Onlinepresentationapberard
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: UpdatedAmanda L. Goodman
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
What's So Scary About Social Software?
What's So Scary About Social Software?What's So Scary About Social Software?
What's So Scary About Social Software?Beth Gallaway
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Facebook Privacy options
Facebook Privacy optionsFacebook Privacy options
Facebook Privacy optionsPhil Bradley
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet SafetyBobbi Newman
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 

Ähnlich wie Protecting your privacy online (20)

Protecting Your Privacy Online
Protecting Your Privacy OnlineProtecting Your Privacy Online
Protecting Your Privacy Online
 
Irwin Onlinepresentation
Irwin OnlinepresentationIrwin Onlinepresentation
Irwin Onlinepresentation
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
What's So Scary About Social Software?
What's So Scary About Social Software?What's So Scary About Social Software?
What's So Scary About Social Software?
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Facebook Privacy options
Facebook Privacy optionsFacebook Privacy options
Facebook Privacy options
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet Safety
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Legalissues
LegalissuesLegalissues
Legalissues
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 

Mehr von Molly Immendorf

Technology use and underserved audiences
Technology use and underserved audiencesTechnology use and underserved audiences
Technology use and underserved audiencesMolly Immendorf
 
University of Wisconsin Learning Technology and Development Council Virtual S...
University of Wisconsin Learning Technology and Development Council Virtual S...University of Wisconsin Learning Technology and Development Council Virtual S...
University of Wisconsin Learning Technology and Development Council Virtual S...Molly Immendorf
 
Reaching new audiences ag conference jan2011
Reaching new audiences ag conference jan2011Reaching new audiences ag conference jan2011
Reaching new audiences ag conference jan2011Molly Immendorf
 
Facebook Pages Tech Tuesday November 2010
Facebook Pages Tech Tuesday November 2010Facebook Pages Tech Tuesday November 2010
Facebook Pages Tech Tuesday November 2010Molly Immendorf
 
Peddling Progress - 1999 UWEX Cooperative Extension Conference Keynote
Peddling Progress - 1999 UWEX Cooperative Extension Conference KeynotePeddling Progress - 1999 UWEX Cooperative Extension Conference Keynote
Peddling Progress - 1999 UWEX Cooperative Extension Conference KeynoteMolly Immendorf
 
Tech tuesday april_2010__revised
Tech tuesday april_2010__revisedTech tuesday april_2010__revised
Tech tuesday april_2010__revisedMolly Immendorf
 
Social Networking And Social Media June409
Social Networking And Social Media June409Social Networking And Social Media June409
Social Networking And Social Media June409Molly Immendorf
 

Mehr von Molly Immendorf (9)

Technology use and underserved audiences
Technology use and underserved audiencesTechnology use and underserved audiences
Technology use and underserved audiences
 
University of Wisconsin Learning Technology and Development Council Virtual S...
University of Wisconsin Learning Technology and Development Council Virtual S...University of Wisconsin Learning Technology and Development Council Virtual S...
University of Wisconsin Learning Technology and Development Council Virtual S...
 
Reaching new audiences ag conference jan2011
Reaching new audiences ag conference jan2011Reaching new audiences ag conference jan2011
Reaching new audiences ag conference jan2011
 
Facebook Pages Tech Tuesday November 2010
Facebook Pages Tech Tuesday November 2010Facebook Pages Tech Tuesday November 2010
Facebook Pages Tech Tuesday November 2010
 
Peddling Progress - 1999 UWEX Cooperative Extension Conference Keynote
Peddling Progress - 1999 UWEX Cooperative Extension Conference KeynotePeddling Progress - 1999 UWEX Cooperative Extension Conference Keynote
Peddling Progress - 1999 UWEX Cooperative Extension Conference Keynote
 
Social Media Sept 2010
 Social Media Sept 2010 Social Media Sept 2010
Social Media Sept 2010
 
Organizing the Internet
Organizing the InternetOrganizing the Internet
Organizing the Internet
 
Tech tuesday april_2010__revised
Tech tuesday april_2010__revisedTech tuesday april_2010__revised
Tech tuesday april_2010__revised
 
Social Networking And Social Media June409
Social Networking And Social Media June409Social Networking And Social Media June409
Social Networking And Social Media June409
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Protecting your privacy online

Hinweis der Redaktion

  1. Read them – they might spell out if they can be changed without notice.
  2. Create a separate work account for social networking/social media tools – minimize personal data shared Remember that the true customer of Facebook are advertisers, Facebook’s product is your data.
  3. Add intermediary step – “Edit Friends” between click friends and create a list.
  4. Add intermediary step – “Edit Friends” between click friends and create a list.
  5. When writing a status update/tweet, don’t announce that you are going on or are on vacation.
  6. Any application developer
  7. Linked to GPS/phones Twitter Facebook
  8. Contact information as capital assets (bankrupted companies, aquired companies) Homeland Security National Strategy for Trusted Identities in Cyberspace (draft) Enhanced privacy protection