Following from an earlier discussion on the changing perception of privacy, \u201cGiving up the ghost<\/a>\u201d, this post, the first of a two-part series, suggests options that could be implemented to improve your privacy online.<\/em><\/p>\n
3.\u00a0 Regularly review the security\/privacy options of websites<\/strong>. Occasionally websites may update their terms of service, privacy policies, and\/or their privacy or security options. Many of them might notify their users of those amendments, but then again they might not. For example, several Facebook users have observed that the company is inconsistent in how it applies new updates. If an update benefits Facebook, it tends to be done automatically, but if it benefits users, they usually have to opt in.<\/p>\n
However, most websites do reserve the right to update those policies without notice. Further, since the information tends to be readily available on the site, it becomes incumbent on users to ensure that they are aware of the revisions that have been made and to adjust their preferences accordingly.<\/p>\n
4.\u00a0 Opt out of 3rd<\/sup> party information sharing<\/strong>. When registering to use a site, persons are regularly given to option to not allow the site to share their information with other entities. Sometimes, the site will refer to those entities as \u201ctrusted\u201d, \u201cselect\u201d, or \u201cpartners\u201d, but the crux of the matter is that you really do not know who these parties are, what information they will be given, and how that information will be used.<\/p>\n
5.\u00a0 Be mindful when using public PCs or unsecured Wi-Fi connections<\/strong>. Public PCs and unsecured Wi-Fi connections are a hotbed of security threats, such as through hacking and spyware, and even through persons physically eavesdropping in your vicinity. Under no circumstances should you access sites that require you to send sensitive or personal information in those environments. In addition to the examples given in the first tip, do not access bank accounts or accounts that contain credit card information. Finally, when using public PCs, ensure you log out of any account that you have accessed before you leave.<\/p>\n
6.\u00a0 Clear cache or history after browsing<\/strong>. A web browser\u2019s cache stores temporary Internet files on websites visited, on documents, images, other downloaded content, and even cookies. These files are initially referenced when loading web pages, which speeds up the download time. However, these same files leave a very clear path of all of your activities online. After browsing on public PCs, it is important to ensure that the cache is emptied before you depart.<\/p>\n
__________<\/p>\n","protected":false},"excerpt":{"rendered":"
Following from an earlier discussion on the changing perception of privacy, \u201cGiving up the ghost\u201d, this post, the first of a two-part series, suggests options that could be implemented to improve your privacy online.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[27,13,6,33],"tags":[38,109,110,34,41,42,108],"class_list":["post-253","post","type-post","status-publish","format-standard","hentry","category-computing","category-content","category-internet","category-lists","tag-data-protection","tag-facebook","tag-linkedin","tag-lists-2","tag-privacy","tag-social-media","tag-twitter","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-45","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":16,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":2592,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/253\/revisions\/2592"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}