Lesson Overview
Participants will learn how to protect their individual privacy and how to protect others’ privacy and safety.
Participants will learn how to protect their individual privacy and how to protect others’ privacy and safety.
Ready?
Begin Lesson
The personal information you choose to share online can become part of your online identity and reputation.It is important to think about what the information you share about yourself says to others. It is also important to think about other people’s privacy and how you interact with others through online communities.
Privacy is personal and can vary depending on individual preferences and cultural norms.
Your personal definition of privacy, or what and with whom you choose to share information, greatly impacts your online identity. We’ll learn more about online identity and reputation in Lesson 4 (Online Identity and Reputation).
Private materials can include personally identifiable information, intellectual property and copyrighted material. Let’s explore each of these areas in greater detail.
Personally identifiable information (PII) is any information relating to someone that could help someone else identify that person, whether directly or indirectly.
Here are some common types of personally identifiable information:
People may have different opinions about what types of personal information they want to share and how they want it shared. For example;
There are usually broad community guidelines relating to privacy for most applications online. No matter which application or site you are visiting, you should be aware of what you can and cannot post.
Privacy and the protection of personal information are fundamentally important values for Meta. We work hard to safeguard your personal identity and information and we do not allow people to post personal or confidential information about yourself or of others.
We remove content that shares, offers or solicits personally identifiable information or other private information that could lead to physical or financial harm, including financial, residential, and medical information, as well as private information obtained from illegal sources.
We also provide people ways to report imagery that they believe to be in violation of their privacy rights. (fb.me/privacy-violations-image-privacy-rights)
Do not post:
1. Content that shares or solicits any of the following private information, either on Facebook or through external links:
2. Records or official documentation of civil registry information (marriage, birth, death, name change or gender recognition, and so on)
3. Immigration and work status documents (for example, green cards, work permits, visas, or immigration papers)
4. Driver’s licenses or license plates
5. Credit Privacy Number (CPN)
6. Email addresses with passwords
7. Digital identities with passwords
8. Passwords, pins or codes to access private information
9. Other private information
10. The following content also may be removed:
A reported photo or video of people where the person depicted in the image is:
11. For the following Community Standards, we require additional information and/or context to enforce:
Be thoughtful when sharing personally identifiable information with specific applications, software, or tools that you use. There are many reasons you may choose to share information for different purposes: to make a purchase, to celebrate a milestone or to promote a business. When sharing information, make sure it aligns with your own comfort level in terms of your privacy. In a later module, you will learn more about specific strategies for staying secure online.
Some people are more comfortable sharing personally identifiable information in certain circumstances. For example, a person may feel comfortable sharing information in an individual communication to a trusted recipient via email or encrypted message (for more information about encryption, see the Security Module). Sharing the same message on a social media profile, or posting it in a group forum, may not feel as comfortable. In those more public forums, information that may be considered private is now more easily shared.
Opportunity to consult the Community Standards: Memorialization
The term “personal identifiable information” can also refer to the information of deceased people where this is required under applicable privacy and data protection laws.
When someone passes away, friends and family can request that we memorialize the Facebook account. Once memorialized, the word "Remembering" appears above the name on the person's profile so the account is now a memorial site and protects against attempted logins and fraudulent activity. To respect the choices someone made while alive, we aim to preserve their account after they pass away.
We have also made it possible for people to identify a legacy contact to look after their account after they pass away. To support the bereaved, in some instances we may remove or change certain content when the legacy contact or family members request it.
Visit Hard Questions for more information about our memorialization policy and process. And see our Newsroom for the latest tools we are building to support people during these difficult times.
For victims of murder and suicide, we will remove the following content if it appears on the deceased’s profile photo, cover photo, or among recent timeline posts when requested by a legacy contact or family member of the deceased:
For victims of murder, we will also remove the convicted or alleged murderer from the deceased’s profile if referenced in relationship status or among friends.
For the following Community Standards, we require additional information and/or context to enforce:
When brought to our attention by the legacy contact or a family member of the deceased, we will:
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View Page
Students will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View Page
Students will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View Page
Students will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View Page
Students will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View Page
Students will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page