What do your long lost childhood best friend, your college roommate, your boss and your significant other all have in common? If you are one of the hundreds of millions of people using social networks, there’s a good chance that you are linked to them through an online relationship. The information you share with your online contacts allows you to keep in touch without much effort. But who else is looking at that information? And how are they going to use it?
Online social networks are websites that allow users to build connections and relationships to other Internet users. Social networks store information remotely, rather than on a user’s personal computer. Social networking can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas.
These online services have grown in popularity since they were first adopted on a large scale in the late 1990s. Pew Research shows that the number of adult Internet users who have a social networking profile more than quadrupled from 2005 to 2008. (See Pew Research’s Social Networks Grow: Friending Mom and Dad ) As of June 2010, the popular application Facebook  listed over 400 million active accounts worldwide.
However, many people besides friends and acquaintances are interested in the information people post on social networks. Identity thieves, scam artists, debt collectors, stalkers, and corporations looking for a market advantage are using social networks to gather information about consumers. Companies that operate social networks are themselves collecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers.
This fact sheet will provide information about the advantages and disadvantages of using social networks, what kind of information may be safe to post and how to protect it, as well as who is able to access different types of information posted to these networks.
2. Types of Social Networks
There are many types of social networks available. This fact sheet examines the privacy and security implications of using a few of them. Most social networks combine elements of more than one of these types of networks, and the focus of a social network may change over time. While this fact sheet does not address every type of social network, many of the security and privacy recommendations are applicable to other types of networks.
- Personal networks. These networks allow users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. For example, Facebook , Friendster  and MySpace  are platforms for communicating with contacts. These networks often involve users sharing information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. These platforms may also share selected information with individuals and applications that are not authorized contacts.
- Status update networks. These types of social networks are designed to allow users to post short status updates in order to communicate with other users quickly. For example, Twitter  and Google Buzz  focus their services on providing instantaneous, short updates. These networks are designed to broadcast information quickly and publicly, though there may be privacy settings to restrict access to status updates.
- Location networks. With the advent of GPS-enabled cellular phones, location networks are growing in popularity. These networks are designed to broadcast one’s real-time location, either as public information or as an update viewable to authorized contacts. Many of these networks are built to interact with other social networks, so that an update made to a location network could (with proper authorization) post to one’s other social networks. Some examples of location networks include Brightkite , Foursquare , Loopt  and Google Latitude . For an in-depth discussion of locational privacy, read the ACLU of Northern California’s Location-Based Services: Time for a Privacy Check-in  and their Comparison Chart  evaluating the privacy features of six location networks.
- Content-sharing networks. These networks are designed as platforms for sharing content, such as music, photographs and videos. When these websites introduce the ability to create personal profiles, establish contacts and interact with other users through comments, they become social networks as well as content hubs. Some popular content sharing networks include thesixtyone , YouTube  and Flickr .
- Shared-interest networks. Some social networks are built around a common interest or geared to a specific group of people. These networks incorporate features from other types of social networks but are slanted toward a subset of individuals, such as those with similar hobbies, educational backgrounds, political affiliations, ethnic backgrounds, religious views, sexual orientations or other defining interests. Examples of such networks include deviantART , LinkedIn , Black Planet , Goodreads  and Gay.com .
3. What Information is Public?
There are two kinds of information that can be gathered about a user from a social network: information that is shared and information gathered through electronic tracking.
Information a User Shares
Information a user shares may include:
- Photos and other media
- Age and gender
- Biographical information (education, employment history, hometown, etc.)
- Status updates (also known as posts)
- Geographical location
This information becomes public in a variety of ways:
- A user may choose to post information as “public” (without restricting access via available privacy settings).
- Certain information may be publicly visible by default. In some situations, a user may be able to change the privacy settings to make the information “private” — so that only approved users can view it. Other information must remain public; the user does not have an option to restrict access to it.
- Approved contacts may copy and repost information – including photos – without a user’s permission, potentially bypassing privacy settings.
- Third-party applications that have been granted access may be able to view information that a user or a user’s contacts post privately. Read more about third-party applications.
