Social Media for Paralegals: Privacy, Concerns, and Best Practices
Privacy on social media is constantly changing. This presentation covers an introduction to social media, common privacy concerns and examples and best practices. I will discuss Facebook, Twitter, Google+ and LinkedIn and talk about how to secure online profiles.
This public service announcement discusses the issue of cyberbullying. It provides statistics showing that over half of kids have experienced mean or hurtful things said to them online and over 40% have experienced it more than once. Additionally, over 50% of kids admit to saying something mean online to someone else, with over a third doing it more than once. Cyberbullying can occur through various electronic means of communication and can affect both children and adults. A story is presented of a 13-year old girl who committed suicide after being cyberbullied through a fake friendship on MySpace.
Kids often feel safe online but may not realize some people have harmful intentions. The document discusses internet safety and provides tips for kids, such as avoiding sites that ask for personal information, money, or involve gambling, hate, or violence. It warns that sharing too much personal information or photos online can put kids at risk. The biggest mistake is accepting friend requests from strangers, as predators may try to pose as teenagers. Cyberbullying and sexting are also discussed as inappropriate online behaviors that children should avoid. Parents are encouraged to supervise their children's internet usage.
Digital citizenship refers to appropriate and responsible behavior regarding technology use. It involves thinking carefully before posting online by considering whether the content is true, helpful, inspiring, necessary, and kind. Users should avoid sharing personal information, stealing content, lying about their age, or visiting unfamiliar websites. They should keep social media profiles private, use strong passwords, treat others with respect both online and off, and act as upstanders by reporting signs of bullying. Examples of good digital citizenship include disabling location services and citing sources, while bad examples involve posting identifying personal information, plagiarizing content, or sharing work issues on social media.
This document discusses the issue of cyberbullying and provides facts about its prevalence and forms. It notes that around half of teens have been cyberbullying victims, but only 1 in 10 tell their parents. Fewer than 1 in 5 incidents are reported to law enforcement. Some of the ways cyberbullying occurs include harassment through instant messaging, password theft, blogs, websites, and sending unwanted pictures or emails. While motives for cyberbullying can vary, it is important to address the root causes and get help for both bullies and victims.
Seven Stories of Social Media Legal RiskRyan Garcia
These are the slides that were used during my keynote address at the 2014 Charleston Law Review Symposium on Social Media and the Law. The YouTube video of my keynote can be found at http://www.youtube.com/watch?v=llRz72q_cyI&feature=youtu.be
As growing numbers of companies jump into social media marketing, there are greater opportunities to make missteps. Preparation and, to a certain degree, common sense can prevent embarrassing errors from reaching the public.
However, we must recognize that all of us are imperfect and we can’t possibly meet our own high standards 100% of the time. In the case of failure, prior planning will prevent our response to an error from multiplying and becoming larger than the original mistake.
This public service announcement discusses the issue of cyberbullying. It provides statistics showing that over half of kids have experienced mean or hurtful things said to them online and over 40% have experienced it more than once. Additionally, over 50% of kids admit to saying something mean online to someone else, with over a third doing it more than once. Cyberbullying can occur through various electronic means of communication and can affect both children and adults. A story is presented of a 13-year old girl who committed suicide after being cyberbullied through a fake friendship on MySpace.
Kids often feel safe online but may not realize some people have harmful intentions. The document discusses internet safety and provides tips for kids, such as avoiding sites that ask for personal information, money, or involve gambling, hate, or violence. It warns that sharing too much personal information or photos online can put kids at risk. The biggest mistake is accepting friend requests from strangers, as predators may try to pose as teenagers. Cyberbullying and sexting are also discussed as inappropriate online behaviors that children should avoid. Parents are encouraged to supervise their children's internet usage.
Digital citizenship refers to appropriate and responsible behavior regarding technology use. It involves thinking carefully before posting online by considering whether the content is true, helpful, inspiring, necessary, and kind. Users should avoid sharing personal information, stealing content, lying about their age, or visiting unfamiliar websites. They should keep social media profiles private, use strong passwords, treat others with respect both online and off, and act as upstanders by reporting signs of bullying. Examples of good digital citizenship include disabling location services and citing sources, while bad examples involve posting identifying personal information, plagiarizing content, or sharing work issues on social media.
