SlideShare a Scribd company logo
1 of 11
A Brief Guide to Facebook
Privacy
(June 2013)
Larry Magid
Co-director
ConnectSafely.org
Inline Privacy Settings
• You can control the audience for each post, each time you post
• Click on the icon (globe means it’s public) below each post to change
the audience
Audience Choices
• Public – Everyone
• Friends – People you have friended
• Friends of Friends: Your extended network of people your
friends are friends with
• Acquaintances – “Friends you don’t need to stay in close
touch with.”
• Close Friends: People you interact with a lot
• Custom: You get to chose who to include or exclude
Privacy Settings and Tools
• Facebook has a couple of settings that are “permanent” (until you
change them)
• Who can see my stuff
• Who can look me up
• You can access them from the settings menu
Tagging
• Anyone can tag you in a photo or a post
• Once tagged, that photo or post can be found by searching for you
• Tagged images of you can also show up on your Timeline
• You can remove a tag of yourself from Activity log or from your
Timeline
You can tag
yourself or others
To Remove a Tag
• From Your Activity Log
• Click on the post or picture
• Click Options below the picture
• Select Report/Remove tag
• From your Timeline
• Click on pencil to select “edit/remove”
• Select Report/Remove
Using the Activity Log to Find and
Remove Content
• You can use the Activity Log to see photos you're tagged in and posts that
may appear in News Feed, search and other places on Facebook
• Use "Shared with" and "On timeline" filters to review who can still see
things you may have hidden from your time line that could show up in news
feed, search and other places.
• You can remove something you don’t like by clicking on the pencil icon and
selecting Delete.
• You can report abusive posts from others by Report/Remove Tag
A Lot Can Be Found With Graph Search
• Graph Search is a powerful search tool that can help people find
people places and things including photos you’ve been tagged in
• If someone is part of the audience of a post, they can find it using
graph search
• Anything posted to “public” can be found by anyone
• Anything posted to friends can be found by your friends
• If you don’t want it found, don’t post it or limit the audience
• Content hidden from your Timeline may still be found via search
Timeline Vs. News Feed Vs. Search
• Your Timline is “you central” – the place where people can see what
you post, what’s posted about you and what (including pictures)
you’re tagged in
• But it’s not the only place people can find content about you. It can
also be found:
• In News Feed (those posts that show up on people’s home pages)
• Via search
• On other people’s TImelines
Hiding vs. Deleting
• There are ways to hide content from your
Timeline but it might still surface elsewhere
• In News feed
• In Search
• On someone else’s Timeline
• If you really want it gone, you must delete it, not
just hide it
Larry Magid
larry@connectsafely.org
Thank You!

More Related Content

Viewers also liked

Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Nicole C. Engard
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenWhat Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenHome
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 

Viewers also liked (7)

Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)Practical Open Source Software for Libraries (part 2)
Practical Open Source Software for Libraries (part 2)
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese GardenWhat Plants, Shrubs 7 Flowers to Use In A Japanese Garden
What Plants, Shrubs 7 Flowers to Use In A Japanese Garden
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 

Similar to A Brief Guide to Facebook Privacy

Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529dinica
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Becky Benishek
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesKelly Anderson
 
Facebook privacy settings by Lynn
Facebook privacy settings by LynnFacebook privacy settings by Lynn
Facebook privacy settings by LynnLynnOng Jia Hui
 
Facebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesFacebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesTory Starr
 
Google+ features for business and users
Google+ features for business and usersGoogle+ features for business and users
Google+ features for business and usersEnconexo
 
Google plus chapter 2 - circles
Google plus   chapter 2 - circlesGoogle plus   chapter 2 - circles
Google plus chapter 2 - circlesBobby Wan
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingVictor Castelo
 
Google+ posting
Google+ postingGoogle+ posting
Google+ postingmattgasior
 
Google+ posting
Google+ postingGoogle+ posting
Google+ postingAngelMcru
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for scepticsHelen Webster
 
Social Branding for Student Journalists
Social Branding for Student JournalistsSocial Branding for Student Journalists
Social Branding for Student JournalistsMandy Jenkins
 
Print screen and Script
Print screen and ScriptPrint screen and Script
Print screen and Scriptmenger89
 
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...News Leaders Association's NewsTrain
 
Oachc Presentation2
Oachc Presentation2Oachc Presentation2
Oachc Presentation2Kknepper
 
How to Use Flipboard
How to Use FlipboardHow to Use Flipboard
How to Use FlipboardLisa Sicard
 

Similar to A Brief Guide to Facebook Privacy (20)

Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529Facebook and Twitter 101 20150529
Facebook and Twitter 101 20150529
 
Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)Tips to Facebook Privacy 2013 (So Far)
Tips to Facebook Privacy 2013 (So Far)
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
Facebook privacy settings by Lynn
Facebook privacy settings by LynnFacebook privacy settings by Lynn
Facebook privacy settings by Lynn
 
Facebook 101 for WGBH Employees
Facebook 101 for WGBH EmployeesFacebook 101 for WGBH Employees
Facebook 101 for WGBH Employees
 
Facebook and privacy policy
Facebook and privacy policyFacebook and privacy policy
Facebook and privacy policy
 
Google+ features for business and users
Google+ features for business and usersGoogle+ features for business and users
Google+ features for business and users
 
Google plus chapter 2 - circles
Google plus   chapter 2 - circlesGoogle plus   chapter 2 - circles
Google plus chapter 2 - circles
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and tagging
 
Google+ posting
Google+ postingGoogle+ posting
Google+ posting
 
Google+ posting
Google+ postingGoogle+ posting
Google+ posting
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Google+ workshop presentation
Google+ workshop presentationGoogle+ workshop presentation
Google+ workshop presentation
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for sceptics
 
Google+ Smart Card 070314
Google+ Smart Card 070314Google+ Smart Card 070314
Google+ Smart Card 070314
 
Social Branding for Student Journalists
Social Branding for Student JournalistsSocial Branding for Student Journalists
Social Branding for Student Journalists
 
Print screen and Script
Print screen and ScriptPrint screen and Script
Print screen and Script
 
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
Using Social Media as Powerful Reporting Tools by Carla Zanoni - Philadelphia...
 
Oachc Presentation2
Oachc Presentation2Oachc Presentation2
Oachc Presentation2
 
How to Use Flipboard
How to Use FlipboardHow to Use Flipboard
How to Use Flipboard
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 

More from ConnectSafely (11)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

A Brief Guide to Facebook Privacy

  • 1. A Brief Guide to Facebook Privacy (June 2013) Larry Magid Co-director ConnectSafely.org
  • 2. Inline Privacy Settings • You can control the audience for each post, each time you post • Click on the icon (globe means it’s public) below each post to change the audience
  • 3. Audience Choices • Public – Everyone • Friends – People you have friended • Friends of Friends: Your extended network of people your friends are friends with • Acquaintances – “Friends you don’t need to stay in close touch with.” • Close Friends: People you interact with a lot • Custom: You get to chose who to include or exclude
  • 4. Privacy Settings and Tools • Facebook has a couple of settings that are “permanent” (until you change them) • Who can see my stuff • Who can look me up • You can access them from the settings menu
  • 5. Tagging • Anyone can tag you in a photo or a post • Once tagged, that photo or post can be found by searching for you • Tagged images of you can also show up on your Timeline • You can remove a tag of yourself from Activity log or from your Timeline You can tag yourself or others
  • 6. To Remove a Tag • From Your Activity Log • Click on the post or picture • Click Options below the picture • Select Report/Remove tag • From your Timeline • Click on pencil to select “edit/remove” • Select Report/Remove
  • 7. Using the Activity Log to Find and Remove Content • You can use the Activity Log to see photos you're tagged in and posts that may appear in News Feed, search and other places on Facebook • Use "Shared with" and "On timeline" filters to review who can still see things you may have hidden from your time line that could show up in news feed, search and other places. • You can remove something you don’t like by clicking on the pencil icon and selecting Delete. • You can report abusive posts from others by Report/Remove Tag
  • 8. A Lot Can Be Found With Graph Search • Graph Search is a powerful search tool that can help people find people places and things including photos you’ve been tagged in • If someone is part of the audience of a post, they can find it using graph search • Anything posted to “public” can be found by anyone • Anything posted to friends can be found by your friends • If you don’t want it found, don’t post it or limit the audience • Content hidden from your Timeline may still be found via search
  • 9. Timeline Vs. News Feed Vs. Search • Your Timline is “you central” – the place where people can see what you post, what’s posted about you and what (including pictures) you’re tagged in • But it’s not the only place people can find content about you. It can also be found: • In News Feed (those posts that show up on people’s home pages) • Via search • On other people’s TImelines
  • 10. Hiding vs. Deleting • There are ways to hide content from your Timeline but it might still surface elsewhere • In News feed • In Search • On someone else’s Timeline • If you really want it gone, you must delete it, not just hide it