“We cannot guarantee that only authorized persons will view your information. We cannot ensure that information you share on Facebook will not become publicly available. We are not responsible for third-party circumvention of any privacy settings or security measures on Facebook.” [http://www.facebook.com/policy.php  accessed on May 7, 2010]
This was demonstrated in one May 2010 incident during which unauthorized users were able to see the private chat logs of their contacts on Facebook. While this and other similar bugs are usually quickly fixed, there is great potential for taking advantage of leaked information. (See New York Times’ Facebook Glitch Brings New Privacy Worries )
Information Gathered Through Electronic Tracking
Information may also be gathered from a user’s actions online using “cookies” (short strings of text stored on one’s hard drive). Some of the purposes of cookies may include:
- Tracking which websites a user has viewed.
- Storing information associated with specific websites (such as items in a shopping cart).
- Tracking movement from one website to another.
- Building a profile around a user.
In fact, a 2009 study conducted by AT&T Labs and Worcester Polytechnic Institute found that the unique identifying code assigned to users by social networks can be matched with behavior tracked by cookies. This means that advertisers and others are able to use information gleaned from social networks to build a profile of a user’s life, including linking browsing habits to one’s true identity. Read Krishnamurth and Will’s 2009 study On the Leakage of Personally Identifiable Information Via Online Social Neworks . Information leakage also occurs in mobile online social networks, according to Privacy Leakage in Mobile Online Networks , another study by Krishnamurthy and Wills.
4. Who Can Access Information?
When posting information to a social network, a user probably expects authorized contacts to be able to view it. But who else can see it, and what exactly is visible?
Entities that collect personal information for legal purposes include:
- Advertisers interested in personal information so they can better target their ads to those most likely to be interested in the product
- Third-party software developers who incorporate information to personalize applications, such as an online games that interact with the social network
Entities that collect personal information for illegal purposes include:
- Identity thieves who obtain personal information either based on information a user posts or that others post about the user. (See Identity Theft)
- Other online criminals, such as people planning to scam or harass individuals, or infect computers with malware (malicious software placed on a computer without the knowledge of the owner). (See Fraud on Social Networks)
Social networks that provide their services without user fees make a profit by selling advertising. This is often done through behavioral advertising, also known as targeting.
Behavioral advertising is the term used to describe the practice of tailoring advertisements to an individual’s personal interests. This practice is appealing to marketers because targeted advertisements are more likely to result in a purchase by a viewer than comparable non-targeted advertisements. They are valuable to social networks as they can be sold at a higher price than regular ads. (See The Value of Behavioral Targeting  by Howard Beales, sponsored by the Network Advertising Initiative)
Social networks collect a lot of information about potential customers, which advertisers are very interested in using. In some ways, this may be useful to the user because the advertisements he or she sees may appear more relevant.
However, as of June 2010 there are no limits on the ways advertisers can gather and use the information they gather. The behavioral advertising industry is currently regulating itself. Companies are voluntarily following principles such as those put forward by the industry group Interactive Advertising Bureau (IAB). Read the Self-Regulatory Principles for Online Behavioral Advertising .
There are several concerns regarding behavioral advertising:
- Consumers may not be aware that data is associated with their profiles.
- Consumers may not be able to view the data associated with their profiles and have inaccuracies corrected.
- There are no maximum retention periods on data and no security requirements for the retention of data, leaving it susceptible to hackers and security risks.
- Information about minors may be collected and used for behavioral advertising.
Read more about behavioral advertising in PRC’s Fact Sheet 18 Privacy and the Internet – Behavioral Marketing .
Third-Party Applications on Social Networks
Within the context of social networking, “third-party applications” are programs that interact with a social network without actually being part of that social network. These applications take many forms but some typical and popular forms include:
- Games to play with contacts
- Online polls or quizzes
- Software that allows users to post to a social media profile via a cellular phone or web application
Some social networks allow program developers to access their platforms in order to create these applications. This makes the social network more attractive to users by facilitating the development of new and creative methods of interacting with contacts and the network.
