Privacy Settings Checkup UTHSC IT SECURITY TEAM What portable computers do you own? • MacBook • PC Laptop • ChromeBook Which Smartphone/Tablets do you own? • iPhone • iPad • Android Phone • Android Tablet • Windows Tablet • Kindle (Fire) Tablet UTHSC Which online applications do you log into? • Facebook • Twitter • YikYak • Tumblr • LinkedIN • Dating Sites • SnapChat • Instagram • Youtube • Pinterest When was the last you checked you privacy settings on both your device(s) and online application(s)??? Website Privacy • In the 90's website were little more than digital brochures and “interactivity” meant signing up to receive a monthly e-newsletter. • Modern websites have evolved into complex and powerful information platforms – collecting, processing and sharing data at blinding speeds on massive scales. • When we share personal data with these online platforms it is often passed on to numerous third parties, such as advertisers, vendors, and partners. • Protecting privacy in this spider web of data flows is no easy task: it's easy to see how personal information can be compromised, either accidentally or intentionally. • Fortunately, many websites, from social networks to eCommerce website, provide Internet with privacy enhancing options: Privacy Controls • While websites today share more information, they also provide their users with great specificity and control over these sharing activities. • On many websites you'll find that you can define your audience when you share personal information or content, whether it's an audience of one or the entire public. • YouTube, for example, allows users to upload “Private” videos visible only to people whom the author specifically authorizes via email or make videos available to their millions of monthly visitors (learn more on YouTube Private videos here). • Facebook also offers the same selective sharing ability to its more than 400 million users. • • A Facebook user can, for example, choose to make a photo album visible only to their immediate family (learn more about Facebook's privacy options here).These are just two examples of privacy controls available on modern websites. You can often find privacy controls on a site by navigating to a control panel or settings menu. Sometimes, websites will draw attention to privacy controls while in other cases they will group them under broader categories like “Account Settings”. • Privacy controls may also be offered during the sign-up process for a new online service or account. To best protect your privacy you should explore and understand privacy controls available to you on a given website/platform before you share personal information on or with the site. Privacy Policies • Privacy policies communicate a site's privacy practices to its visitors. These policies can be lengthy documents, filled with language only readily comprehensible to lawyers. • Given an increasing focus on privacy, however, major sites are experimenting with way to make privacy notices more consumer friendly and actionable. • Taking the time to read a privacy policy in part or in whole to understanding the data relationships that exist on the site will help you make informed decisions when using available privacy controls on a site. The public/private distinction • For a number of websites today making information public and open is the name of the game. It's important to understand when signing-up for a new online service or account what model the site defaults to and how its users share information on the site. • Twitter, for example, is an example of an online service where the default is public: unless you specifically opt-in to private mode your messages exchanged using Twitter are available to the general public. • Some websites straddle the line between public and private, while some websites that have been traditionally private are moving toward a more public model. When signing up for a new online service or account take the time to understand the information sharing defaults on the service and the site's general information model: are they trying to keep information private are they pushing to make it public and interconnected with the greater Web? • Blindly signing up for an online account or service understanding and appreciating the site's public/private model can lead to privacy disasters. Email Privacy • Email has remained largely unchanged in the last decade. Methods of exploiting email, however, have evolved significantly and protecting personal information in email environments has become more challenging. • In the past decade hacking has become more effective and phishing techniques, more elaborate. Here are some strategies for protecting your privacy when using email: Use a secondary, “spam” email address • Signing up for new accounts and services or making purchases online usually requires you to share your email address. • If you do not trust a website it's helpful to have a secondary email address you can use in these cases. • This way, if the website shares your email address with marketers or other third parties without your permission you will not be inundated with spam or potentially malicious emails at your personal email account. Use email service providers with strong security and spam filters • Does your email service provider offer message encryption? Do they have robust spam filters? • These are questions to ask before signing up for a new email account. Three of the world's most popular email services, Microsoft Outlook, Yahoo Mail, and Gmail offer their users the ability to encrypt emails, which prevents third parties from intercepting messages. • If you use an email service provider that does not offer built-in encryption capabilities you can use free email encryption protocols such as OpenPGP. Exercise caution when opening emails • Be especially wary of emails sent from individuals or businesses you do not recognize. You should never download attachments from unrecognized senders, as they are likely to contain viruses or malicious software that can take over your computer and/or harvest your personal information. • Another type of malicious email practice known as “phishing” uses elaborate ruses to attempt to trick a recipient into handing over personal information or money. Sometimes “phishers” will claim they have a large sum of money that they need your help transferring or depositing and will reimburse you in exchange. Others will claim they need you to “verify your account” or “confirm your billing information” by providing them with the requisite personal information. A good rule of thumb for email is that if it sounds too good be true or seems potentially fraudulent, it probably is and you should not download the attachment or respond. • Even emails sent from acquaintances or from allegedly legitimate businesses or entities can be malicious. Viruses, for example, can take over your friend's email account and automatically distribute malicious messages to your friend's email contacts. Recognize that email is evolving towards openness and interconnectivity • While the basic function of email – sending and receiving messages and content via a private channel - has remained largely unchanged in the last decade, recently we've seen a push to make email more open with embedded features that mirror the functionality of social networks. • Both Yahoo and Google made changes in this direction to their respective email services with the introduction of Google Buzz and Yahoo! Pulse. Email service providers are increasingly moving