Get Help
Skip to Main Content

Digital Citizenship Workshop Series

Presentation Slides

Workshop Objectives:

  • Recognize how personal information and metadata are collected in order to analyze your privacy risks
  • Identify tools and strategies to protect online privacy in order to choose some for your own use

 

During a typical day, your personal information accidentally gets generated using computers, cell phones, and behavior surveillance. These interactions with technology will release hundreds of megabytes of data to online platforms, and it will be used to persuade and manipulate you. Learn tips and strategies to protect your privacy online and make more informed, intentional choices that minimize threats and risks.

Digital Footprint Activity

What data systems did you engage with today, and what information did you provide to these systems? 

Activity: Individually Explore Some of These Links

Reflect: Did anything surprise you about the data being collected? Record your reaction to at least one of these tools on the Padlet.

Preventive Tools and Strategies

Ad Blockers
Browser extensions that block intrusive pop-ups, invasive trackers, and malicious ads.

Default Web Browser
Always enable the https-preferred mode on your browser; in Chrome this is the "always use secure connection" option, and in Firefox this is the "enable https-only mode" option. Also consider some alternatives.

Encryption
Information is converted into secret code using complex algorithms to scramble the data being sent.

Password Managers
Stores all your passwords securely so you don't have to remember them. This allows you to use a unique, strong password for all important accounts.

Privacy Terms of Service
Read the Terms of Service / Use or software license before clicking "I accept."

Tracking Blockers
Blocks tracking tools, or the scripts that record your visits and build profiles based on the websites you review.

Two-Factor Authentication
Lets a user identify themselves to a service provider by requiring a combination of two different authentication methods.

Virtual Private Network (VPN)

Routes traffic through a secure, encrypted connection and changes your location and IP address.

Other Resources
Also take a look at these additional tools and resources.

Get Involved