Top Tips to Protect Your Privacy and Data (PDF)
Total Page:16
File Type:pdf, Size:1020Kb
Top Tips to Protect Your Privacy and Data Monday, Jan. 28th is Data Privacy Day Data Privacy Day is held on January 28th every year. It is an effort to empower people to protect their privacy and control their digital footprint and escalate the protection of privacy and data as everyone’s priority. Presented by: Tim Gurganus 1/28/2013 Data Privacy Day 2013 Top Tips to Protect Your Privacy and Data January is Data Privacy Month OIT is hosting several activities during Data Privacy Month (January) to empower campus users to protect their privacy and to control their digital footprint. All events will be held in DH Hill Library Auditorium 12pm – 1pm Tuesday: “What Data is sensitive and How do we keep it private?” Thursday: “Data Protection, Privacy and the Law” NCSU Privacy Month website: http://go.ncsu.edu/dpm2013 Top Tips to Protect Your Privacy and Data Student Data Privacy @ NCSU The University publishes an directory online. You can control what information is displayed using the instructions in this document: http://www.ncsu.edu/registrar/forms/pdf/privacyblock.pdf You can update or remove your personal information by logging into the MyPack portal at: http://mypack.ncsu.edu Under the FOR STUDENTS tab in MyPack Portal, select Privacy Settings . Top Tips to Protect Your Privacy and Data Faculty/Staff Data Privacy @ NCSU The University publishes an directory online. You can update or remove your personal information by visiting this website: https://ssl.ncsu.edu/directory/updatelisting.php The University also maintains other personal information about you that you can view and update in the MyPack Portal: http://mypack.ncsu.edu Under the FOR Faculty and STAFF tab in MyPack Portal, select Employee Self-Service and then Personal Information Top Tips to Protect Your Privacy and Data Pick Good Passwords • Passwords should be hard to guess and longer is better • Use good passwords with strength appropriate for the importance of the site. – Banking website password should be stronger than a forum site – If a site stores your credit card info, it should have a stronger password – Use different passwords for different websites or types of websites • Online Banking • Personal Email • Unity ID • Online shopping • Facebook, Twitter, LinkedIn, Pinterest Password strength testing • If you have an idea for a password, test it here: https://passfault.appspot.com/password_strength.html#menu Top Tips to Protect Your Privacy and Data Be Careful of Linked Accounts • If your email account can be used to reset the password for your Bank account, the passwords should be different and at least the same strength • Avoid connecting too many accounts and be wary of using your Facebook or twitter account to login to sites that are not well known • Firefox plug-in shows password use and re-use http://connectioni.st/2012/01/visualize-your-password-reuse.html Password strength testing • If you have an idea for a password, test it here: https://passfault.appspot.com/password_strength.html#menu • Password suggestions: https://onyen.unc.edu/cgi-bin/unc_id/services Top Tips to Protect Your Privacy and Data Manage your passwords • If you store passwords in your web browser, set a master password • Consider using a password vault like Keepass from: http://keepass.info – Works in Windows, Linux and Mac – Works in Android, iPhone, Blackberry and Windows phone – Password vault is opened with a master password – Passwords are encrypted while in memory – Once you find a password, double click on it to copy it to the clipboard then paste it in the login screen – Keepass can automatically clear the clipboard after a certain time has passed. • Use a mnemonic or association to help you remember the password chosen for a given login Top Tips to Protect Your Privacy and Data Gmail Email Security and Privacy • Setting up mail delegation - http://support.google.com/mail/bin/answer.py?hl=en&ctx=mail&answer=138350 • You can delegate access to your Gmail to another person so they can read, send, and delete messages on your behalf. • For example, you can delegate e-mail rights to an admin in your organization, or you could delegate your personal email access to your spouse. • The delegate can also access the other person's contacts by clicking the Contacts link. Clicking the To , Cc , or Bcc links in the mail compose window will also bring up your contacts. • You won't be able to give anyone permission to change your account password or account settings, or chat on your behalf. • Only delegate email access to a trusted person • This is one of the settings you should check if your account has been compromised Top Tips to Protect Your Privacy and Data Gmail Email Filters and Forwarding • Email filters and forwarding are another way to share access to email • You can set up