Social Media & Security Risk. The privacy and security issues related to social networking websites are. InfoSec institute respects your privacy and will. A privacy paradox: Social networking in the United States. Exposure, invasion, and social. The Fourth Amendment and privacy issues on the “new. SOCIAL NETWORKING AND THE FOURTH AMENDMENT: LOCATION TRACKING ON. The privacy policies of social networking. This Note focuses on the privacy. Understanding the Legal Issues for Social Networking Sites and Their Users. Laws Pertaining to Social Networking Sites. Social Networking Privacy: How to be Safe, Secure and Social. Introduction. Types of Social Networks. What Information is Public? Information a User Shares. Information Gathered Through Electronic Tracking. Who Can Access Information? Behavioral Advertising. Third- Party Applications on Social Networks. Government and Law Enforcement Use of Social Networking Sites. Creditors May Use Social Networking Sites. Social Networking and Job Searches: Pros and Cons. How Social Networks May Assist Job Seekers. How Social Networks May Hinder Job Seekers. How Social Networks Can Get You Fired. Anonymity on Social Networks. What Laws Protect a User’s Information Online? Reading a Privacy Policy. Fraud on Social Networks. Identity Theft. Malware. Social Engineering. Social networking sites as.Tips to Stay Safe, Private and Secure. Setting Up an Account. General Tips for Using Social Networks. Resources. 1. Introduction What do your long lost childhood best friend, your college roommate, your boss and your significant other all have in common? If you are one of the hundreds of millions of people using social networks, there’s a good chance that you are linked to them through an online relationship. The information you share with your online contacts allows you to keep in touch without much effort. ![]() ![]() ![]() ![]() But who else is looking at that information? And how are they going to use it? Online social networks are websites that allow users to build connections and relationships to other Internet users. Social networks store information remotely, rather than on a user’s personal computer. Privacy and Security Issues in Social Networking. The problems plaguing social network security and privacy issues, for now. Social networking can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas. However, many people besides friends and acquaintances are interested in the information people post on social networks. Types of Social Networks. There are many types of social networks available. These networks allow users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. For example, Facebook, Friendster and My. Space are platforms for communicating with contacts. These types of social networks are designed to allow users to post short status updates in order to communicate with other users quickly. For example, Twitter focuses its services on providing instantaneous, short updates. These networks are designed to broadcast information quickly and publicly, though there may be privacy settings to restrict access to status updates. Location networks. With the advent of GPS- enabled cellular phones, location networks are growing in popularity. These networks are designed to broadcast one’s real- time location, either as public information or as an update viewable to authorized contacts. Many of these networks are built to interact with other social networks, so that an update made to a location network could (with proper authorization) post to one’s other social networks. These networks are designed as platforms for sharing content, such as music, photographs and videos. Some social networks are built around a common interest or geared to a specific group of people. These networks incorporate features from other types of social networks but are slanted toward a subset of individuals, such as those with similar hobbies, educational backgrounds, political affiliations, ethnic backgrounds, religious views, sexual orientations or other defining interests. What Information is Public? There are two kinds of information that can be gathered about a user from a social network: information that is shared and information gathered through electronic tracking. Information a User Shares. Information a user shares may include: Photos and other media. Age and gender. Biographical information (education, employment history, hometown, etc.)Status updates (also known as posts)Contacts Interests. Geographical location. This information becomes public in a variety of ways: A user may choose to post information as “public” (without restricting access via available privacy settings). Certain information may be publicly visible by default. Other information must remain public; the user does not have an option to restrict access to it. A social network can change its privacy policy at any time without a user’s permission. This was demonstrated in one May 2. Facebook. While this and other similar bugs are usually quickly fixed, there is great potential for taking advantage of leaked information. In fact, a 2. 00. AT& T Labs and Worcester Polytechnic Institute found that the unique identifying code assigned to users by social networks can be matched with behavior tracked by cookies. This means that advertisers and others are able to use information gleaned from social networks to build a profile of a user’s life, including linking browsing habits to one’s true identity. To find out if or how a social network uses cookies, see the social network’s privacy policy. Who Can Access Information? When posting information to a social network, a user probably expects authorized contacts to be able to view it. But who else can see it, and what exactly is visible? Entities that collect personal information for legal purposes include: Advertisers interested in personal information so they can better target their ads to those most likely to be interested in the product. Third- party software developers who incorporate information to personalize applications, such as an online games that interact with the social network. Entities that collect personal information for illegal purposes include: Identity thieves who obtain personal information either based on information a user posts or that others post about the user. Other online criminals, such as people planning to scam or harass individuals, or infect computers with malware (malicious software placed on a computer without the knowledge of the owner). Behavioral Advertising. Social networks that provide their services without user fees make a profit by selling advertising. This is often done through behavioral advertising, also known as targeting. Behavioral advertising is the term used to describe the practice of tailoring advertisements to an individual’s personal interests. They are valuable to social networks as they can be sold at a higher price than regular ads. In some ways, this may be useful to the user because the advertisements he or she sees may appear more relevant. There are several concerns regarding behavioral advertising: Consumers may not be aware that data is associated with their profiles. Consumers may not be able to view the data associated with their profiles and have inaccuracies corrected. There are no maximum retention periods on data and no security requirements for the retention of data, leaving it susceptible to hackers and security risks. Information about minors may be collected and used for behavioral advertising. Read more about behavioral advertising in PRC’s Fact Sheet 1. Privacy and the Internet - Behavioral Marketing. These applications take many forms but some typical and popular forms include: Games to play with contacts. Online polls or quizzes Software that allows users to post to a social media profile via a cellular phone or web application. Some social networks allow program developers to access their platforms in order to create these applications. This makes the social network more attractive to users by facilitating the development of new and creative methods of interacting with contacts and the network. To make these applications useful, social networks may allow developers automatic access to public information of users. In addition to public information, third- party applications may access some private information. As a general rule, use caution when using third- party applications. While still incomplete, the documents that have been published indicate: Each social network has adopted its own procedures for dealing with requests from law enforcement agencies. The degree to which these sites cooperate, or don’t cooperate, with law enforcement may not be fully explained in the privacy policy. This includes divorce trials, child custody battles, insurance lawsuits, criminal trials and cases brought by university police against students for inappropriate behavior or underage drinking, to name a few. Creditors May Use Social Networking Sites. Some creditors are beginning to data mine social networking sites, including Facebook and Linked. In, in order to supplement the information gathered from traditional credit reports. Social Networks and Job Searches: Pros and Cons. Jobseekers have increasingly turned to social networks to market themselves to potential employers, network with other professionals and search out job opportunities. However, an unprofessional social networking profile may also make a job applicant seem unsuitable by revealing too much personal or unflattering information to a potential employer. This section reviews the pros and cons of social networking for jobseekers. This information can be applied to any situation where reputation matters, such as: Renting an apartment. Beginning to date someone. Starting or maintaining a professional relationship, for example as an independent contractor or in a managerial position. Engaging in volunteer or electoral positions. Applying for colleges or scholarships. Being considered in a jury selection process. How Social Networks May Assist Jobseekers. There are a variety of ways social networks can help with the job hunt. If a job applicant initially contacts a potential employer via the Internet, a profile on a social network can help confirm that there is a real person behind an email address. Social networks also increase networking opportunities. A job applicant can alert others to an interest in finding a job, as well as details on the desired position, by posting about this interest on a social network. Professional networks, such as Linked.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |