Protecting Your Online Identity

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Is This You? Internet Safety Day
Privacy: Facebook, Twitter
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
Cyberbullying.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
e-safety and cyber bullying
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Establishing boundaries where there appear to be none.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
T HINK ! Before You Post A lesson on Internet Safety Source:
Riverside Primary School Parent Meeting st Century Learners – a few facts: young people aged had the highest rate of internet use at June.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Christian Citizenship in a Digital World Lesson 2: Personal Identity: Your brand and reputation Your brand and reputation.
O nline R eputation. Paris Brown She was 17 She was 17 From Kent From Kent She was Britain’s first youth crime commissioner She was Britain’s first.
What does yours look like? Your Digital Footprint.
Online Reputation A guide for children aged 7+
Safety.
Cyberbullying project
Creating your online identity
What does your digital footprint say about you?
E-Safety Briefing
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
Social Media & You Let’s take a look at your social media use.
Information Security.
GOSSIP and CYBERBULLYING
How to Protect Yourself from ID Theft and Social Engineering
Appropriate Use of Technology
Information Security Awareness 101
Preserving your privacy
Warrior Wednesday DIGITAL CITIZENSHIP.
GDPR General Data Protection Regulation EU: Coming May 25, 2018
Digital Citizenship and Social Media
GDPR (General Data Protection Regulation)
GOSSIP and CYBERBULLYING
What is Digital Citizenship?
Your Online Identity 2018 College Night Jamie McConnell
Online safety, social manners, and digital footprint
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Internet Safety – Social Media
Internet Safety.
Career Services at Villa Maria
What it is, how to spot it, and how to respond to it
E-Safety including Safer Working Practice for School Staff
Online Safety Assembly.
8th grade Tiger Time Presentation
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Protecting Your Online Identity What is digital reputation? - Defined by online behaviors and content Examples: Tagged photos Blog & social media posts Your digital reputation is defined by your behaviors in the online environment and by the content that you post about yourself and others. Tagged photos, blog post and social networking interactions will all shape how you are perceived by others online and offline, now and in the future.

Protecting Your Online Identity Why digital reputation matters. Affects both personal and professional relationships. Examples: 78% corporate recruiters & 63% of college admission officers reported using social media to review prospects. A poor digital reputation can affect your friendships, relationships and even your job or college prospects. A survey conducted by CyberSafetyCop.com reported that 78% of corporate recruiters and 63% of college admission officers reported checking social media accounts of prospects.

Protecting Your Online Identity Protecting your online reputation from: Yourself Remove old or embarrassing accounts Review potentially breached accounts A major part in protecting your online reputation is ensuring that you are protecting yourself from yourself. With practically every service imaginable available on the web today, people are inclined to create accounts on a whim to access these services. Often times these accounts become unused and forgotten about. Unfortunately, these accounts do not go away once forgotten about, thus creating a large exposure vector. The first step in cleaning up an online identity is identifying all those old unused accounts and either deactivating them, or removing any personal identifying information such as: name, address, phone number, photos, etc. Fortunately, there is a service that will assist with this process a website called justdelete.me aggregates links and instructions for deleting accounts from many population web services. Another important step for ensuring the safety of your online identity is reviewing if any of your old or even current accounts have been exposed in any hacks or database breaches. Again, there is a useful service that will make this process simple. The webpage (https://haveibeenpwned.com/) Have I Been Pwned allows you to search for your email address or username to see if it has been affected by any such breaches.

Protecting Your Online Identity Protecting your online reputation from: Others (doxing) Protect your accounts Protect your information Protect your devices “Doxing is the act of publishing someone’s personal information, of which there would be a reasonable expectation of privacy and dubious value to the conversation, in an environment that implies or encourages intimidation or threat.” In essence, doxing and online harassment are generally not mutually exclusive – if a person is doxed, it is reasonable to assume they will / are being harassed.

Protecting Your Online Identity Responding to doxing / harassment: Document all harassment Report threats to local authorities Report harassment to the webpage abuse team. Seek help ISU abuse (abuse@ilstu.edu) Online resources Before you do anything, remember that documenting your doxing is of the utmost priority. Things like screenshots, downloading the webpage and other methods of record-keeping, preferably with things like timestamps and URLs visible, are crucial for both your own reference and for any third parties who may have an interest in your case. Not only does it create a chain of culpability, but the site of your doxing and surrounding threats can make it much easier to secure police or legal involvement should the harassment escalate. This doesn’t mean you should leave your dox up if you can help it. Once it’s documented, sites like Pastebin, which are often used to share doxed information, have procedures in place (http://pastebin.com/contact) for removing private information. Many social media sites have processes in place to assist victims of online harassment in removing the offending content. For example CyberCivilRights.org offers tips and directions for removing sexually explicit material of an individual that has been publicly exposed. Of course, these processes will apply to all types of harassment, not just those specifically outline in the text. http://www.cybercivilrights.org/online-removal/

Protecting Your Online Identity Useful links for reference: http://justdelete.me/ https://haveibeenpwned.com/ http://www.cybercivilrights.org/online-removal/ https://www.crashoverridenetwork.com/index.html https://www.microsoft.com/en-us/security/online-privacy/social-networking.aspx

Questions?