This document discusses the issue of cyberbullying and provides facts about its prevalence and forms. It notes that around half of teens have been cyberbullying victims, but only 1 in 10 tell their parents. Fewer than 1 in 5 incidents are reported to law enforcement. Some of the ways cyberbullying occurs include harassment through instant messaging, password theft, blogs, websites, and sending unwanted pictures or emails. While motives for cyberbullying can vary, it is important to address the root causes and get help for both bullies and victims.
Seven Stories of Social Media Legal RiskRyan Garcia
These are the slides that were used during my keynote address at the 2014 Charleston Law Review Symposium on Social Media and the Law. The YouTube video of my keynote can be found at http://www.youtube.com/watch?v=llRz72q_cyI&feature=youtu.be
As growing numbers of companies jump into social media marketing, there are greater opportunities to make missteps. Preparation and, to a certain degree, common sense can prevent embarrassing errors from reaching the public.
However, we must recognize that all of us are imperfect and we can’t possibly meet our own high standards 100% of the time. In the case of failure, prior planning will prevent our response to an error from multiplying and becoming larger than the original mistake.
The document discusses online fundraising trends and strategies. It notes that online giving grew 35% from 2012 to $39 billion in the US. However, it dispels 3 common myths: that people will donate simply because a donation page exists; that like/share buttons equal social engagement; and that people want to give money away. Instead, it emphasizes that online fundraising must be easy, emotional, and engaging. This includes using viral loops, notifications, social proof like number of donors, and return visits through updates, recognition and a sense of belonging. The combination of easy, emotional and engaging elements leads to effective online fundraising.
A presentation from a training event aimed at Curates in the Church of England, Birmingham Diocese. To help them to understand and engage with online issues.
The document discusses social media management and legal concerns, noting that companies should plan risk management strategies before engaging in social media, monitor their social media presence to address issues quickly, and respond to issues on the social media sites themselves for timely response and credibility. Recent examples highlight legal risks around employment, confidentiality, defamation and how viral events on social media can have significant impacts.
Social media platforms collect users' personal information which can sometimes be accessed or shared without users' consent, violating their privacy. Some key privacy issues discussed include data breaches from hacker attacks and third party apps, cyber manhunts doxing users, and targeted ads using private message content. Governments have begun enacting privacy laws while platforms and users also have responsibilities - platforms to protect data and be transparent, and users to manage privacy settings and share information wisely. Overall the document discusses important social media privacy concerns and some measures taken to enhance protection.
Getting folks to follow you isn’t enough—the real value of social media is Return on Engagement, and research tells us which social media activities yield better results, so we can design campaigns with ROE in mind. In this presentation, we’ll look at the most (and least) effective strategies and activities and explore different ways to measure and maximize impact.
The document discusses online fundraising trends, myths, and best practices. It notes that online giving grew 35% from 2012 to $39 billion in the US. While some myths exist, like passive websites attracting donors, effective online fundraising requires making the experience easy, emotional, and engaging. This includes using photos, videos, and viral sharing incentives to cultivate return visits and expand social reach among donors, followers, and friends.
Norton's Internet Safety Advocate with a presentation on internet safety, online privacy, viruses and malware, for 8th grade students (13 years and up)
This document provides an introduction to social media for councillors. It defines social media as virtual communities for sharing information. It provides statistics on social media usage in the UK and examples of hashtags. It discusses listening to conversations on social media and gives examples of councillors already active on social media. It outlines opportunities for networking and potential issues like digital footprints. Finally, it offers advice on costs, considerations, and useful accounts to follow.
Cyber bullying involves using technology like computers, cell phones, or other devices to harass or embarrass others online. It can have serious psychological effects on victims and has become a widespread problem. The document discusses what cyber bullying is, different types of cyber bullies, examples of cyber bullying behaviors, effects on victims, statistics on cyber bullying prevalence, and case studies of individuals severely impacted by cyber bullying like Megan Meier who tragically died by suicide. It emphasizes the importance of preventing cyber bullying through education and policies.