To make these applications useful, social networks may allow developers automatic access to public information of users. In addition to public information, third-party applications may access some private information. A user may grant a third-party application access to his or her profile without realizing the extent of the permissions being granted. Users may also mistakenly assume that third-party applications are held to the same standards as the primary social network There are also “rogue” applications which do not follow the policies and terms that govern applications. (See Consumer Reports’ Apps that bite )
Some facts to keep in mind when considering using third-party applications:
- They may not be guaranteed to be secure.
- Most social networks do not take responsibility for the third-party applications that interact with their sites.
- They may gain access to more information than is necessary to perform their functions.
- Sometimes applications are designed only to gather information about users (See McAfee Labs Predicts Facebook, Twitter Will Be Platforms of Choice for Emerging Threats )
- They may contain malware designed to attack the user’s computer.
- Third-party developers may report users’ actions back to the social networking platform.
- A social network may have agreements with certain websites and applications that allow them access to public information of all users of the social network.
Third-party applications typically can access information that:
- Is considered public without explicit consent from the user.
- Is considered private when a user grants the application permission.
In some instances, once they have received permission from a primary user, the third-party applications may also gain access to the personal information of users’ contacts without those contacts granting explicit permission.
As a general rule, use caution when using third-party applications. Remember that it is difficult to control what information they are gathering, how they might use it, and who they will share it with. To learn more about third-party applications, particularly Facebook quizzes, visit DotRight’s Quiz: What Do Facebook Quizzes Know About Me? 
Government and Law Enforcement Uses of Social Networking Sites
Freedom of Information Act (FOIA) requests filed by Electronic Frontier Foundation  (EFF) with assistance from University of California-Berkeley Samuelson Clinic  have shed light on how government agencies use social networking sites for investigations, data collection and surveillance.
While still incomplete, the documents that have been published indicate:
- Government agencies, including the U.S. Justice Department and the Internal Revenue Service (IRC), have developed training materials instructing employees on how to utilize public profile information on social networking sites during investigations.
- Facebook has been noted as having a reputation for being “cooperative with emergency requests” (See http://www.eff.org/deeplinks/2010/03/eff-posts-documents-detailing-law-enforcement ) .
- IRS manuals specifically prohibit employees from using “fake identities” in order to “trick” users “into accepting a [government] official as a friend.” (EFF Posts Documents Detailing Law Enforcement Collection of Data From Social Media Sites .) However, there is no reason to believe law enforcement officers practice similar restraint about creating false profiles.
View “Obtaining and Using Evidence from Social Networking Sites ,” a Justice Department presentation obtained by EFF through FOIA request.
EFF states it will publish new documents as they are received on their page FOIA: Social Networking Monitoring .
Additionally, information on social networking sites has been used as evidence during criminal and civil trials. This includes divorce trials, child custody battles, insurance lawsuits, criminal trials and cases brought by university police against students for inappropriate behavior or underage drinking, to name a few. Be aware that information entered as evidence in a court case could potentially become part of a public record. Read more about public records in PRC Fact Sheet 11: From Cradle to Grave: Government Records and Your Privacy .
The use of social networking sites by law enforcement and government agencies, coupled with the fact that information on social networking sites can be used as evidence in trials, reinforces the importance of using restraint in posting information to your profile.
5. Social Networks and Job Searches: Pros and Cons
Jobseekers have increasingly turned to social networks to market themselves to potential employers, network with other professionals and search out job opportunities. However, an unprofessional social networking profile may also make a job applicant seem unsuitable by revealing too much personal or unflattering information to a potential employer. This section reviews the pros and cons of social networking for jobseekers.
This information can be applied to any situation where reputation matters, such as:
- Renting an apartment
- Beginning to date someone
- Starting or maintaining a professional relationship, for example as an independent contractor or in a managerial position
- Engaging in volunteer or electoral positions
- Applying for colleges or scholarships
- Being considered in a jury selection process
Jobseekers should take the impact of their social networking profiles very seriously. A report commissioned by Microsoft issued in January 2010, found that only 15% of consumers surveyed thought that what they posted online had any effect on their job prospects. In sharp contrast, the report found that 75% of recruiters reported formal policies that required online research of applications. Read the full Microsoft report, Online Reputation in a Connected World .
How Social Networks May Assist Jobseeker
There are a variety of ways social networks can help with the job hunt. If a job applicant initially contacts a potential employer via the Internet, a profile on a social network can help confirm that there is a real person behind an email address.
