Safe and Responsible Social Networking

Preview:

DESCRIPTION

Safe and Responsible Social Networking. Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WA North East Washington ESD 101 Computer Crime & Intellectual Property SectionTechnology Specialist. Social Networking and Your Digital Dossier How to Avoid: Career Pitfalls - PowerPoint PPT Presentation

Citation preview

Safe and Responsible Social Safe and Responsible Social NetworkingNetworking

Stephanie Lister Brent HowardAssistant U.S. Attorney, ED of WA North East Washington ESD 101Computer Crime & Intellectual Property Section Technology Specialist

AGENDAAGENDA

Social Networking and Your Digital Social Networking and Your Digital DossierDossier

How to Avoid: How to Avoid: Career PitfallsCareer PitfallsOnline PredatorsOnline PredatorsIdentity Theft (P2P) Identity Theft (P2P) Viruses & SpywareViruses & Spyware

Social NetworkingSocial Networking

Digital DossierDigital Dossier

How Do You Contribute to How Do You Contribute to Your Digital Dossier?Your Digital Dossier?

Social Networking Social Networking Creating & Creating & Collaborating Collaborating Online Online

Other Thoughts?Other Thoughts?

By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing.

You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.

How Might Others How Might Others Contribute to Your Digital Contribute to Your Digital

Dossier?Dossier?

33,139,666 Views (10/27/09)

What are Possible What are Possible Consequences of the Consequences of the

Content That Makes Up Content That Makes Up Your Digital Dossier? Your Digital Dossier?

Career Pitfalls…Career Pitfalls…The Future is in YOUR The Future is in YOUR

Hands!Hands!

One in five employers search social One in five employers search social networking sites before hiringnetworking sites before hiring

One-third of those said they found One-third of those said they found information that caused them to toss out information that caused them to toss out potential candidatespotential candidates

Universities and colleges are also searching Universities and colleges are also searching sites when reviewing applicationssites when reviewing applications

Many teachers, administrators, and coaches Many teachers, administrators, and coaches are also reviewing these sitesare also reviewing these sites

Who is Looking at Your Digital Dossier?

Who Else Might Be Who Else Might Be Looking at Your Digital Looking at Your Digital Profile?Profile?

Who Have You “Friended” Who Have You “Friended” Lately?Lately?

“Yeah baby, I’m 6’1, tan,

fit, washboard abs…”

How Can You Find How Can You Find Out What Is In Your Out What Is In Your Digital Profile?Digital Profile?

Safety Tips for Safe Safety Tips for Safe and Responsible and Responsible

Social NetworkingSocial Networking

Protect Your Privacy & Protect Your Privacy & ReputationReputation

Use the privacy protection features to limit Use the privacy protection features to limit who can view your profile.who can view your profile.

But remember private does not mean But remember private does not mean PRIVATE.PRIVATE.

Private = Limited Access!

Even if you use privacy protection Even if you use privacy protection features, don’t post material that features, don’t post material that

could…could…

Allow a stranger to find you in Real LifeAllow a stranger to find you in Real Life

Attract a dangerous strangerAttract a dangerous stranger

Be used by a cyber-bully to torment youBe used by a cyber-bully to torment you

Damage your reputation, friendships, or Damage your reputation, friendships, or future opportunitiesfuture opportunities

Cause harm or distress to another by Cause harm or distress to another by contributing to others “digital dossier” contributing to others “digital dossier”

Protect Your PrivacyProtect Your Privacy

If someone posts inappropriate If someone posts inappropriate material about you on their profile, material about you on their profile, demand that it be removed. If not, demand that it be removed. If not, tell a trusted adult or file a complaint.tell a trusted adult or file a complaint.

Recognize that personality quizzes Recognize that personality quizzes and contests are techniques to obtain and contests are techniques to obtain your personal information for your personal information for advertising.advertising.

Be SelectiveBe SelectiveBe selective about who you add as Be selective about who you add as

friendsfriends

Block anyone who…Block anyone who… Communicates rudelyCommunicates rudely Sends “overly friendly” messagesSends “overly friendly” messages Wants to talk about sexWants to talk about sex Does not fit your valuesDoes not fit your values

File a complaint if you receive harmful File a complaint if you receive harmful communications with social networking communications with social networking provider or cybertipline.comprovider or cybertipline.com

Safe and Responsible Safe and Responsible ComputingComputing

Identify Theft-P2PIdentify Theft-P2P

Identify Theft: The P2P Identify Theft: The P2P ProblemProblem

P2P Example: LimewireP2P Example: Limewire

How do sensitive files get How do sensitive files get exposed?exposed?

My Documents = Shared Folder

Music

Movies

Corporate Files

Personal Files

PC

Network Drive

P2P file sharing programs “index” PC and Network Drives and expose them to anyone with access to the WW P2P

Files are shared Files are shared unintentionallyunintentionally

“Though it appears that filesharing has been

disabled for all folders by clicking on

the “Deselect All” button, the program

continues to surreptitiously share

the Downloads folder”

P2P-Ways to Protect P2P-Ways to Protect YourselfYourself

Be careful about what “permissions” Be careful about what “permissions” you have set up.you have set up.

Avoid sharing your own files and say no Avoid sharing your own files and say no to any offers to install such software.to any offers to install such software.

Even then, there is no guarantee you Even then, there is no guarantee you will not experience problems as a will not experience problems as a result of having the software on your result of having the software on your computer.computer.

Viruses & Viruses & SpywareSpyware

P2P downloads can result in P2P downloads can result in viruses & spyware-BotNetsviruses & spyware-BotNets

Be careful of game cheat Be careful of game cheat sitessites

Use Anti-Virus Software and Use Anti-Virus Software and keep updates current!keep updates current!

ConclusionConclusion

Keep Your Life In Keep Your Life In BalanceBalance

Communicating with Communicating with friends online can friends online can strengthen your strengthen your friendships, but make friendships, but make sure you also spend time sure you also spend time with your friends in Real with your friends in Real Life.Life.

Be a LeaderBe a LeaderIf you see someone who is If you see someone who is makingmakingbad choices or is in danger….bad choices or is in danger….

Talk with the person about your Talk with the person about your concerns.concerns.

Be a model for positive and Be a model for positive and productive online choices.productive online choices.

Questions?Questions?

Recommended