Post on 18-Jan-2016
description
Safe and Responsible Social Safe and Responsible Social NetworkingNetworking
Stephanie Lister Brent HowardAssistant U.S. Attorney, ED of WA North East Washington ESD 101Computer Crime & Intellectual Property Section Technology Specialist
AGENDAAGENDA
Social Networking and Your Digital Social Networking and Your Digital DossierDossier
How to Avoid: How to Avoid: Career PitfallsCareer PitfallsOnline PredatorsOnline PredatorsIdentity Theft (P2P) Identity Theft (P2P) Viruses & SpywareViruses & Spyware
Social NetworkingSocial Networking
Digital DossierDigital Dossier
How Do You Contribute to How Do You Contribute to Your Digital Dossier?Your Digital Dossier?
Social Networking Social Networking Creating & Creating & Collaborating Collaborating Online Online
Other Thoughts?Other Thoughts?
By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing.
You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.
How Might Others How Might Others Contribute to Your Digital Contribute to Your Digital
Dossier?Dossier?
33,139,666 Views (10/27/09)
What are Possible What are Possible Consequences of the Consequences of the
Content That Makes Up Content That Makes Up Your Digital Dossier? Your Digital Dossier?
Career Pitfalls…Career Pitfalls…The Future is in YOUR The Future is in YOUR
Hands!Hands!
One in five employers search social One in five employers search social networking sites before hiringnetworking sites before hiring
One-third of those said they found One-third of those said they found information that caused them to toss out information that caused them to toss out potential candidatespotential candidates
Universities and colleges are also searching Universities and colleges are also searching sites when reviewing applicationssites when reviewing applications
Many teachers, administrators, and coaches Many teachers, administrators, and coaches are also reviewing these sitesare also reviewing these sites
Who is Looking at Your Digital Dossier?
Who Else Might Be Who Else Might Be Looking at Your Digital Looking at Your Digital Profile?Profile?
Who Have You “Friended” Who Have You “Friended” Lately?Lately?
“Yeah baby, I’m 6’1, tan,
fit, washboard abs…”
How Can You Find How Can You Find Out What Is In Your Out What Is In Your Digital Profile?Digital Profile?
Safety Tips for Safe Safety Tips for Safe and Responsible and Responsible
Social NetworkingSocial Networking
Protect Your Privacy & Protect Your Privacy & ReputationReputation
Use the privacy protection features to limit Use the privacy protection features to limit who can view your profile.who can view your profile.
But remember private does not mean But remember private does not mean PRIVATE.PRIVATE.
Private = Limited Access!
Even if you use privacy protection Even if you use privacy protection features, don’t post material that features, don’t post material that
could…could…
Allow a stranger to find you in Real LifeAllow a stranger to find you in Real Life
Attract a dangerous strangerAttract a dangerous stranger
Be used by a cyber-bully to torment youBe used by a cyber-bully to torment you
Damage your reputation, friendships, or Damage your reputation, friendships, or future opportunitiesfuture opportunities
Cause harm or distress to another by Cause harm or distress to another by contributing to others “digital dossier” contributing to others “digital dossier”
Protect Your PrivacyProtect Your Privacy
If someone posts inappropriate If someone posts inappropriate material about you on their profile, material about you on their profile, demand that it be removed. If not, demand that it be removed. If not, tell a trusted adult or file a complaint.tell a trusted adult or file a complaint.
Recognize that personality quizzes Recognize that personality quizzes and contests are techniques to obtain and contests are techniques to obtain your personal information for your personal information for advertising.advertising.
Be SelectiveBe SelectiveBe selective about who you add as Be selective about who you add as
friendsfriends
Block anyone who…Block anyone who… Communicates rudelyCommunicates rudely Sends “overly friendly” messagesSends “overly friendly” messages Wants to talk about sexWants to talk about sex Does not fit your valuesDoes not fit your values
File a complaint if you receive harmful File a complaint if you receive harmful communications with social networking communications with social networking provider or cybertipline.comprovider or cybertipline.com
Safe and Responsible Safe and Responsible ComputingComputing
Identify Theft-P2PIdentify Theft-P2P
Identify Theft: The P2P Identify Theft: The P2P ProblemProblem
P2P Example: LimewireP2P Example: Limewire
How do sensitive files get How do sensitive files get exposed?exposed?
My Documents = Shared Folder
Music
Movies
Corporate Files
Personal Files
PC
Network Drive
P2P file sharing programs “index” PC and Network Drives and expose them to anyone with access to the WW P2P
Files are shared Files are shared unintentionallyunintentionally
“Though it appears that filesharing has been
disabled for all folders by clicking on
the “Deselect All” button, the program
continues to surreptitiously share
the Downloads folder”
P2P-Ways to Protect P2P-Ways to Protect YourselfYourself
Be careful about what “permissions” Be careful about what “permissions” you have set up.you have set up.
Avoid sharing your own files and say no Avoid sharing your own files and say no to any offers to install such software.to any offers to install such software.
Even then, there is no guarantee you Even then, there is no guarantee you will not experience problems as a will not experience problems as a result of having the software on your result of having the software on your computer.computer.
Viruses & Viruses & SpywareSpyware
P2P downloads can result in P2P downloads can result in viruses & spyware-BotNetsviruses & spyware-BotNets
Be careful of game cheat Be careful of game cheat sitessites
Use Anti-Virus Software and Use Anti-Virus Software and keep updates current!keep updates current!
ConclusionConclusion
Keep Your Life In Keep Your Life In BalanceBalance
Communicating with Communicating with friends online can friends online can strengthen your strengthen your friendships, but make friendships, but make sure you also spend time sure you also spend time with your friends in Real with your friends in Real Life.Life.
Be a LeaderBe a LeaderIf you see someone who is If you see someone who is makingmakingbad choices or is in danger….bad choices or is in danger….
Talk with the person about your Talk with the person about your concerns.concerns.
Be a model for positive and Be a model for positive and productive online choices.productive online choices.
Questions?Questions?