Thinking about your online presence (Digital Dates, University of Leeds)

Post on 29-Jan-2015

104 views 2 download

Tags:

description

This presentation was used during the "Thinking about your online presence" Digital Dates event for staff and students at the University of Leeds on Thursday 20/03/14. It is based upon the "Your Digital Identity" session which I facilitate for colleagues at the University.

Transcript of Thinking about your online presence (Digital Dates, University of Leeds)

By the end of the session you will be better able to:

1. Manage your online presence

2. Recognise the benefits and challenges of managing personal and professional digital identities

3. Recognise the key issues relating to managing your online presence including public digital communications, online safety and privacy

Outcomes

Make informed choices about your digital identity and use of the web

1. Digital identity is…

2. Personal VS Professional

3. Managing your identity

Outline

1. Digital identity is…

‘Digital identity can be defined as all the online information and data specifically about an individual.’

(Last accessed 26/06/13 at: http://distance.uvic.ca/students/identity.htm)

Your Digital Identity

Creating an account on the social web is a choice.

Having a digital identity is not.

We all have a digital footprint.

Your digital identity = everything about you

on the webVerified / non-verified

– both important

What else are you sharing?

WHOIS databaseLocation servicesSocial media privacyMobile device security

How do you verify who you are talking to online? How do others verify you?

Who manages your digital identity?

This was posted on Twitter during a recent conference presentation #NoEscape

Some companies create profiles for

us using public information on the web – inaccurate

and merging identities.

You can manage your digital identity, you cannot control it

2. Personal VS Professional

“Don’t say (or do) anything you wouldn’t on 5 Live.”Rory Cellan-Jones

Social media = public

Separate personal and professional, makes each presence more useful to your networks

You’re not anonymous on social media – dangerous to think you are

Impact of liking, re-tweeting

Click the video to watch

Email

Do you use the same e-mail address to manage all your social media accounts?

Are you merging personal, professional and institutional social profiles?

Social media sites encourage us to integrate our email address book – your email contacts will find you, whether you want to be found or not.

http://news.uk.msn.com/uk/twitter-trolls-u-turn-after-users-threaten-to-tell-his-mum

Case: Lord McAlpine falsely accused Alleged offence: Libel

Case: Twitter users name victim of rape by footballer Ched EvansOffence: The Sexual Offences (Amendment) Act 1992

Case: Social media users circulated alleged pictures of child killer Jon VenablesAlleged offence: Contempt of Court

http://www.bbc.co.uk/news/magazine-20782257

Case: Juror Joanne Fraill contact defendant in trial by FacebookOffence: Contempt of Court

Case: Paul Chambers joked on Twitter that he would blow up Robin Hood AirportOffence: Sending a “menacing electronic communication” under the 2003 Communications Act

Case: Reading man Sean Duff mocks dead children on social media sitesOffence: Making “grossly offensive” comments under the Malicious Communications Act 1988

http://www.bbc.co.uk/news/magazine-20782257

3. Managing your identity

University Guidance

Are you feeling lucky?

Start thinking like a search engine – be the top of your own search results.

Use Google Alerts to keep updated on what others are saying about you (your work, project etc) on the web. It won’t search everything, but can assist in managing your digital identity.

accidentaloutlaw.knowthenet.org.uk

Existing laws apply online as they do offline – new Defamation Act 2013 (good news). BBC Defamation article

Only share information when you have permission and obtain permission to publish someone else’s work

Avoid making comments and being supportive of the comments or actions of others, if they could get you in trouble.

Everything shared on social media, regardless of privacy settings can be captured.

Educate your social network – your “private” Facebook Timeline is only as secure as the devices you/your Facebook “friends” use.

Put simply…think first, share second

Think about security1. Use official mobile apps and trusted third-party apps – check reviews.

2. Location services – what else are you sharing with the world?

3. Are your mobile devices secure? What information are you giving away if your device is lost/stolen? Is your device set up for remote wiping?

4. A service or App might be secure, your internet access might not be – think about what you do/where you do it – public Wi-Fi can be dangerous.

5. Do you need to remain logged into all apps at all times? Think about your web history too.

6. Be wary of hackers, account cloning, phishing scams, rogue links.

7. Unused accounts at risk – monitor or close | consider strong password security.

Keep updated

about online safety

and the law

www.socialmedialaw.co.uk www.thatsnonsense.com/