1 / 31

Safe and Responsible Social Networking

Safe and Responsible Social Networking. Stephanie Lister Brent Howard Assistant U.S. Attorney, ED of WA North East Washington ESD 101 Computer Crime & Intellectual Property Section Technology Specialist. Social Networking and Your Digital Dossier How to Avoid: Career Pitfalls

rob
Télécharger la présentation

Safe and Responsible Social Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safe and Responsible Social Networking Stephanie Lister Brent Howard Assistant U.S. Attorney, ED of WA North East Washington ESD 101 Computer Crime & Intellectual Property Section Technology Specialist

  2. Social Networking and Your Digital Dossier How to Avoid: Career Pitfalls Online Predators Identity Theft (P2P) Viruses & Spyware AGENDA

  3. Social Networking

  4. Digital Dossier

  5. How Do You Contribute to Your Digital Dossier? • Social Networking • Creating & Collaborating Online • Other Thoughts?

  6. Facebook User Agreement By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire,however you acknowledge that the Company may retain archived copies of your User Content.

  7. How Might Others Contribute to Your Digital Dossier? 33,139,666 Views (10/27/09)

  8. What are Possible Consequences of the Content That Makes Up Your Digital Dossier?

  9. Career Pitfalls…The Future is in YOUR Hands! Who is Looking at Your Digital Dossier? • One in five employers search social networking sites before hiring • One-third of those said they found information that caused them to toss out potential candidates • Universities and colleges are also searching sites when reviewing applications • Many teachers, administrators, and coaches are also reviewing these sites

  10. Who Else Might Be Looking at Your Digital Profile?

  11. Who Have You “Friended” Lately? “Yeah baby, I’m 6’1, tan, fit, washboard abs…”

  12. How Can You Find Out What Is In Your Digital Profile?

  13. Safety Tips for Safe and Responsible Social Networking

  14. Protect Your Privacy & Reputation • Use the privacy protection features to limit who can view your profile. • But remember private does not mean PRIVATE. This profile is set to private. This user must add you as a friend to see his/her profile. view more Private = Limited Access!

  15. Even if you use privacy protection features, don’t post material that could… • Allow a stranger to find you in Real Life • Attract a dangerous stranger • Be used by a cyber-bully to torment you • Damage your reputation, friendships, or future opportunities • Cause harm or distress to another by contributing to others “digital dossier”

  16. Protect Your Privacy • If someone posts inappropriate material about you on their profile, demand that it be removed. If not, tell a trusted adult or file a complaint. • Recognize that personality quizzes and contests are techniques to obtain your personal information for advertising.

  17. Be Selective • Be selective about who you add as friends • Block anyone who… • Communicates rudely • Sends “overly friendly” messages • Wants to talk about sex • Does not fit your values • File a complaint if you receive harmful communications with social networking provider or cybertipline.com

  18. Safe and Responsible Computing

  19. Identify Theft-P2P

  20. Identify Theft: The P2P Problem

  21. P2P Example: Limewire

  22. Network Drive How do sensitive files get exposed? My Documents = Shared Folder • Music • Movies • Corporate Files • Personal Files PC P2P file sharing programs “index” PC and Network Drives and expose them to anyone with access to the WW P2P

  23. Files are shared unintentionally “Though it appears that filesharing has been disabled for all folders by clicking on the “Deselect All” button, the program continues to surreptitiously share the Downloads folder”

  24. P2P-Ways to Protect Yourself • Be careful about what “permissions” you have set up. • Avoid sharing your own files and say no to any offers to install such software. • Even then, there is no guarantee you will not experience problems as a result of having the software on your computer.

  25. Viruses & Spyware • P2P downloads can result in viruses & spyware-BotNets • Be careful of game cheat sites • Use Anti-Virus Software and keep updates current!

  26. Conclusion

  27. Keep Your Life In Balance Communicating with friends online can strengthen your friendships, but make sure you also spend time with your friends in Real Life.

  28. Be a Leader If you see someone who is makingbad choices or is in danger…. • Talk with the person about your concerns. • Be a model for positive and productive online choices.

  29. Questions?

More Related