Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

1

The video on this page will play automatically.


While it is playing, conduct a Bluetooth tracking experiment using your own mobile phone's or
laptop's Bluetooth scanner to search for devices in the room.
Write down any conspicuous names.
The video is also available online at http://www.youtube.com/watch?v=aDycZH0CA4I

2
Greet the class, and if you did a Bluetooth scan, ask if specific names from the scan are here.
This works to plant the idea that their data is not as safe as they might think
Introduce yourself and (if you have one) tell them about a brief experience you have had in
regards to protecting your data. Alternatively, tell them why you are interested in this topic. Does
it pertain to you job? Do you have specific experience with subject?
The video you just watched was a warm-up to get us to start thinking about how navigating the
Internet is a little odd. For instance, on Facebook we can follow someone—but it‘s a little weird
to follow them around on the street. Facebook is real—and it‘s not real. If you poke someone or
write on their wall or even share a photo, it has a completely different meaning online than it
does in real life.
Today we going to talk about personal data, how to protect your data, and ultimately how you
can be in charge of your data to protect and manage your digital reputation—which in this case
is every bit as real online as it is in real life.
Encourage pupils to ask questions during the presentation.
Remind them to put their cell phones on silent, and face-down or out of sight. Remind them they
will need a pencil and paper.

3
Where does data reside and how do you unwittingly contribute data online?
Ask: (move through these quickly and just note how many hands go up)
•! Who has posted trivial information on the Internet?
(By trivial, we mean unnecessary, like, “I just put on a new shirt.”)
•! Who is registered with Facebook, Myspace, Twitter and other online communities?
•! Who is familiar with Facebook privacy settings and has ever edited them?
•! How many of you have up-to-date anti-virus protection?
•! How many of you have received a warning that it needs updating?
•! How many of you have a personal photo visible on the Internet?
•! How many of you think your passwords are strong enough to withstand hacking?
•! How many of you have shared their passwords?
•! How many of you think your data is protected adequately?

4
What is personal data, anyway?
•! “Data” is defined as: Individual facts, statistics, or items of information.
•! Anything about you that is on the Internet is personal data.
Ask: What are the things that fall under your own data?
•! Name and address
•! Date of birth
•! Mobile phone number
•! Official numbers (license, Social Security, etc.)
Ask: What are the things that fall under school data?
•! Grades
•! “Dings” or reprimands
•! Number of absent/tardy days
•! Awards
•! Yearbook information
Ask: What are the things that fall under leisure time data?
•! Friends
•! Hobbies
•! Photos
So…your friends are your data. Your activities in and out of school = data. Photos you post on
the Internet = data.
Anything and everything that you post on the Internet or is posted about you (with or without
your consent) is your personal data.

5
And what about these?
Ask: Is personal data also gathered this way?
•! Google Street View: Is your house and car public or private?
•! Face recognition
This lets people tag YOUR face on Facebook and online
In 2011, Facebook Inc. introduced a facial recognition feature that can pinpoint individuals. It
was used to automatically identify friends when you uploaded photos of them onto the social
network. Facebook users need to disable this function from their end, putting the burden on
them to decide how their face is spread throughout the Internet.
•! Posters and advertising
Once the stuff of science fiction and high-tech crime fighting, facial recognition technology—
which is used to tailor advertising to individuals passing by—has become one of the newest
tools in marketing. For instance, in Las Vegas, Nevada, US, the Venetian resort, hotel and
casino has started using face recognition to tailor suggestions for restaurants, clubs and
entertainment to passersby. And in July 2011, a group of U.S. bar owners started using facial
recognition, in conjunction with mounted cameras, to keep tabs on the male/female ratio and
age mixes of their crowds. Patrons planning a night out can use mobile apps to get a real-
time check of a venue's vibe.
•! Ask: What about facial expressions?
•! Do they belong to you?
•! Are they public?
•! Do they really say what you are thinking?
•! Should your facial expressions be used by someone else for their own gain or profit?

6
What can happen to your data?
When you surf the Internet, you leave behind traces of yourself without even thinking about it.
Some of this information you publish voluntarily, like on Facebook—your name, age, location,
relationship status.
But sometimes you aren’t aware that your data is being gathered and used for other purposes—
some of which are benign and some of which can be really negative.