Social networks also increase networking opportunities. A job applicant can alert others to an interest in finding a job, as well as details on the desired position, by posting about this interest on a social network. Professional networks, such as LinkedIn , are designed to provide information about education, employment history and accomplishments to a large number of people. There are also professional or interest groups on a variety of networks that can increase visibility and contacts.
Potential employers can use social networks to confirm that an applicant has represented his or her interests, education level and background truthfully. They can also learn about other interests an applicant may have. Individuals who create positive, interesting and informative social networking profiles may seem like stronger candidates for certain jobs. This is especially true of, but not limited to, jobs involving outreach and communication.
How Social Networks May Hinder Jobseekers
Social networks may inadvertently reveal information jobseekers might not choose to reveal about themselves. Potential employers often use whatever information they can gather about an applicant in making a hiring decision. It is important to know what information can be seen by non-contacts and to consider what kind of conclusions might be drawn from it.
Unflattering pictures or posts could seriously affect the likelihood of getting hired. Even if one posts this information using restrictive privacy settings, there are many ways in which it may become available. (See Who Can Access Information)
As a general rule, before posting something on a social networking profile, imagine it displayed on a billboard on the side of a highway. Would you be uncomfortable to see it there? If so, you may not want to post it at all.
While it is illegal and very hard to prove, potential employers might discriminate based on information available from profile pictures and other easily available information on one’s social networking profile. Be aware of revealing even basic information such as:
- Sexual orientation
- Political affiliations
- Other groups and contacts
Also, negative posts about a current job could harm an applicant’s chances of getting an offer.
The Fair Credit Reporting Act (FCRA) is a law that not only regulates credit reports but also sets national standards for employment screening and background checks. In effect, it sets limits on what information employers can get from background checks and how they can use that information (see PRC Fact Sheet 16: Employment Background Checks: A Jobseeker’s Guide ). However, the FCRA only applies to employers using third-party screening companies. Information that an employer gathers independently, including from informal Internet searches, is not covered by the FCRA.
6. Anonymity on Social Networks
Many users of social networks choose to mask their real identities. This may be done via anonymity (providing no name at all) or pseudonymity (providing a false name).
Some people who may prefer an anonymous or pseudonymous persona include, but are not limited to:
- Individuals with medical conditions who want to discuss symptoms and treatment without creating a public record of their condition
- Bloggers and activists engaging in political discourse, especially on controversial issues
- Teachers and childcare workers
- Medical professionals, including mental health professionals
- Law enforcement agents, prosecutors, parole and probation officers, judges, and other court employees
- Victims of stalking, sexual assault, and domestic violence
- Children and youth
In fact, anonymity is a useful tool for anyone who prefers to keep a strict separation between an online persona and an off-line identity. It can also be abused by individuals trying to shield their identities while engaging in illegal activities.
Typically, users who prefer to engage in social networks without divulging their true identity will create profiles using a false name as well as a false email address. If you are considering a pseudonymous profile, refer to the terms of service for the social networking site. Providing false or incomplete information violates the terms of service of some social networking sites. Users should consider using software that masks IP addresses, such as TOR . Users should also remember to delete all cookies after visiting a social networking site. See PRC’s discussion of cookies in PRC Fact Sheet 18: Privacy and the Internet — Cookies .
Bear in mind that it is difficult to truly separate online and off-line identities. It is possible to divulge identifying information through status updates, group memberships, photographs, friend networks and other indicators. In fact, numerous studies have shown that anonymized data can often still be linked to specific individuals.
Read more about anonymization issues:
- PRC’s Privacy Today: Data Anonymization 
- Arvind Narayanan and Vitaly Shmatikov’s paper, De-anonymizing Social Networks 
- The Electronic Frontier Foundation’s Anonymity page 
7. What Laws Protect a User’s Information Online?
There are currently few laws that can be interpreted as protecting information given to social networks. Most privacy laws in the United States protect specific types of information, such as medical or financial records. Some laws that do protect the privacy of information do not currently extend to casual information searches on the Internet (see FCRA, previous section) or to information revealed by the user, such as a quiz about health that provides information to drug companies. (See New York Times’ Online Age Quiz Is a Window for Drug Makers ).