toward models that publicize and interconnect the data in your account. For email this includes information like your contacts and communication habits, and, in some cases, even the contents of your emails. • If you don't want to participate in this evolution toward openness you should set your privacy controls appropriately. Use strong passwords and remember to sign-out • Setting a strong password is an important part of email privacy. As a rule of thumb, the more complex the password, the better. Your password should include letters and numbers, make use of upper and lower cases, and incorporate characters such as exclamation points and dollar signs. • Microsoft provides a helpful guide on setting strong passwords available here and a secure password strength checker, available here. • Also, remember to sign out of an online service or account when you are finished with your session, especially if you are using a public or shared computer. This will prevent others from being able to access your account, which can still be open and signed in even after you have closed the browser. Mobile Privacy • 1. On mobile devices your personal information is more likely to be compromised via device theft or loss take appropriate precautions • Because they're smaller and more portable, you're more likely to suffer device theft or loss compared to your desktop computer or even laptop. These mobile devices can also store vast amount of data comparable to desktop computers and laptops. Considering using encryption, and enabling options that will allow you remotely wipe data on the device in the event of loss or theft. For users of Apple's popular iPhone, Apple “Mobile Me” product allows iPhone users to remotely wipe data on a lost or stolen phone (learn more here). • 2. Your mobile device may be aware of your location and may share that data with applications and advertisers • Mobile devices with GPS capabilities are fast becoming the norm. Location aware mobile applications can use GPS data to help you navigate, alert you to events, friends and deals in the area, and serve you location specific advertisements. For example, Fandango mobile applications for Blackberry, iPhone, Palm and Android devices allows users to identify nearby movie theaters and buy movie tickets (learn more here). Most mobile platforms enable you to turn off this location feature, and some mobile platforms offering application specific location controls. If you feel that location-aware applications are invading your privacy, take appropriate action with your privacy controls. Check your native DEVICE settings • Settings Option • Privacy • Photo Sharing • Location Settings • Turn off when not in navigation mode Application – Website Privacy Settings Facebook Privacy Checkup Tool (http://www.cnet.com/news/facebook-launches-its-privacycheckup/) Google+ Privacy Checkup Tool (https://www.google.com/search?q=Google%2B+Privacy+Checkup+T ool&ie=utf-8&oe=utf-8) Common Application Website Settings • LinkedIN – Settings/My Profile • Twitter – Settings/My Profile • General Email - Settings • Yik Yak - Settings • Snap Chat - Settings • Instagram - Settings Prevention is KEY! BEST ONLINE PRIVACY PRACTICES Minimize personal information sharing • Often you will see a laundry list of data fields to enter various bits of personal information when signing up for a new online service or account. • Typically, only certain pieces of personal information are required to register, sometimes noted with an asterisk (*). • If you don't trust the website with your personal information there is no need to enter more information that that which is required to use the service or sign-up for an account. Look for trustmarks on websites and verify their authenticity • The TRUSTe TRUSTed Websitesis the leading online privacy trustmark, but there are other types of trustmarks that provide consumers with online assurances about a business' integrity or practices. • Security trustmarks, like those offered by Verisign and McAfee, demonstrate that a website uses technological measures like encryption to protect your data. • Reputation trustmarks, like those provided by the Better Business Bureau, verify a business' legitimacy and legal status. To verify these seals' authenticity you should always click on them and see that the verification page is hosted by the respective company. • For example, if you click on a TRUSTe seal and the site that pops up begins with anything other than “https://www.truste.com,” you know it's a fake Consider temporary credit card numbers when shopping online • Many credit card companies offer their customers the ability to activate temporary credit card numbers for online shopping use that are linked to their financial account, but are valid only for single or limited transactions. • This technique protects a cardholder's actual credit card account from fraud and theft. Examples of this service include Bank of America's ShopSafe ® program, Citibank's Virtual Account Numbers and Discover's Secure Online Account Numbers. Use strong passwords and remember to sign-out • Setting a strong password is an important part of email privacy. As a rule of thumb, the more complex the password, the better. • Your password should include letters and numbers, make use of upper and lower cases, and incorporate characters such as exclamation points and dollar signs. Use anti-virus and anti-spyware protection • When browsing online you may intentionally download any number of files, such as desktop applications and songs, and unintentionally download tracking files, some of which can be malicious. • Ensuring your computer has up-to-date anti-virus and anti-spyware software is an important part of protecting your personal information online. • Trojans and keystroke logging software can steal personal information from your computer when you use the Internet. Take advantage of browser privacy enhancing capabilities and options • Update your Web browser (Internet Explorer, Firefox, Safari etc.) to ensure that it's the most recent version so you can take full advantage of the included privacy features like ‘private browsing mode'. Summary… Check you device’s native privacy and location settings daily. Only turn on your location settings when using navigation system. You may turn it off when you arrive to your destination. Conduct a weekly Privacy Checkup on all of your apps and online social media networking sites like Facebook, Instagram, and Twitter. Be reminded that many apps must have access to your location in order to perform like Yik Yak and Shopkick. Instead of allowing an application to access your location, enter the closest zip code to satisfy location settings. Always read and review Privacy Statements and other information before downloading an app or signing up for a site. Some applications may be able to access information stored or cached on your device like your credit card number or other private data. Lastly, when in doubt, contact your UTHSC Information Security Team at (901) 448-1579 or itsecurity@uthsc.edu. Let’s Check Some Devices and Applications!!! THANKS! UTHSC Information Security Team Frank Davison Jessica McMorris L. Kevin Watson Ammar Ammar fdavison@uthsc.edu jmcmorr1@uthsc.edu lwatso20@uthsc.edu aammar@uthsc.edu (901) 448-1260 (901) 448-1579 (901) 448-7010 (901) 448-2163 • Information Security Email: itsecurity@uthsc.edu • Website: security.uthsc.edu • To report phishing and spam email forward it to abuse@uthsc.edu • UTHSC Help Desk: (901) 448-2222 ext. 1 or helpdesk@uthsc.edu