Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
SOCIAL MEDIA AND THE
FUTURE OF PRIVACY
By: SarahTipper, JuliaTytula, and Gursharan Singh Mahal
Social Networking Sites Selling
Information toThird Parties
Huffington Post, 2014
Introduction
• Some social media sites have started selling information about their users
to third parties.These third par...
Examples of Companies Selling Users
Information toThird Parties
• Facebook makes money by selling information about your f...
Cont’d
• Pinterest is legally allowed to sell names,
numbers, email addresses, and third parties
• LinkedIn has a new “Pro...
Facebook
• Facebook has released that they sell personal information to advertisers, developers and
partners
• Personal in...
Google
• Where does Google’s Money come From?
• Google made an estimated $36.5 billion through advertising in 2011
• How d...
Twitter
• Twitter sells promoted tweets to firms interested in learning more about
consumers
• Twitter generated $32 milli...
• LinkedIn sells information to its own users, offering to show them who’s
viewed their profile.
• This feature is called ...
Pinterest
• It is recorded in Pinterest’s privacy policy that users’ information can be sold.
• It is not known specifical...
• Tumblr sold all of its information toYahoo!
• Tumblr is a blog style website where users often feel it’s appropriate to
...
• YouTube has converted over to target marketing.
• This is controversial becauseYouTube has to sell information about wha...
Legality
• Before a user can access a social network, he or she must read and accept a
privacy policy.
• It is understood ...
How to ProtectYourself
• Avoid
• Full names when signing up for social media sites
• Using your everyday email account whe...
Implications
• Information found online has been used against people in court because legally law
enforcement is allowed t...
In Summary
• Large internet companies have been able and will continue to sell your personal
information online
• There ar...
References
Google is Evil. n.d. Evil Google logo. Retrieved from http://images.seroundtable.com/google-is-
evil-300x270-13...
References
Law. (2013). Gavel picture. Retrieved from http://www.everything- taxidermy.com/wp-
content/uploads/2013/05/law...
References
Nguyen, P. (2013). Social Media Privacy Policy LoopholesYou Need to Know About.
Hotspot Shield. Retrieved from ...
Government/PoliceTracking
Social Media Users
How our online privacy is non-existent
to the Government.
For years the Government has been spying on our online lives, invading our
privacy and taking our personal information.The...
Government Using Social Media to Spy on
People
• Section 5 (1) of the Privacy Act dictates that “a government institution ...
Government Using Social Media to Spy on
People
• Avner Levin, director of the Privacy and Cyber Crime Institute at Ryerson...
Our Privacy-TheTruth
• Interim privacy commissioner Chantal Bernier says "we are seeing evidence
that personal information...
FBI, DHS, Pentagon, Fed using social media for spying,
propaganda
http://youtu.be/fk49s_YGzHA
Online Police Investigations
With all the Social Media traffic, we as users are making it easier and easier for
the Police...
Arrests due to Secret Police Investigations
In the past few years multiple suspects have been caught in Collier County, Fl...
Reality of Law Enforcement and Social Media
With all the recent and growing social media activity, tracking down criminals...
Police Reaching Out to Social Media Users
Law enforcement officials are not only spying on us and looking through our
priv...
Law EnforcementViolate Laws to Get
Information
Though not all forms of obtaining information is done legally, even by law
...
Law EnforcementViolate Laws to Get
Information (continued)
• The NYDP even goes as far as using pictures of young women in...
Social Media Investigations Spreading
This is not only a growing issue in North America, using social media in order to
ca...
Social Media Being Used Positively
Yes, the government and law officials may be spying on us to gather information,
but it...
In Conclusion
Indeed the government may be spying on us, the police may be disobeying laws
to get to criminals, our privac...
Refrences
• http://www.cbc.ca/news/politics/government-snooping-on-social-media-may-breach-privacy-act-
1.2636905
• http:/...
Privacy and Jobs
Employers “googling” their future employees.
INTERNET
Internet is an interlink between different servers all around the world. The DNS-driven
World Wide Web, the overl...
SOCIAL MEDIA
Social media is users participating in social networking using websites and
applications to create or share c...
SOCIAL MEDIA MASKS OFF APPLICANT
HR of companies frequently go through applicant Social Networking profiles
What they are ...
What FaceBook checks provide employers
Facebook after all the privacy options available on social networking profiles stil...
What LinkedIn checks provide employers
LinkedIn shares employees one kind of bio data which allows them to connect to othe...
Photo sharing also have a story
In jobs related to photography, movie shooting, modelling photographer, etc. applicants
pr...
TechnicalAspects Standards
Different Blogs over the internet such as personal websites, WordPress,
Tumblr, Blogger etc. de...
What Employee Rights Restricts :
• Candidate’s Birthplace, ancestry, ethnic, place of origin
• Candidate Sex, sexual orien...
Employers Cyberbullying Employees
• Cyberbully is an aggressive, unethical and inappropriate sense of behavior
that happen...
The Past, Present, and Future of Employment
• Couple of decades ago, technology was not as commonly used as today, thus jo...
Privacy of Social Media
Most popular social media in today’s society are Facebook,Twitter, Google Plus,
LinkedIn,Tumblr, P...
How Employers should research
Be coherent. Employers should do social networking research to check all job
applicants for ...
EmployeeTips for safe social networking
Facebook,Twitter, Google+,YouTube, Pinterest, LinkedIn and other social networks h...
http://www.linkedin.com/today/post/article/20140418011645-949502-are-you-facing-
social-media-risks
http://www.businessins...
Upcoming SlideShare
Loading in …5
×

Social Media and the Future of Privacy

928 views

Published on

This presentation explains how social media is putting our future of privacy at risk.

Published in: Social Media
  • I made $2,600 with this. I already have 7 days with this... ◆◆◆ http://ishbv.com/surveys6/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Your opinions matter! get paid for them! click here for more info...♥♥♥ https://tinyurl.com/make2793amonth
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Social Media and the Future of Privacy

  1. 1. SOCIAL MEDIA AND THE FUTURE OF PRIVACY By: SarahTipper, JuliaTytula, and Gursharan Singh Mahal
  2. 2. Social Networking Sites Selling Information toThird Parties Huffington Post, 2014
  3. 3. Introduction • Some social media sites have started selling information about their users to third parties.These third parties take personal information that has been shared with users friends and families, and use it to try to advertise to specific people better.This may seem harmless, but knowing that your personal information is no longer personal at all can be quite frightening.
  4. 4. Examples of Companies Selling Users Information toThird Parties • Facebook makes money by selling information about your friends, hobbies, age, relationship status, etc. • Google uses information from Gmail’s, things you’ve searched, etc. to make money from advertisers • Twitter uses “tweets” to make a profit by selling the popular ones to advertisers • YouTube targets ads based on videos watch
  5. 5. Cont’d • Pinterest is legally allowed to sell names, numbers, email addresses, and third parties • LinkedIn has a new “Pro” option that charges users for a feature that tells them who has visited their page and what they thought of it • Tumblr has sold its users’ information toYahoo! Hendricks, 2014
  6. 6. Facebook • Facebook has released that they sell personal information to advertisers, developers and partners • Personal information posted on Facebook by users is being shared with millions of companies • When Facebook users “Like” something, information is given to advertisers http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using- you.html?pagewanted=all&_r=2& Facebook Logo Detail, n.d
  7. 7. Google • Where does Google’s Money come From? • Google made an estimated $36.5 billion through advertising in 2011 • How does Google make it’s money? • Google sells information from users anywhere from a Google search to information inside a Gmail http://www.techradar.com/news/internet/trusting-your-private-data-to-google-is-like-trusting- your-chickens-to-mr-fox-1173302 Google is Evil, n.d.
  8. 8. Twitter • Twitter sells promoted tweets to firms interested in learning more about consumers • Twitter generated $32 million licensing its data • Once firms have purchased information fromTwitter, they resell the data to analytics companies. http://business.time.com/2013/10/08/twitter-is-selling-access-to-your-tweets- for-millions/ EvilTwitter Logo, 2012
  9. 9. • LinkedIn sells information to its own users, offering to show them who’s viewed their profile. • This feature is called the “Pro” feature. • LinkedIn promotes its own privacy policy, that it has personally violated by selling information back to users. http://www.hive76.org/linkedin-is-selling-your-clicks-and-violating-its-own- privacy-policy Logo for Linkedin, 2013
  10. 10. Pinterest • It is recorded in Pinterest’s privacy policy that users’ information can be sold. • It is not known specifically what is sold • But the company is able to sell any information it collects, such as: • Names • Phone numbers • Email adresses • And more http://blog.hotspotshield.com/2013/06/25/social-media-privacy-concerns/
  11. 11. • Tumblr sold all of its information toYahoo! • Tumblr is a blog style website where users often feel it’s appropriate to share extremely personal information to their readers • Giving a magnitude of personal information to one of the internet’s largest corporations many are considering a huge breach in user privacy http://blog.hotspotshield.com/2013/06/25/social-media-privacy-concerns/ Logo forTumblr, n.d
  12. 12. • YouTube has converted over to target marketing. • This is controversial becauseYouTube has to sell information about what users are watching to companies to show Ads that directly targets each user’s interests. • Google has emphasized that this service is only done onYouTube. http://www.theguardian.com/media/2009/mar/11/googlethemedia-google YouTube
  13. 13. Legality • Before a user can access a social network, he or she must read and accept a privacy policy. • It is understood by social networks that most users neglect to read these policies • This allows for social networks to put controversial statements in their policies • This takes the legal responsibility away from social networks https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure- and-social#laws Law, 2013
  14. 14. How to ProtectYourself • Avoid • Full names when signing up for social media sites • Using your everyday email account when signing up for social media so that it won’t be spammed with junk mail • Using these social media sites all together if you are very concerned about your personal information being sold to larger companies Internet Security, n.d.
  15. 15. Implications • Information found online has been used against people in court because legally law enforcement is allowed to have full access to anything online • You may be turned down for credit or insurance because these companies have access to your online information • Users have no ability to know where their personal information has gone or where it is being stored
  16. 16. In Summary • Large internet companies have been able and will continue to sell your personal information online • There are many ways to protect yourself from these companies and keep your information personal • Ultimately the best thing to do is properly educate yourself on the user agreements before signing your life away
  17. 17. References Google is Evil. n.d. Evil Google logo. Retrieved from http://images.seroundtable.com/google-is- evil-300x270-1314103412.jpg Facebook Logo Detail. n.d. Facebook logo. Retrieved from http://www.underconsideration.com/bran dnew/archives/facebook_logo_detail.gif Huffington Post (2014). Social Media. Retrieved from http://images.huffingtonpost.com/2014-05- 06-socialmedia.jpg Hendricks, D. (2014). Social MediaTips. Retrieved from http://drewahendricks.com/wp- content/uploads/2014/06/social-media- tips.jpg EvilTwitter Logo. (2012).Twitter Bird with Horns. Retrieved from http://www.hyphenet.com/blog/wp-content/uploads/2012/11/twitter-bird- with-horns.png Logo for Linkedin. (2013). Linkedin Logo. Retrieved from http://www.nitahelpinghand.net/wp- content/uploads/2013/04/linkedin- logo.png Logo forTumblr. n.d.Tumblr Logo. Retrieved from http://upload.wikimedia.org/wikipedia/commons/2/2c/Tumblr_Logo.svg
  18. 18. References Law. (2013). Gavel picture. Retrieved from http://www.everything- taxidermy.com/wp- content/uploads/2013/05/law.jpg Internet Security. n.d. Lock and earth. Retrieved from http://3.bp.blogspot.com/- RVgH8LzKEW4/TsEH6FCpyXI/AAAAAAAAA A0/HzzfbqeAQN4/s1600/internetsecurity.png Andrews, L. (2012). Facebook is Using you. Sunday Review. Retrieved from http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using- you.html?pagewanted=all&_r=4& Luckerson,V. (2013). Twitter is Selling Access to yourTweets for Millions. Time. Retrieved from http://business.time.com/2013/10/08/twitter-is-selling- access-to-your-tweets-for-millions/ Marshall,G. (2013). Trusting your private data to Google is like trusting your chickens to Mr Fox. Techradar. Retrieved from http://www.techradar.com/news/internet/trusting-your- private-data-to- google-is-like-trusting-your-chickens-to-mr-fox-1173302 Jmil. (2012). LinkedIn is selling your clicks and violating its own Privacy Policy. Hive76. Retrieved from http://www.hive76.org/linkedin-is-selling-your-clicks-and- violating-its- own-privacy-policy
  19. 19. References Nguyen, P. (2013). Social Media Privacy Policy LoopholesYou Need to Know About. Hotspot Shield. Retrieved from http://blog.hotspotshield.com/2013/06/2 5/social- media-privacy-concerns/ Kiss, J. (2009). Google introduces targeted display ads on sites includingYouTube. Theguardian. Retrieved from http://www.theguardian.com/media/2009/m ar/11/googlethemedia-google (2014). Fact Sheet 35: Social Networking Privacy: How to be Safe, Secure and Social. Privacy Rights Clearinghouse. Retrieved from https://www.privacyrights.org/social- networking-privacy-how-be-safe-secure-and- social#laws
  20. 20. Government/PoliceTracking Social Media Users How our online privacy is non-existent to the Government.
