SlideShare a Scribd company logo
Online Privacy A Module of the CYC Course – Personal Security 8-9-10
The Realities of Digital Communications:  Deleting a digital post is not as permanent as setting fire to a handwritten note.  Digital content is easily forwarded and reposted.  Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so.  Your online reputation has offline implications.
Privacy Levels on Social Networking Sites What is the default privacy setting on most social networks? You control who sees what content. BUT, even though you are restricting access, remember content can be forwarded.
Social Engineering Manipulating people into providing personal information. Often  uses human interaction/emotions to obtain information.  Phishing -  Tries to attack you personally. Looks to be from a trusted company asking you to for your personal information.  Occurs via email, websites and social networks.
Bogus Email Example
Understanding URLs Top level domains Domain names Text before the domain name / after the top level domain Common tactic – URLs that look legitimate but are not. Example – citybank.com.jumbleofletters.com/jumbleofletters
Example
Passwords Choose a password that can’t be easily guessed. Don’t write your password down in any easily findable place. Don’t send your password to anyone through e-mail.
Passwords Don’t allow public computers to remember your password. Don’t tell anyone your passwords. Don’t use the same password for all your accounts, especially the important accounts such as email, banks, credit cards. Create a system for remembering your passwords. Check the strength of your password - http://www.passwordmeter.com/
Shopping Online Make sure YOU initiated the contact. Don’t follow an email link. Type web addresses carefully. Don’t give out SSN, DOB, or your Mother’s Maiden name. Do not accept free trial offers. Don’t rely on a site “looking” professional.
Credit Card Security When possible, choose a credit card NOT a debit card. Best choice - choose one card for online use only or a prepaid credit card. Paypal.com -  Most companies online accept payments from PayPal.  Paypal acts as an intermediary for payment.  If you don’t have a credit card you can set it up to take payment out of a checking/savings account.
Identity Theft Someone uses your personal information without your knowledge to commit fraud or theft.
Identity Theft Prevention Tips Do not store personal financial information on laptop computers. Before disposing of a computer delete all personal information. Review websites’ privacy policies. Request free credit report -  https://www.annualcreditreport.com/ A company or organization that initiated contact with you will not request your password via email or phone.
Identity Theft - Public Computer Safety Tips Beware of “Shoulder Surfers” Do NOT allow public computers to remember your log in and password. ALWAYS Sign Out or Log Off. Clear browser history. Close the browser window.
Sources This curriculum was adapted from a workshop created by N. Riesgraf for the Hibbing Public Library (MN).  Funding provided by IRRRA Do I.T. Community Technology Awareness Program. Additional content created by Connect Your Community, a project of  OneCommunity , funded by the federal  Broadband Technology Opportunities Program .
Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0

More Related Content

PPT
10 online privacy module samedit1
PPT
10 online privacy module samedit1
PPTX
Internet safety
PDF
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
PPTX
Internet privacy presentation
PPTX
Digital privacy
PPTX
Presentation for class
PPTX
Digital literacy 2
10 online privacy module samedit1
10 online privacy module samedit1
Internet safety
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Internet privacy presentation
Digital privacy
Presentation for class
Digital literacy 2

What's hot (20)

ODP
The Net is Dangerous
PDF
31 Internet Security Tips on CyberSecurity Month Ocotober
PPTX
Social media-threats
PPT
UW School of Medicine Social Engineering and Phishing Awareness
PPTX
Dangers on the Internet
PPTX
Cybersafety Version1
PPT
Internet safety
PDF
Internet Safety
PDF
Emp tech las-week-2
PPTX
The Ten Commandments of Online Security and Privacy
PDF
Internet Safety Glossary of Terms
PDF
Social media-threats
PPTX
Web security
PPT
Internet safety v 4 slides and notes
PDF
CDSE Cybsecurity Awareness Posters
PDF
Five habits that might be a cyber security risk
PPT
Cyber Safety How Children Can Protect Themselves From Online Threats
PPTX
Cyber security tips in Banking in Nepal
PPS
Abhishek cyber bullying
The Net is Dangerous
31 Internet Security Tips on CyberSecurity Month Ocotober
Social media-threats
UW School of Medicine Social Engineering and Phishing Awareness
Dangers on the Internet
Cybersafety Version1
Internet safety
Internet Safety
Emp tech las-week-2
The Ten Commandments of Online Security and Privacy
Internet Safety Glossary of Terms
Social media-threats
Web security
Internet safety v 4 slides and notes
CDSE Cybsecurity Awareness Posters
Five habits that might be a cyber security risk
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber security tips in Banking in Nepal
Abhishek cyber bullying
Ad

Viewers also liked (9)

