Facebook Smart Card FB _1800

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Facebook Smart Card FB 121211_1800"

Transcription

1 Facebook Smart Card FB _1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Minimizing your Facebook Profile Click to access and edit Profile Go to Downward Arrow > Privacy Settings Access Facebook Privacy Setting Here Facebook has hundreds of privacy and sharing options. To control how your personal information is shared, you should use the settings shown below (such as Only Me, ) for (1) Privacy, (2) Connecting, (3) Tags, (4) Apps/Websites, (5) Info Access through Friends, and (6) Past Posts Limit Use of Apps ALL Boxes 5 Disable Personalization Disable Public Search 6 Limit Old Posts to

2 Profile Settings Facebook Smart Card FB _1800 Do not login to or link third-party sites (e.g. twitter, bing) using your Facebook account. Facebook Connect shares your information, and your friends information, with third party sites that may aggregate and misuse personal information. Also, use as few apps as possible. Apps such as Farmville access and share your personal data. Apply and save the Profile settings shown below to ensure that your information is visible to only people of your choosing. - Only Me Click on Info tab to start editing Only Me Only Me Only Me Show Birthday Deactivating / Deleting Your Facebook Account Useful Links A Parent s Guide to Internet Safety Wired Kids Microsoft Safety & Security OnGuard Online To deactivate your Facebook account, go to Account Settings and select Security. To reactivate your account log in to Facebook with your address and password. To delete your Facebook account, go to Help Center from the account menu. Type Delete into the search box. Select How do I permanently delete my account then scroll down to submit your request here. Verify that you want to delete your account. Click Submit. FB will remove your data after 14 days post security check.

3 Google+ Smart Card G _2000 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Managing Your Google+ Profile Google+ provides privacy and sharing options using Circles. Circles are groups that users create for different types of connections, such as family, friends, or colleagues. Content is shared only with circles you select. Google+ requires that users provide real names - no pseudonyms. Click to access and edit Profile Profile Settings Apply and save the Profile settings shown below to ensure that your information is visible to only people of your choosing. This box is PUBLIC. Do not fill out additional information Select Edit Profile to make changes both Name & Profile Picture are PUBLIC DO NOT add links to other online presences, such as a webpage, Facebook, Twitter, or LinkedIn Your Circles To share information on this page with specific people, select Custom then choose appropriate Circles top button Only You Your Circles

4 Google+ Smart Card G _2000 Account Settings & Minimizing Your Activities Apply the Account settings shown with arrows below to ensure that your information is shared in a limited fashion. Change as indicated Don t Add Phone Number Account settings can be accessed under Account Settings > Google+. Maintain a small Google+ "footprint". Select only important Google+ notifications as shown in the box to the left. Limit notifications to as opposed to text. Do not connect your mobile phone to Google+ or use the Google+ mobile application, and Disable +1 on non-google Websites Do not allow contacts to tag you then automatically link to your profile Disable your circles from accessing your photo tags prior to you Limit Huddle capability only to your circles Off Check as indicated Remove Everyone Do not add outside accounts Deleting Your Google+ Profile Information or Account Useful Links A Parent s Guide to Internet Safety Wired Kids Microsoft Safety & Security OnGuard Online By default, Google+ uses your Google contact information to link your accounts from other online services, aggregating your online identity in one location. To disable this feature: Go to Account Settings > Connected Accounts Click No to Google-suggested 3 rd -party accounts Disable Google+ access to your contact information Do not manually connect other online accounts using Google+ Go to Account Settings > Account Overview Delete Google+ Content removes Google+ related information such as circles, +1 s, posts, and comments Delete your entire Google profile removes all user data from Google services, including your Gmail Disable web history to prevent accumulation of your digital footprint

