SlideShare a Scribd company logo
Presented by Samantha Collier of R.JOHNSON Legal Recruitment for the 
British Columbia Paralegal Association on June 25th, 2014
Featured In: 
CBC Currents: The Digital 
Afterlife: Facebook and Death – 
Samantha Collier 
Globe and Mail: Law Firms 
Dipping Toes in Social Media 
Ocean 
Lawyers Weekly: The 24: 
Canada’s Top Legal Social 
Media Influencers 
Canadian Law Blog Awards 
2011 Winner – Top Practice 
Management Category
Agenda 
• Social Media 
Blunders 
• Privacy 
• Concerns 
• Best Practices
Blunder #1 (Personal Story) 
• Checked in on Foursquare and Facebook 
on a regular basis 
• Used Facebook, LinkedIn and Twitter 
publicly 
• Always felt safe.
And then… 
Random stranger showing up at the 
restaurant I’m at because I “checked in”. It 
was harmless but it was a wake-up call.
Blunder #2 
Alexandra Wallace = 10 million references on Google about her being a racist.
Blunder #3 
• Rebecca Martinson Delta Gamma
Privacy 
Good way to gage 
your online privacy. 
Take your “Google 
Portrait”.
Concern #1 
Are my Facebook pictures mine?
Concern #2 
How do my social media accounts get 
hacked?
Concern #3 
How can I protect my privacy?
Concern #4 
I don’t use social media at all. Can I just forget about 
online privacy?
Best Practices 
Never check in from home or work 
 Only accept friend requests from those you know 
and trust 
Change up your morning routines if you check in 
to coffee shops and such 
Check and double check your privacy settings 
Turn off geo-tagging in your cell phone. 
 Don’t publish what you don’t want to know. 
There is no true “Privacy” on the web.
Questions

More Related Content

Similar to BC Paralegal Association Social Media Privacy and Ethics Presentation

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Dave Boyce 3 Myths & Musts of Social Fundraising
Dave Boyce 3 Myths & Musts of Social FundraisingDave Boyce 3 Myths & Musts of Social Fundraising
Dave Boyce 3 Myths & Musts of Social Fundraising
Social Media for Nonprofits
 
Curate training digital generation
Curate training digital generationCurate training digital generation
Curate training digital generation
Craig Gilman
 
Sm legal topics vcu june 2011
Sm legal topics vcu june 2011Sm legal topics vcu june 2011
Sm legal topics vcu june 2011
Chris Gatewood
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
Hsuan-Ting Chen
 
Dave Boyce: How to Launch a Successful Social Fundraising Campaign?
Dave Boyce: How to Launch a Successful Social Fundraising Campaign?Dave Boyce: How to Launch a Successful Social Fundraising Campaign?
Dave Boyce: How to Launch a Successful Social Fundraising Campaign?
Social Media for Nonprofits
 
How to Launch a Successful Fundraising Campaign
How to Launch a Successful Fundraising CampaignHow to Launch a Successful Fundraising Campaign
How to Launch a Successful Fundraising Campaign
Social Media for Nonprofits
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
Social media for councillors presentation
Social media for councillors presentationSocial media for councillors presentation
Social media for councillors presentation
Paul Greene MCIPR
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
zackkay
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
Nathan Lesser
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risks
JAIRO SUAREZ
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
Inflection Point Global
 
The Reality Behind Your Webpresence
The Reality Behind Your WebpresenceThe Reality Behind Your Webpresence
The Reality Behind Your Webpresence
cdoval
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Marian Merritt
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
Robin540999
 
Awareness about cyberbulling and growing concerns
Awareness about cyberbulling and growing concernsAwareness about cyberbulling and growing concerns
Awareness about cyberbulling and growing concerns
Ananya Sharma
 
Social Media for Crisis Communication - Sneak Peak
Social Media for Crisis Communication - Sneak PeakSocial Media for Crisis Communication - Sneak Peak
Social Media for Crisis Communication - Sneak Peak
Rebecca Poling
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
Dobby12
 
Marketing Public Health Through Social Media
Marketing Public Health Through Social MediaMarketing Public Health Through Social Media
Marketing Public Health Through Social Media
Angela Connor
 