This document discusses protecting personal cybersecurity for high-value targets such as politicians, celebrities, and business executives. It outlines common hacking motivations like money, identity theft, and espionage. High-value targets are more susceptible due to greater amounts of public information and broader networks. The document then gives examples of how personal email and financial accounts could be compromised through malicious emails and website hacking. Finally, it provides a top ten list of cybersecurity best practices like using encryption, updating software, backing up data, and practicing good password hygiene to help prevent attacks.
Social media posts can negatively impact jobs, education, and relationships by revealing private information to unintended audiences. Risks include identity theft, cyberbullying, loss of privacy, and stalking. People often post without considering privacy or that information cannot be retracted. Users should avoid posting anything they would not want an employer, spouse or police to see and use privacy settings to limit access to their information.
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
The document discusses the importance of managing your digital identity and online presence, providing tips on developing a plan to consolidate and optimize online profiles and accounts, create regular online content, and ask for help from professionals to craft an ideal digital identity. It emphasizes that first impressions are formed within the first 3 pages of search results and one's online presence can impact credibility and opportunities.
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
1) Cyberbullying involves the use of electronic communication to harass, threaten, or humiliate someone repeatedly. It often involves targeting victims who have a hard time defending themselves.
2) Cyberbullying has evolved along with technology, starting with flaming and trolling online in the 1990s and expanding to social media in the 2000s. Offline bullying and online bullying are closely connected, with half of both victims and bullies experiencing both forms.
3) Research finds that about 24% of kids experience cyberbullying as victims and 17% admit to being cyberbullies themselves. Offline bullying increases the risks of being both a target and perpetrator of online bullying.
Social media has evolved rapidly over the past 15 years. While it allows users to connect and share freely, security and privacy have become major concerns. Users readily accept friend requests without verifying identities and have lax privacy settings. This exposes personal information to unknown parties. Best practices include carefully managing friend lists, avoiding sharing sensitive details, using strong passwords, and being wary of links and attachments from unknown sources. Education is needed for users to protect themselves while enjoying the benefits of social media connections.
Awareness about cyberbulling and growing concernsAnanya Sharma
Cyberbullying encompasses various forms of online harassment, such as spreading rumors, sending hurtful messages, sharing private information, or creating fake profiles to impersonate and attack someone. It can occur on social media, messaging apps, or through other digital means.
The impact of cyberbullying can be profound, leading to anxiety, depression, or even suicidal thoughts in victims. It's crucial for individuals to be cautious about what they share online, report any instances of cyberbullying, and seek help when needed. Parents, educators, and online platforms also play a role in creating a safe digital environment by educating and monitoring online activities.
Cyberbullying is a growing problem, especially among teenagers. It can have serious psychological impacts like anxiety and depression, and in some cases has even led to suicide. Three key points to address cyberbullying are:
1) Educating everyone about what cyberbullying is and how to recognize signs of it occurring.
2) Establishing open communication so victims feel comfortable reporting incidents and understand they are not alone.
3) Implementing legal consequences for cyberbullying to increase accountability and discourage harmful online behavior. While changing culture is difficult, policy and law can help address cyberbullying.
Marketing Public Health Through Social MediaAngela Connor
The document discusses using social media to promote public health. It notes that over 65% of adult internet users use social media, as do 80% of teens. Social media can help public health organizations achieve goals like behavior change, raising awareness, and educating on unknown topics. The document provides tips for social media success, including listening to audiences, finding the right audiences, engaging audiences through education and real dialogue, and using visual content and advertising. Examples are given of organizations successfully using social media for public health purposes.
10 simple steps for creating a social media strategy v2Samantha Collier
Natalie Alesi and Samantha Collier presented “Developing a Social Media Strategy” on March 21, 2012.
About the Program
Social media can no longer be ignored; it has infiltrated our businesses on all levels. So, How do you create a strategy that will work for your practice? Natalie and Samantha will present real world examples of effective social media use by law firms, and will offer a ‘how-to’ for creating and implementing a social business strategy.
Keeping our children safe is harder to do in today's digital age. The Internet has changed the way families operate, and the population at general communicates.
Overall, the benefits of the Internet outweigh the bad aspects. Our children have it a bit harder as we are "learning" too. Most times, our kids know more than us.
I work in the social media realm training Lawyers how to use Facebook, LinkedIn, Twitter and Instagram. Thankfully, this training has allowed me to help other parents as well.