5 LinkedIn Smart Card LI _1400 Social Networks -Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Managing Your LinkedIn Profile LinkedIn is a professional networking site whose users establish connections with co-workers, customers, business contacts, and potential employees and employers. Users post and share information about current and previous employment, education, military activities, Use Settings to manage visibility specialties, and interests. To limit exposure of your personal information, you can manage who can view your profile and activities. Profile Settings Apply the Profile settings shown with arrows below to ensure that your information is visible only to people of your choosing. Set to no one Set to Only you Set to totally anonymous Set to Only you Do not use a face photo for your account Set to My Connections Set to Only you LinkedIn Quick Facts There are over 100 million LinkedIn users around the world. Aside from the US, LinkedIn is widely adopted in India, Brazil, and the UK. Users tend to share information related to their careers or jobs as opposed to photographs from parties or social events. LinkedIn profiles tend to be more visible and searchable than in social networks such as Facebook. Paid LinkedIn accounts have access to more information about other users, such as connections, than free accounts. The type of information users can see about each other depends on how closely they are connected (1 st, 2 nd, or 3 rd degree).

6 Account Settings LinkedIn Smart Card LI _1400 Apply the Account settings shown with arrows below to ensure that your information is shared in a limited fashion. Passwords Use a complex password with capital letters and numbers to ensure that attackers cannot access your account information. Closing Your LinkedIn Account If you no longer plan to use the LinkedIn service, you can close your account. Click Close your account and confirm that you want to take this action. to opt out of Partner Advertising on third party websites to opt out of Social Advertising Application Settings Third-party applications and services can access most of your personal information once you grant them permission. You should limit your use of applications to ensure that third parties cannot collect, share, or misuse your personal information. Apply the Application setting shown with arrows below to ensure that your information is visible only to people of your choosing. Do not share with Third Parties Also, avoid using the LinkedIn smartphone app to prevent accidentally collecting and sharing location data. the box. Do not share your information on Third Parties with LinkedIn. LinkedIn, by default, automatically retrieves information about the user on websites with LinkedIn Plug-In integration. Prevent sharing your activities on third-party websites with LinkedIn by unchecking the box. Useful Links A Parent s Guide to Internet Safety Wired Kids Microsoft Safety & Security OnGuard Online

7 Twitter Smart Card Twitter _1631 W2 Social Networks -Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Managing your Twitter Account Twitter is a social networking and microblogging site whose users send and read text-based posts online. The site surged to worldwide popularity with +300 million active users as of 2011, generating 300 million tweets and 1.6 billion search queries daily. Stream of tweets from people you follow Use Settings to manage visibility Each tweet is timestamped Following are people you subscribe to Followers subscribe to your tweets Private tweets will only be visible to followers you approve Hashtags (#topic) are used to mark a keyword or topic in a Tweet. Posts with hashtag are categorized by topics in the Twitter search engine. Hashtagged words that become popular become Trending Topics (ex. #jan25, #egypt, #sxsw). Mentions are used to tag a user in a Twitter update. When a public user mentions a private Twitter account, the link to the private account profile becomes public. Tweets Tweets are short text-based messages up to 140 characters that users post to Twitter. "Tweet" can refer to a post as well or to the act of posting to Twitter. Tweets are public, indexed, and searchable unless protected by the user. Many users never Tweet, choosing only to follow persons or topics of interest. Profile Settings Apply the Profile settings shown below to ensure that your information is visible only to people of your choosing. DO NOT use a face photo Use nicknames, initials, or pseudonyms Use general location, such as a country or a metropolitan area This is how your profile page will look to visitors on the web DO NOT connect to Facebook Twitter Best Practices Avoid using hashtags (#) in updates to avoid being indexed and associated with a topic by Twitter Search. Tweet responsibly. Do not provide personal details regarding your whereabouts and activities in your post. Do NOT upload links to personal photos or websites on Twitter. Do NOT allow Twitter to use your location on mobile devices. Change your Twitter username periodically to limit account exposure.