Similar to BC Paralegal Association Social Media Privacy and Ethics Presentation (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Dave Boyce 3 Myths & Musts of Social Fundraising
Dave Boyce 3 Myths & Musts of Social FundraisingDave Boyce 3 Myths & Musts of Social Fundraising
Dave Boyce 3 Myths & Musts of Social Fundraising
 
Curate training digital generation
Curate training digital generationCurate training digital generation
Curate training digital generation
 
Sm legal topics vcu june 2011
Sm legal topics vcu june 2011Sm legal topics vcu june 2011
Sm legal topics vcu june 2011
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Dave Boyce: How to Launch a Successful Social Fundraising Campaign?
Dave Boyce: How to Launch a Successful Social Fundraising Campaign?Dave Boyce: How to Launch a Successful Social Fundraising Campaign?
Dave Boyce: How to Launch a Successful Social Fundraising Campaign?
 
How to Launch a Successful Fundraising Campaign
How to Launch a Successful Fundraising CampaignHow to Launch a Successful Fundraising Campaign
How to Launch a Successful Fundraising Campaign
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Social media for councillors presentation
Social media for councillors presentationSocial media for councillors presentation
Social media for councillors presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risks
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
The Reality Behind Your Webpresence
The Reality Behind Your WebpresenceThe Reality Behind Your Webpresence
The Reality Behind Your Webpresence
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Awareness about cyberbulling and growing concerns
Awareness about cyberbulling and growing concernsAwareness about cyberbulling and growing concerns
Awareness about cyberbulling and growing concerns
 
Social Media for Crisis Communication - Sneak Peak
Social Media for Crisis Communication - Sneak PeakSocial Media for Crisis Communication - Sneak Peak
Social Media for Crisis Communication - Sneak Peak
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
 
Marketing Public Health Through Social Media
Marketing Public Health Through Social MediaMarketing Public Health Through Social Media
Marketing Public Health Through Social Media
 

More from Samantha Collier

10 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v210 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v2
Samantha Collier
 
Internet Safety Tips for Parents of Teenagers
Internet Safety Tips for Parents of TeenagersInternet Safety Tips for Parents of Teenagers
Internet Safety Tips for Parents of Teenagers
Samantha Collier
 
How to Pick the Perfect LinkedIn Profile
How to Pick the Perfect LinkedIn ProfileHow to Pick the Perfect LinkedIn Profile
How to Pick the Perfect LinkedIn Profile
Samantha Collier
 
Social Media for Law Firms 2015 Edition
Social Media for Law Firms 2015 Edition Social Media for Law Firms 2015 Edition
Social Media for Law Firms 2015 Edition
Samantha Collier
 
Social Media Rocket Matter
Social Media Rocket MatterSocial Media Rocket Matter
Social Media Rocket Matter
Samantha Collier
 
Google +
Google +Google +
Google +
Google +Google +
WTF? Did You Know Your Firm is on Facebook
WTF? Did You Know Your Firm is on FacebookWTF? Did You Know Your Firm is on Facebook
WTF? Did You Know Your Firm is on Facebook
Samantha Collier
 

More from Samantha Collier (8)

10 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v210 simple steps for creating a social media strategy v2
10 simple steps for creating a social media strategy v2
 
Internet Safety Tips for Parents of Teenagers
Internet Safety Tips for Parents of TeenagersInternet Safety Tips for Parents of Teenagers
Internet Safety Tips for Parents of Teenagers
 
How to Pick the Perfect LinkedIn Profile
How to Pick the Perfect LinkedIn ProfileHow to Pick the Perfect LinkedIn Profile
How to Pick the Perfect LinkedIn Profile
 
Social Media for Law Firms 2015 Edition
Social Media for Law Firms 2015 Edition Social Media for Law Firms 2015 Edition
Social Media for Law Firms 2015 Edition
 
Social Media Rocket Matter
Social Media Rocket MatterSocial Media Rocket Matter
Social Media Rocket Matter
 
Google +
Google +Google +
Google +
 
Google +
Google +Google +
Google +
 
WTF? Did You Know Your Firm is on Facebook
WTF? Did You Know Your Firm is on FacebookWTF? Did You Know Your Firm is on Facebook
WTF? Did You Know Your Firm is on Facebook
 

Recently uploaded

一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
exqfuhe
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
9u4xjk4w
 
ChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdfChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdf
almutabbil
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
Elysian Digital Services Pvt. Ltd.
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
anubug
 
Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
SocioCosmos
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
wozek1
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
AJHSSR Journal
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
viralbusinessmarketi
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
SocioCosmos
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
AJHSSR Journal
 

Recently uploaded (13)

一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
 
ChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdfChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdf
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
 
Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
 

BC Paralegal Association Social Media Privacy and Ethics Presentation

  • 1. Presented by Samantha Collier of R.JOHNSON Legal Recruitment for the British Columbia Paralegal Association on June 25th, 2014
  • 2. Featured In: CBC Currents: The Digital Afterlife: Facebook and Death – Samantha Collier Globe and Mail: Law Firms Dipping Toes in Social Media Ocean Lawyers Weekly: The 24: Canada’s Top Legal Social Media Influencers Canadian Law Blog Awards 2011 Winner – Top Practice Management Category
  • 3.
  • 4. Agenda • Social Media Blunders • Privacy • Concerns • Best Practices
  • 5. Blunder #1 (Personal Story) • Checked in on Foursquare and Facebook on a regular basis • Used Facebook, LinkedIn and Twitter publicly • Always felt safe.
  • 6. And then… Random stranger showing up at the restaurant I’m at because I “checked in”. It was harmless but it was a wake-up call.
  • 7. Blunder #2 Alexandra Wallace = 10 million references on Google about her being a racist.
  • 8. Blunder #3 • Rebecca Martinson Delta Gamma
  • 9. Privacy Good way to gage your online privacy. Take your “Google Portrait”.
  • 10.
  • 11. Concern #1 Are my Facebook pictures mine?
  • 12. Concern #2 How do my social media accounts get hacked?
  • 13. Concern #3 How can I protect my privacy?
  • 14. Concern #4 I don’t use social media at all. Can I just forget about online privacy?
  • 15. Best Practices Never check in from home or work  Only accept friend requests from those you know and trust Change up your morning routines if you check in to coffee shops and such Check and double check your privacy settings Turn off geo-tagging in your cell phone.  Don’t publish what you don’t want to know. There is no true “Privacy” on the web.

