Lesson Objective
Participants will learn how to protect their individual privacy and how to protect others’ privacy and safety.
Participants will learn how to protect their individual privacy and how to protect others’ privacy and safety.
Ready?
Begin Lesson
The personal information you choose to share online can become part of your online identity and reputation.It is important to think about what the information you share about yourself says to others. It is also important to think about other people’s privacy and how you interact with others through online communities.
Privacy is personal and can vary depending on individual preferences and cultural norms.
Your personal definition of privacy, or what and with whom you choose to share information, greatly impacts your online identity. We’ll learn more about online identity and reputation in Lesson 4 (Online Identity and Reputation).
Private materials can include personally identifiable information, intellectual property and copyrighted material. Let’s explore each of these areas in greater detail.
Personally identifiable information (PII) is any information relating to someone that could help someone else identify that person, whether directly or indirectly.
Here are some common types of personally identifiable information:
People may have different opinions about what types of personal information they want to share and how they want it shared. For example;
There are usually broad community guidelines relating to privacy for most applications online. No matter which application or site you are visiting, you should be aware of what you can and cannot post.
Do not post:
1. Content that shares or solicits any of the following private information, either on Facebook or through external links:
2. Records or official documentation of civil registry information (marriage, birth, death, name change or gender recognition, and so on)
3. Immigration and work status documents (for example, green cards, work permits, visas, or immigration papers)
4. Driver’s licenses or license plates
5. Credit Privacy Number (CPN)
6. Email addresses with passwords
7. Digital identities with passwords
8. Passwords, pins or codes to access private information
9. Other private information
10. The following content also may be removed:
A reported photo or video of people where the person depicted in the image is:
11. For the following Community Standards, we require additional information and/or context to enforce:
Be thoughtful when sharing personally identifiable information with specific applications, software, or tools that you use. There are many reasons you may choose to share information for different purposes: to make a purchase, to celebrate a milestone or to promote a business. When sharing information, make sure it aligns with your own comfort level in terms of your privacy. In a later module, you will learn more about specific strategies for staying secure online.
Some people are more comfortable sharing personally identifiable information in certain circumstances. For example, a person may feel comfortable sharing information in an individual communication to a trusted recipient via email or encrypted message (for more information about encryption, see the Security Module). Sharing the same message on a social media profile, or posting it in a group forum, may not feel as comfortable. In those more public forums, information that may be considered private is now more easily shared.
Opportunity to consult the Community Standards: Memorialization
The term “personal identifiable information” can also refer to the information of deceased people where this is required under applicable privacy and data protection laws.
For victims of murder and suicide, we will remove the following content if it appears on the deceased’s profile photo, cover photo, or among recent timeline posts when requested by a legacy contact or family member of the deceased:
For victims of murder, we will also remove the convicted or alleged murderer from the deceased’s profile if referenced in relationship status or among friends.
For the following Community Standards, we require additional information and/or context to enforce:
When brought to our attention by the legacy contact or a family member of the deceased, we will:
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords.
View PageStudents will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View PageStudents will learn how to keep their online information more secure by using and maintaining strong passwords.
View PageStudents will learn to recognize unsecured Wi-Fi when it is available to them, understand the trade-offs inherent in using unsecured Wi-Fi, and make informed decisions about when to connect to and use unsecured Wi-Fi.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of news.
View Page