8 Twitter Smart Card Twitter _1631 Account Settings Apply the Account settings shown below to ensure that your information is shared in a limited fashion. DO NOT connect your phone Change every ~6 months Check Protecting your tweets makes all your posts private Only those who you approve can access your tweets Click to delete all location data associated with your account Deactivating / Delete Your Twitter Account To deactive your account, go to Settings and select Account page. At the bottom of the page, click Deactive my account. After deactivation, the user can reactivate the account within 30 days. After 30 days, the account is permanently deleted. Notification & Application Settings Maintain a small digital footprint by minimizing the number of notifications. Revoke access to unnecessary third party applications. Direct message (DM) is never visible to the public Private tweets will become visible to the web when retweeted (RT) by a user with public account Block unknown or unwanted applications from accessing your account Useful Links A Parent s Guide to Internet Safety Wired Kids Microsoft Safety & Security OnGuard Online

9 Enhancing Online Anonymity Smart Card Enhancing Online Anonymity Smart Card HK _1145 Why is striving for online anonymity important? Everything you do on the Internet involves sharing your identity information Identity information can be compared across services by advertisers and data brokers to build consumer profiles This data can also be compiled by identity thieves and malicious actors to gain access to bank accounts and other sensitive information There s no such thing as total anonymity online. Generally, though, how can I make my online activity more anonymous? Use different accounts, user names, and passwords for different kinds of activity (e.g., banking, instant messaging, social media). For more information on creating s, see the Anonymous Services smart card Use a pseudonym whenever possible; don t volunteer information to websites unless they require it For more enhanced anonymity, consider using TOR, a free browser that anonymizes your IP address. To install TOR, see the Anonymous Services smart card Browsing VULNERABILITY: browsers allow websites to install cookies to track your online activity Recommendation: private browsers do not store most cookies Google Chrome Mozilla Firefox Caveats Secure browsing still relays your IP addresses to the websites you visit. You must close the browser for activity to be deleted. Internet Explorer 10 Apple Safari Your Internet Service Provider (ISP) can still see your browsing activity. Internet Searches VULNERABILITY: searches may be recorded and associated with IP address, user agent, or identifiers stored in cookies Recommendation: Search Obfuscation Use general search terms Identify a topic of interest from linked sites DO NOT search using location or individual name, or specific topics DuckDuckGo Uses an encrypted connection by default Only retains cookies related to users settings preferences Does not store users IP addresses, search queries, or personal information. Browser extensions for Firefox, Chrome, Internet Explorer, Safari, and Opera Available at: https://duckduckgo.com/

10 Enhancing Online Anonymity Smart Card Enhancing Online Anonymity Smart Card HK _1145 Instant Messaging Performed on services such as Adium, Pidgin, Google Chat Allows users to send instant messages from desktop and mobile devices that may contain images, audio clips, and videos Accessed through either explicit registration or implicit registration through an service VULNERABILITY: message histories can be intercepted; packet contents of chats can be intercepted; usernames can link to addresses Recommendation: Off The Record (OTR) Messaging Encrypts instant messages Does not save chat logs Chat clients may store users passwords in a local text file on users PCs (Pidgin); they may also share information such as status, device, contact list, and address in packet File Sharing Allows users to store, share, and create files such as Office Docs, image, video, and audio files Include services such as DropBox, Google Drive, Evernote Cloud or web based VULNERABILITY: sharing private information on SNS; users sharing documents; weak password protection Recommendation: Crabgrass https://we.riseup.net/crabgrass Allows users to register with only an address Supports file sharing, collaborative wikis, group pages Shared content page Each type of shared content page has a control column Best practices include: 1) using separate s for chatting and ing 2) registering for chat clients with a pseudonym used only with that chat client History of document changes including names of Details concerning document permissions Recommendations: File Tea https://filetea.me/default/ Does not require registration File contents are not cached or stored server side Server never analyzes or processes the files being transferred No cache or log entry of a file transfers are kept IP addresses of users are never stored Once the file is uploaded, a link can be copied and pasted to s or chats; once the browser window is closed, the link expires When sharing files online, be sure to 1) verify sharing permissions are set to ONLY users you wish to share with 2) verify that, if possible, links to shared files can be set to expire 3) ensure that both the sender and receiver have nonidentifying user names

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

Are you having trouble logging in with a Username that contains special characters or spaces?

