online privacy

Eye looking through a keyhole

Our library is committed to protecting the privacy and confidentiality of our users. Protecting your privacy and confidentiality can help protect you against identity theft. Moreover, privacy is essential to your ability to explore new ideas - even controversial ones - without fear of being judged, punished, ostracized, or put under surveillance.  

Protecting your privacy is a team effort, and we can't do it alone; you also have an important role in keeping your information safe. In this last post of our series on privacy, we'll look at one of the most basic steps you can take in securing your online identity: password protection.

Password Complexity

Eye looking through a keyhole

Our library is committed to protecting the privacy and confidentiality of our users. Protecting your privacy and confidentiality can help protect you against identity theft. Moreover, privacy is essential to your ability to explore new ideas - even controversial ones - without fear of being judged, punished, ostracized, or put under surveillance.  

Protecting your privacy is a team effort, and we can't do it alone; you also have an important role in keeping your information safe. In this fourth post of our series on privacy, we'll specifically look at some resources to secure your Chromebook.

Secure Your Chromebook

Eye looking through a keyhole

Our library is committed to protecting the privacy and confidentiality of our users. Protecting your privacy and confidentiality can help protect you against identity theft. Moreover, privacy is essential to your ability to explore new ideas - even controversial ones - without fear of being judged, punished, ostracized, or put under surveillance.  

Protecting your privacy is a team effort, and we can't do it alone; you also have an important role in keeping your information safe. In this third post of our series on privacy, we'll delve into a slightly more advanced topic: browsers and browser extensions.

Your browser is the program that you use to browse the internet. Examples of browsers include Internet Explorer, Edge, Chrome, Safari, and Firefox. Many browsers have extensions (or add-on programs) available that can increase your security, and other browsers have security measures built in to protect you without requiring additional extensions. These options require installation on your own computer, and thus cannot be used on library-provided computers.  

Browser Extensions

Eye looking through a keyhole

Our library is committed to protecting the privacy and confidentiality of our users. Protecting your privacy and confidentiality can help protect you against identity theft. Moreover, privacy is essential to your ability to explore new ideas - even controversial ones - without fear of being judged, punished, ostracized, or put under surveillance.  

Protecting your privacy is a team effort, and we can't do it alone; you also have an important role in keeping your information safe. In this second post of our series on privacy, we'll delve into a slightly more advanced topic: search engines. 

Secure, Safe Search Engines

Eye looking through a keyhole

Our library is committed to protecting the privacy and confidentiality of our users. Protecting your privacy and confidentiality can help protect you against identity theft. Moreover, privacy is essential to your ability to explore new ideas - even controversial ones - without fear of being judged, punished, ostracized, or put under surveillance.  

Protecting your privacy is a team effort, and we can't do it alone; you also have an important role in keeping your information safe. In this first of a series of posts, we'll share some simple, basic steps and tips to keep in mind while you're browsing that can help ensure your safety, privacy and confidentiality online.

Basic Steps

Subscribe to RSS - online privacy