Users might be sharing too much personal information by posting on social networking sites
Stories of people's online photos being used for nefarious purposes abound: A mother in Jacksonville, Florida discovered that a photo she posted of her five-year-old on Facebook was taken and used to create a new profile, unbeknownst to her. A soldier's photo was stolen off of MySpace, posted by scam artists under a fake Match.com account, and used to con one woman out of thousands of dollars. One blogger found her family's photo being used as an advertisement in the Czech Republic . Another mother's four-year-old daughter's photo was pulled off of Flickr and posted on a Brazilian social networking site, where it was rated for "sexiness."
The convenience of sharing photos with friends (and non-friends) through social networking sites and blogs is undeniable. Unfortunately, so are the dangers. Not only can photos be stolen and used by strangers, but many photos, especially those taken by phones or devices with GPS technology, contain tags that reveal their location, which means viewers can figure out where exactly they were snapped. In other words, if a parent takes a photo of their child playing at home and then posts it online, it's possible for strangers to know exactly where they live.
A few simple steps can dramatically reduce your chances of falling victim, and there's no need to give up photo-sharing altogether. Here are seven steps everyone should take to protect themselves and their families when posting photos online:
1. Check your privacy settings
Facebook and many other social networking sites give users options when it comes to who can view their photos and personal information. On Facebook, users can specify that they want only their "friends" to view their photos, or friends of friends, or everyone. (To check your settings, log in to your account and go to "privacy settings.")
2. Make sure you know who your friends are
If you have hundreds of friends on Facebook, chances are you don't know them all that well. Take a moment to review your friends list to make sure everyone still sounds familiar. Perhaps you accepted a friend request from an old high school classmate, but they appear to have grown up into an odd person. You might want to consider de-friending them.
3. Disable the GPS technology before taking photos with a smartphone if you plan to post the photos online
Even regular cameras are starting to get this technology, so check what information is included on your photos before posting them online. You should be able to turn off the high-tech feature before snapping, and you might want to consider doing so when you are in your home or places you frequent often.
4. Watch out for lower-tech ways of sharing personal information, too
A photo taken in front of your home could reveal your address, or a T-shirt could contain a school logo. If you're posting photos on a blog or other publicly-accessible site, you probably want to keep your personal details under cover.
5. Don't post photos that could be embarrassing to your children, even in 10 or 20 years
That means naked bath photos or toilet photos are out, for example. Joanne Villani, founder of ProtectedPix, which offers a private photo-sharing service, says with facial recognition technology on the rise, it's possible that photos posted now will still be searchable online by the time your now-toddler looks for his first job. You don't want to leave a trail of photographs that could hurt his reputation later.
6. Stand up for yourself (and your child)
If a friend or relative posts photos of your child on Facebook and you don't want them to, ask them to take them down. After all, you don't know how carefully they monitor their own friend list, so it's impossible to know who is viewing the photos. The same goes for YouTube, Picasa, and other media-sharing sites.
7. Use a watermark
Bloggers are increasingly turning to watermarks, which imprint their photos with their name or blog title and make it harder for someone to misappropriate the image. Villani suggests adding it in a spot where it cannot be easily cropped out. Doing so, she says, is sort of like locking your door or having a security system: It makes it more likely that a scam artist will leave your photo alone and move on to the next, more vulnerable victim.
The bottom line:
It's hard to control how your photos are used once they are posted online, but these steps can reduce your chances of becoming a victim of identify thieves or other types of criminals.
- How Apple's iCloud Changes Business
- Use the Cloud to Go Mobile
- Apple iPad 2: A Smarter Business Tool
- Why You Can't Ignore iPhone / iPad Security
- Should You Let Your Teens Blog?
- Should You Talk Politics Online?
- How to Watch TV for Free -- or Close to It
- The Cost of Paying for Netflix
- Future for Slates, Tablets and iPads
- Social Media and Privacy (or Lack Thereof)
- Small Business Video: Life After the Flip
- Is It Safe to Post Photos Online?
- 9 Ways to Avoid Online Scams
- LinkedIn Offers New Options for Students
- 4 Strategies to Avert Virtual Arguments
- Cloud Computing 101: Protect Yourself Online
- How to Recover From a Social Media Mistake
- Why You Should Inventory Business Cloud Use
- Emerging Technology Has Positive Impact in Classroom
- 4 Apps to Manage Your Contacts
- Portable Tech Gadgets You Need This Summer
- Best Tablets for Your Business
- Security Tips for Your Smartphone or Tablet
- 5 New Cloud Tools You'll Love
- Can a Tablet Replace Your Laptop?