Are you having trouble logging in with a Username that contains special characters or spaces? Troubleshooting Guide Forgot your Username or Password? Are you having trouble logging in with a Username that contains special characters or spaces? Can t launch a course in InfoComm University? Can t

More information

How we use cookies on our website

How we use cookies on our website How we use cookies on our website We use cookies on our site to improve performance and enhance your user experience. This policy explains how cookies work. What are cookies? Cookies are small text files

More information

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NC PSyA Recommended Facebook Settings - October 2014 1 Introduction 3 Privacy Shortcuts 3 Privacy Settings and Tools 6 General

More information

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer

More information

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to

More information

Internet Explorer 7. Internet Explorer 8/9

Internet Explorer 7. Internet Explorer 8/9 Internet Explorer 7 1. Select "Internet Options" by clicking "Tools" on your browser's toolbar. 2. Under the "General" tab, in the "Browser History" area, click "Delete." 3. Click on the Delete Files button

More information

New Online Banking Guide for FIRST time Login

New Online Banking Guide for FIRST time Login New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms

More information

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?

Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored? Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

Layar Privacy Policy

Layar Privacy Policy Layar Privacy Policy Version 3.2 November 25, 2014 1. Information Collection and Use 2. Collection, Use and Transfer of Personal Data 3. User Account 4. Data Security 5. Cookies 6. Your Rights At Layar,

More information

8x8 Click2Pop User Guide

8x8 Click2Pop User Guide USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft

More information

I'm having issues accessing ANZ Internet Banking. How do I make my web browser more compatible?

I'm having issues accessing ANZ Internet Banking. How do I make my web browser more compatible? I'm having issues accessing ANZ Internet Banking. How do I make my web browser more compatible? If you are having issues accessing ANZ Internet Banking there are a number of activities you can do to make

More information

The system is asking me to login again and says my session has timed out. What does this mean?

The system is asking me to login again and says my session has timed out. What does this mean? What browser types are supported? Do I need to allow cookies? What are session cookies? The system is asking me to login again and says my session has timed out. What does this mean? I am locked out after

More information

Introduction to Cloud Storage GOOGLE DRIVE

Introduction to Cloud Storage GOOGLE DRIVE Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,

More information

How to Create a Voicethread PowerPoint Presentation

How to Create a Voicethread PowerPoint Presentation CREATE A FREE VOICETHREAD ACCOUNT 1. Open a browser like Internet Explorer, Firefox, or Safari. Navigate to http://voicethread.com. 2. To create an account, click Sign in or Register. 3. Underneath the

More information

Single Sign On: Volunteer User Guide

Single Sign On: Volunteer User Guide Single Sign On: Volunteer User Guide V3.0 Document Owner: Pathways Project Issue Date: 11-Jun-15 Purpose of the Document The Single Sign On (SSO) User Guide has been developed to provide users with instructions

More information

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business

Accessing Websites. Mac/PC Compatibility: QuickStart Guide for Business Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it

More information

CONTENT ANYWHERE FAQS

CONTENT ANYWHERE FAQS CONTENT ANYWHERE FAQS INDEX p. 1 General FAQs p. 2-4 Windows Desktop Client FAQs p. 5-6 Mac Desktop Client FAQs p. 7-9 Web Client FAQs p. 10-13 ios Client FAQs p. 14-17 Android Client FAQs General FAQs

More information

TxEIS Browser Settings

TxEIS Browser Settings TxEIS Browser Settings Updated May 2016 The TxEIS Browser Settings document lists supported browsers and recommended browser settings which will allow you to utilize the TxEIS system at its fullest potential

More information

Do I need anything special to use it? All you need to use Twitter is an Internet connection or a mobile phone with Internet capability.

Do I need anything special to use it? All you need to use Twitter is an Internet connection or a mobile phone with Internet capability. Twitter Guide What is Twitter? Twitter is a real-time communication platform that allows you to quickly share thoughts, opinions, and interesting links with friends, family, and the general public. People

More information

Cloud Web Portal User Guide Version 2.0

Cloud Web Portal User Guide Version 2.0 Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

Social Networking: MySpace and Facebook

Social Networking: MySpace and Facebook Social Networking: MySpace and Facebook Signing Up for MySpace 1. Go to http://www.myspace.com. 2. Click on the SIGN UP! Button located in the Member Login area. 3. On the page that follows, fill in the

More information

Datto Drive User Manual

Datto Drive User Manual Datto Drive User Manual NAVIGATING THE DATTO DRIVE INTERFACE By default, the Datto Drive Web interface opens to your Files page. You can add, remove, share files, and make changes based on the access privileges

More information

CDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles.

CDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles. CDUfiles User Guide Chapter 1: Accessing your data with CDUfiles Here are the first steps to using CDUfiles. Sign In Open your web browser and enter cdufiles.cdu.edu.au or Note: Use cdufiles.egnyte.com

More information

Introducing OneDrive for Business

Introducing OneDrive for Business Introducing OneDrive for Business OneDrive for Business is Microsoft s cloud storage service, which comes as part of the Conservatoire s Office365 subscription. OneDrive for Business allows you to access

More information

OET Cloud Services Getting Started Guide

OET Cloud Services Getting Started Guide OET Cloud Services Getting Started Guide Introduction OET Cloud Services uses Google Drive to let you store and access OET files anywhere -- on the web, and access them on your PC, or on any device connected

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

1. Open up your Internet browser and go to https://hootsuite.com

1. Open up your Internet browser and go to https://hootsuite.com HootSuite Tutorial HootSuite is an excellent social media management website. Through HootSuite you can track things like when your Twitter account (called a handle ) is mentioned by another Twitter user,

More information

dotmailer for Salesforce Installation Guide Winter 2015 Version 2.30.1

dotmailer for Salesforce Installation Guide Winter 2015 Version 2.30.1 for Salesforce Installation Guide Winter 2015 Version 2.30.1 Page 1 CONTENTS 1 Introduction 2 Browser support 2 Self-Installation Steps 2 Checks 3 Package Download and Installation 4 Users for Email Automation

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

Campus 2.0 Student s Guide. For PC and Mac Users

Campus 2.0 Student s Guide. For PC and Mac Users Campus 2.0 Student s Guide For PC and Mac Users July 7, 2009 IMPORTANT NOTICE Copyright 2009 Tegrity, Inc. DISCLAIMER 2009 Tegrity, Inc. all rights reserved Campus 2.0 Student s Guide Disclaimer iii TABLE

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Secure File Transfer Help Guide

Secure File Transfer Help Guide Secure File Transfer Help Guide Establish a Secure File Transfer Account When a package is sent to your email address, you will receive an email from the sender that includes a link to instructions to

More information

The GIJP Tech team can offer assistance setting up and implementing any of the services mentioned in this document.

The GIJP Tech team can offer assistance setting up and implementing any of the services mentioned in this document. TWITTER Twitter (www.twitter.com) allows users to answer the question, What are you doing in 140 characters or less. Users post about their activities, links of interest, and even ask questions on Twitter.

More information

How to Allow Pop-ups in Home Banking

How to Allow Pop-ups in Home Banking Most of the commonly-used web browsers have pop-ups blocked by default for user convenience while on the Internet. Our Home Banking system does have some pages that attempt to open as a pop-up in a new

More information

Drive. Etobicoke-Mimico Watershed Coalition

Drive. Etobicoke-Mimico Watershed Coalition Drive Etobicoke-Mimico Watershed Coalition (Adapted from Google Drive for Academics available at https://docs.google.com/document/d/1hvbqob26dkpeimv6srdgwvpupuo5ntvojqjxorq0n20/edit?pli=1) Table of Contents

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Frequently Asked Questions for the USA TODAY e-newspaper

Frequently Asked Questions for the USA TODAY e-newspaper Frequently Asked Questions for the USA TODAY e-newspaper Navigating the USA TODAY e-newspaper A look at the toolbar Toolbar Functions, Buttons, and Descriptions The tab marked Contents will take the e-reader

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET

More information

Internet Explorer 7 and higher

Internet Explorer 7 and higher Internet Explorer 7 and higher Bright Idea If the end user can t find Tools, have the end user hold the ALT button and press the T button. Clearing Cache 1. Go to the Tools. 2. Select Internet Options.