Editor's Notes

  1. My name is Samantha Collier and I am the marketing and communications specialist at R.JOHNSON Legal Recruitment. I help lawyers and legal professionals such as yourselves with the ins and outs of social media. Before working for R.JOHNSON, I worked in a law firm for 7 years in the business development department and began to work on the firm’s social media policy approximately 3 years ago. After that, I was getting asked to consult quite frequently, so I quit my job and started my own business. Even though I hate tooting my own horn, Richard told me I had too so my work has been featured in the CBC where I was on the Trends radio show talking about what happens to your Facebook account after you die. I had a small mention in the globe and mail about law firms dipping their toes in social media. I was voted as one of the top 24 Canadian legal tweeters and my blog won in the practice management category in the Canadian law log awards. As you know running a business from home with three kids can be quite hectic so I downgraded my social media business and have been working at RJ for just about a year. Actually, I was recently featured in the province on the 2nd page as…
  2. Having RWS, rushing woman syndrome. I’m sure many of you suffer from the same ailment working full time with kids and engagements. I was featured in this article because a reporter tweeted that she wanted to talk to burned out moms and I responded. One thing led to another and bam, a photographer was in our office. I didn’t realize it was going to be on page 3 and I got a few phone calls to make sure I wasn’t going to the loony bin. The closeup wasn’t necessary and reminded me I needed to get new crow’s feet
  3. On to our agenda, today we’re discussing four things: social media blunders, privacy, concerns, and best practices. We’ll have a 15 minute question period at the end if you have any questions.
  4. Our first blunder story is one of own personal stories. When I first starting using social media, I jumped in head first. I was always an early adopter so they say. I checked in to places on Foursquare and Facebook and used these accounts publicly. In other words, I felt safe. In the summer of 2010, I was on Bowen Island with the managigng partner of our firm. I was helping her with a project and was tweeting the ferry ride, the wildlife, etc. I didn’t see it being a big deal. We went to a little restaurant and I checked in on foursquare and tweeted a picture of the harbor.
  5. Within minutes, a gentleman arrived at the restaurant and approached me. He told me he had seen my post(s) and wanted to say hello. In this circumstance, it was harmless, but, it could have turned out much worse. This was a huge wake up call and a common concern. I still check in to some places but I usually do it after I’ve been there.
  6. Blunder #2. This isn’t a blunder, it’s a nightmare. Alexandra Wallace was a UCLA student majoring in junior political science. who made racial remarks via YouTube. She had been studying in the library and certain people were speaking loudly on their cell phones. Her remarks were terrible and I’m not sure what possessed her to post them on YouTube. The video was viewed millions of times and went viral. Alexandra began to receive hundreds of death threats, harassing emails and phone calls. The locations of where she was taking her tests also became public and she was receiving even more death threats. In the end, she wasn’t kicked out of school but they were considering discipline and called the video “hate speech” and “harassment” The most important lesson from this story is not to post anything online that you don’t mind the whole world seeing. Alexandra Wallace = 10 million references on Google to her being a racist.
  7. This is also a nightmare so I will call it Blunder #3. Rebecca Martinson attended the University of Maryland where she headed a sorority. The story goes like this. Her sorority met up with a close by fraternity where they had a party during Greek Week. The party must have not gone so well because after the event, she sent a furious email to all her sisters threatening violence because of the sisters’ interactions with the fraternity. The email was so terrible that I can’t even read portions of it. It is really terrible. What Rebecca didn’t foresee was the email becoming public knowledge when it was published online. Rebecca resigned from the fraternity and said she didn’t mean the email to go viral. Reactions were separate: many praised the sorority’s decision but others said “any of us could have a similar lapse in judgment’. Overall, the points to remember from this story to remember is that anything you put in an email or a social media post is public. There’s no such thing as 100% privacy anymore. If Rebecca wants to get a certain job, and her interviewer types her name into Google, I don’t think she’d be impressed.
  8. Here’s where we start talking about Privacy. A good way to find out what’s public knowledge about you is to Google yourself. Type in your first and last name surrounded by hyphens and hit search. I’ve shown what comes up when you Google Samantha Collier. You should also search for family names, nicknames and any other aliases you might have. For me, my blog comes up #1, images of me #2 (back when I was pre-pregnant and skinny plus a few other Samantha Collier’s}. And then a bunch of my articles. It’s funny because 10 years ago there was a doctor named Samantha Collier and all her stuff used to appear on the first page and I think I take up the first 10 pages of results now… When you take you Google snapshot, if you find negative content, you have a few options: If it’s a friend that authors the content, politely ask them to take it down. If it’s a business, send them an email and be polite, proper and professional. For content that you control, delete the Facebook, Twitter posts, etc. Request that Google remove the content. They usually won’t do it unless it is violation of their policies. This includes someone posting your SIN number, adult spam, etc. Tips Google can’t crawl what they don’t see so be very selective about what you share. If you use online forurm, use an alias and don’t enter all of your personal information. You should also consider creating a separate email address to use for all your other accounts like Netflix etc. Keep your user name abbreviated. Another method to get rid of bad content is to flood the Internet with good content. Good content will push the bad content down over time.
  9. Have you heard about Facebook’s New Graph Search? It’s very important and you need to adjust your privacy settings accordingly. Using Microsoft’s Bing, people can now do ultra detailed searches using people’s names, and can find posts, images and information that are hidden from the timeline. It’s pretty scary what people can find out about you if you don’t have your settings adjusting. One hacker even created a phone directory using the new graph search. Say you’re a burned girlfriend who thinks their boyfriend is cheating on them. They can do a detailed search of every picture their boyfriend liked from all of time. She can also look for tagged pictures of him, pictures he commented on, where’s he’s been, etc. How to Protect Yourself Log into facebook and go into your account settings. Make sure that you limit the privacy accordingly and set the privacy for all your past posts. Protect yourself from your friends as in make sure you have to approve tagged photos before they are posted.
  10. But you need to control your privacy and application settings. For content that is covered by IP rights, you specifically give FB the following permission, subject to your privacy and application settings: you grant FB a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook.
  11. 70% Phishing (sending email and clicking link) 39% of social users have same passwords for many accounts.
  12. Don’t click links in emails, don’t download files, keep security software up-to-date and change passwords often. Tighten settings on all social networks, view your public profile, only connect with those you know. A long password is a strong password. Talk about 1password. Don’t post anything you wouldn’t want your grandmother seeing,
  13. No. It is constantly changing but it can be managed. Keep yourself educated. Remember, Facebook is free to use.