The Electronic Communications Privacy Act was passed in 1986, before the Internet became an essential means of communication. If information is stored on a server (such as the information on social networks), this law makes it easy for law enforcement or the government to access it via a subpoena. As of May 2010, a variety of industry and advocacy organizations are lobbying to update this law. The proposed update would strengthen the requirements needed for governmental access to the data stored on a server by necessitating a search warrant. Information about location is also not strongly protected under ECPA. (See Digital Due Process )
The Children’s Online Privacy Protection Act (COPPA) requires that websites directed at children under 13 must limit their data collection and usage in certain ways. There are also limitations on the information that can be sent to advertisers (see PRC Fact Sheet 21: Children’s Online Privacy: A Resource Guide for Parents ). Some social networks therefore do not allow users under 13.
Some of the information users provide to a social network is readily apparent — such as providing a birth date in order to create a new account.
Other times, the social network may be collecting information on users “invisibly” – by tracking where users go within the social network, what links they click on and even which websites they visit after leaving the social networking site. “Invisible” tracking is often accomplished through cookies. (Read more about cookies on PRC Fact Sheet 18: Privacy and the Internet — Cookies )
- Privacy policies can change – sometimes dramatically– after a user creates an account.
- Canceling your account. If you decide to leave the social network, can you delete the account and remove all of your information? Can all data be removed entirely or will some information be maintained by the social network? Be aware that some social networks may make it difficult or confusing to cancel an account and instead direct dissatisfied users to “deactivate” accounts.
- How long is personal information stored? Note that some information may be made ‘anonymous’ after a certain period of time, some may be deleted entirely after a certain period of time, and some may be maintained in perpetuity.
- Who owns the data that a user posts? Does a user lose rights to information that he or she posts? Can it be used by marketers without the user’s explicit consent? For example, can a user’s name and photos be used for advertisements?
- Who has access to information? See What Information is Public
- Does the social network participate in seal programs? Social networks that participate in third-party seal or certification programs show some level of awareness of privacy concerns. This also gives users another place to voice concerns if any should arise. Some well-known companies include the Better Business Bureau , Verisign  and Truste . However, never assume that a third-party certification means the social network will always respect users’ privacy and security.
- Yahoo’s Reading Privacy Policies 
Also, try seeing what others have said about the policy. A simple Internet search could turn up thoughtful analysis of the policy, especially if the social network has been in the news.
9. Fraud on Social Networks
Criminals may use social networks to connect with potential victims. This section discusses some of the typical scams and devices used to defraud consumers on social networks. Fraud may involve more than one of the techniques described below. Some types of fraud may not be described here. To learn more about how to protect yourself, see Tips to Stay Safe, Private and Secure.
Identity thieves use an individual’s personal information to pretend to be them – often for financial gain. The information users post about themselves on social networks may make it possible for an identity thief to gather enough information to steal an identity. In 2009, researchers at Carnegie University Mellon published a study showing that it is possible to predict most and sometimes all of an individual’s 9-digit Social Security number using information gleaned from social networks and online databases. (See Predicting Social Security Numbers from Public Data  by Acquisti and Gross)
Information often targeted by identity thieves includes:
- Bank account information
- Credit card numbers
- Information stored on a user’s computer such as contacts
- Access to the user’s computer without his or her consent (for example, through malware)
- Social Security numbers. Remember that the key to identity theft is the Social Security number. Never provide a Social Security number through a social networking service.
Some fraud techniques to watch out for include:
- Illegitimate third-party applications. These rogue applications may appear similar to other third-party applications but are designed specifically to gather information. This information may be sold to marketers but could also be useful in committing identity theft. These applications may appear as games, quizzes or questionnaires in the format of “What Kind of Famous Person Are You?” (See ABC’s Online Games Can Lead to Identity Theft )
- False connection requests. Scammers may create fake accounts on social networks and then solicit others to connect with them. These fake accounts may use the names of real people, including acquaintances, or may be entirely imaginary. Once the connection request is accepted, a scammer may be able to see restricted and private information on a user’s profile. (See ReadWriteWeb’s Fake Social Networking Profiles: a New Form of Identity Theft in 2009 )
- Hijacking Accounts (see Hijacked accounts)
For advice on avoiding identity theft on social networks, see Tips to Stay Safe, Private and Secure. Learn more about protecting yourself from identity theft in general by reading PRC Fact Sheet 17: Coping with Identity Theft: Reducing the Risk of Fraud . If you believe you may be the victim of identity theft, read PRC Fact Sheet 17a: Identity Theft: What to Do if It Happens to You .
Malware (malicious software) is a term that describes a wide range of programs that install on a user’s computer often through the use of trickery. Malware can spread quickly on a social network, infecting the computer of a user and then spreading to his or her contacts. This is because the malware may appear to come from a trusted contact, and thus users are more likely to click on links and/or download malicious programs. (See Hijacked Accounts)
Some common techniques used in spreading malware include:
- Shortened URLs, particularly on status update networks or newsfeeds. These may lead the user to download a virus or visit a website that will attempt to load malware on a user’s computer.
- Messages that appear to be from trusted contacts that encourage a user to click on a link, view a video or download a file.
- An email appearing to be from the social network itself, asking for information or requesting a user click on a link.
- Third-party applications that infect computers with malicious software and spread it to contacts. (See Third-Party Applications)
- Fake security alerts – applications that pose as virus protection software and inform the user that his or her security software is out-of-date or a threat has been detected.
There are a variety of social engineering scamming techniques which trick users into entering sensitive information. This section describes a few of the well-known techniques.
- Phishing attacks are when emails, instant messages or other messages claiming to be from a trusted source ask for information. For example, an email may appear to be from a bank and could direct a user to enter a password at a fake login page, or tell a user to call a phone number or risk having their account closed. For tips on how to spot and avoid phishing attacks, see FTC Alert How Not to Get Hooked by a ‘Phishing’ Scam  and OnGuardOnline’s Phishing page . Some Internet browsers, such as recent versions of Mozilla Firefox  and Internet Explorer , have taken steps to help identify fake websites. (See GetSafe Online’s Avoid Criminal Websites  for these and other tips.)
- Spear phishing is a type of phishing attack that appears to be from a colleague, employer or friend and includes a link or something to download. (This is often the result of account hijacking.) These links or downloads can be malicious, such as viruses or fake websites that solicit personal information.
- Misleading solicitations. A social network might use social engineering to make people feel obligated to join. This often occurs when one person joins and (often inadvertently) provides the social network with access to his or her contact list. The social network then sends out emails to all of his or her contacts, often implying they are from the individual who joined. For example, it has been reported that Tagged.com  solicits contacts of users with emails claiming the recipient has been “tagged.” These emails state: “Is <user name> your friend? Please respond or <user name> may think you said no ” or “<user name> sent you photos on Tagged.” The recipient may believe this is a personal invitation from the user and feel obligated to join the network, giving out his or her information and perhaps perpetuating the solicitations. See Time’s Tagged: The World’s Most Annoying Website  for more information.
- Hijacked accounts. A legitimate account may be taken over by an identity thief or malware for the purpose of fraud such as posting spam, sending out malware, stealing the private data of contacts or even soliciting contacts to send money. One typical scenario is when a hijacked account sends out messages stating that the account owner is overseas and in desperate straits. Contacts are urged to immediately wire money. A user may not realize his or her account has been hijacked for quite some time. An attack could also be in the form of a chat conversation.
10. Tips to Stay Safe, Private and Secure
There are many ways that information on social networks can be used for purposes other than what the user intended. Below are some practical tips to help users minimize the privacy risks when using social networks. Be aware that these tips are not 100% effective. Any time you choose to engage with social networking sites, you are taking certain risks. Common sense, caution and skepticism are some of the strongest tools you have to protect yourself.
Registering an Account
- Use a strong password different from the passwords you use to access other sites. See PRC’s 10 Rules for Creating a Hacker-Resistant Password 
- If you are asked to provide security questions, use information that others would not know about you.
- Never provide a work-associated email to a social network, especially when signing up. Consider creating a new email address strictly to connect with your social networking profile(s).
- Consider not using your real name, especially your last name. Be aware that this may violate the terms of service of some social networks. See Anonymity on Social Networks
- Be sure to keep strong antivirus and spyware protection on your computer. See How to Secure Windows and Your Privacy — with Free Software .
- Provide only information that is necessary or that you feel comfortable providing. When in doubt, err on the side of providing less information. Remember, you can always provide more information to a social network, but you can’t always remove information once it’s been posted.
- During the registration process, social networks often solicit a new user to provide an email account password so the social network can access the user’s email address book. The social network promises to connect the new user with others they may already know on the network. To be safe, don’t provide this information at all. There are some social networks that capture all of a user’s email contacts and then solicit them – often repeatedly – to join. These messages may even appear to be from the original user. If you consider providing an email address and account password to a social network, read all agreements very carefully before clicking on them.
General Tips for Using Social Networks
- Become familiar with the privacy settings available on any social network you use.
- Don’t post your exact date of birth, especially in combination with your location of birth. This information could be useful to identity thieves. If you do consider posting a birthday, restrict who has access to this information using privacy settings and don’t post the year.
- Be careful when you click on shortened links. Consider using a URL expander (as an application added to your browser or a website you visit) to examine short URLs before clicking on them. Example of URL expanders include LongURL , Clybs URL Expander  and Long URL Please  (Privacy Rights Clearinghouse does not endorse one URL expander over another.)
- Be very cautious of pop-up windows, especially any that state your security software is out of date or that security threats and/or viruses have been detected on your computer. Use your task manager to navigate away from these without clicking on them, then run your spyware and virus protection software.
- Delete cookies, including flash cookies, every time you leave a social networking site. See PRC Fact Sheet 18: Privacy and the Internet 
- Remember that whatever goes on a network might eventually be seen by people not in the intended audience. Think about whether you would want a stranger, your mother or a potential boss to see certain information or pictures. Be especially cautious about photos of you on social networks, even if someone else placed them there. Don’t be afraid to untag photos of yourself and ask to have content removed.
- Don’t publicize vacation plans, especially the dates you’ll be traveling.
- If you use a location-aware social network, don’t make public where your home is because people will know when you are not there. (See Please Rob Me – Raising Awareness about Oversharing )
- Be aware that your full birth date, especially the year, may be useful to identity thieves. Don’t post it, or at a minimum restrict who has access to it.
- Don’t post your address, phone number or email address on a social network. Remember scam artists as well as marketing companies may be looking for this kind of information. If you do choose to post any portion of this, use privacy settings to restrict it to approved contacts.
- If you receive a request to connect with someone and recognize the name, verify the account holder’s identity before accepting the request. Consider calling the individual, sending an email to his or her personal account or even asking a question only your contact would be able to answer.
- If you receive a connection request from a stranger, the safest thing to do is to reject the request. If you decide to accept the request, use privacy settings to limit what information is viewable to the stranger and be cautious of posting personal information to your account, such as your current location as well as personally identifiable information.
- Be wary of requests for money, even if they are from contacts you know and trust. If a contact’s account is compromised, a scam artist may use his or her name and account to attempt to defraud others through bogus money requests.
- Take additional precautions if you are the victim of stalking, harassment or domestic violence. See PRC Fact Sheet 14: Are You Being Stalked? 
- Take additional precautions if you are a job seeker. See Social Networking and Job Searches.
- In the event that your social networking account is compromised, report it to the site immediately and alert your contacts. You will need to change passwords, but proceed with caution because your computer security may have been compromised. Malware, including key-logging software, may have been installed on your computer. If you use online banking, do not log on from the computer that may have been compromised until you have ensured your computer security is intact.
Published on Privacy Rights Clearinghouse (http://www.privacyrights.org)
Today’s Date: Jan 10, 2011
Source URL (retrieved on 2011-01-10 07:45): http://www.privacyrights.org/print/social-networking-privacy Copyright © 2010-2011
Privacy Rights Clearinghouse / UCAN
Posted June 2010
Revised December 2010
Read more helpful tips at EFF’s Top 12 Ways to Protect Your Online Privacy .