Your SlideShare is downloading. ×
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation


Published on

2012 National BDPA Technology Conference

2012 National BDPA Technology Conference

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. 2012 National BDPA TechnologyConferenceManaging Your Digital Footprint Shauna Cox August 1 – 4, 2012 Baltimore, MD
  • 2. Purpose and Objectives • Discuss considerations for protecting sensitive information. • Understand ways to leverage electronic assets to benefit your “digital profile”. • Understand strategies for managing your online reputation. 2
  • 3. AgendaI. What is a digital footprint?II. Strategies for protecting informationIII. Leveraging your footprint for personal brandingIV. Action plan for post-sessionV. Questions 3
  • 4. Session StructurePart 1: Risks & ProtectionPart 2: Personal Branding 4
  • 5. What is a digital footprint?• Data trail produced by activities in cyberspace• Content generated by online action 5
  • 6. Components of Digital Footprint• Email Communications• Social Media Profiles• Online transactions• Web surfing activity• Cell phone / Smart Phone tracks 6
  • 7. Examples of Digital Footprint Content Text Photos E-mails Messages SocialNetworkin g Posts Videos Sites Blogs Visited Phone Activity Tablet Activity 7
  • 8. “You already have zero privacy. Get over it.” • Most large cities have surveillance Scott McNealy cameras. former CEO Sun Microsystems • 1 out of every 5 passwords are simple and easy to guess • Hackers typically take less than 4 minutes to enter a system • Some experts estimate Internet crime costs Americans @ $1 trillion / year • Over a 2-year period (2007 – 2009) identity theft incidents rose by 37% Source: Online Privacy by Stephen Currie 8
  • 9. Risks• Fraud Victimization• Identity Theft• Poor Reputation• Harassment• Invasion of Privacy 9
  • 10. Managing Risk• Stay current on privacy policies• Use appropriate authentication standards• Avoid using debit cards for online transactions• Limit credit card use online (e.g., low limit cards, gift cards or prepaid credit cards)• Beware of social engineering techniques• Educate yourself on how data is used 10
  • 11. Rules of Engagement• Separate business & personal cyber activities• Utilize strong passwords and PIN numbers {Example: Iluv3ewe}• Utilize encryption where appropriate• Assume no “expectation of privacy”• Utilize built-in privacy settings (but do not assume 100% protection) 11
  • 12. Rules of Engagement• Reveal information on a “need to know” basis• Never reveal private information in a public place• Execute consumer transactions cautiously• Properly discard electronic equipment (e.g., cell phones, computers, etc.)• Utilize different passwords for different purposes 12
  • 13. Personal Branding • Personal image • Self presentationDefinition:“…a promise to a…well defined audience,combined with the actual experience theseindividuals have with the brand [you].” Source: Managing BrandYou by Jerry S. Wilson & IraBlumenthal 13
  • 14. Digital Profile  Personal BrandingDigital Profile•Collection of cyber tools used topresent you•One component of personal brand•Key to building online reputation 14
  • 15. Digital Profile Tools• LinkedIn • YouTube• Facebook • Blogs• Google+ • Personal Web Site• Twitter • Professional• Pinterest Organizations (e.g., online profiles) 15
  • 16. Building a Digital Profile Tips• Determine your digital identity and learn your niche.• Complete your profiles based on your personal brand.• Encourage endorsements.• Be judicious in what networks you join.• Leverage others’ digital profiles. 16
  • 17. Rules of Engagement• Separate business & personal profiles• Utilize built-in privacy settings• Limit sharing easily exploitable PII (e.g., birth dates)• Assume your digital profile is permanent• Make your online brand consistent with your offline brand• Assume all online information is accessible 17
  • 18. Rules of Engagement• Keep online communications positive• Present yourself professionally • Use proper grammar, etc. • Clear visuals• Monitor your digital profile 18
  • 19. Managing Your Digital Profile• Set regular time intervals to monitor & clean up inaccurate information• Set time aside to optimize your profile• Use automated tools to monitor your profile• Use search optimization techniques 19
  • 20. Inaccurate or Unflattering Information1. Ask posting party to remove the information2. If removal does not occur, dispute information publicly (if appropriate)3. Engage “reputation” specialist4. Optimize profile / reputation with positive information5. Execute legal recourse if necessary 20
  • 21. What’s Next? (Action Plan)• Review your existing footprint• Determine what you want your digital profile to be (Prioritize components)• Build / Optimize your profile• Develop profile management / monitoring strategy 21
  • 22. Reality• Many employers / potential employers check online information• Clients, potential clients, colleagues, etc. check digital profiles• Laws / legislative environment typically trail the advancement of technology• Everyone has or will have some interaction in cyberspace 22
  • 23. Questions 23
  • 24. Contact Information Shauna Cox Chicago Housing 24
  • 25. Resources Books• Managing Your Digital Footprint by Stephen Currie• Online Privacy by Robert Grayson• How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace by Frank Ahearn• Social Networking for Career Success by Miriam SalpeterWeb Sites / Organizations• Privacy Rights Clearinghouse (• ACLU (• Electronic Privacy Information Center (• Federal Trade Commission ( 25