SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Controlling Your Social Networking Privacy Settings Stay safe online!
Facebook Privacy Settings
Click on “Settings” Then on “Privacy Settings”
Use these options to control the information people see about you!
“ Only friends” is the BEST option to limit who sees  your info.
Check to see what your friends can see about you.  If you don’t like what they are able to see, change it!
Do you want your cousin to know that you watch Judge Judy?  If not, you can restrict that information!
You can choose what can be seen about you through the sites applications! Choose your games and applications wisely!
This is the most secure setting for applications  (uncheck all)
Twitter Privacy Settings
Search for your username on the Twitter homepage to find out what other people are saying about you!  Hopefully it’s all good.  If not, you can block those people from following you or direct messaging you!  (or talk to Twitter owners)
You can control your privacy on Twitter by clicking on “Settings.”
Click on “Notices” so that you find out when people are following you or direct messaging you.  This way you can remove the people you don’t want following you.  Or better: protect your tweets!
Do not reveal your location.  Your real friends know where you are.  Protect your “tweets” so that only trusted friends can follow you.
The Lock means you’ve “protected your tweets.”  This is a great Twitter privacy setting.
If you’ve “Protected Your Tweets,” people will have to request to follow you.  Block people you don’t know in person.
If you see followers on your profile that you do not want following you, you can remove them by “Blocking” them.  Block people you don’t know.
MySpace Privacy Settings
In MySpace, click on “My Account” to maintain your privacy settings.
Click on the “Privacy” tab to fix your privacy settings.  Your birthday and location are sensitive pieces of information.  It’s nice for your friends to wish you an online “Happy Birthday,” but it’s nicer to be safe!
Adjust your settings so that only your  friends can  see your info!
Remember to customize your MySpace Instant Messaging (IM) settings as well!
Hi5 Privacy Settings
Rating people is a type of cyber-bullying!  Don’t do it!
This person is a male named Sonia with a sunset for a picture.  Seems nice (or a little strange), but it could be dangerous! Don’t ever try to “meet” someone unless you know them in person.
Again, don’t give your email address book information to social networks.  Your email contacts should remain  private. It will be embarrassing when your grandmother gets  an email invitation from you to join you on “Hi5.”
In General…
[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Look to the future   ,[object Object],[object Object]
Set Up Your Privacy Settings It may be the best 10 minutes you spend on the Internet!

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersafety
CybersafetyCybersafety
Cybersafety
mitch
 
Darius jones internet safety
Darius jones internet safetyDarius jones internet safety
Darius jones internet safety
Jennifer Spann
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1
Anja Junginger
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
Ellie Simons
 
Internet safety
Internet safetyInternet safety
Internet safety
jld1018
 

Was ist angesagt? (19)

Cybersafety
CybersafetyCybersafety
Cybersafety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Darius jones internet safety
Darius jones internet safetyDarius jones internet safety
Darius jones internet safety
 
Sadie Rudge\'s Esaftey quiz
Sadie Rudge\'s Esaftey quizSadie Rudge\'s Esaftey quiz
Sadie Rudge\'s Esaftey quiz
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1
 
Kirstin's i safe ppt
Kirstin's i safe pptKirstin's i safe ppt
Kirstin's i safe ppt
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Safety And Ethics on the Internet
Safety And Ethics on the InternetSafety And Ethics on the Internet
Safety And Ethics on the Internet
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cell phone safty
Cell phone saftyCell phone safty
Cell phone safty
 
Esafety Quiz
Esafety QuizEsafety Quiz
Esafety Quiz
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 

Ähnlich wie Setting privacy controls on social networks

2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
MentorIT
 
Digital identity
Digital identityDigital identity
Digital identity
marudiaz77
 
Script Outline For Cyber Safety Video
Script Outline For Cyber Safety VideoScript Outline For Cyber Safety Video
Script Outline For Cyber Safety Video
Alice Mercer
 
Digital Identity - Junior 5
Digital Identity - Junior 5 Digital Identity - Junior 5
Digital Identity - Junior 5
marudiaz77
 

Ähnlich wie Setting privacy controls on social networks (20)

Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
 
Digital identity
Digital identityDigital identity
Digital identity
 
Social Networking Tips - Teens
Social Networking Tips - TeensSocial Networking Tips - Teens
Social Networking Tips - Teens
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
7th grade digital security
7th grade digital security7th grade digital security
7th grade digital security
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Script Outline For Cyber Safety Video
Script Outline For Cyber Safety VideoScript Outline For Cyber Safety Video
Script Outline For Cyber Safety Video
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
Digital Identity - Junior 5
Digital Identity - Junior 5 Digital Identity - Junior 5
Digital Identity - Junior 5
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Heads up!
Heads up!Heads up!
Heads up!
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
How to Protect Yourself and Your Famlily on Social Media
How to Protect Yourself and Your Famlily on Social MediaHow to Protect Yourself and Your Famlily on Social Media
How to Protect Yourself and Your Famlily on Social Media
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)The 10 Commandments of Social Media (from Grandma)
The 10 Commandments of Social Media (from Grandma)
 