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

OneDrive for Business FAQ s Updated 6/19/14

OneDrive for Business FAQ s Updated 6/19/14 OneDrive for Business FAQ s Updated 6/19/14 What is OneDrive for Business? OneDrive for Business is an online service that provides resources for file storage, collaboration, and communication. It provides

More information

Posting Job Orders. mindscope Staffing and Recruiting Software www.mindscope.com

Posting Job Orders. mindscope Staffing and Recruiting Software www.mindscope.com Posting Job Orders CURA Technical Support Email: cura_support@mindscope.com Phone: 1.888.322.2362 x 555 Posting Job Orders Page 1 Table of Contents Posting Jobs Orders... 2 Posting Jobs on Your Website...

More information

Administration Guide. WatchDox Server. Version 4.8.0

Administration Guide. WatchDox Server. Version 4.8.0 Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and

More information

Lifesize Cloud Privacy Statement

Lifesize Cloud Privacy Statement Lifesize Cloud Privacy Statement When you use Lifesize Cloud, you provide certain information to Lifesize, Inc. and its affiliates, successors and assigns (collectively referred to as Lifesize ), including

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

Using OwnCloud. OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection.

Using OwnCloud. OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection. Using OwnCloud OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection. 1. Contact the IT Department to set up your account. 2. Once

More information

UNIFIED MEETING 5 HELP

UNIFIED MEETING 5 HELP UNIFIED MEETING 5 HELP Table of Contents Conference Manager... 1 About Conference Manager... 1 From Conference Manager, you can... 1 Signing in to Conference Manager... 2 To sign in to the Conference

More information

MY NSE Login problem

MY NSE Login problem MY NSE Login problem If you are facing problems logging into MYNSE please follow the following steps: 1) Enable cookies If you're seeing a message that your browser's cookie functionality is turned off,

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

Hosted PBX. TelePacific Communicator User Guide. Desktop Edition

Hosted PBX. TelePacific Communicator User Guide. Desktop Edition Hosted PBX TelePacific Communicator User Guide Desktop Edition 11/19/2014 CONTENTS Login... 2 Home Window... 3 Status Flag... 4 My Room... 6 Contacts Screen... 6 History... 8 Directory... 9 Dialpad...

More information

Wimba Pronto. Version 3.1. Administrator Guide

Wimba Pronto. Version 3.1. Administrator Guide Wimba Pronto Version 3.1 Administrator Guide Wimba Pronto 3.1 Administrator Guide Overview 1 Accessing the Wimba Pronto Administration Interface 2 Managing Multiple Institutions 3 General Features 4 Configuring

More information

UPDATE Appendix H: How to set Facebook s privacy settings to increase security

UPDATE Appendix H: How to set Facebook s privacy settings to increase security UPDATE Appendix H: How to set Facebook s privacy settings to increase security (October 2012) Please note that in order to protect yourself you should also change your Security Settings and all the options

More information

How to sync Office 365 email with Gmail

How to sync Office 365 email with Gmail How to sync Office 365 email with Gmail Why would you want to sync your Office 365 email account with Gmail? Send and receive emails from multiple accounts at one website location Sync Gmail with all of

More information

USER GUIDE for Google Apps VERSION 3, JUNE 2014

USER GUIDE for Google Apps VERSION 3, JUNE 2014 USER GUIDE for Google Apps VERSION 3, JUNE 2014 Contents 3 Introduction to Backupify 4 Quick-start guide 5 Administration 5 Logging in 6 Administrative dashboard 7 Header: switching domains or services

More information

MyLabsPlus Deleting Cache Files & Cookies

MyLabsPlus Deleting Cache Files & Cookies MyLabsPlus Deleting Cache Files & Cookies If you close your browser without logging out or use more than one account in the same browser, conflicting sign-in information (cookies) may be stored in the

More information

Senior Systems Cloud Services

Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

How to create database in GlycomcsPortal?

