Privacy+Protecting+Habits


 * Privacy Protecting Habits[[image:Privacy.jpg width="159" height="145" align="right"]] **


 * Audience Management: ** Through the Internet, personal, social and professional realms can intersect. Anything an individual posts online could be found at anytime and by anyone. Due to the “recordability and subsequent persistence of information,” [1] information can remain in the public domain long after the user has removed it from the original site. Digital profiles and pictures should be carefully screened for individual security and professional integrity.[2]


 * Email Confidentiality: ** Employers and schools have the right to monitor email addresses and instant messaging accounts provided by their institution. Hackers can also access personal email and messaging histories. Never assume what you write in your emails or instant messages are private. [3]


 * Antivirus Software: ** Consider purchasing or downloading a free anti-virus/security service. These programs actively monitor your computer for viruses or signs of intrusion, and can serve as “firewalls,” making it more difficult for remote users to gain access. [4]


 * Using Aliases: ** When using a public message board or chat room, individuals should use an alternate email address specifically set up for that purpose. If the account is abused by spammers or invasive members, the email address can be easily discarded. [5]


 * Validating Websites: ** Before joining a site, making an online purchase, or giving any other type of personal information online, the user should ensure the site is what it appears to be. Is it a reputable site that guards and uses your information responsibly? Does the privacy statement on the site promise adequate protection for the in[[image:StudentComp.jpg width="164" height="142" align="right"]]formation you give them? Does the site have a reputation for following through on this promise?


 * Cookies: ** A cookie is a small piece of code a remote website stores on your computer. Some cookies can be useful, keeping track of your personal preferences on certain websites. Others transmit the personal information stored on your computer and track your online movements, providing remote users with your digital dossier. To erase cookies from your computer, click on “Tools” in your Internet browser, then “Privacy,” and then “Show Cookies.” Any cookies that shouldn’t be on your computer can be deleted. [6]


 * Spam: ** Automated spam services send emails to thousands of address. If you respond to the email, even asking not to be emailed again, “you’re signaling that your email address is a good one. Instead of less spam mail, you’ll likely end up with more.” [7]


 * Phishing: ** Phishing sites are sites which masquerade as legitimate corporations (i.e. a bank, an online shopping site, etc.) They send individuals emails which request that the user click a link to update their account information. The phony site will then use the personal information (and often credit card numbers) it acquires for its own purposes. Make sure to validate seemingly authenticate emails by visiting the site directly, or calling a representative. [8]

[1] Zeynep Tufekci, “Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites,” //Bulletin of Science Technology & Society//, 28:20 (2008), 22 [2] Ibid. [3] Selena Maranjian, “Protect Your Privacy Online,” //NEA Today//, 24:3 (Jan 2005), 49 [4] Ibid, 48 [5] Ibid [6] Royal Van Horn, “Cookies, Web Profilers, Network Cartography, And Proxy Servers,” //Phi Delta Kappan//, 86:3, 183 [7] Maranjian, 48 [8] Ibid
 * all graphics are the original work of the author