DOCX
Basic terms & definitions
PPTX
4 word press module 1d
PPT
3 module basic hardware
PPTX
9 word press 2c
PPT
7 module web based email
PPTX
Geitungar kynning
PPTX
Folclore slide
PPT
Renaissance
PPTX
Lesson plan and most successful activity
Basic terms & definitions
4 word press module 1d
3 module basic hardware
9 word press 2c
7 module web based email
Geitungar kynning
Folclore slide
Renaissance
Lesson plan and most successful activity
Ad

Similar to 5 a module online privacy (20)

PPTX
Cyber safety.pptx
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Identity theft
PPTX
A Basic Guide to Safe Surfing on the Internet
PDF
Online Safety, Security & Netiquette Report Part Two
PDF
National Life IT Department's Cyber Security Awareness Presentation
DOCX
Identity theft in the internet
PDF
Cybersecurity Awareness Posters - Set #2
PPTX
Cyber security-1.pptx
DOCX
Tarun Gaur On Data Breaches and Privacy Fears
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Internet Safety.pptx
PPTX
ONLINE SAFETY, SECURITY, ETHICS, AND.pptx
PPTX
Online Safety, Security & Netiquette Report
PPTX
Cyber Awareness.pptx
PPTX
IS Presetation.pptx
PDF
Q3 G11 Empowerment Technologies Module 2.pdf
PPTX
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
PPTX
Rules of netiquette-lesson 2.pptx
PPTX
Undergraduate Student Presentation STOP.THINK.CONNECT™ NATIONAL CYBERSECURIT...
Cyber safety.pptx
TheCyberThreatAndYou2_deck.pptx
Identity theft
A Basic Guide to Safe Surfing on the Internet
Online Safety, Security & Netiquette Report Part Two
National Life IT Department's Cyber Security Awareness Presentation
Identity theft in the internet
Cybersecurity Awareness Posters - Set #2
Cyber security-1.pptx
Tarun Gaur On Data Breaches and Privacy Fears
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Internet Safety.pptx
ONLINE SAFETY, SECURITY, ETHICS, AND.pptx
Online Safety, Security & Netiquette Report
Cyber Awareness.pptx
IS Presetation.pptx
Q3 G11 Empowerment Technologies Module 2.pdf
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
Rules of netiquette-lesson 2.pptx
Undergraduate Student Presentation STOP.THINK.CONNECT™ NATIONAL CYBERSECURIT...

More from Rozell Sneede (20)

DOCX
Terms & definitions
DOCX
Security terms & definitions
DOCX
Excel & database terms & definitions
DOCX
Digital literacy terms & definitions
DOCX
5 steps
DOCX
Removing virus tri fold - white
DOC
Cyc flyer chn with ob logo
PPT
Cyc module learning express library
PPT
Cyc module inf ohio
PPTX
Wordpress module 1 a
PPTX
8 word press 2b
PPTX
7 word press 2a
PPTX
6 word press module 1f
PPTX
5 word press module 1e
PPTX
3 word press module 1c
PPTX
2 word press module 1b
PPTX
1 wordpress module 1 a
PPTX
1 wordpress module 1 a
PPTX
On line banking cur
PPT
Module online investments
Terms & definitions
Security terms & definitions
Excel & database terms & definitions
Digital literacy terms & definitions
5 steps
Removing virus tri fold - white
Cyc flyer chn with ob logo
Cyc module learning express library
Cyc module inf ohio
Wordpress module 1 a
8 word press 2b
7 word press 2a
6 word press module 1f
5 word press module 1e
3 word press module 1c
2 word press module 1b
1 wordpress module 1 a
1 wordpress module 1 a
On line banking cur
Module online investments

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Mushroom cultivation and it's methods.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1. Introduction to Computer Programming.pptx
A Presentation on Artificial Intelligence
OMC Textile Division Presentation 2021.pptx
Hybrid model detection and classification of lung cancer
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
A comparative analysis of optical character recognition models for extracting...
Zenith AI: Advanced Artificial Intelligence
Enhancing emotion recognition model for a student engagement use case through...
SOPHOS-XG Firewall Administrator PPT.pptx
Web App vs Mobile App What Should You Build First.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Assigned Numbers - 2025 - Bluetooth® Document
Mushroom cultivation and it's methods.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
A comparative study of natural language inference in Swahili using monolingua...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

