Managing Your Digital Footprint Shauna Cox 2012 National BDPA Technology Conference August 1 – 4, 2012 Baltimore, MD.

Slides:



Advertisements
Similar presentations
Respect for All: Digital Footprint. Lesson Objectives: Students will be able to …  Define the term digital footprint and understand how their actions.
Advertisements

HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Who are You Online? An Advisory Discussion February
FLORIDA STATE UNIVERSITY College of Communication & Information Your Digital Footprint Michael Helfrich Milton Ramer Courtney Lisenbee MH.
Morra Aarons-Mele Staying Current The Technical Tools You Need and the Ones You Don’t.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
SOCIAL. SAFE. SMART.. Presentation Title Social Media The average teen spends 2 hours and 20 minutes online each day. Teens spend 79% of their time online.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Social Media in the Physician Practice Setting. Objectives 1. Review the types of social media available for communication with patients. 2. Explain the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Career Networking: Utilizing LinkedIn and Other Social Media Tools Brian White, College Relations Manager, Payless ShoeSource Sara Clayton, Assistant Director,
How To Protect Your Privacy and Avoid Identity Theft Online.
Top Objectives: 1.Increase web traffic and exposure 2.Become definitive authority on Coffee 3.Increase sales to coffee centric Food Service Operators 4.Engage.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Electronic Portfolios DIGITAL CITIZENSHIP & THE CREATION OF E-PORTFOLIOS.
How To Protect Your Privacy and Avoid Identity Theft Online.
A Case Study in Success Online How to generate revenue through content marketing.
FlipFlop PD June 12, 2012 Stephanie Dixon, EBRPSS What’s in Your Digital Dossier?
Creating an Online Professional Presence Using Social Media.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Use and Regulation of Social Media April 5, 2011 – Destin, Florida.
PRIVACY BOOTCAMP YpJU.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Internet Skills The World Wide Web (Web) consists of billions of interconnected pages of information from a wide variety of sources. In this section: Web.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
OCLC Online Computer Library Center 1 Social Media and Advocacy.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Digital CitizenshipDigital Citizenship By Pinsinee Mekpanuwat (pin) Smita Jirayingcharoen (mudmee)
May 24, 2015 Scottsdale AZ Use Social Media to Enhance Employability and Communication.
Online Safety Parent Workshop Helping to keep your children safe online.
Text Stephanie Ciccarelli Marketing on Social Networks.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Cyber Safety Jamie Salazar.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Digital Marketing For Small Business Today’s Topic: Social Media Marketing.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
Brand building utilizing online profiles. Online IdentityOnline Identity.
Sarah Manuel Final Presentation MCO435-Social Media.
A consistent social media presence is key to a good SEO strategy. Create engaging content that will encourage people to share. Encourage sharing on your.
Technological Awareness for Teens and Young Adults.
13 Social Media and Networking. Introduction Social Media Types of Social Media Benefits and Challenges Measuring Social Media Performance.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Digital Footprint.
Christian Citizenship in a Digital World Lesson 2: Personal Identity: Your brand and reputation Your brand and reputation.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Creating Safe Environments Volunteers and Members Learning and Communicating via the Internet.
What does your digital footprint say about you?
Digital Citizenship.
Information Security.
Social Media: What You Should Know
Digital Citizenship.
Digital $$ Quiz Test your knowledge.
Digital Citizenship EIT, Author Gay Robertson, 2017.
Caryn Brown BNI – Centers of Influence 8 August 2013
ICT Communications Lesson 3: Internet Life and Privacy
Digital Citizenship.
THANK YOU TO OUR PARTNERS
Digital Citizenship.
Digital Identity Digital Identity is the concept of adopting an online presence or networked identity in cyberspace by an individual or an organization.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Managing Your Digital Footprint Shauna Cox 2012 National BDPA Technology Conference August 1 – 4, 2012 Baltimore, MD

2 Purpose and Objectives Discuss considerations for protecting sensitive information. Understand ways to leverage electronic assets to benefit your “digital profile”. Understand strategies for managing your online reputation.