7
What does happens to your data “behind your back”?
Without deliberately storing anything, diverse items of your data or behavior on the Internet are
collected.
Cookies are bits of text stored on your computer by the Web sites you visit. Cookies can be
used for authentication, for storing your site preferences, or anything else that can be saved as
text data. Unfortunately they can also be used by ad tracking services to track the sites you visit
online.
IP Address: This is the address your computer has when it connects to the Internet.
•! Public IP addresses have locations associated with them.
•! If the device you are using to surf the web has a GPS or location identifier, that tells people
where you are.
•! If you surf from a private IP address (like from your home) it’s still possible to compare your
IP address to another publically-known spot and pinpoint your location to within half a mile.
•! Your surfing history is stored in your browser. If someone takes your history of where you
have been surfing for the last six weeks, they can tells a lot about you.
Think before accepting cookies (“Click here if you want to stay logged on with this computer”,
“Do you want me to remember this password?”)
Periodically clear your browsing history, and delete cookies in your browser
Each system does it differently (Mozilla, Windows, etc) so just do a Google search for the
specifics of your system.
Why? Because if someone hacks your computer, they will then be able to access all those bits
of data that tell who you are, where you go online, what you like.

8
Your personal data is precious and worthy of protection
Remember: All those various bits and pieces of your online information can be recombined to
make up a picture of you that you may not like—or can actually work against you.

9
This is how your data is can be captured with only a nickname and freely available tools
ICQ is an instant messaging computer program that provides Internet-wide instant messaging
services. It was developed in 1996. The name ICQ is a homophone for the phrase "I seek you".
This is an adaptation of the Morse code callout "CQ", which means "calling any station".
If you use instant messaging of any kind (like Windows Messenger or Yahoo Chat, you are
dealing with ICQ.
When you use a chatroom, you often have a visible nickname or screen name. But sometimes
you use your real name—which leaves you even more vulnerable. Always use a screen name!

10
Because we often use the same screen name or nickname in many places (and sometimes,
again, our real names), someone using a few freely available tools can easily get more
information about the holder of a nickname by looking elsewhere in the Web.
Google easily shows a listing of where a nickname has been in use, especially if that name has
been used to post in forums and chat rooms.

11
Maybe you also use the same screen name to make a wishlist, say on Amazon. Now, your
interests are known to whoever is snooping around.

12
By following your ICQ screen name, other people can access your profile in other communities,
like Myspace and Facebook, which can tell them details about what school you go to, what class
you are in, and who your friends are. Maybe by now—by putting some pieces together—they
know your real name, even if you’ve only used a screen name.

13
By following specified groups your name is associated with (like a school and class), it’s
possible to find photos that are tagged with your name. Maybe the photos show you at parties,
or doing things that don’t show you at your best.

14
By using face comparison software (like Picasa), it’s possible to find all of the photos of you that
are on the Internet.
The new Picasa 3.5 contains a facial recognition feature similar to the one already present on
Picasa Web Albums, but letting it run over your likely vast collection of assorted photos stashed
on your hard drive is a lot more convenient. Picasa creates a new sidebar menu list of "People,"
and asks you to name the folks it finds in its main "Scanning" menu. If you're signed into Web
Albums with a Google account stuffed with contacts, that's pretty easy, actually—just start typing
a name, then select the contact that pops up as you type.
Apple’s iPhoto behaves in a similar fashion. When you import new photos, whether directly from
your camera, from files that are stored on your Mac’s hard drive or images you have uploaded
to a storage drive from a remote location, iPhoto inspects their content and looks for features it
thinks are people’s faces.

15
So now, by means of using just a few simple tools, anyone can get a very complete view of you
by the traces of data that live forever on the Web.
That one screen name reveals a lot about you as a person and what your interests are.