How to create database in GlycomcsPortal? How to create database in GlycomcsPortal? 1. Log- in Log in through Log in 2. Submit Content Click Submit Content on the menu. 3. Choose Database Choose Database as a type of entry you desire to create.

More information

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network. Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

P WEBSITE P CATALOGUES P PRICE GUIDES P ONLINE CLOUD STORAGE P e-commerce System. Printed and Electronic (e-documents) Users Guide. vbradug-15.10.

P WEBSITE P CATALOGUES P PRICE GUIDES P ONLINE CLOUD STORAGE P e-commerce System. Printed and Electronic (e-documents) Users Guide. vbradug-15.10. P WEBSITE P CATALOGUES P PRICE GUIDES P ONLINE CLOUD STORAGE P e-commerce System Printed and Electronic (e-documents) vbradug-5.0.02 Users Guide 205 Bradfield Trading Ltd. All rights reserved. Reproduction

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

BlackBerry Internet Service. Version: 4.5.1. Administration Guide

BlackBerry Internet Service. Version: 4.5.1. Administration Guide BlackBerry Internet Service Version: 4.5.1 Administration Guide Published: 2014-01-22 SWD-20140122155744258 Contents 1 Getting started...6 Administrative feature availability... 6 Availability of features

More information

SmartGrant Web Browser Set-Up

SmartGrant Web Browser Set-Up SmartGrant Web Browser Set-Up TABLE OF CONTENTS SmartGrant Supported Web Browsers for Windows... 2 Configuring Your Web Browser for SmartGrant... 3 Internet Explorer... 3 Firefox... 10 Chrome... 15 Safari...

More information

Technical Guide for Remote access

Technical Guide for Remote access Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles

More information

LinkedIn Professional Social Network

LinkedIn Professional Social Network LinkedIn Professional Social Network What is LinkedIn? LinkedIn is world's largest professional network on the Internet with over 364 million users as of July 2015. LinkedIn offers tools to help users

More information

NDSU Technology Learning & Media Center. Introduction to Google Sites

NDSU Technology Learning & Media Center. Introduction to Google Sites NDSU Technology Learning & Media Center QBB 150C 231-5130 www.ndsu.edu/its/tlmc Introduction to Google Sites Get Help at the TLMC 1. Get help with class projects on a walk-in basis; student learning assistants

More information

ZeroPC User Guide. Welcome to ZeroPC your Lifetime Desktop in the Cloud!

ZeroPC User Guide. Welcome to ZeroPC your Lifetime Desktop in the Cloud! ZeroPC User Guide Welcome to ZeroPC your Lifetime Desktop in the Cloud! rev. July 2011 1 Unplug your computer your desktop in the cloud follows you wherever you go! The ZeroPC Lifetime Desktop in the Cloud

More information

DDN CUSTOMER SUPPORT COMMUNITY QUICK START GUIDE

DDN CUSTOMER SUPPORT COMMUNITY QUICK START GUIDE DDN CUSTOMER SUPPORT COMMUNITY QUICK START GUIDE March 10, 2015 v2 Contents Getting an Account Logging In Creating a New Case Updating an Existing Case Using the Knowledgebase Welcome to the DDN Customer

More information

Welcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP?

Welcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP? Welcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP? SFTP (Secure File Transfer Protocol) is an added layer of security provided to our clients. SFTP requires an encrypted

More information

H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles

H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles Privacy Notice H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles Protecting your information is important to us. The following guidelines set forth our

More information

Send and receive encrypted e-mails

Send and receive encrypted e-mails Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

Adaptive Business Management Systems Privacy Policy

Adaptive Business Management Systems Privacy Policy Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information

More information

Criminal Justice Social Work Community of Practice Subscription, registration and login manual

Criminal Justice Social Work Community of Practice Subscription, registration and login manual Criminal Justice Social Work Community of Practice Subscription, registration and login manual Version: concept 08102014 Introduction Before you can access the Criminal Justice Social Work - Community

More information

How to register and use our Chat System

How to register and use our Chat System How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you

More information

WYOMINGTOURISM.ORG Deal Listings How To Guide Version 1 Published November 26 th, 2014