More Related Content
Similar to BC Paralegal Association Social Media Privacy and Ethics Presentation
The document discusses online fundraising trends and strategies. It notes that online giving grew 35% from 2012 to $39 billion in the US. However, it dispels 3 common myths: that people will donate simply because a donation page exists; that like/share buttons equal social engagement; and that people want to give money away. Instead, it emphasizes that online fundraising must be easy, emotional, and engaging. This includes using viral loops, notifications, social proof like number of donors, and return visits through updates, recognition and a sense of belonging. The combination of easy, emotional and engaging elements leads to effective online fundraising.
A presentation from a training event aimed at Curates in the Church of England, Birmingham Diocese. To help them to understand and engage with online issues.
The document discusses social media management and legal concerns, noting that companies should plan risk management strategies before engaging in social media, monitor their social media presence to address issues quickly, and respond to issues on the social media sites themselves for timely response and credibility. Recent examples highlight legal risks around employment, confidentiality, defamation and how viral events on social media can have significant impacts.
Social media platforms collect users' personal information which can sometimes be accessed or shared without users' consent, violating their privacy. Some key privacy issues discussed include data breaches from hacker attacks and third party apps, cyber manhunts doxing users, and targeted ads using private message content. Governments have begun enacting privacy laws while platforms and users also have responsibilities - platforms to protect data and be transparent, and users to manage privacy settings and share information wisely. Overall the document discusses important social media privacy concerns and some measures taken to enhance protection.
Getting folks to follow you isn’t enough—the real value of social media is Return on Engagement, and research tells us which social media activities yield better results, so we can design campaigns with ROE in mind. In this presentation, we’ll look at the most (and least) effective strategies and activities and explore different ways to measure and maximize impact.
The document discusses online fundraising trends, myths, and best practices. It notes that online giving grew 35% from 2012 to $39 billion in the US. While some myths exist, like passive websites attracting donors, effective online fundraising requires making the experience easy, emotional, and engaging. This includes using photos, videos, and viral sharing incentives to cultivate return visits and expand social reach among donors, followers, and friends.
Norton's Internet Safety Advocate with a presentation on internet safety, online privacy, viruses and malware, for 8th grade students (13 years and up)
This document provides an introduction to social media for councillors. It defines social media as virtual communities for sharing information. It provides statistics on social media usage in the UK and examples of hashtags. It discusses listening to conversations on social media and gives examples of councillors already active on social media. It outlines opportunities for networking and potential issues like digital footprints. Finally, it offers advice on costs, considerations, and useful accounts to follow.
Cyber bullying involves using technology like computers, cell phones, or other devices to harass or embarrass others online. It can have serious psychological effects on victims and has become a widespread problem. The document discusses what cyber bullying is, different types of cyber bullies, examples of cyber bullying behaviors, effects on victims, statistics on cyber bullying prevalence, and case studies of individuals severely impacted by cyber bullying like Megan Meier who tragically died by suicide. It emphasizes the importance of preventing cyber bullying through education and policies.
This document discusses protecting personal cybersecurity for high-value targets such as politicians, celebrities, and business executives. It outlines common hacking motivations like money, identity theft, and espionage. High-value targets are more susceptible due to greater amounts of public information and broader networks. The document then gives examples of how personal email and financial accounts could be compromised through malicious emails and website hacking. Finally, it provides a top ten list of cybersecurity best practices like using encryption, updating software, backing up data, and practicing good password hygiene to help prevent attacks.
Social media posts can negatively impact jobs, education, and relationships by revealing private information to unintended audiences. Risks include identity theft, cyberbullying, loss of privacy, and stalking. People often post without considering privacy or that information cannot be retracted. Users should avoid posting anything they would not want an employer, spouse or police to see and use privacy settings to limit access to their information.
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
The document discusses the importance of managing your digital identity and online presence, providing tips on developing a plan to consolidate and optimize online profiles and accounts, create regular online content, and ask for help from professionals to craft an ideal digital identity. It emphasizes that first impressions are formed within the first 3 pages of search results and one's online presence can impact credibility and opportunities.
