Privacy in the Age of the Smartphone


Fact Sheet 2bPrivacy in the Age of the Smartphone

 

 

 

Online Privacy: Using the Internet Safely


Fact Sheet 18Online Privacy:
Using the Internet Safely

This fact sheet explains how your online activities may compromise your privacy and the steps you can take to protect youself. As consumers increasingly go online in so many aspects of their daily lives, the challenge is enjoy the conveniences of online activities while limiting the privacy sacrifices. As the focus of online activity migrates from desktop and laptop computers to smartphones and other mobile devices, the mechanisms for protecting your privacy continue to evolve.

Online Privacy FAQ


Fact Sheet 18aOnline Privacy FAQ

Can employers monitor your email at work?  How can you get your information removed from websites like Zabasearch and PeopleFinders?  What can you do if someone is pretending to be you on social networking sites like Myspace and Match.com? 

This FAQ answers some of the questions we are often asked by individuals who contact us concerning online privacy and safety.  Learn what you can do to protect your personal information when you use the Internet.

Children’s Online Privacy: A Resource Guide for Parents


Fact Sheet 21Children’s Online Privacy:
A Resource Guide for Parents

Children's Safety on the Internet


Fact Sheet 21aChildren's Safety on the Internet

Online Shopping Tips: E-Commerce and You


Fact Sheet 23Online Shopping Tips:
E-Commerce and You

With just a click of the mouse, shoppers can buy nearly any product online -- from groceries to cars, from insurance policies to home loans. The world of electronic commerce, also known as e-commerce, enables consumers to shop at thousands of online stores and pay for their purchases without leaving the comfort of home. For many, the Internet has taken the place of Saturday afternoon window shopping at the mall. Consumers expect merchants to not only make their products available on the Web, but to make payments a simple and secure process. However, the same things can go wrong shopping in cyberspace as in the real world. Sometimes it is simply a case of a computer glitch or poor customer service. Other times, shoppers are cheated by clever scam artists.

Privacy Tips for Online Job Seekers


Fact Sheet 25Privacy Tips for Online Job Seekers

We have more than 70 Privacy Fact Sheets. Click here to see the rest.

Job seekers who use online job search web sites must be careful to avoid a type of job scam in which the applicant is asked to accept payment to his or her own bank account. These are known as payment-forwarding or payment-transfer scams. Payment-transfer scams involve a con artist who pretends to be an employer. The con artist uses a job ad to lure an unsuspecting job seeker, or they may use information from a resume they have found online. Such con artists can be quite convincing, and may even steal company names and corporate logos to convince victims that they are legitimate employers.

Avoiding Online Job Scams


Fact Sheet 25aAvoiding Online Job Scams

We have more than 70 Privacy Fact Sheets. Click here to see the rest.

Job seekers who use online job search web sites must be careful to avoid a type of job scam in which the applicant is asked to accept payment to his or her own bank account. These are known as payment-forwarding or payment-transfer scams.

Payment-transfer scams involve a con artist who pretends to be an employer. The con artist uses a job ad to lure an unsuspecting job seeker, or they may use information from a resume they have found online. Such con artists can be quite convincing, and may even steal company names and corporate logos to convince victims that they are legitimate employers.


Online Privacy for Nonprofits


Fact Sheet 28Online Privacy for Nonprofits

Social Networking Privacy: How to be Safe, Secure and Social


Fact Sheet 35Social Networking Privacy:
How to be Safe, Secure and Social

What do your long lost childhood best friend, your college roommate, your boss and your significant other all have in common? If you are one of the hundreds of millions of people using social networks, there’s a good chance that you are linked to them through an online relationship. The information you share with your online contacts allows you to keep in touch without much effort, but who else is looking at that information? And how are they going to use it?

Many people besides friends and acquaintances are interested in the information people post on social networks.  Identity thieves, scam artists, debt collectors, stalkers and corporations looking for a market advantage are using social networks to gather information about consumers.  Companies that operate social networks are themselves collecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers.  

This fact sheet will provide information about the advantages and disadvantages of using social networks, what kind of information may be safe to post and how to protect it, as well as who is able to access different types of information posted to these networks.

Showing 1-10 of 85 results
Syndicate content


X

Sign In!

Loading