2. Risks
• Impact in jobs and school.
• Effect in family, friends, opportunities.
• Identity theft.
• Cyber-bullying.
• Loss of privacy.
• Stalking.
• Can’t be taken back.
3. Examples
1. Comment
2. Video
3. Photo
4. Tweet
5. Post
4. 1. Comment
“I am sorry I said I love Fidel Castro."
- Ozzie Guillen
9. Example 3 – Email
“I regret the harm that my actions
have caused my family, my staff and
my constituents."
- Christopher Lee
10. Example 4 – Tweeter
Connor Riley, 22
A Cisco employee responded: “Who is the hiring manager?
I’m sure they would love to know that you will hate the
work. We here at Cisco are versed in the Web.”
11. Example 5 – Youtube
Pittsburgh
• Police caught
thieves that
stole thousands
of dollars in
cash and goods.
• They posed
with their loot.
12. Example 6 – Facebook
• An employee called out sick from work, claiming
that "she could not work in front of a computer
as she needed to lie in the dark.“
• When she was discovered to be surfing Facebook
from home, she was terminated.
13. Why It Happens
Inattention
• People post for friends; forget others may information.
• Mistakenly believe page will have relative privacy.
• Few have installed software to remotely wipe the
device if it is lost or stolen.
• Social media users don’t know how to protect their
privacy.
14. Why It Happens (cont’d)
Technology
• Easier to post: phones, iPad, free WiFi
• Internet provides a sense of anonymity.
• Lack of physical interaction provides false sense of
security.
• No “friending” is needed to gain access.
• Interlinked pages, blogs, news, tweets are all visible to
anyone and everyone.
• The beauty of the Web is that it is open, and anyone
can crawl it.
15. Why It Happens (cont’d)
Badness
• Scammers
• Many websites share / sell private data
• Envy
• Drugs
Human Nature
• Grudges
• Jealousy
• Impulsive
• Peer pressure
16. Conclusion
• Removing information is like removing an
unwanted tattoo.
• It is better to avoid the tattoo in the first place
than to try to remove it later.
• There are no guarantees that you can even
remove it completely.
• The only way is to prevent it from ever
showing up.
17. “Golden Rule”
“In Social Media, don’t
post, send, email, upload, attach, record
anything you would not want
your spouse, boss or a police officer
to see.”
18. Suggestions
1. Use Social Media to promote yourself personally and
professionally.
2. Don’t surrender to peer pressure.
3. Learn to use privacy features.
4. Be alert against phishing scams.
5. Be wary of publishing any identifying information:
– Pick a user name that doesn’t include any personal
information.
– Set up a separate email account that doesn’t use your
real name.
– Use a ‘strong’ passwords.
6. Keep your profile closed. Only allow friends to view it.
Editor's Notes
Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!
Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!
Criminals can use information provided about a person’s birthday, location, routine, hobbies, and interests to impersonate a trusted friend or convince the unsuspecting that they have the authority to access personal or financial data. They can even use such info to guess your account passwords—which is why you should never have a password that uses the name of your pet, favorite band, hobby, birthday, or something else easily known about you. And stalkers will really appreciate your help if you post your daily routine and whereabouts online!