Teens Top 10 Checklist to Protect Your Personal Privacy Online 1 Top 10 Checklist Summary Locate and Review Security Settings on Social Sites Think Before You Post to Social Sites Understand GPS for Your Mobile Phone Use Caution with Links, Downloads & Apps Understand How Data is Protected on School Websites or Devices Use Passwords Limit Personal Information Provided Online Be an Informed Online Shopper Protect Your Devices Know Your Email Rights Your footnote #1 Locate and Review Security Settings on Social Sites • Who can see your information? - • • Direct connections Friends of connections Everyone? Who can contact you? Only connect with people you know FIPP 2 #2 Think Before You Post to Social Sites • • Don’t post your full date of birth, phone number or home address • People who can see your content may share with others beyond your “friends” or connections • Don’t publicize your specific travel dates Choose your comments and pictures carefully; once you’ve posted it’s out there forever FIPP 2 and 4 #3 Understand GPS for Your Mobile Phone • Pros - • Cons - • Using maps Can emergency services find you? Can your friends or family find you? Can someone follow you / stalk you? References: - FIPP 1 and 4 https://www.privacyrights.org/fs/fs26-cellprivacy.htm To disable geo-tagging – http://icanstalku.com/how.php#disable #4 Use Caution with Links, Downloads, & Apps • Use caution when downloading information from links in email - - • Links may contain viruses or malware that you don’t want on your computer Consider who sent you the email with links If unsure, mark as spam and delete Purchase apps from legitimate sources and avoid offers for “free” apps - - FIPP 1 and 4 Read the terms of use, especially about what information is used or shared Understand what personal information the app can access #5 Understand How Data is Protected on School Websites or Devices • If you register for classes on your school’s website, read the Privacy policy to learn how your information is protected. • If you lease or borrow a computer (laptop or tablet) from your school, ask about the rules for content accessed or saved on the computer - Does the device have a camera? What happens to pictures taken with the device? Can you / should you remove all content before returning the device, or will the school wipe the memory? FIPP 1, 2, and 4 #6 Use Passwords • • • • Use passwords for your computer, phone, tablet Make your password memorable for you, but not easily guessed Set your devices to require a password after a short time of inactivity Reference: https://www.privacyrights.org/fs/fs23-shopping.htm FIPP 1 and 4 #7 Limit Personal Information Provided Online • • If a website asks for personal information, does the request make sense? Look for and read the disclosure about how your personal information will be used before providing it - Is payment card information saved on the sight? Will your email address be shared or sold to others? FIPP 1, 2 and 4 Examples of Personal Information Name Address Phone # Date of Birth Social Security # Drivers License # Credit / Debit Card # PIN Passport # Student ID # Bank Account Numbers Health Information #8 Be an Informed Online Shopper • It’s typical to provide payment card information for an online purchase but consider - - Site security (look for https in the url or a lock icon on the page) A credit card is a better choice for payment that a debit card (broader protections if you have a dispute with the seller) Many sites offer to save your payment card information to make future purchases easier, but avoid this option to reduce the number of places your payment information is stored If you have concerns about the site, call customer service to place your order over the phone Resources: Credit Card consumer protections: http://www.privacyrights.org/fs/fs32-paperplastic.htm#3 FIPP 1 and 4 #9 Protect Your Devices • Virus and spyware protection - Security software (even when it comes loaded on your new computer) must be kept up to date to protect you against the newest threats. Resource: www.consumerreports.org/cro/magazine-archive/2010/june/electronics-computers-securitysoftware/overview/index.htm. • Peer-to-peer file sharing - • Software allows groups to share files but may expose files you don’t intend to share Resource: www.onguardonline.gov/topics/p2p-security.aspx. Limit what you do using unsecure Wi-Fi FIPP 4 Never leave your computer unattended at public wi-fi locations Limit secure transactions, always check for encrypted site (https) Resource: https://www.privacyrights.org/fs/fs36-securing-computer-privacy #10 Know Your Email Rights • You can unsubscribe from unwanted emails - • You can mark unwanted email as spam - • This may not stop future emails but will generally direct them to your spam folder when they arrive, rather than your main inbox There are some emails you will receive as part of your online transactions; generally you cannot unsubscribe from these, but they should recap a transaction or provide a notice you’ve requested - • Emails from businesses or organizations selling or offering something (commercial emails) should have an opt out link or instructions for stopping future email; take the time to formally unsubscribe Order confirmation Notices from your bank Reference: www.consumer.ftc.gov/articles/0262-stopping-unsolicited-mail-phone-calls-and-email FIPP 1 and 2