Advertisement
Guest User

Untitled

a guest
May 24th, 2017
122
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.09 KB | None | 0 0
  1. from the NSA:
  2. Dear Industry Partner,
  3.  
  4. (U) GUIDELINES FOR THE PERSONAL USE OF SOCIAL NETWORKING SITES
  5.  
  6. (U) Would you give your address to a stranger on the street? Of course not! What if the stranger were a burglar? They’d know you’re not at home and would be free to ransack your house. So why would you post personal information to social networking sites on the Internet?
  7.  
  8.  
  9.  
  10. (U) The Internet really is the new Wild West, with very few controls and no assurance that your personal information is protected. Despite site privacy settings, you should assume that anything you post can be viewed by anyone with an Internet connection—including cyber and identity thieves, as well as traditional criminals.
  11.  
  12.  
  13.  
  14. (U) The following guidelines are provided to reduce your exposure to potential threats on social networking websites:
  15.  
  16.  
  17.  
  18. · (U) Use your personal email address, not your government or company email address, as the means of identification on social networking sites.
  19.  
  20.  
  21. · (U) Do not use any screen name, username, "handle", URL, personal space name or other designation that would reveal an association with the U.S. Government or any other Enterprise- or Intelligence Community-related word.
  22.  
  23.  
  24. · (U) Avoid posting sensitive personal and work-related information, such as plans, schedule and location information; phone number, address or other sensitive contact information; an unclassified government e-mail address; or names and personal information of coworkers, friends and family members.
  25.  
  26.  
  27. · (U) Do not reveal any other individual’s affiliation with specific government agencies.
  28.  
  29.  
  30. · (U) Do not post pictures, videos, diagrams or other graphics that may reveal an association with your organization. Be particularly aware of compromising information that might be contained in the background of pictures or videos, such as pictures taken in front of your facility, or reflected images from tables or mirrors.
  31.  
  32.  
  33. · (U) Ask family and friends not to post photos and information about you without prior approval.
  34.  
  35.  
  36. · (U) Avoid adding third-party plugins, add-ons or applications such as “Farmville” or “Mafia Wars” to your social networking profile, especially when not familiar with the associated vulnerabilities and security threats. Remember that many third-party applications may gain unrestricted access to Personally-Identifiable Information (PII).
  37.  
  38.  
  39. · (U) Become familiar with the End-User License Agreements of social networking sites in order to know the site’s access and rights to personal information and personal material.
  40.  
  41.  
  42. · (U) Periodically monitor privacy settings and security options. Consider using each site’s privacy settings to prevent strangers from viewing your profile/content, e.g., by removing yourself from site search results; prevent photo tagging; define access permissions for social networking associates or “friends” to determine what PII they can view; and define access permissions for public viewing and search results.
  43.  
  44.  
  45. · (U) Regularly monitor postings from family and friends to see if they have disclosed PII about you, and respond accordingly. If you are unsure how to respond, please contact your supervisor or your Security Officer.
  46.  
  47.  
  48. · (U) Do not allow people you don’t know to be on your “friends” lists.
  49.  
  50.  
  51. · (U) Check all groups’ privacy settings before joining them.
  52.  
  53.  
  54. · (U) Avoid joining groups or associations that might suggest your employer or job affiliation.
  55.  
  56.  
  57. · (U) Ensure that your systems and software (including web browsers) are up to date with the latest virus definitions, patches and malware protection.
  58.  
  59.  
  60. · (U) Beware of links and attached files posted to social networking sites, as they may link to or contain malware. Be sure to protect your computer against viruses, trojans, etc.
  61.  
  62.  
  63. · (U) Use unique, complex passwords for each online account. Vary usernames and passwords for personal accounts, such as personal e-mail, home banking, blogs, social networking, etc. Then, if one account is compromised, all others should remain secure and not susceptible to unauthorized access.
  64.  
  65.  
  66. · (U) Protect your passwords. Do not share them.
  67.  
  68.  
  69. · (U) Look for HTTPS and the lock icon that indicate active transmission security before logging in or entering sensitive data (especially when using wi-fi hotspots).
  70.  
  71.  
  72. · (U) Avoid accessing social networking sites from especially risky public locations such as hotels, cyber-cafes or airport hotspots, particularly when in a foreign country. Usernames, passwords and other sensitive information could be intercepted during transmission.
  73.  
  74.  
  75. · (U) Certain clues could help indicate if your Social Network page has been compromised. If you notice any of these events, contact the site administrators of the SNS and report it. More than likely your page will be locked out until it’s resolved or a new password is generated by the site and emailed to your personal email address. Things to watch for include:
  76.  
  77.  
  78. · (U) A major increase or decrease of friends (someone besides yourself could be sending friend requests to strangers, or removing approved friends from your page.)
  79.  
  80.  
  81. · (U) Wall Posts, Blogs, applications, even the design of your page have been added, modified, or deleted.
  82.  
  83.  
  84. · (U) Your password no longer works.
  85.  
  86.  
  87. · (U) You receive an email on the address that is assigned to your SNS stating that changes have been made.
  88.  
  89.  
  90. · (U) Pictures have been added or removed from your profile or your default picture has changed.
  91.  
  92.  
  93. · (U) Any changes to your identifying information, such as hometown, date of birth, etc.
  94.  
  95.  
  96. · (U) Your profile has been added as a member of Groups or Fan Pages you normally do not join.
  97.  
  98.  
  99. · (U) Report all suspicious or overly aggressive contacts, as well as anyone who asks any probing or leading questions pertaining to your government affiliation, to your Security Officer.
  100.  
  101.  
  102.  
  103. Regards,
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement