6.3 Privacy Protection

Understanding Online Privacy

In the digital age, protecting your privacy is more important than ever. This lesson will help you understand how to safeguard your personal information online.

What is Online Privacy?

Your right to control how your personal information is collected, used, and shared online.

Protecting Personal Information

What is Personal Information?

Any information that can be used to identify you, including:

  • Full name and date of birth
  • Address and phone number
  • Email addresses and usernames
  • School or workplace information
  • Photos and videos
  • Location data

Think Before You Share

Before posting anything online, ask yourself:

  • Is this information necessary to share?
  • Who might see this information?
  • Could this be used to harm me or others?
  • Would I be comfortable if this was public permanently?

Privacy Settings & Controls

Social Media Privacy

  • Review and adjust privacy settings regularly
  • Limit who can see your posts and profile information
  • Turn off location services for social media apps
  • Review and remove old posts if necessary

Device Privacy

  • Use strong passcodes or biometric authentication
  • Keep your operating system and apps updated
  • Review app permissions and revoke unnecessary access
  • Enable remote tracking and wiping features

Browser Privacy

  • Use private/incognito mode when needed
  • Clear browsing history and cookies regularly
  • Use privacy-focused search engines
  • Consider using a VPN for public Wi-Fi

Strong Passwords & Authentication

Creating Strong Passwords

  • Use at least 12 characters
  • Include uppercase and lowercase letters, numbers, and symbols
  • Avoid using personal information or common words
  • Use a unique password for each account

Password Example

Instead of: password123 or iloveyou

Try: B1g$ecureP@ssw0rd! or M0untainV!ew#2024

Two-Factor Authentication (2FA)

Adds an extra layer of security by requiring a second form of verification.

  • Text message codes
  • Authentication apps (Google Authenticator, Microsoft Authenticator)
  • Biometric verification (fingerprint, face ID)
  • Security keys

Understanding Data Collection

How Companies Collect Data

  • Cookies and tracking technologies
  • Account registration and profiles
  • Location services
  • Purchase history and browsing behavior
  • Social media activity

Protecting Your Data

  • Read privacy policies before signing up for services
  • Opt out of data collection when possible
  • Use privacy-focused browsers and search engines
  • Regularly review and delete old accounts
  • Be cautious with free apps and services (you're often the product)

Knowledge Check

1. Which of the following is the strongest password?

2. What should you do to protect your privacy on social media?