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
1) Cyberbullying involves the use of electronic communication to harass, threaten, or humiliate someone repeatedly. It often involves targeting victims who have a hard time defending themselves.
2) Cyberbullying has evolved along with technology, starting with flaming and trolling online in the 1990s and expanding to social media in the 2000s. Offline bullying and online bullying are closely connected, with half of both victims and bullies experiencing both forms.
3) Research finds that about 24% of kids experience cyberbullying as victims and 17% admit to being cyberbullies themselves. Offline bullying increases the risks of being both a target and perpetrator of online bullying.
Social media has evolved rapidly over the past 15 years. While it allows users to connect and share freely, security and privacy have become major concerns. Users readily accept friend requests without verifying identities and have lax privacy settings. This exposes personal information to unknown parties. Best practices include carefully managing friend lists, avoiding sharing sensitive details, using strong passwords, and being wary of links and attachments from unknown sources. Education is needed for users to protect themselves while enjoying the benefits of social media connections.
Awareness about cyberbulling and growing concernsAnanya Sharma
Cyberbullying encompasses various forms of online harassment, such as spreading rumors, sending hurtful messages, sharing private information, or creating fake profiles to impersonate and attack someone. It can occur on social media, messaging apps, or through other digital means.
The impact of cyberbullying can be profound, leading to anxiety, depression, or even suicidal thoughts in victims. It's crucial for individuals to be cautious about what they share online, report any instances of cyberbullying, and seek help when needed. Parents, educators, and online platforms also play a role in creating a safe digital environment by educating and monitoring online activities.
Cyberbullying is a growing problem, especially among teenagers. It can have serious psychological impacts like anxiety and depression, and in some cases has even led to suicide. Three key points to address cyberbullying are:
1) Educating everyone about what cyberbullying is and how to recognize signs of it occurring.
2) Establishing open communication so victims feel comfortable reporting incidents and understand they are not alone.
3) Implementing legal consequences for cyberbullying to increase accountability and discourage harmful online behavior. While changing culture is difficult, policy and law can help address cyberbullying.
Marketing Public Health Through Social MediaAngela Connor
The document discusses using social media to promote public health. It notes that over 65% of adult internet users use social media, as do 80% of teens. Social media can help public health organizations achieve goals like behavior change, raising awareness, and educating on unknown topics. The document provides tips for social media success, including listening to audiences, finding the right audiences, engaging audiences through education and real dialogue, and using visual content and advertising. Examples are given of organizations successfully using social media for public health purposes.
Similar to BC Paralegal Association Social Media Privacy and Ethics Presentation (20)
10 simple steps for creating a social media strategy v2Samantha Collier
Natalie Alesi and Samantha Collier presented “Developing a Social Media Strategy” on March 21, 2012.
About the Program
Social media can no longer be ignored; it has infiltrated our businesses on all levels. So, How do you create a strategy that will work for your practice? Natalie and Samantha will present real world examples of effective social media use by law firms, and will offer a ‘how-to’ for creating and implementing a social business strategy.
Keeping our children safe is harder to do in today's digital age. The Internet has changed the way families operate, and the population at general communicates.
Overall, the benefits of the Internet outweigh the bad aspects. Our children have it a bit harder as we are "learning" too. Most times, our kids know more than us.
I work in the social media realm training Lawyers how to use Facebook, LinkedIn, Twitter and Instagram. Thankfully, this training has allowed me to help other parents as well.
How to Pick the Right LinkedIn Profile Picture - It only takes 1/10 of a second for someone to draw conclusions about your LinkedIn Profile based on your photo — so how do you win someone over in less than a second?
This is a presentation about social media for law firms presented by Samantha Collier. She's the CEO and Founder of Social Media for Law Firms, a company that assists Lawyers with their social media endeavours. This presentation is a brief overview of statistics in favour of social media, work-based scenarios, how to set up Twitter, Facebook and LinkedIn and some tips and tricks.
This document summarizes a webinar about using social media for law firms. It discusses how law firms are using platforms like LinkedIn, Facebook, Twitter, and blogs for business development and client acquisition. Statistics are provided showing the growing use of these platforms by legal professionals and law firms. Scenarios demonstrate how attorneys have obtained new clients through engaging on social media. The webinar then reviews best practices for setting up and engaging on key social media platforms and blogs to help law firms grow their business online.
