{"id":82,"date":"2009-12-11T12:42:47","date_gmt":"2009-12-11T16:42:47","guid":{"rendered":"http:\/\/internetsafety.trendmicro.com\/?p=82"},"modified":"2009-12-17T14:54:43","modified_gmt":"2009-12-17T18:54:43","slug":"privacy-is-in-the-eye-of-the-beholder","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/privacy-is-in-the-eye-of-the-beholder\/","title":{"rendered":"Privacy is in the Eye of the Beholder"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-92\" title=\"Blog4c\" src=\"\/internet-safety\/wp-content\/uploads\/2009\/12\/Blog4c-150x100.jpg\" alt=\"Blog4c\" width=\"150\" height=\"100\" \/>by Lynette T. Owens<\/p>\n<p>I know several parents who within the last year became frequent users and heavy recommenders of social networking sites.\u00a0 Most use it as a way to stay in touch with far flung friends and relatives (to share photos and updates of their kids much of the time) and to feed their curiosity about old classmates or previous co-workers.\u00a0 To a lesser extent or almost never do they use it to meet people unfamiliar to them.\u00a0 According to research from the Pew Research Center, 89% of the more than 2200 adults surveyed use online social networks to connect with people they already know. \u00a0\u00a0<\/p>\n<p>But social networking sites are in essence a web of concentric circles, where your sphere of connections overlaps others\u2019 to varying degrees but not completely.\u00a0 For this reason, considering the implications of privacy for you and for anyone in your circle or your circle\u2019s circle is an important issue. \u00a0\u00a0Your definition of privacy may not be the same as others.<\/p>\n<p>Last month,\u00a0<a title=\"http:\/\/www.google.com\/hostednews\/ap\/article\/ALeqM5iO6BHatMJ4kVFpXE5AGA-4QdFXNwD9BLL5DO3\" href=\"http:\/\/abcnews.go.com\/WN\/indiana-school-sued-student-athletes-suspended-sexy-pics\/story?id=8975121\">two teenage girls sued their high school<\/a> for punishing them after they posted suggestive photos on their MySpace pages last summer, despite using the highest level of privacy settings for their profiles. \u00a0They assumed only those they allowed on the site could see it.\u00a0 A reasonable assumption.<\/p>\n<p>What led to the girls\u2019 ultimate demise was a breach in trust. \u00a0Someone in their circle of \u2018friends\u2019 connected to their profile had access to the photos. \u00a0In turn, they showed them to others outside the circle, and eventually the pictures ended up in front of their high school principal.\u00a0<\/p>\n<p>The school responded by preventing the girls, both student-athletes, from participating in extracurricular activities in the fall and made them apologize to the Athletics board and attend counseling sessions.\u00a0 The school\u2019s student handbook cites that student-athletes can be excluded from representing the school if their conduct in or out of school discredits the school in any way or is a disruptive influence to its environment.\u00a0 In the lawsuit filed by the girls, the issue of civil liberties (freedom of speech\/expression, specifically) is now in play.\u00a0 Schools are questioning how to better define codes of conduct to include online activities.\u00a0 And friends are reconsidering the barometers of trust they use to measure their relationships with others.<\/p>\n<p>Regardless of how this case ends and which side you may take, there are many lessons to be learned immediately:\u00a0\u00a0<\/p>\n<ol>\n<li><strong>Using the highest privacy level settings in your social networking profile does not prevent people you have given privilege to see your posts from making them public. <\/strong>So always think before posting anything. Parents should advise their children of the dangers of posting personal things on the Web. They can use this case to show how managing privacy is first about making good choices and second about using technology to support those choices.\u00a0 Parents should also set good examples.\u00a0 Do not post photos or content that you or any of your friends or relatives would not want to be widely known or seen.\u00a0<\/li>\n<li><strong>Privacy means different things to different people.\u00a0<\/strong> I was once asked permission by someone to post a picture of my kids online.\u00a0 Given the context of the posting, I declined (it was too public in my opinion), but I appreciated being asked in the first place.\u00a0 Schools require parents to complete a release form allowing them (or not) to take photographs of our kids for the purposes of promoting the school in various publicity materials.\u00a0 Some parents have no issues with this, some parents do.\u00a0 It is a matter of choice, and it should never be assumed that everyone feels the same about what is private and what is not.\u00a0 Show kids how you value privacy and how to respect the privacy of others.<\/li>\n<li><strong>Kids\u2019 online safety and digital citizenship is the ultimate responsibility of the parents but they must guide their kids with the help of their school.<\/strong> In this case, while the teens made a poor choice of posting the photos in the first place, the incident may not have occurred if their parents and their school had warned them about the consequences of doing so.\u00a0 It is unclear where the boundaries are or should be between parent and school, and what jurisdiction they each have over ensuring kids\u2019 acceptable use of the Internet.\u00a0 But rather than tackle it in isolation, a collaborative model would help address this more efficiently.\u00a0 The case of the girls from Indiana highlights how the Internet is deeply woven into kids\u2019 lives and why teaching digital citizenship needs to be a high priority for schools and parents.\u00a0<\/li>\n<\/ol>\n<p>There are of course legal definitions and protections for you and your kids\u2019 personal privacy, such as when you share health records with the school.\u00a0 But privacy on social networking sites is a different matter.\u00a0 The good news is that protecting your privacy is largely in yours and your kids\u2019 own control. \u00a0\u00a0Despite all the heat that social networking sites receive for improving their privacy control capabilities, technology can never be a replacement for good judgment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social networking sites are in essence a web of concentric circles, where your sphere of connections overlaps others\u2019 to varying degrees but not completely.  For this reason, considering the implications of privacy for you and for anyone in your circle or your circle\u2019s circle is an important issue.   Your definition of privacy may not be the same as theirs&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-82","post","type-post","status-publish","format-standard","hentry","category-for-parents","category-for-teachers","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":0,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/82\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}