Social Networking Privacy: How to be Safe, Secure and Social


Fact Sheet 35Social Networking Privacy:
How to be Safe, Secure and Social

What do your long lost childhood best friend, your college roommate, your boss and your significant other all have in common? If you are one of the hundreds of millions of people using social networks, there’s a good chance that you are linked to them through an online relationship. The information you share with your online contacts allows you to keep in touch without much effort, but who else is looking at that information? And how are they going to use it?

Many people besides friends and acquaintances are interested in the information people post on social networks.  Identity thieves, scam artists, debt collectors, stalkers and corporations looking for a market advantage are using social networks to gather information about consumers.  Companies that operate social networks are themselves collecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers.  

This fact sheet will provide information about the advantages and disadvantages of using social networks, what kind of information may be safe to post and how to protect it, as well as who is able to access different types of information posted to these networks.

Geotag, You're It! What Your Smartphone Might Be Saying Behind Your Back


Snap a photo of a sunset with your iPhone and you can upload it to Twitter with a few clicks. But your smartphone might be transmitting more than a pretty photograph. It could be collecting and storing data about your real-time location – and then broadcasting that information when you upload photos onto the Internet. What is Geotagging? Geotagging refers to the practice of adding location information – like GPS coordinates – to different types of media, such as photos. The location information is embedded in a way that may not be visible to the naked eye. There are several ways to make geotags visible, including browser plug-ins and software programs that can reveal the location information embedded in photos, videos and other types of media.

Top 8 Things You Shouldn't Give Social Networking Sites


While websites like Facebook and MySpace make it easy to share vacation photos with old classmates, the personal information on social networks is also attracting people besides friends and family members.  Scam artists, identity thieves, debt collectors, stalkers, hiring managers, and companies looking for a marketing advantage are turning to social networking sites to gather valuable information. Before you publish your next status update, take care that you aren’t risking your identity, security or reputation.

Below are eight things you shouldn’t give to a social network – when signing up for an account, posting content or interacting with your contacts through the network.

“Pay As You Drive” Automobile Insurance: The Need to Guard Personal Privacy


Privacy Rights Clearinghouse and PrivacyActivism agree that a pay-drive plan that offers financial incentives for those who drive infrequently or who may choose to carpool or take public transportation has enormous potential for reducing traffic and protecting the environment. However, we respectfully disagree with the Commissioner’s statements in his August 3, 2009, press release that the regulations protect the privacy of California drivers.

Also, regrettably, neither the Department’s press release nor the amended regulations explain how the privacy of California drivers is protected.

Privacy Today: A Review of Current Issues


The purpose of this report is to highlight and summarize key privacy issues affecting consumers today and tomorrow. Readers who want to explore issues in depth should visit the Web sites of government agencies, public interest groups, industry associations, and companies. A list of public interest groups that are working on these issues is provided at the end of the report.

Showing 7 results
Syndicate content


X

Sign In!

Loading