The document discusses whether a business needs to create a Google+ account, noting that Google+ has over 90 million users and was launched in 2011. It provides tips for businesses on using Google+ such as creating an account, using profiles for SEO, collaborating with circles and notifications, and determining target audiences and how Google+ can solve business needs. The document was created by Just Engage and provides contact information for Kerry Scott Boll, Samantha Collier, and Natalie Alesi.
This document discusses Google+ and provides tips for setting up and optimizing business pages on the social media platform. It notes that Google controls much of internet search traffic and incorporates Google+ into search results. The history of Google+ is summarized, including its launch in 2011 and rapid growth. Instructions are provided for setting up business pages. Features like Hangouts, Circles, and the +1 button are overviewed. The document concludes with suggestions for sharing content, encouraging engagement, and analyzing results.
UR BHatti Academy dedicated to providing the finest IT courses training in the world. Under the guidance of experienced trainer Usman Rasheed Bhatti, we have established ourselves as a professional online training firm offering unparalleled courses in Pakistan. Our academy is a trailblazer in Dijkot, being the first institute to officially provide training to all students at their preferred schedules, led by real-world industry professionals and Google certified staff.
ChatGPT 4o for social media step by step Guide.pdfalmutabbil
In this comprehensive guide, we'll delve into the exciting world of ChatGPT and explore
its practical applications for social media success. Learn how to craft captivating posts
that resonate with your audience, leverage automation to save precious time, and utilize
ChatGPT's analytical prowess to stay ahead of the curve.
Discover essential SEO Google tools to boost your website's performance, from Google Analytics and Search Console to Keyword Planner and Page Speed Insights.
Learn more: https://elysiandigitalservices.com/seo-google-tools/
Using Playlists to Increase YouTube Watch TimeSocioCosmos
Discover how to use playlists to keep viewers engaged and increase your watch time.
https://www.sociocosmos.com/product-category/youtube/youtube-comments/
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...AJHSSR Journal
ABSTRACT: Salman Rushdie’s novels are humorous books about serious times. His cosmopolitanism and
hybrid identity allowed him access to multiple cultures, religions, languages, dialects, and various modes of
writing. His style is often classified as magic realism, blending the imaginary with the real. He draws
inspiration from both English literature and Indian classical sources. Throughout his works, there is a lineage of
‘bastards of history’, a carnival of shameful characters scrolling all along his works. Rushdie intertwines fiction
with reality, incorporating intertextual references to Western literature in his texts, and frequently employing
mythology to explore history. This paper focuses on Rushdie’s three novels: Midnight’s Children, Shame, and
Haroun and the Sea of Stories, analyzing his postmodern storytelling techniques that aim to explore human
vices and follies while offering socio-political criticism.
KEYWORDS : Magic Realism, Rushdie, Satire, Storytelling, Transfictional Identities
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...AJHSSR Journal
ABSTRACT: Security plays an important role in human life and endeavors. Securing information and
disseminating are critical challenges in the present day. This study aimed at identifying innovative technologies
that aid cybercrimes and can constitute threats to cybersecurity in North Central (Middle Belt) Nigeria covering
its six States and the FCT Abuja. A survey research design was adopted. The researchers employed the use of
Google form in administering the structured questionnaire. The instruments were faced validated by one expert
each from ICT and security. Cronbach Alpha reliability Coefficient was employed and achieved 0.83 level of
coefficient. The population of the study was 200, comprising 100 undergraduate students from computer science
and Computer/Robotics Education, 80 ICT instructors, technologists and lecturers in the University and
Technical Colleges in the Middle Belt Nigeria using innovative technologies for their daily jobs and 20 officers
of the crime agency such as: Independent Corrupt Practices Commission (ICPC) andEconomic and Financial
Crimes Commission (EFCC). Three research purposes and questions as well as the hypothesis guided the study
on Five (5) point Likert scale. Data collected were analyzed using mean and standard deviation for the three
research questions while three hypotheses were tested using t-test at 0.05 level of significance. Major findings
revealed that serious steps are needed to better secure the cybers against cybercrimes. Motivation, types, threats
and strategies for the prevention of cybercrimes were identified. The study recommends that government,
organizations and individuals should place emphasis on moral development, regular training of its employees,
regular update of software, use strong password, back up data and information, produce strong cybersecurity
policy, install antivirus soft and security surveillance (CCTV) in offices in order to safeguard its employees and
properties from being hacked and vandalized.