- Why Wireless Needs a Network of Networks
- 5 Steps to a Successful Enterprise Wireless Strategy
- 5 Keys for Moving Enterprise Security to the Cloud
- Tips for Building and Deploying Cloud-based Apps
- 5 Business Lessons You Can Learn From Mark Zuckerberg
- Russia: The No. 1 Base of Global Internet Attacks
- Researchers Say New Botnet TDL-4 Poses Big Threat
- The Internet Grows Up
- Ten Ways to Keep Your Online Information Secure
- How Facebook and Your Free Time Can Get You Fired
- The Only 10 Android Health Apps You Need
- Connected TV
- Near-Field Communication Technology the Next Big Thing
- The Future of 3-D Video
- Is Your Teen Sexting?
- Should You Ban Your Tweens From Facebook?
- Home Movies: Then and Now
- Is Social Media Malware Infecting Your Business?
- Is Your Tween (Illegally) on Facebook?
- Are Free Public Wi-Fi Networks Safe?
- Explosion of Creativity: Power of Online Communities
- The Future According to Google
- 5 Cheap Alternatives to Hiring a Personal Trainer
- When Your Dream Company is Hiring on Twitter
- Colleges Bring Campuses to Facebook
- Technology Powers Revolutions and Saves Lives
- Best Photo Apps
- Virtual World No Substitute for Real One
- Best Phone Apps for Busy Women
- How to Prevent Identity Theft
- How to Use Facebook So It Does not Use You
- Worst-case Computer Scenarios
- Google Chrome OS Notebook: A Security Game Changer?
- What Is Cloud Computing?
- How to Prevent Data Breaches
- Best Tips for Sharing Videos
- Do You Need an iPad for Your Small Business?
- The App Guide: 5 Must-have Shopping Apps
- Project Management Tips From the Pros
- Finding the Right Skill Set
- Who's Gawking at Your Photos?
- Dealing With Virtual Stalking
- CES 2011 Report - Consumer Electronics Show
- Time to Gear up for 3-D TV?
- How to Get the Best Service From IT Vendors
- Dating Apps: The Lowdown
- New Website Streamlines College-Aid Application
- Gift-card Resale Market Thrives Online
- Stop Cyberbullying Now!
- 5 Cloud Tools to Boost Your Productivity
- Mobile Pay Can Give You an Edge
- How to Find the Best Deals Online
- Should You 'Friend' Your Teens Online?
- Should You Really Post That Comment?
- 5 Smart Tactics for LinkedIn Self-Promotion
- How Repressive Regimes Use the Internet to Keep Power
- WikiLeaks: Diplomacy as Usual
- The Rising Threat of USB Drives
- Integrate Cloud Solutions With Caution
- Tech Solutions to Track Your Resolutions
- Crash Course in Computer Maintenance
- How to Pick the Right Cloud Provider
- Web Tools for Starting a Small Business
- 4 Life-changing Resolutions You Can Stick to
- Create Your Own Social Network
- What the Web Says About You
- FTC Chairman: 'Do Not Track' Rules Would Help Web Thrive
- 'Do Not Track' Rules Would Put a Stop to the Internet As We Know It
- Are Federal 'Do Not Track' Rules Needed?
- The Political Power of Social Media
- Top 3 Kid-safe Social Networks
- 5 Ways to Cultivate Your Kids' Online Reputation
- Preparing Our Children for Global Digital Citizenship Success
- The Great E-reader Roundup
- The NFL's Highest-scoring Apps
- New Gadgets Straight From the Big Screen
- A Game Plan for Protecting Stored Data
- The Drive for Real-time Collaboration
- Hang Onto People Who'll Help You Advance
- Leading New Developments in Visual Computing
- Meet Mr. Industrial: Justin Lassen's Music Machine
- Must-see TV on the Internet
- Share Safely on Social Networks
- 6 Essential Rules for Safe Online Shopping
- Five Steps to Kid-friendly Surfing
- High-tech Help for Weight Loss
- Create a Web Site or Blog for Your Family
- Video Eyewear for Sunglass Cinema
- Smart Phone Apps Help Stop Distracted Driving
- Online Computer Backup Services Remove Hassle
Copyright © 2011 U.S. News & World Report