2012 National BDPA TechnologyConferenceManaging Your Digital Footprint                    Shauna Cox                 Augus...
Purpose and Objectives   •   Discuss considerations for       protecting sensitive       information.   •   Understand way...
AgendaI. What is a digital footprint?II. Strategies for protecting     informationIII. Leveraging your footprint for     p...
Session StructurePart 1: Risks & ProtectionPart 2: Personal Branding                             4
What is a digital footprint?• Data trail produced by activities in  cyberspace• Content generated by online action        ...
Components of Digital Footprint•   Email Communications•   Social Media Profiles•   Online transactions•   Web surfing act...
Examples of Digital Footprint Content                                                      Text                Photos     ...
“You already have zero privacy. Get over it.”                          •   Most large cities have surveillance         Sco...
Risks•   Fraud Victimization•   Identity Theft•   Poor Reputation•   Harassment•   Invasion of Privacy                    ...
Managing Risk• Stay current on privacy policies• Use appropriate authentication  standards• Avoid using debit cards for on...
Rules of Engagement• Separate business & personal  cyber activities• Utilize strong passwords and PIN  numbers {Example: I...
Rules of Engagement• Reveal information on a “need to  know” basis• Never reveal private information in a  public place• E...
Personal Branding             • Personal image             • Self presentationDefinition:“…a promise to a…well defined aud...
Digital Profile  Personal BrandingDigital Profile•Collection of cyber tools used topresent you•One component of personal ...
Digital Profile Tools•   LinkedIn             •   YouTube•   Facebook             •   Blogs•   Google+              •   Pe...
Building a Digital Profile Tips• Determine your digital identity and learn  your niche.• Complete your profiles based on y...
Rules of Engagement• Separate business & personal profiles• Utilize built-in privacy settings• Limit sharing easily exploi...
Rules of Engagement• Keep online communications  positive• Present yourself professionally  •   Use proper grammar, etc.  ...
Managing Your Digital Profile• Set regular time intervals to  monitor & clean up  inaccurate information• Set time aside t...
Inaccurate or Unflattering Information1. Ask posting party to remove the information2. If removal does not occur, dispute ...
What’s Next? (Action Plan)• Review your existing footprint• Determine what you want your digital  profile to be (Prioritiz...
Reality• Many employers / potential employers  check online information• Clients, potential clients, colleagues, etc.  che...
Questions            23
Contact Information        Shauna Cox Chicago Housing Authoritys_cox_tech2011@yahoo.com                             24
Resources Books• Managing Your Digital Footprint by Stephen Currie• Online Privacy by Robert Grayson• How to Disappear: Er...
Upcoming SlideShare
Loading in …5
×

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation

724 views

Published on

2012 National BDPA Technology Conference

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
724
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation

  1. 1. 2012 National BDPA TechnologyConferenceManaging Your Digital Footprint Shauna Cox August 1 – 4, 2012 Baltimore, MD
  2. 2. Purpose and Objectives • Discuss considerations for protecting sensitive information. • Understand ways to leverage electronic assets to benefit your “digital profile”. • Understand strategies for managing your online reputation. 2
  3. 3. AgendaI. What is a digital footprint?II. Strategies for protecting informationIII. Leveraging your footprint for personal brandingIV. Action plan for post-sessionV. Questions 3
  4. 4. Session StructurePart 1: Risks & ProtectionPart 2: Personal Branding 4
  5. 5. What is a digital footprint?• Data trail produced by activities in cyberspace• Content generated by online action 5
  6. 6. Components of Digital Footprint• Email Communications• Social Media Profiles• Online transactions• Web surfing activity• Cell phone / Smart Phone tracks 6
  7. 7. Examples of Digital Footprint Content Text Photos E-mails Messages SocialNetworkin g Posts Videos Sites Blogs Visited Phone Activity Tablet Activity 7
  8. 8. “You already have zero privacy. Get over it.” • Most large cities have surveillance Scott McNealy cameras. former CEO Sun Microsystems • 1 out of every 5 passwords are simple and easy to guess • Hackers typically take less than 4 minutes to enter a system • Some experts estimate Internet crime costs Americans @ $1 trillion / year • Over a 2-year period (2007 – 2009) identity theft incidents rose by 37% Source: Online Privacy by Stephen Currie 8
  9. 9. Risks• Fraud Victimization• Identity Theft• Poor Reputation• Harassment• Invasion of Privacy 9
  10. 10. Managing Risk• Stay current on privacy policies• Use appropriate authentication standards• Avoid using debit cards for online transactions• Limit credit card use online (e.g., low limit cards, gift cards or prepaid credit cards)• Beware of social engineering techniques• Educate yourself on how data is used 10
  11. 11. Rules of Engagement• Separate business & personal cyber activities• Utilize strong passwords and PIN numbers {Example: Iluv3ewe}• Utilize encryption where appropriate• Assume no “expectation of privacy”• Utilize built-in privacy settings (but do not assume 100% protection) 11
  12. 12. Rules of Engagement• Reveal information on a “need to know” basis• Never reveal private information in a public place• Execute consumer transactions cautiously• Properly discard electronic equipment (e.g., cell phones, computers, etc.)• Utilize different passwords for different purposes 12
  13. 13. Personal Branding • Personal image • Self presentationDefinition:“…a promise to a…well defined audience,combined with the actual experience theseindividuals have with the brand [you].” Source: Managing BrandYou by Jerry S. Wilson & IraBlumenthal 13
  14. 14. Digital Profile  Personal BrandingDigital Profile•Collection of cyber tools used topresent you•One component of personal brand•Key to building online reputation 14
  15. 15. Digital Profile Tools• LinkedIn • YouTube• Facebook • Blogs• Google+ • Personal Web Site• Twitter • Professional• Pinterest Organizations (e.g., online profiles) 15
  16. 16. Building a Digital Profile Tips• Determine your digital identity and learn your niche.• Complete your profiles based on your personal brand.• Encourage endorsements.• Be judicious in what networks you join.• Leverage others’ digital profiles. 16
  17. 17. Rules of Engagement• Separate business & personal profiles• Utilize built-in privacy settings• Limit sharing easily exploitable PII (e.g., birth dates)• Assume your digital profile is permanent• Make your online brand consistent with your offline brand• Assume all online information is accessible 17
  18. 18. Rules of Engagement• Keep online communications positive• Present yourself professionally • Use proper grammar, etc. • Clear visuals• Monitor your digital profile 18
  19. 19. Managing Your Digital Profile• Set regular time intervals to monitor & clean up inaccurate information• Set time aside to optimize your profile• Use automated tools to monitor your profile• Use search optimization techniques 19
  20. 20. Inaccurate or Unflattering Information1. Ask posting party to remove the information2. If removal does not occur, dispute information publicly (if appropriate)3. Engage “reputation” specialist4. Optimize profile / reputation with positive information5. Execute legal recourse if necessary 20
  21. 21. What’s Next? (Action Plan)• Review your existing footprint• Determine what you want your digital profile to be (Prioritize components)• Build / Optimize your profile• Develop profile management / monitoring strategy 21
  22. 22. Reality• Many employers / potential employers check online information• Clients, potential clients, colleagues, etc. check digital profiles• Laws / legislative environment typically trail the advancement of technology• Everyone has or will have some interaction in cyberspace 22
  23. 23. Questions 23
  24. 24. Contact Information Shauna Cox Chicago Housing Authoritys_cox_tech2011@yahoo.com 24
  25. 25. Resources Books• Managing Your Digital Footprint by Stephen Currie• Online Privacy by Robert Grayson• How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace by Frank Ahearn• Social Networking for Career Success by Miriam SalpeterWeb Sites / Organizations• Privacy Rights Clearinghouse (www.privacyrights.org)• ACLU (www.aclu.org/technology-and-liberty/)• Electronic Privacy Information Center (epic.org)• Federal Trade Commission (www.ftc.gov) 25

×