KEYWORDS: Cybersecurity, cybercrime, cyberattack, cybercriminal, computer virus, Virtual Private Networks
(VPN).
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
BC Paralegal Association Social Media Privacy and Ethics Presentation
1. Presented by Samantha Collier of R.JOHNSON Legal Recruitment for the
British Columbia Paralegal Association on June 25th, 2014
2. Featured In:
CBC Currents: The Digital
Afterlife: Facebook and Death –
Samantha Collier
Globe and Mail: Law Firms
Dipping Toes in Social Media
Ocean
Lawyers Weekly: The 24:
Canada’s Top Legal Social
Media Influencers
Canadian Law Blog Awards
2011 Winner – Top Practice
Management Category
3.
4. Agenda
• Social Media
Blunders
• Privacy
• Concerns
• Best Practices
5. Blunder #1 (Personal Story)
• Checked in on Foursquare and Facebook
on a regular basis
• Used Facebook, LinkedIn and Twitter
publicly
• Always felt safe.
6. And then…
Random stranger showing up at the
restaurant I’m at because I “checked in”. It
was harmless but it was a wake-up call.
7. Blunder #2
Alexandra Wallace = 10 million references on Google about her being a racist.
14. Concern #4
I don’t use social media at all. Can I just forget about
online privacy?
15. Best Practices
Never check in from home or work
Only accept friend requests from those you know
and trust
Change up your morning routines if you check in
to coffee shops and such
Check and double check your privacy settings
Turn off geo-tagging in your cell phone.
Don’t publish what you don’t want to know.
There is no true “Privacy” on the web.
My name is Samantha Collier and I am the marketing and communications specialist at R.JOHNSON Legal Recruitment. I help lawyers and legal professionals such as yourselves with the ins and outs of social media. Before working for R.JOHNSON, I worked in a law firm for 7 years in the business development department and began to work on the firm’s social media policy approximately 3 years ago. After that, I was getting asked to consult quite frequently, so I quit my job and started my own business.
Even though I hate tooting my own horn, Richard told me I had too so my work has been featured in the CBC where I was on the Trends radio show talking about what happens to your Facebook account after you die. I had a small mention in the globe and mail about law firms dipping their toes in social media. I was voted as one of the top 24 Canadian legal tweeters and my blog won in the practice management category in the Canadian law log awards.
As you know running a business from home with three kids can be quite hectic so I downgraded my social media business and have been working at RJ for just about a year. Actually, I was recently featured in the province on the 2nd page as…
Having RWS, rushing woman syndrome. I’m sure many of you suffer from the same ailment working full time with kids and engagements. I was featured in this article because a reporter tweeted that she wanted to talk to burned out moms and I responded. One thing led to another and bam, a photographer was in our office. I didn’t realize it was going to be on page 3 and I got a few phone calls to make sure I wasn’t going to the loony bin. The closeup wasn’t necessary and reminded me I needed to get new crow’s feet
On to our agenda, today we’re discussing four things: social media blunders, privacy, concerns, and best practices. We’ll have a 15 minute question period at the end if you have any questions.
Our first blunder story is one of own personal stories. When I first starting using social media, I jumped in head first. I was always an early adopter so they say. I checked in to places on Foursquare and Facebook and used these accounts publicly. In other words, I felt safe.
In the summer of 2010, I was on Bowen Island with the managigng partner of our firm. I was helping her with a project and was tweeting the ferry ride, the wildlife, etc. I didn’t see it being a big deal. We went to a little restaurant and I checked in on foursquare and tweeted a picture of the harbor.
Within minutes, a gentleman arrived at the restaurant and approached me. He told me he had seen my post(s) and wanted to say hello. In this circumstance, it was harmless, but, it could have turned out much worse.
This was a huge wake up call and a common concern. I still check in to some places but I usually do it after I’ve been there.
Blunder #2. This isn’t a blunder, it’s a nightmare.