WYOMINGTOURISM.ORG Deal Listings How To Guide Version 1 Published November 26 th, 2014 WYOMINGTOURISM.ORG Deal Listings How To Guide Version 1 Published November 26 th, 2014 Getting Started SYSTEM REQUIREMENTS Internet Explorer 8 & Newer Firefox 3.5 + 18 and newer Google Chrome (18 and newer)

More information

webcrm App for HootSuite User Guide

webcrm App for HootSuite User Guide webcrm App for HootSuite User Guide 07 December 2014 Contents General... 3 Install the webcrm App on HootSuite... 4 Configure webcrm HootSuite Integration in webcrm... 6 Add Custom Attributes... 6 Map

More information

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

Easy Social Media Management with Hootsuite

Easy Social Media Management with Hootsuite Easy Social Media Management with Hootsuite Hootsuite is the largest social media integration and management platform on the Internet. It has sent over 700 million messages to date and has over 3 million

More information

Privacy Statement, Effective as of May 4, 2014

Privacy Statement, Effective as of May 4, 2014 Ulfberht Software Systems, LLC ( Ulfberht or the Company ) is committed to protecting the privacy of individuals who visit the Company s Web sites ( Visitors ) and individuals who register to use the Services

More information

Google Apps Migration

Google Apps Migration Academic Technology Services Google Apps Migration Getting Started 1 Table of Contents How to Use This Guide... 4 How to Get Help... 4 Login to Google Apps:... 5 Import Data from Microsoft Outlook:...

More information

RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA TWITTER

RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA TWITTER RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA Alberta s a big place and while you could run round the province telling everyone you see about Change Day AB, it s probably not the best use of your time and could

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

Unified Meeting 5 User guide for MAC

Unified Meeting 5 User guide for MAC Unified Meeting 5 User guide for MAC Unified Meeting 5 is a web based tool that puts you in complete control of all aspects of your meeting including scheduling, managing and securing your meetings.. Whether

More information

The UC Learning Center: Disabling Pop-Up Blockers

The UC Learning Center: Disabling Pop-Up Blockers The UC Learning Center: Disabling Pop-Up Blockers In order to launch online courses within the UC Learning Center all pop-up blockers must be turned off. This guide will walk you through disabling pop-up

More information

SESSION EXPIRED Error Loop Fix

SESSION EXPIRED Error Loop Fix SESSION EXPIRED Error Loop Fix After our Banner upgrade in April, we ve noticed some users receive a Session Expired error upon logging into mywatc. This guide will present two options available to solve

More information

Cloud Controls. Quick Start Guide Version 3.5.1 April 2014

Cloud Controls. Quick Start Guide Version 3.5.1 April 2014 Cloud Controls Quick Start Guide Version 3.5.1 April 2014 W HE A NY ANY TIME ONLINE RE Table of Contents Welcome to imeet Cloud Controls. 1 Getting started. 2 Add hosts and meeting rooms. 4 Enterprise-wide

More information

Xerox econcierge Account Setup Guide

Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their

More information

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers.

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Disable Pop-Up Blockers for MyCPD This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Popup blockers interfere with proper functioning of the

More information

USM Web Content Management System

USM Web Content Management System University of Southern Maine USM Web Content Management System USM Web CMS Technical Development Group 4/26/2011 Content o Introduction o Login o User Roles o Group Member o Group Publisher o Group Admin

More information

SAP VIRTUAL AGENCY GETTING STARTED GUIDE: SELF SERVICE MARKETING

SAP VIRTUAL AGENCY GETTING STARTED GUIDE: SELF SERVICE MARKETING GETTING STARTED GUIDE: SELF SERVICE MARKETING SELF SERVICE MARKETING TABLE OF CONTENTS Introduction 3 Starting Out 4 Creating Campaigns and Collateral 8 Customizing and Executing a Pre-Packaged Campaign

More information

Support Documentation

Support Documentation Support Documentation WP-Live-Chat-Support 2/5/2014 This document is here to help WordPress Users and Developers Install and Troubleshoot WP-Live- Chat-Support Contents General Info Before you begin...

More information