  21. 21. For years the Government has been spying on our online lives, invading our privacy and taking our personal information.The police is using our daily feeds as evidence in cases, proof of our whereabouts, and digging up dirt on our personal lives. No need for permission, a reason, or a warrant, everything online is there for them to see. Everything you post on the internet thinking its safe and private, just chatting with friends, you where wrong!
  22. 22. Government Using Social Media to Spy on People • Section 5 (1) of the Privacy Act dictates that “a government institution shall, wherever possible, collect personal information that is intended to be used for an administrative purpose directly from the individual to whom it relates except where the individual authorizes otherwise or where personal information may be disclosed to the institution under subsection 8(2)”, which states that “a government institution shall inform any individual from whom the institution collects personal information about the individual of the purpose for which the information is being collected.”
  23. 23. Government Using Social Media to Spy on People • Avner Levin, director of the Privacy and Cyber Crime Institute at Ryerson University states that "Our government, as a liberal democracy, has to justify why it's collecting any kind of information” • When we post things on the internet and social media sites we are giving public access to our private live according to the government and they believe they should have just as much access to this information as everyone else. • David Christopher, a spokesman with OpenMedia, a community-based organization dedicated to protecting online rights, said "When we share on Facebook, we think we're sharing with our friends. We don't think we're sharing everything with some faceless government bureaucrat in Ottawa using our tax dollars to snoop on us“, “It could also be used for law enforcement or shared with other government departments”
  24. 24. Our Privacy-TheTruth • Interim privacy commissioner Chantal Bernier says "we are seeing evidence that personal information is being collected by government institutions from social media sites without regard for accuracy, currency and accountability.“ • In April of 2014 Bernier's office revealed that various government agencies have made almost 1.2 million requests for personal information about Canadians from Canada's major telecom companies, often without a warrant.
  25. 25. FBI, DHS, Pentagon, Fed using social media for spying, propaganda http://youtu.be/fk49s_YGzHA
  26. 26. Online Police Investigations With all the Social Media traffic, we as users are making it easier and easier for the Police to catch wanted suspects.With just a few clicks and searches, the police can find anything they want.We as social media users post updates, talk to friends, and post pictures and videos thinking its all private and just between friends. Little do we know, we have a few spies on our page. Though how can the law enforcement make sure they are getting credible information. Some people post things only to show off, of course, many people lie online, which can all lead to potential false arrests.
  27. 27. Arrests due to Secret Police Investigations In the past few years multiple suspects have been caught in Collier County, Florida, because of their social media activity. • 30-year-old Brandon Perry was arrested for battery in Collier County after he allegedly bragged about beating up his neighbor on hisTwitter page. • 27-year-old Hector Carrion for GrandTheft. Detectives he posted a picture of puppies for sale, proving he stole a pregnant pitbull and tried to sell her litter online. • 22-year-old Seth Runyon was on probation, making it illegal for him to have a firearm. Deputies arrested hi after he posted a picture of himself with a 9mm handgun on Facebook. And this is only the beginning, many of these people were not even suspected of a crime until they posted it on the internet. So now you may ask, how were they found?What made the police look them up? Does this mean everyone is being watched?