5 a module online privacy

  • 1. Online Privacy A Module of the CYC Course – Personal Security 8-9-10
  • 2. The Realities of Digital Communications: Deleting a digital post is not as permanent as setting fire to a handwritten note. Digital content is easily forwarded and reposted. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. Your online reputation has offline implications.
  • 3. Privacy Levels on Social Networking Sites What is the default privacy setting on most social networks? You control who sees what content. BUT, even though you are restricting access, remember content can be forwarded.
  • 4. Social Engineering Manipulating people into providing personal information. Often uses human interaction/emotions to obtain information. Phishing - Tries to attack you personally. Looks to be from a trusted company asking you to for your personal information. Occurs via email, websites and social networks.
  • 6. Understanding URLs Top level domains Domain names Text before the domain name / after the top level domain Common tactic – URLs that look legitimate but are not. Example – citybank.com.jumbleofletters.com/jumbleofletters
  • 8. Passwords Choose a password that can’t be easily guessed. Don’t write your password down in any easily findable place. Don’t send your password to anyone through e-mail.
  • 9. Passwords Don’t allow public computers to remember your password. Don’t tell anyone your passwords. Don’t use the same password for all your accounts, especially the important accounts such as email, banks, credit cards. Create a system for remembering your passwords. Check the strength of your password - http://www.passwordmeter.com/
  • 10. Shopping Online Make sure YOU initiated the contact. Don’t follow an email link. Type web addresses carefully. Don’t give out SSN, DOB, or your Mother’s Maiden name. Do not accept free trial offers. Don’t rely on a site “looking” professional.
  • 11. Credit Card Security When possible, choose a credit card NOT a debit card. Best choice - choose one card for online use only or a prepaid credit card. Paypal.com - Most companies online accept payments from PayPal. Paypal acts as an intermediary for payment. If you don’t have a credit card you can set it up to take payment out of a checking/savings account.
  • 12. Identity Theft Someone uses your personal information without your knowledge to commit fraud or theft.
  • 13. Identity Theft Prevention Tips Do not store personal financial information on laptop computers. Before disposing of a computer delete all personal information. Review websites’ privacy policies. Request free credit report - https://www.annualcreditreport.com/ A company or organization that initiated contact with you will not request your password via email or phone.
  • 14. Identity Theft - Public Computer Safety Tips Beware of “Shoulder Surfers” Do NOT allow public computers to remember your log in and password. ALWAYS Sign Out or Log Off. Clear browser history. Close the browser window.
  • 15. Sources This curriculum was adapted from a workshop created by N. Riesgraf for the Hibbing Public Library (MN). Funding provided by IRRRA Do I.T. Community Technology Awareness Program. Additional content created by Connect Your Community, a project of OneCommunity , funded by the federal Broadband Technology Opportunities Program .
  • 16. Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0

Editor's Notes

  • #2: This module is intended to help class participants be more aware of how to protect themselves online while still enjoying and making full use of the Internet.
  • #3: Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  • #4: Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  • #5: Social Engineering Tactics - Someone claiming to be doing research or survey for your bank, a new employee at a company you use, or a repair person that NEEDS your help. They may seem to ask round about or harmless questions that they then use against you. Verify they really are who they say they are before answering questions.
  • #6: Why not trust this email? No such thing as free cash. Most likely they will ask for your bank account and password in order to supposedly deposit your check.
  • #7: You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  • #8: Phishing, and spyware attacks are occurring often on social networking sites, especially Facebook. Anyone received a message via email or a social network that was not sent by the person it appeared to have been sent by? Most likely Michelle has no idea this message went out in her name. What is the top level domain in this message? Do a search of .in domain. What do you find? It’s the country domain for India.
  • #9: Use a combination of letters (capital and lower case), numbers and symbols if allowed. Example are: EmilyP05 – Emily Pietilia was my great grandmother and she was born in 1905 – However, don’t do this with a spouse or child that relationship is too close and too obvious. Or use a mnemonic i.e. – mbsfe530 – my brother sells fire extinguishers and his birthday. Don’t use names or words in a dictionary, names, addresses, or birthdates. Or use a full sentence - ilovecats If you must write them down, don’t keep it in a file labeled passwords or on your calendar.
  • #10: If you are using public computers be alert to who is around you, if your password is too easy or too hard so you type it very slowly, it could be possible to watch what you type & learn your password. Why is your email account an important account? Because with access to your email account, someone could get access to your other accounts. Instructor – provide suggestions on how to create and keep track of passwords. Examples – use one string of letters and number but add a code to each one per application – such as having 135fox as a password and adding fb for Facebook to the beginning or end of 135fox, resulting in fb135fox. Your internet provider can access your account without your password – they would never contact you and ask for it. However, if you call them about a problem, they may ask for it so they can try and duplicate the problem you are having. If the incorrect password allows you to log into a site then you are on a spoofed site and not the company’s legitimate site. Most important – if you suspect someone is using your accounts, change the password and contact the company it is with immediately!
  • #11: Who has shopped online? What did you purchase? You initiate with a known and trusted company. Don’t use sites from unsolicited websites or pop up ads. www.hoogle.com vs. www.google.com
  • #12: MOST Credit cards have a maximum liability of $50.00 in the event of fraud, debit cards may have a higher or no limit check with your bank for information about the cards you have or read that little tiny print! One card lets you easily review online purchases and request a card with a lower limit Online transactions are said to be safer since there is no human interaction – you are not giving your card to a person.
  • #13: Anyone been a victim of identity theft?
  • #14: In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the FTC website. Do not go to a search engine!