Sharing restrictions

Home > Life Skills > Social media etiquette > Sharing restrictions

Knowing what should and should not be shared on social media in terms of privacy and confidentiality.

Sharing personal information: What information should you never share on social media? This topic covers how online fraud is perpetuated, and how to avoid it by keeping sensitive information private.
Personal privacy settings: What privacy settings are available, and how do you manage them? This topic covers configurable changes in privacy settings that you can make, including deciding who can see posts, profile pictures, and contact information.
Online reputation management: What is online reputation management, and why do you need it? This topic covers how your social media activity can affect your reputation and what you can do to protect and manage it.
Cyber-bullying: What is cyber-bullying, and how does it affect people? This topic covers how social media bullying works, how to identify it, and how to respond effectively.
Sharing copyrighted material: What copyrighted material can and can't be shared, and how do you avoid breaking the law? This topic covers the risks of sharing copyrighted material without permission, along with best practices to avoid legal issues.
Posting racist, sexist or otherwise offensive content: What types of posts are offensive, and how do you avoid posting them online? This topic covers the importance of avoiding posts that could offend people of different backgrounds, religions, and ethnicities.
Posting inappropriate photos and videos: What types of photos and videos are inappropriate, and how do you avoid posting them online? This topic covers best practices for posting photos and videos, such as being mindful of the backgrounds and situations in which you take them.
Engaging in online arguments: Why getting into online arguments is generally a bad idea, and how to avoid getting into these debates. This topic covers how to disagree with someone respectfully and constructively.
Cyber-stalking: How to avoid cyber-stalking, and what to do if you become a victim. This topic covers the risks related to divulging too much personal information, along with best practices for staying safe.
Managing third-party apps and accounts: How to manage third-party apps and accounts, protecting your privacy and security. This topic covers best practices for managing social media accounts and how to protect them from hacking and data breaches.
Privacy settings: The social media platform provides privacy settings to control what content is shared and who can see the shared content.
Copyright: Sharing or using copyrighted content without permission can result in legal issues. Always take permission before sharing or use original content.
Sensitive information: Personal information such as address, phone number, email, and other sensitive information should not be shared on social media.
Cyberbullying: It's essential to maintain respect and avoid making negative comments or messages to any user or group.
Nudity and adult content: Adult, vulgar, or explicit content should not be shared on social media, and one should abstain from sharing such content.
Plagiarism: Taking credit for someone else's work or ideas can result in poor reputation and legal liabilities.
Hate speech and discrimination: Any content or messages promoting racial or sexual discrimination, hate speech, or offensive gestures should be avoided.
Personal attacks: It is discouraged to attack other people or individuals personally, especially when disagreeing with their opinions or views.
Confidentiality agreements: Posting trade secrets or confidential information about any business, company or individual goes against any agreement. Hence refrain from sharing confidential information.
Trolling: Intentionally posting false or provocative content to provoke negative reactions or responses from others.
"Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet."
"Internet privacy is a subset of data privacy."
"Privacy concerns have been articulated from the beginnings of large-scale computer sharing."
"Privacy concerns... especially relate to mass surveillance enabled by the emergence of computer technologies."
"Privacy can entail either personally identifiable information (PII) or non-PII information."
"PII refers to any information that can be used to identify an individual."
"For example, age and physical address alone could identify who an individual is without explicitly disclosing their name."
"Other forms of PII may soon include GPS tracking data used by apps, as the daily commute and routine information can be enough to identify an individual."
"It has been suggested that the 'appeal of online services is to broadcast personal information on purpose.'"
"Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
"Internet privacy involves... the storage of information pertaining to oneself via the Internet."
"Internet privacy involves... provision to third parties."
"Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance enabled by the emergence of computer technologies."
"Privacy concerns... relate to... behavior on a website."
"Privacy can entail either personally identifiable information (PII) or non-PII information."
"As the daily commute and routine information can be enough to identify an individual."
"Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
"Internet privacy... involves... provision to third parties, and display of information pertaining to oneself."
"Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
"Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."