  28. 28. Reality of Law Enforcement and Social Media With all the recent and growing social media activity, tracking down criminals is becoming easier every year. "When you post something online, you really do so at your own peril," says Collier County Judge Robert Crow. Social media is helping law enforcement crack down criminals because of their lack of realization that the internet is anything but a private place to talk. Everything you post can be use to convict you of a crime or help the police track you down, take for instance this robbery case which reached a dead end. One detective decided to check if he had Facebook, of course he did and his profile was completely unsecured. He had updated that he was at a local club, with no surprise he was apprehended at the club. • http://www.digitaltrends.com/social-media/the-new-inside-source-for-police-forces-social- networks/#!bozoZz`
  29. 29. Police Reaching Out to Social Media Users Law enforcement officials are not only spying on us and looking through our private information. They are reaching out to social media users to do the work for them. For example, in Albany, NewYork it was announced by Governor Andrew M. Cuomo that the NewYork State Police will set up a Facebook account to reach out to the public.There Facebook page will have post like: • Occurring crimes in the state • Missing persons • As well as information on wanted persons which encourages the public to inform the police with and leads. -www.facebook.com/nyspolice
  30. 30. Law EnforcementViolate Laws to Get Information Though not all forms of obtaining information is done legally, even by law enforcement officials.As Christina Sterbenz at Business Insider reports, “It's no secret cops use social media to monitor the public, but it might surprise you that they create fake Facebook profiles to nab criminals — in direct violation of the website's terms of service”. “More than 80% of the responding officials said social media was a valuable tool for crime-fighting and that “creating personas or profiles on social media outlets for use in law enforcement activities is ethical.”” The NYDP is okay with the idea and is encouraging this concept, the so called “alias” must be registered before use. So it is okay for law enforcement to break social media privacy laws but not the rest of the public?
  31. 31. Law EnforcementViolate Laws to Get Information (continued) • The NYDP even goes as far as using pictures of young women in their aliases, in order to spy on criminal as reported by the NewYorkTimes. • By using these aliases, the police believes that they can get clues of the whereabouts of “potential” criminals. • In a 2012 survey, of 1,221 federal, state, and local law enforcement agencies n New York, four of five admitted to using social media for investigations. • Though these “aliases” are in direct violation of Facebook’s terms of service, which states that users may not "provide any false personal information on Facebook, or create an account for anyone other than yourself without permission."
  32. 32. Social Media Investigations Spreading This is not only a growing issue in North America, using social media in order to catch criminals is a spreading topic. Police departments all over the world are not turning to social media as a device to solve crimes.Though this can be a useful tool, some crimes are just “stumbled upon due to peoples lack of intelligence as in these few cases. • A man in India was recently arrested for trying to sell his grandson on Facebook, • A woman in Oklahoma was arrested for trying to sell her children via the social network • A teen was taken into custody after bragging about a boozed up hit-and-run on Facebook • A British man who stole $130,000 of jewellery and had fled the country later returned to the U.K. using a different name, but posted pictures of his return online and was tracked down.
  33. 33. Social Media Being Used Positively Yes, the government and law officials may be spying on us to gather information, but it does have a positive side to it. In cases of large organizations such as the Olympics, social media is used to keep everyone safe and stop any illegal activity. Keywords used on the internet would be used to alert the police of any possible conflict. Police presence would be then increased in those areas. If anyone were to plans something on the location of the Olympic stadium or its city, law enforcement would be notified and precautions would be taken. On many occasions, this tactic was used to prevent conflicts from arising.
  34. 34. In Conclusion Indeed the government may be spying on us, the police may be disobeying laws to get to criminals, our privacy may be invaded, and no one would even have to find out, and of course the occasional false arrest. In the long run though, the idea of the government breaching our privacy isn’t for any no good reason. Due to this breach of privacy, criminals are being taken off the streets, cold cases are being solved, and surprisingly, thanks to the internet, the world has the ability of becoming a safer place. Not only this but thanks to the large police activity online, we as users can be informed of potential dangers we can encounter not only but in our own neighbourhoods.
  35. 35. Refrences • http://www.cbc.ca/news/politics/government-snooping-on-social-media-may-breach-privacy-act- 1.2636905 • http://www.cbc.ca/news/business/chantal-bernier-says-ottawa-snooping-on-social-media-1.2635998 • http://www.thestar.com/news/canada/2013/11/29/social_media_to_be_monitored_by_federal_government .html • http://www.nbc-2.com/story/20075876/social-media • http://www.wptz.com/news/vermont-new-york/plattsburgh/state-police-to-use-social-media-to-make- arrests/24305266#!boyVWK • www.facebook.com/nyspolice • http://www.businessinsider.com/police-make-fake-facebook-profiles-to-arrest-people-2013-10 • http://www.digitaltrends.com/social-media/the-new-inside-source-for-police-forces-social- networks/#!bozoZz • http://laws-lois.justice.gc.ca/eng/acts/p-21/page-2.html • http://youtu.be/fk49s_YGzHA
  36. 36. Privacy and Jobs Employers “googling” their future employees.