16
These days, employers and landlords do online searches on people. Everything that shows up
—both good and bad—tells them about you, and affects whether or not you get the job or the
apartment.
•! Ask: If you have a lot of missed days at school, what might that tell someone about your
work ethic?
•! Ask: Would a landlord want to rent to a person who had a bunch of party photos floating
around the Web?
Schools and employers can perceive posting negative comments online as a sign of general
immaturity or an inability to get along with others. In some cases, posting these kinds of
comments online could even be classified as online libel.
•! Ask: Do you think car insurance companies take a look at a teenager’s presence on the
Internet?
You bet they do. Increasingly, insurance companies have been using the Internet to search
for information on their policyholders. The goal is to assess a policyholder’s risk so that the
insurance company can make sure it is charging the right amount of money.

17
This is the place to insert a short discussion about how your country handles data privacy if you
have done some prior research.
Some countries take the subject of data privacy very seriously; others have not yet put stringent
safeguards in place. You can’t assume your government has taken all the steps to protect online
privacy—the individual is ultimately responsible.
What are the current regulations?
Where are areas where your data might be vulnerable?
Remember: No matter what the privacy laws are for an individual country, it is the laws of the
country where an online service (such as Facebook) actually reside that apply on the Internet.
So—your country may have stringent privacy laws, but those laws may not apply when you are
online. No law protects a citizen completely. Essentially, there is no privacy when you surf the
Internet.

18
Keeping your data private is your responsibility.
Ask: Where can you assume responsibility for your data?
•! Facebook
•! Myspace
•! Twitter
•! E-mail
•! Mobile phone
•! Passwords

19
Just like a secret, you keep your personal data to yourself:
•! My passwords are only intended for me//not intended for anyone else
•! My email is only intended for me
•! I decide what I like, who I meet, and where I meet them
•! Not everyone needs to know where I live
•! What I do on the Internet is not the business of strangers
•! What I talk about on the telephone/mobile is my business
•! I decide what I publish in social communities
Protect your data!

20
Why not take control?
If you are going to take part in the online world (and you already are) you don’t want to do it
thoughtlessly.
Think of the Internet as an opportunity and not as a danger.
The Internet is a kind of virtual marketplace. If you do assume responsibility for your data, you
can present yourself very positively online.
If you think a bit about targeting how your personal data is used online, it’s possible to not only
be in charge of your online identity, but possibly get some big benefits.
Assume responsibility for yourself—but also take responsibility for how you treat others online.

21
Managing your online identity is simple—if you remember some simple rules:
•! Nothing goes away on the Internet: Think before you post.
•! Create and use powerful passwords.
•! Protect your PC.
•! Manage your digital reputation.

22
Think before you post
Ask: Has anyone had a photo you thought was private go viral?

23
Creating a powerful password
Ask the class to write down a six-character (letters and characters and caps allowed). Have
them do it fast—they don’t have to remember it.
That’s a pretty good password, right?
This is how long it takes for a hacker to break it…
(Go to next page. The clock will start and stop automatically.)

24
25
Password reality check
Briefly show the class the table, pointing out the big jump in time required to break a 10-
character password.
Good passwords are:
•! At least 10 characters long, and contain letters, numbers and special characters
•! Different for different accounts
•! Password rules:
•! Change them frequently
•! Do not exchange them with friends
•! Do not leave them lying around
•! Always keep them private

26
How to create a powerful password
Make a memorable phrase into an acronym
•! For instance: I Never Tell Anyone My Password (INTAMP)
Mix in capitals, special characters and numbers to make it at least 7 characters long
•! Int@mP15
•! This string can be yours forever (or for a really long time). It’s pretty powerful as it is. But you
beef it up and identify specific locations by taking the next step.
Manage each site
•! Each place you commonly go (like Facebook, YouTube, Amazon) use three letters from the
name to identify the site and associate it with your password
•! YouTube could be uTu. Amazon = azo
•! So, using our example, your YouTube password could become Int@mP15Utu
Remember to keep your password to yourself!
•! A great and powerful password means nothing if other people, even your friends, know what
it is.

27
Protect your PC
If your personal computer is not adequately protected, someone or something can get inside of
it and access all of your data to rip you off and possibly ruin your computer. You need to keep
your computer as secure as possible.
•! Have virus protection installed on your PC and keep it up-to-date
•! Regularly update your operating systems (Windows/Linux/Mac)
•! Ensure the firewalls that are part of your operating systems are turned on
•! When you are surfing, it’s best to use an encrypted wireless network where you have to enter
a password before getting online. This makes it harder for hackers to access your data.
•! Always back up your data on an external hard drive

28
Manage your digital reputation
The video will play automatically.
Ask: What is reputation?
•! The estimation in which a person is generally held
•! Public opinion about a person
•! Favorable and publicly recognized name or standing for merit, achievement, reliability
•! Notoriety or fame, especially for some specified characteristic: A bad reputation for…
So a reputation can cut both ways. And the trail you leave behind online—everything together—
constitutes your digital reputation.

