Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Digital footprints & reputation management plan


Published on

Digital Footprints & Online Reputation Management Plan for BSU EDTECH 543.

Published in: Education
  • Ben, I really like the breadcrumb metaphor. That's a great way to describe the digital detritus we leave behind. I hadn't even thought about IP addresses or uploaded files & videos! I almost included owning my name as a domain (i.e. because it was recommended on several sites, but I decided against it for the reason that it really wasn't something I was going to do in the near future. I think your point about avoiding engaging “trolls” is great advice. Don't feed the trolls! Your security advice is also well taken, especially remembering to log out of every web session if you are on a public computer.
    Are you sure you want to  Yes  No
    Your message goes here
  • Ben -
    You made a great point about double checking posts. I saw a few examples this weekend where people posted their frustrations with the Razorbacks as the moderator of a corporate account instead of on their personal account. Voice is really important too. Your plan is very well thought out and professionally presented. Excellent job! Shelly
    Are you sure you want to  Yes  No
    Your message goes here
  • Ben, I really like your slide on establishing your subject matter expertise. In creating a positive, professional profile, this expertise is going to become very important. I also liked your tip on avoiding public computers and Wi-Fi. I know so many people who have fallen prey to public and unsecured Wi-Fi connections. Great job!
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Digital footprints & reputation management plan

  1. 1. Ben MooreEDTECH 543October 1, 2012
  2. 2. And why they are important
  3. 3. • Electronic crumbs left behind during online activity • IP Address of machines accessing/posting content • Usernames/Handles • Blog posts • Posted web content • Discussion topic posts/replies • Emails • Uploaded files & videos
  4. 4. Doing it right is easier then undoing it all!
  5. 5. Social media My Plan• Website • Separate business page• Blog whenever possible.• Facebook Maintain business circles and verify content• Google+ matches. Avoid cross• Twitter posting personal &• Tumblr business material.• Instagram • Double check post & destination to avoid contamination and brand damage.
  6. 6. • By maintaining separate business & personal accounts and ensuring that appropriate content is posted to the proper pages I control my business and personal messaging.• By controlling the content that I provide I am able to maintain a professional business image to clients and general public.• I monitor posted content (internal & external) to maintain control of my brand and image.• Through strict permission controls and account management I am able to post personal content or images to family and friends that is unavailable to those outside the intended audience.
  7. 7. • My domain names are owned and controlled directly, as is my web hosting, ensuring immediate and perpetual access that is not tied to a specific company.• Posted content and pages identify me, the company, the service that is being provided to ensure I am found.• Dedicated specific time to update content to reflect vibrant, thriving activity.• Avoid engaging “trolls”, it is almost impossible to win an online argument. Address mistakes as needed but avoid online shouting matches.
  8. 8. Be the same you as often as possible!
  9. 9. Online Persona My Plan• Websites • Strive to utilize the same• Blogs username or handle• Social Media across all platforms possible.• Message Boards • Register with the same• Online Forums business information (email) to provide continuity across sites. • Stay on message and in character when engaging
  10. 10. • Since it is unfortunately impossible to ensure that I will have access to the same username on every possible site I create as self descriptive and unique a name as possible.• If the same (or similar) username is unavailable, register with the same business related contact information across all sites to verify identity and ownership.
  11. 11. • When posting content or responding online I take my time and review materials prior to submission to both protect against inappropriate material and to post in my “business voice”.• Whenever possible, cross posting content and referencing materials (when appropriate) that I previously shared establishes my subject matter expertise.
  12. 12. Always protect your valuables!
  13. 13. • Follow best practices by maintaining a secure computing lifestyle. • Avoid free/open WIFI hot spots • Avoid public computers • Log out of every web session before closing the browser • Maintain anti-virus/anti-spyware at all times • Avoid questionable web content & phishing email• To further protect my online identity I post all content myself rather than delegating to an assistant or third party.
  14. 14. • Once content is posted online, it is almost impossible to remove all traces of it’s existence. The adage measure twice, cut once absolutely applies… Think twice, post once.
  15. 15. • Creating a successful, meaningful, relevant, and respected online identity requires planning, strategy, and dedication.• I will be aware of my digital surroundings and the audience, I have an unlimited amount of time to think through the content prior to posting.• I will utilize established best practices to avoid compromising myself, my work, and my reputation online by reducing the risk of unauthorized access to my content.• I will engage with your users and take part in the
  16. 16. • Roth, C. (2012) Four Steps to Managing Your Online Reputation. Retrieved from _b_1532639.html• Kawasaki, G (2011) How To Start Managing Your Online Reputation. Retrieved from reputation• Kessler, S. (2011) How To: Manage Your Online Reputation Using SEO. Retrieved from• Wallen, J. (2012) Five Tools to Monitor and Manage Your Online Reputation. Retrieved from your-_b_1532639.html• Warden, C (2012) Using Social Media to Manage Your Online Reputation. Retrieved from to-manage-your-online-reputation/