  37. 37. INTERNET Internet is an interlink between different servers all around the world. The DNS-driven World Wide Web, the overlay which we surf today was officially launched in 1983. More specifically the first TCP/IP WA network was came operational on January 1’1983. Originally it was a university network constructed by NSF(National Science Foundation) of United States of America which later became NSFNet On a bigger margin it was renamed as World Wide Web and the first website was launched in March 15’1985 as SYMBOLICS.COM. A website is like a front view of a server(computer) just like a house and it is rendered using different web development languages which is presented using an internet browser such as Internet Explorer, Google Chrome, Safari, Firefox, etc. As internet itself is a network of different computers where everybody is connected similarly to designate users identity social media came into play.
  38. 38. SOCIAL MEDIA Social media is users participating in social networking using websites and applications to create or share content with each other. Most popular social networking websites: • Facebook launched Feb’04 (Personal/Social Networking) • Twitter launched Mar’06 (Fan Following) • LinkedIn launched Dec’02 (Professional Networking) • Pinterest launched Mar’10 (Business Ideas) • Google Plus+ launched June’11 (Social Networking and Identity Service) Other websites are Tumblr, Instagram, VK, Flickr, Myspace, Meetup, etc.
  39. 39. SOCIAL MEDIA MASKS OFF APPLICANT HR of companies frequently go through applicant Social Networking profiles What they are most interested in verifying: • Candidate posted provocative or inappropriate photographs or information. • Candidate posted content about them drinking or using drugs. • Candidate bad-mouthed their previous employer, co-workers or clients. • Candidate showed poor communication skills. • Candidate made discriminatory comments. • Candidate lied about qualifications. • Candidate shared confidential information from previous employer
  40. 40. What FaceBook checks provide employers Facebook after all the privacy options available on social networking profiles still shares some information to the 3rd parties such as employers, Social media analysis corporations, government, etc. • Candidate’s publically shared statuses denoting thinking patterns and thoughts • Candidate’s publically shared pictures denoting daily activities • Candidate’s travelling history • How much time he/she spends on FaceBook
  41. 41. What LinkedIn checks provide employers LinkedIn shares employees one kind of bio data which allows them to connect to other similar professional in or around their professional network. If LinkedIn accounts of users/applicant profile shares some information publically then it would be: • Candidate’s Education Summary • Candidate’s Professional Experience • Candidate’s past professional projects • Candidate’s recommendations by professionals denoting how they performed when they worked together into some projects • Walk-through through candidate network connections ad group they follow Skills of applicants and endorsements other professional made which they may be capable of • Different Languages they speak and their language levels
  42. 42. Photo sharing also have a story In jobs related to photography, movie shooting, modelling photographer, etc. applicants provide their photography portfolio but social photo sharing profile s addresses an extra look to applicants profile. Photo sharing profiles examples are Instagram, Flickr, 500PX, PhotoBucket • Show’s candidate presence of mind while shooting pictures • Presents a big image about applicant’s skills • Also shows editing skills • Also describes their online buzz and fan following over the internet • Sometimes it describes how much safety and disciplined applicants were while taking pictures • Also points out candidate’s attraction towards specific topics and aspects of photography
  43. 43. TechnicalAspects Standards Different Blogs over the internet such as personal websites, WordPress, Tumblr, Blogger etc. describes applicants interest and projects they worked which also links to their online projects such a websites . Online question and answer site for professional and enthusiast programmers such asW3Schools, StackOverFlow, StackExchange, adobebc, etc. also have a lot to say • Specific technical knowledge aspects about programming languages • Presents how applicants answers to different problems • How applicant approaches solutions • How much ranking and rating do they get back from other students and professionals on the network
  44. 44. What Employee Rights Restricts : • Candidate’s Birthplace, ancestry, ethnic, place of origin • Candidate Sex, sexual orientation, marital status, family status • Candidate’s age • Candidate’s Race, Color • Candidate’s religion, creed • Candidate’s education (e.g. questions that denote age, place of origin, etc. • Candidate’s disability • Candidate’s membership in other organizations The following categories have restrictions on what can legally be searched by an employer