The video can also be seen online at: http://www.youtube.com/watch?v=mgHycMBGzp4

29
Your digital reputation and Facebook
Facebook has a lot of benefits, but the challenge is to understand the risks of using it.
•! Anything and everything you post can be linked to you, and can also affect other people
•! Watch out what you write and who you write about
Who are my friends?
What do I allow my friends to see?
What do people who are not my friends see?
What does my wall say about me?
How do I present myself when I write on my friend’s walls?
Does every photo of me represent me positively?

30
Quick Facebook quiz
Ask: When you take a quiz on Facebook, what information about you can the quiz see and
collect?
1.! Only your answers to its questions
2.! Only information that is set as “public” on your profile
3.! Almost everything on your profile, even if you use privacy settings to limit access. (Correct)

31
Ask: When your friends take a quiz, what information about you can the quiz see?
1.! Nothing at all, unless my friends use my name in an answer on the quiz
2.! Only information from my profile that is visible to everyone on Facebook
3.! Almost everything on my profile, even if I use privacy settings to limit who can see that
information (correct)

32
Ask: There must be safeguards, right? My information is safe, because:
1.! Facebook’s default privacy settings prevent application developers from accessing my
information
2.! Facebook carefully screens all app developers to ensure they are trustworthy, and requires
that they post and comply with a stated privacy policy
3.! Facebook limits how app developers collect and use personal information
4.! None of the above (correct)
Ask: How do you protect yourself and your data?
If you have time, and an Internet connection, you can go online to The evolution of privacy on
Facebook (http://mattmckeon.com/facebook-privacy/)
•! Make sure to click on each year to see the changes
•! This is an excellent visual demonstration of how Facebook has expanded the default privacy
settings of individuals.

33
Make the Internet work FOR you
If only positive things about you can be found on the Internet for years, then you have more
credibility when you apply (for a job, or insurance or a rental) than if you just publish something
at the last moment
Make everything about you on the Internet into an excellent business card.

34
Control Your Online Identity!
Take a look at your whole life. Post about the sports you play, about the church you go to, about
the volunteer work you did, about the band you play in. Post with an eye to presenting yourself
in the best possible light.
If a photo of you is posted that does not represent you well, take it down. If someone else
posted it, remove the tag and ask that it be taken down.
Let the Internet become your marketplace for your personal brand.

35
Tips to remember
•! Keep control of your data
•! Manager your passwords
•! Keep them powerful
•! Keep them secret
•! Use different passwords for different sites
•! Change your passwords periodically
•! Protect yourself, your data and your friends
•! Negative posts about other people reflect badly on you
•! Be fair with other people’s data
•! Ask if you are unsure

36
The video on this page will play automatically.
It can be found online at: http://www.youtube.com/watch?v=JJvue_LPaLY
Note: If there is not enough time, skip to the final page.

37
Recap
At the beginning of the session, we went through a few questions. I wonder if you’ve changed
your mind about online privacy and identity.
Who in the group here today…
…has posted trivial information on the Internet?
•! Instead…who will think about posting positive and important things?
…is registered with Facebook, Myspace, Twitter and other online communities?
•! And…who will use these communities to their advantage?
…is familiar with Facebook privacy settings and has actually edited them?
•! and …who will take charge of Facebook privacy settings?
…has up-to-date virus protection?
•! And…who will check to see if their PC virus protection is current?
…has a personal photo visible on the Internet?
•! And…who will screen their online photo albums?
…thinks their passwords are strong enough to withstand hacking?
•! And…who will update and/or strengthen their passwords?
…thinks their data is protected adequately?
•! Who…still thinks their personal data is protected adequately?
If you have time, check to see if there are questions.
Thank them for their time and attention

38
39

You might also like