6.3 Privacy Protection
Understanding Online Privacy
In the digital age, protecting your privacy is more important than ever. This lesson will help you understand how to safeguard your personal information online.
What is Online Privacy?
Your right to control how your personal information is collected, used, and shared online.
Protecting Personal Information
What is Personal Information?
Any information that can be used to identify you, including:
- Full name and date of birth
 - Address and phone number
 - Email addresses and usernames
 - School or workplace information
 - Photos and videos
 - Location data
 
Think Before You Share
Before posting anything online, ask yourself:
- Is this information necessary to share?
 - Who might see this information?
 - Could this be used to harm me or others?
 - Would I be comfortable if this was public permanently?
 
Privacy Settings & Controls
Social Media Privacy
- Review and adjust privacy settings regularly
 - Limit who can see your posts and profile information
 - Turn off location services for social media apps
 - Review and remove old posts if necessary
 
Device Privacy
- Use strong passcodes or biometric authentication
 - Keep your operating system and apps updated
 - Review app permissions and revoke unnecessary access
 - Enable remote tracking and wiping features
 
Browser Privacy
- Use private/incognito mode when needed
 - Clear browsing history and cookies regularly
 - Use privacy-focused search engines
 - Consider using a VPN for public Wi-Fi
 
Strong Passwords & Authentication
Creating Strong Passwords
- Use at least 12 characters
 - Include uppercase and lowercase letters, numbers, and symbols
 - Avoid using personal information or common words
 - Use a unique password for each account
 
Password Example
Instead of: password123 or iloveyou
Try: B1g$ecureP@ssw0rd! or M0untainV!ew#2024
Two-Factor Authentication (2FA)
Adds an extra layer of security by requiring a second form of verification.
- Text message codes
 - Authentication apps (Google Authenticator, Microsoft Authenticator)
 - Biometric verification (fingerprint, face ID)
 - Security keys
 
Understanding Data Collection
How Companies Collect Data
- Cookies and tracking technologies
 - Account registration and profiles
 - Location services
 - Purchase history and browsing behavior
 - Social media activity
 
Protecting Your Data
- Read privacy policies before signing up for services
 - Opt out of data collection when possible
 - Use privacy-focused browsers and search engines
 - Regularly review and delete old accounts
 - Be cautious with free apps and services (you're often the product)
 
Knowledge Check
1. Which of the following is the strongest password?
2. What should you do to protect your privacy on social media?