Mehr von sraslim

Mehr von sraslim (12)

Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)Flip It!  CSLA Southern Region Workshop on the Flipped Classroom (Library)
Flip It! CSLA Southern Region Workshop on the Flipped Classroom (Library)
 
Flip It! Flipped Learning for Teacher Librarians
Flip It!  Flipped Learning for Teacher LibrariansFlip It!  Flipped Learning for Teacher Librarians
Flip It! Flipped Learning for Teacher Librarians
 
CSLAsr eBooks Presentation - May 31, 2012
CSLAsr eBooks Presentation - May 31, 2012CSLAsr eBooks Presentation - May 31, 2012
CSLAsr eBooks Presentation - May 31, 2012
 
Passwords and Digital Safety
Passwords and Digital SafetyPasswords and Digital Safety
Passwords and Digital Safety
 
Sonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer PresentationSonora HS Medical Careers Breast Cancer Presentation
Sonora HS Medical Careers Breast Cancer Presentation
 
Inspiring Students
Inspiring StudentsInspiring Students
Inspiring Students
 
Crocodoc Guide
Crocodoc Guide   Crocodoc Guide
Crocodoc Guide
 
Livebinders Guide
Livebinders GuideLivebinders Guide
Livebinders Guide
 
Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7Creating a Works Cited Page and Parenthetical Citations - MLA 7
Creating a Works Cited Page and Parenthetical Citations - MLA 7
 
Wikis for Education
Wikis for EducationWikis for Education
Wikis for Education
 
Web 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy TeachersWeb 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy Teachers
 
Using Web 2 0 Tools To Enliven Projects Nov 20
Using Web 2 0 Tools To Enliven Projects Nov 20Using Web 2 0 Tools To Enliven Projects Nov 20
Using Web 2 0 Tools To Enliven Projects Nov 20
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Kürzlich hochgeladen (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Setting privacy controls on social networks

  • 1. Controlling Your Social Networking Privacy Settings Stay safe online!
  • 3. Click on “Settings” Then on “Privacy Settings”
  • 4. Use these options to control the information people see about you!
  • 5. “ Only friends” is the BEST option to limit who sees your info.
  • 6. Check to see what your friends can see about you. If you don’t like what they are able to see, change it!
  • 7. Do you want your cousin to know that you watch Judge Judy? If not, you can restrict that information!
  • 8. You can choose what can be seen about you through the sites applications! Choose your games and applications wisely!
  • 9. This is the most secure setting for applications (uncheck all)
  • 11. Search for your username on the Twitter homepage to find out what other people are saying about you! Hopefully it’s all good. If not, you can block those people from following you or direct messaging you! (or talk to Twitter owners)
  • 12. You can control your privacy on Twitter by clicking on “Settings.”
  • 13. Click on “Notices” so that you find out when people are following you or direct messaging you. This way you can remove the people you don’t want following you. Or better: protect your tweets!
  • 14. Do not reveal your location. Your real friends know where you are. Protect your “tweets” so that only trusted friends can follow you.
  • 15. The Lock means you’ve “protected your tweets.” This is a great Twitter privacy setting.
  • 16. If you’ve “Protected Your Tweets,” people will have to request to follow you. Block people you don’t know in person.
  • 17. If you see followers on your profile that you do not want following you, you can remove them by “Blocking” them. Block people you don’t know.
  • 19. In MySpace, click on “My Account” to maintain your privacy settings.
  • 20. Click on the “Privacy” tab to fix your privacy settings. Your birthday and location are sensitive pieces of information. It’s nice for your friends to wish you an online “Happy Birthday,” but it’s nicer to be safe!
  • 21. Adjust your settings so that only your friends can see your info!
  • 22. Remember to customize your MySpace Instant Messaging (IM) settings as well!
  • 24. Rating people is a type of cyber-bullying! Don’t do it!
  • 25. This person is a male named Sonia with a sunset for a picture. Seems nice (or a little strange), but it could be dangerous! Don’t ever try to “meet” someone unless you know them in person.
  • 26. Again, don’t give your email address book information to social networks. Your email contacts should remain private. It will be embarrassing when your grandmother gets an email invitation from you to join you on “Hi5.”
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Set Up Your Privacy Settings It may be the best 10 minutes you spend on the Internet!