The focus of this page is on social media, particularly from the point of view of information security and privacy at the university.
Online communication has changed as services based on networked communication have emerged and replaced some of the more traditional means of online communication, such as e-mail. These services are often called by the umbrella term social media. Many social media are used for both private and commercial communications.
Social media services can be very useful for study and work purposes as well as other communication. However, you should always keep in mind that communication in these services is rarely private. This is why social media – as well as other means of communication – can have unwanted consequences to thoughtless actions that were deemed harmless at the time.
As communications in Facebook, Twitter or other similar services are rarely limited to two parties, you should always consider the audience of your message and the way you present it.
The same is especially true for pictures: if you upload pictures to the Internet, always consider what kind of pictures they are, who are in them, and who you and the other people involved want to display them to.
In many services, it is possible to hide messages, photos and other information behind a password or restrict their visibility to a limited group. It is a good idea to think twice before sharing photos of the crazy afterparty of an academic dinner with your mother-in-law or a future employer – not to mention complete strangers. Remember to review the privacy settings of the services you use and adjust them to your needs.
You should also keep in mind that legislation concerning privacy applies to publishing photos of people online. Always ask the people in the photos for permission before you publish them. In particular, you cannot publish the names of people in pictures that are displayed to the world without their permission. Read more about the subject in the chapter Personal privacy.
Scams and malware
Social media is no exception to the rest of the Internet when it comes to scams and malware. Scammers and criminals try to exploit the feeling of familiarity and safety related to social media in many different ways:
- infiltrating people’s social circles by posing as a person they know
- spreading malware or similar programs through an attractive link on a circulating message
- forwarding malware or personal information in the form of a game, a competition, a survey or a live stream link from an event.
Your online footprint
As identity theft (suorce: Wikipedia) and similar activities are becoming more and more common, it is particularly important to keep track of what kind of information concerning you is available in the open web. For instance, a malevolent person might be able to take an instant loan of several hundreds of Euros in your name by combining pieces of information you have carelessly provided to different sources.
When you upload personal information or photos of yourself or other people on the Internet and make them freely available to everyone, you should always keep in mind that you might lose control over how they are used.
Pay attention to the permissions that the applications installed on your phone request and what permissions you grant to them. Also take others into consideration: if you grant unnecessary rights, you may compromise the contact information of your acquaintances and other contacts.