3 Agenda I.What is a digital footprint? II.Strategies for protecting information III.Leveraging your footprint for personal branding IV.Action plan for post-session V.Questions

4 Session Structure Part 1: Risks & Protection Part 2: Personal Branding

5 What is a digital footprint? Data trail produced by activities in cyberspace Content generated by online action

6 Components of Digital Footprint Communications Social Media Profiles Online transactions Web surfing activity Cell phone / Smart Phone tracks

7 Examples of Digital Footprint Content Blogs s Photos Text Messages Sites Visited Videos Social Networking Posts Phone Activity Tablet Activity

8 Most large cities have surveillance cameras. 1 out of every 5 passwords are simple and easy to guess Hackers typically take less than 4 minutes to enter a system Some experts estimate Internet crime costs $1 trillion / year Over a 2-year period (2007 – 2009) identity theft incidents rose by 37% “You already have zero privacy. Get over it.” Scott McNealy former CEO Sun Microsystems Source: Online Privacy by Stephen Currie

9 Risks Fraud Victimization Identity Theft Poor Reputation Harassment Invasion of Privacy

10 Managing Risk Stay current on privacy policies Use appropriate authentication standards Avoid using debit cards for online transactions Limit credit card use online (e.g., low limit cards, gift cards or prepaid credit cards) Beware of social engineering techniques Educate yourself on how data is used

11 Rules of Engagement Separate business & personal cyber activities Utilize strong passwords and PIN numbers {Example: Iluv3ewe} Utilize encryption where appropriate Assume no “expectation of privacy” Utilize built-in privacy settings (but do not assume 100% protection)

12 Rules of Engagement Reveal information on a “need to know” basis Never reveal private information in a public place Execute consumer transactions cautiously Properly discard electronic equipment (e.g., cell phones, computers, etc.) Utilize different passwords for different purposes

13 Personal Branding Personal image Self presentation Definition: “…a promise to a…well defined audience, combined with the actual experience these individuals have with the brand [you].” Source: Managing Brand You by Jerry S. Wilson & Ira Blumenthal

14 Digital Profile  Personal Branding Digital Profile Collection of cyber tools used to present you One component of personal brand Key to building online reputation

15 Digital Profile Tools LinkedIn Facebook Google+ Twitter Pinterest YouTube Blogs Personal Web Site Professional Organizations (e.g., online profiles)

16 Building a Digital Profile Tips Determine your digital identity and learn your niche. Complete your profiles based on your personal brand. Encourage endorsements. Be judicious in what networks you join. Leverage others’ digital profiles.

17 Rules of Engagement Separate business & personal profiles Utilize built-in privacy settings Limit sharing easily exploitable PII (e.g., birth dates) Assume your digital profile is permanent Make your online brand consistent with your offline brand Assume all online information is accessible

18 Rules of Engagement Keep online communications positive Present yourself professionally Use proper grammar, etc. Clear visuals Monitor your digital profile

19 Managing Your Digital Profile Set regular time intervals to monitor & clean up inaccurate information Set time aside to optimize your profile Use automated tools to monitor your profile Use search optimization techniques

20 Inaccurate or Unflattering Information 1.Ask posting party to remove the information 2.If removal does not occur, dispute information publicly (if appropriate) 3.Engage “reputation” specialist 4.Optimize profile / reputation with positive information 5.Execute legal recourse if necessary

21 What’s Next? (Action Plan) Review your existing footprint Determine what you want your digital profile to be (Prioritize components) Build / Optimize your profile Develop profile management / monitoring strategy

22 Reality Many employers / potential employers check online information Clients, potential clients, colleagues, etc. check digital profiles Laws / legislative environment typically trail the advancement of technology Everyone has or will have some interaction in cyberspace

23 Questions

24 Contact Information Shauna Cox Chicago Housing Authority

25 Resources Books Managing Your Digital Footprint by Stephen Currie Online Privacy by Robert Grayson How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace by Frank Ahearn Social Networking for Career Success by Miriam Salpeter Web Sites / Organizations Privacy Rights Clearinghouse ( ACLU ( Electronic Privacy Information Center (epic.org) Federal Trade Commission (