PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Privacy Rights Clearinghouse: Top 8 Things You Shouldn’t Give Social Networking Sites

Posted on June 9, 2010 by pogowasright.org

From their press release:

While websites like Facebook and MySpace make it easy to share vacation photos with old classmates, the personal information on social networks is also attracting people besides friends and family members. Scam artists, identity thieves, debt collectors, stalkers, hiring managers, and companies looking for a marketing advantage are turning to social networking sites to gather valuable information. Before you publish your next status update, take care that you aren’t risking your identity, security or reputation.

Below are eight things you shouldn’t give to a social network — when signing up for an account, posting content or interacting with your contacts through the network.

1. Access to your email account. During the registration process, social networks often solicit a new user to provide an email address and account password so they can access the user’s email address book. To be safe, don’t provide this information at all. There are some social networks that capture a user’s email contacts and then solicit them — often repeatedly — to join. If you consider providing an email address and account password to a social network, read all agreements (including the privacy policy – http://www.privacyrights.org/social-networking-privacy#privacy-policy) very carefully before clicking on them.

2. An email address associated with your professional life. Never provide a work-associated email to a social network, especially when signing up. Consider creating a new email address strictly to connect with your social networking profile(s). Jobseekers should take special care to keep professional and personal lives separate. (Read more http://www.privacyrights.org/social-networking-privacy#job-searches)

3. Your exact date of birth, especially in combination with your place of birth. Your exact date of birth may be useful to an identity thief. A 2009 study published by researchers at Carnegie Mellon showed that a date and place of birth could be used to predict most, and sometimes all, of the nine digits of one’s Social Security number. If you do decide to post your birthday, use privacy settings to restrict the visibility of this information and don’t provide the year.

4. Your browsing history. Delete cookies, including flash cookies, every time you leave a social networking site. Also consider using a proxy server to mask your IP address, such as Tor, http://www.torproject.org. Read more http://www.privacyrights.org/fs/fs18-cyb.htm#cookies

5. Vacation Plans. Don’t publicize vacation plans, especially the dates you’ll be traveling. Remember, no matter how carefully you construct your privacy settings, there’s no guarantee that what you post won’t become known to unauthorized viewers.

6. Public posts with your address, phone number or email address. Don’t post your address, phone number or email address on a social network profile or status update. Scam artists as well as marketing companies may be looking for this kind of information. If you do choose to post any portion of this, use privacy settings to restrict it to approved contacts. Be especially wary of providing a GPS location of your home. If you use a location-aware social network, use extra caution! Don’t publicize the location of your home because people will know when you are not there. (See http://www.pleaserobme.com/why)

7. Compromising, sensitive, embarrassing or inflammatory pictures or posts. Remember that whatever goes on a network might eventually be seen by people not in the intended audience. Think about whether you would want a stranger, an insurance company, the government, your mother or a potential boss to see certain information or pictures. Don’t be afraid to ask to have content removed. Read more about what information is public at http://www.privacyrights.org/social-networking-privacy#public

8. Money. Be wary of requests for money, even if they are from contacts you know and trust. If a contact’s account is compromised, a scam artist may use his or her name and account to attempt to defraud others through bogus money requests.

Any individual who participates in social networking sacrifices a certain amount of privacy, but a savvy user can limit what they share. Remember, the strongest tools users have to defend their personal privacy on social networking sites are common sense, caution and skepticism.

Read more about social networking privacy — including 18 more vital tips for protecting personal privacy — by reading PRC’s newest fact sheet Social Networking Privacy: How to be Safe, Secure and Social,
http://www.privacyrights.org/social-networking-privacy

Category: Online

Post navigation

← Ca: Province ponders revealing privacy breaches after leak to Teamsters union
Links to defamatory content in email made sender liable, says US court →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech

RSS Recent Posts on DataBreaches.net

  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy