1. Identifying rights retained and removed through user agreements
Name: Privacy: Terms of Use
Criteria:
Link to an example of a user agreement
Describe how a user’s rights are affected (retained/removed) by a particular user agreement
Compare and contrast user agreements of similar services (e.g. using https://tosdr.org)
2. Taking steps to secure non-encrypted connections
Name: Privacy: Secure Connection
Criteria:
Link to descriptions of different ways to secure your internet connection
Describe the opportunities and drawbacks to various secure methods (e..g, VPN, HTTS, TOR)
Change the way your device connects to a website (e.g. VPN, SSH, HTTPS)
3. Explaining ways in which computer criminals are able to gain access to user information
Name: Privacy: Hacker safe
Criteria:
Link to an example of a computer criminal getting access to user information through weak passwords
Describe motivations that computer criminals have for stealing personal information
Change your passwords to stronger, unique ones (e.g. using LastPass / 1Password) and/or utilize two-factor authentication.
4. Managing the digital footprint of an online persona
Name: Privacy: Persona
Criteria:
Trace your digital footprint using a tool such as myshadow.org
Describe what the ‘anti-you’ would look like as an online persona
Take control of a web profile to share a level of detail with which you’re appropriate (e.g. https://www.google.com/settings/accounthistory)
5. Identifying and taking steps to keep important elements of identity private
Name: Privacy: Identifier
Criteria:
Link to a well-known example of someone over-sharing private information.
Describe which elements of identity are best kept private, and offline entirely