  45. 45. Employers Cyberbullying Employees • Cyberbully is an aggressive, unethical and inappropriate sense of behavior that happens repeatedly with the bully feeling a sense of empowerment through cyberspace • Online Shaming is a form of cyberbully, it is defined as “the violation of someone’s privacy with the express purpose of humiliating the targeted person through discredit • Employers out there expressing their feelings towards their employees is an act of online shaming • According to Stats Canada, 7% of adult have been a victim of cyber-bullying at some point in their life • -The most common form of cyberbullying in a workplace is through email, text messages, and the internet • - Online shaming or any other forms of cyberbullying is a disgrace and a violation to our identities • - Bullies performs such act, in hoping to show power towards the victims
  46. 46. The Past, Present, and Future of Employment • Couple of decades ago, technology was not as commonly used as today, thus jobs were more hands on, and physical • Some of the jobs back before the internet become popular were librarian, railroad and transportation workers, FedEx/UPS delivery, and teachers • Nowadays, jobs such as app developer, gaming designer, market data researcher, social media manager are becoming more popular and higher in demand due to the technology advance • As of right now, there are companies out there hiring people just to search through their online profiles and social networking sites • Assuming this trend continues, the future of employment that will be high in demand will involve careers more on the technological side such as social media manager, and app developer (Future Jobs) • The use of technology is constantly evolving, and trying to pop our privacy bubble which new and innovative ways • As technology continues to advance, employer will find new, easier, and faster way to do background check on future employees even though it is violating their privacy
  47. 47. Privacy of Social Media Most popular social media in today’s society are Facebook,Twitter, Google Plus, LinkedIn,Tumblr, Pinterest, and Instagram • According to CBC News, 68 percent of students believe that if a website has a privacy policy, it won’t share their personal information. • Many social media users are not aware of what kind of information a 3rd party user can obtained even if their privacy settings are on • User risked their identities being used by posting information on social networking like Facebook andTwitter • Cyber footprint is constantly being tracked by social media. • Facebook and other social network uses cookies, and javascript to track your cyber footprint • Clickable links on social media may contain malware that will steal all your information from your computer without your permission
  48. 48. How Employers should research Be coherent. Employers should do social networking research to check all job applicants for all positions or they should not use it at all. Tell applicants in advance that they will be looking on internet and at social media sites as part of the application process. Assign someone who is not the top decision maker as the social media researches help to ensure the decision making and does not know about legally protected information. Decide what information about applicants you are looking for online and provide your social media researcher with specific instruction on reporting back this information only. (such as employer history, any negative work related post, etc. Do not access any applicants' social media profile or webpage through venal or delusory means. Consider the accuracy and validity of the information before making any decision.
  49. 49. EmployeeTips for safe social networking Facebook,Twitter, Google+,YouTube, Pinterest, LinkedIn and other social networks have become an crucial part of our internet browsing. Social networks are a great way to stay connected with others. Employees should be aware about how much personal information they post online • Once posted on internet, stays on internet – Be careful while posting anything • Online Reputation can be a good thing – Be honest while sharing something • Keep your personal information personal – If you can’t keep your secrets to yourself, don’t expect others to do different • Manage privacy and security settings carefully –These settings were made for a reason, be sure about what you share and with whom you do • Manage and know friends and people in your network – Unknown and fake identities in network are like spies and scams • Never post anything negative –Writing wrong describes you personality and your character • Don’t post unauthorized stuff –Things such as employers concealed information about upcoming or future products • Use pseudonyms on virtual world – there have been cases of young players getting molested in real world due to giving hard time to others players virtually.
  50. 50. http://www.linkedin.com/today/post/article/20140418011645-949502-are-you-facing- social-media-risks http://www.businessinsider.com/this-is-how-facebook-is-tracking-your-internet-activity- 2012-9?op=1 http://www.statcan.gc.ca/daily-quotidien/110915/dq110915c-eng.htm http://www.cucirca.eu/modern-family-season-4-episode-20-flip-flop/ http://www.theaggie.org/2014/02/14/social-media-can-impact-future-employment/ http://allisondillon.wordpress.com/2009/05/27/10-jobs-that-no-longer-exist/ http://www.forbes.com/sites/meghancasserly/2012/05/11/10-jobs-that-didnt-exist-10- years-ago/ http://jobsearch.about.com/od/backgroundcheck/a/social-networking-checks.htm References

×