filters to forward messages that meet specific criteria. • You can create 20 filters that forward to other addresses. • You can maximize your filtered forwarding by combining filters that send to the same address. • Setting up a forward: http://support.google.com/mail/bin/answer.py?hl=en&ctx=mail&answer= 10957 • Creating filters: http://support.google.com/mail/bin/answer.py?hl=en&answer=6579 • Filters and forwards should be checked after an account is compromised Top Tips to Protect Your Privacy and Data Displaying Images or Remote Content and Privacy • Be aware that displaying images or other remote content in an email may communicate to the sender that you read the email or identify you to the sender Top Tips to Protect Your Privacy and Data Displaying Images or Remote Content and Privacy • Be aware that displaying images or other remote content in an email may communicate to the sender that you read the email or identify you to the sender Top Tips to Protect Your Privacy and Data Did you know ??? • The Wall Street Journal says companies are increasingly connecting consumers' real-life identities to where they hang out online. • The newspaper cited a Georgia man shopping for a car who input his name and contact information on a car dealer's website. • While this data went to the dealership, it also was transmitted to a company that tracks the online movements of people shopping for vehicles. The company then was able to pair the man's personal information with an analysis of the automotive websites he had visited and hand over all of this data to the car dealer, which could use it to more easily land a sale. • One company that can pull off this kind of data mining is Dataium LLC, based in Nashville, Tenn. • Describing itself as "the world's largest compiler of online automotive shopping behavior," Dataium says every month it "observes over 20 million automotive shoppers across over 10,000 automotive websites and then aggregates, indexes and summarizes this data into intelligent insights." Top Tips to Protect Your Privacy and Data More and more, You are being tracked online: How it works: http://online.wsj.com/article/SB1000142412788732478440457814 3144132736214.html#project%3DANONYMITY1208%26article Tabs%3Dinteractive 1. When you visit a website, a tracking company like Dataium or DataLogix put a cookie on your computer 2. As you visit other sites that also use data tracking companies, the cookie data gets updated using your computer browser’s id. 3. If at some point you enter your real name on a website, like to register, your ID is connected with the cookie information collected earlier. Top Tips to Protect Your Privacy and Data • Sites are sharing personally identifiable information and some personal information (age, zip code) with 3 rd parties – Ask.com – Linkedin.com – Photobucket.com – Match.com http://online.wsj.com/article/SB10001424127887324784404578143144132736214.html #project%3DANONYMITY1212%26articleTabs%3Dinteractive Top Tips to Protect Your Privacy and Data When you login to a site, other companies may access the data from your profile via: • Image Advertising on the pages • Social network code such as Like, Google+, LinkedIn or Tweet – If you are signed in to Facebook and go to a site with a Like button, the site can know your Facebook identity even if you don’t click on the Like button • Advertising banners, headers, sidebars and footers – Some use transparent images that you will not see Top Tips to Protect Your Privacy and Data Firefox Browser Settings • Remember history, search history downloads • Don’t Accept tracking cookies • Don’t Accept third party cookies • Cookie Expiration Accept third-party cookies : If selected, Firefox will accept cookies from http://site2.com when you are visiting http://site1.com . Some advertisers use these types of cookies to track your visits to the various websites on which they advertise. If you are concerned about this, you can disable third-party cookies in Firefox. Top Tips to Protect Your Privacy and Data Firefox Browser Settings •Firefox allows you to show your cookies by name and content. •Here you see all the cookies related to Twitter Top Tips to Protect Your Privacy and Data Firefox Browser Settings • See saved passwords and remove or show them • Firefox can protect sensitive information such as saved passwords and certificates by encrypting them using a master password . • If you create a master password, each time you start Firefox, it will ask you to enter the password the first time it needs to access a certificate or stored password. Top Tips to Protect Your Privacy and Data Firefox Browser Settings • Pages you view are normally stored in a special cache folder for quicker viewing the next time you visit the same page. • You can specify the amount of disk space the cache can use here. • You can also immediately clear the contents of the cache.