Alexandra Wallace was a UCLA student majoring in junior political science. who made racial remarks via YouTube. She had been studying in the library and certain people were speaking loudly on their cell phones. Her remarks were terrible and I’m not sure what possessed her to post them on YouTube.
The video was viewed millions of times and went viral. Alexandra began to receive hundreds of death threats, harassing emails and phone calls. The locations of where she was taking her tests also became public and she was receiving even more death threats. In the end, she wasn’t kicked out of school but they were considering discipline and called the video “hate speech” and “harassment”
The most important lesson from this story is not to post anything online that you don’t mind the whole world seeing.
Alexandra Wallace = 10 million references on Google to her being a racist.
This is also a nightmare so I will call it Blunder #3. Rebecca Martinson attended the University of Maryland where she headed a sorority. The story goes like this. Her sorority met up with a close by fraternity where they had a party during Greek Week.
The party must have not gone so well because after the event, she sent a furious email to all her sisters threatening violence because of the sisters’ interactions with the fraternity. The email was so terrible that I can’t even read portions of it. It is really terrible. What Rebecca didn’t foresee was the email becoming public knowledge when it was published online.
Rebecca resigned from the fraternity and said she didn’t mean the email to go viral. Reactions were separate: many praised the sorority’s decision but others said “any of us could have a similar lapse in judgment’.
Overall, the points to remember from this story to remember is that anything you put in an email or a social media post is public. There’s no such thing as 100% privacy anymore.
If Rebecca wants to get a certain job, and her interviewer types her name into Google, I don’t think she’d be impressed.
Here’s where we start talking about Privacy. A good way to find out what’s public knowledge about you is to Google yourself. Type in your first and last name surrounded by hyphens and hit search. I’ve shown what comes up when you Google Samantha Collier.
You should also search for family names, nicknames and any other aliases you might have. For me, my blog comes up #1, images of me #2 (back when I was pre-pregnant and skinny plus a few other Samantha Collier’s}. And then a bunch of my articles. It’s funny because 10 years ago there was a doctor named Samantha Collier and all her stuff used to appear on the first page and I think I take up the first 10 pages of results now…
When you take you Google snapshot, if you find negative content, you have a few options:
If it’s a friend that authors the content, politely ask them to take it down.
If it’s a business, send them an email and be polite, proper and professional.
For content that you control, delete the Facebook, Twitter posts, etc.
Request that Google remove the content. They usually won’t do it unless it is violation of their policies. This includes someone posting your SIN number, adult spam, etc.
Tips
Google can’t crawl what they don’t see so be very selective about what you share. If you use online forurm, use an alias and don’t enter all of your personal information. You should also consider creating a separate email address to use for all your other accounts like Netflix etc. Keep your user name abbreviated.
Another method to get rid of bad content is to flood the Internet with good content. Good content will push the bad content down over time.
Have you heard about Facebook’s New Graph Search? It’s very important and you need to adjust your privacy settings accordingly.
Using Microsoft’s Bing, people can now do ultra detailed searches using people’s names, and can find posts, images and information that are hidden from the timeline.
It’s pretty scary what people can find out about you if you don’t have your settings adjusting. One hacker even created a phone directory using the new graph search.
Say you’re a burned girlfriend who thinks their boyfriend is cheating on them. They can do a detailed search of every picture their boyfriend liked from all of time. She can also look for tagged pictures of him, pictures he commented on, where’s he’s been, etc.
How to Protect Yourself
Log into facebook and go into your account settings. Make sure that you limit the privacy accordingly and set the privacy for all your past posts.
Protect yourself from your friends as in make sure you have to approve tagged photos before they are posted.
But you need to control your privacy and application settings. For content that is covered by IP rights, you specifically give FB the following permission, subject to your privacy and application settings: you grant FB a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook.
70% Phishing (sending email and clicking link) 39% of social users have same passwords for many accounts.
Don’t click links in emails, don’t download files, keep security software up-to-date and change passwords often. Tighten settings on all social networks, view your public profile, only connect with those you know. A long password is a strong password. Talk about 1password. Don’t post anything you wouldn’t want your grandmother seeing,
No. It is constantly changing but it can be managed. Keep yourself educated. Remember, Facebook is free to use.