SlideShare a Scribd company logo
Protect Your Identity  During Social Networking Linda Vincent, RN. PI. The Identity Advocate © Vincent & Associates.  Reprints available by permission
Social Networking by the Numbers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
Five Tips to Protect Your Identity  During Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
Step One:  Protect Your Personal Information  ,[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
Step Two:  Learn the  Rules for Privacy ,[object Object],[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
Step Three: Restrict Access ,[object Object],[object Object],[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
Step Four:  Set Up  Google Alerts ,[object Object],[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
Step Five:  Post for Posterity  ,[object Object],[object Object],[object Object],[object Object],© Vincent & Associates.  Reprints available by permission
The moral of the story?  Have fun on social networks and be cautious.  You never know who may want to be your “friend.”  © Vincent & Associates.  Reprints available by permission
Thank You for watching For More Information  Web:  www.theidentityadvocate.com   Phone:  310-831-4400 Twitter: www.twitter.com/IDAdvocate © Vincent & Associates.  Reprints available by permission

More Related Content

What's hot

Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
justbecos
 
Twitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysisTwitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysis
kimili
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
Chad Warner
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
Antglynn
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitter
guestb39306
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
MindMake - Parenting & Education
 
Connect with Care
Connect with CareConnect with Care
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
Washington Trafficking Prevention
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
CBD College
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Shawn Tuma
 
BrightonSEO 2013 Paul Madden - How to spot a shitty link
BrightonSEO 2013 Paul Madden - How to spot a shitty linkBrightonSEO 2013 Paul Madden - How to spot a shitty link
BrightonSEO 2013 Paul Madden - How to spot a shitty link
LinkRisk
 
Ten Rules Of Internet Safety
Ten Rules Of Internet SafetyTen Rules Of Internet Safety
Ten Rules Of Internet Safety
guest106941
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
bigmike18
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
smeech
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Int Safety
Int SafetyInt Safety
Int Safety
MrsMac9
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
TheMightyNuggets
 
Social Media: The Good, The Bad, The Clueless
Social Media: The Good, The Bad, The CluelessSocial Media: The Good, The Bad, The Clueless
Social Media: The Good, The Bad, The Clueless
Room 214
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
Shawn Tuma
 

What's hot (20)

Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
 
Twitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysisTwitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysis
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitter
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Connect with Care
Connect with CareConnect with Care
Connect with Care
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
BrightonSEO 2013 Paul Madden - How to spot a shitty link
BrightonSEO 2013 Paul Madden - How to spot a shitty linkBrightonSEO 2013 Paul Madden - How to spot a shitty link
BrightonSEO 2013 Paul Madden - How to spot a shitty link
 
Ten Rules Of Internet Safety
Ten Rules Of Internet SafetyTen Rules Of Internet Safety
Ten Rules Of Internet Safety
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Int Safety
Int SafetyInt Safety
Int Safety
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Social Media: The Good, The Bad, The Clueless
Social Media: The Good, The Bad, The CluelessSocial Media: The Good, The Bad, The Clueless
Social Media: The Good, The Bad, The Clueless
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 

Viewers also liked

Bridgewater
BridgewaterBridgewater
Bridgewater
Steve Roesch
 
Johnson Wealth Advisors Group of Birmingham
Johnson Wealth Advisors Group of BirminghamJohnson Wealth Advisors Group of Birmingham
Johnson Wealth Advisors Group of Birmingham
paul_johnson
 
MB_Overview-2016
MB_Overview-2016MB_Overview-2016
MB_Overview-2016
Manuel Oothria Raj
 
Lucini India Product Services_LI
Lucini India Product  Services_LILucini India Product  Services_LI
Lucini India Product Services_LI
Manuel Oothria Raj
 
CV - Payal Shah
CV - Payal ShahCV - Payal Shah
CV - Payal Shah
Payal Shah
 
contract law
contract lawcontract law
contract law
Hassan Yassine
 
A review on plant without soil hydroponics
A review on plant without soil   hydroponicsA review on plant without soil   hydroponics
A review on plant without soil hydroponics
eSAT Journals
 
NEW WAVE MEGAMIX
NEW WAVE MEGAMIXNEW WAVE MEGAMIX
NEW WAVE MEGAMIX
VisualBee.com
 
Saunier Duval TC C25E
Saunier Duval TC C25ESaunier Duval TC C25E
Saunier Duval TC C25E
catv1o64ma
 
client relationships
client relationshipsclient relationships
client relationships
Hassan Yassine
 
BLOOD OIL & CORPORATE RECKLESSNESS
BLOOD OIL & CORPORATE RECKLESSNESSBLOOD OIL & CORPORATE RECKLESSNESS
BLOOD OIL & CORPORATE RECKLESSNESS
TrueDemocracy
 
Aula18 nbr12721-140702171822-phpapp02
Aula18 nbr12721-140702171822-phpapp02Aula18 nbr12721-140702171822-phpapp02
Aula18 nbr12721-140702171822-phpapp02
Gabriel Jaña Porretto
 
Blue Devil LOR
Blue Devil LOR Blue Devil LOR
Blue Devil LOR
Hassan Bilal
 
Health information system for crm implementation in ttd
Health information system for crm implementation in ttdHealth information system for crm implementation in ttd
Health information system for crm implementation in ttd
eSAT Journals
 
laudo de avaliação dos bens e ativos
laudo de avaliação dos bens e ativoslaudo de avaliação dos bens e ativos
laudo de avaliação dos bens e ativos
Everton Retore Teixeira
 
Time to buy REO's
Time to buy REO'sTime to buy REO's
Time to buy REO's
Steve Roesch
 
Evaluation of topsoil iron oxide from visible spectroscopy
Evaluation of topsoil iron oxide from visible spectroscopyEvaluation of topsoil iron oxide from visible spectroscopy
Evaluation of topsoil iron oxide from visible spectroscopy
eSAT Journals
 
The Public Records Act, Digital Storage and Disposal of Information, Presenta...
The Public Records Act, Digital Storage and Disposal of Information, Presenta...The Public Records Act, Digital Storage and Disposal of Information, Presenta...
The Public Records Act, Digital Storage and Disposal of Information, Presenta...
warehaev
 
Avaliacao Imobiliaria: método comparativo de dados do mercado
Avaliacao Imobiliaria: método comparativo de dados do mercadoAvaliacao Imobiliaria: método comparativo de dados do mercado
Avaliacao Imobiliaria: método comparativo de dados do mercado
Gilson Lima
 

Viewers also liked (20)

Bridgewater
BridgewaterBridgewater
Bridgewater
 
Johnson Wealth Advisors Group of Birmingham
Johnson Wealth Advisors Group of BirminghamJohnson Wealth Advisors Group of Birmingham
Johnson Wealth Advisors Group of Birmingham
 
MB_Overview-2016
MB_Overview-2016MB_Overview-2016
MB_Overview-2016
 
Lucini India Product Services_LI
Lucini India Product  Services_LILucini India Product  Services_LI
Lucini India Product Services_LI
 
CV - Payal Shah
CV - Payal ShahCV - Payal Shah
CV - Payal Shah
 
contract law
contract lawcontract law
contract law
 
A review on plant without soil hydroponics
A review on plant without soil   hydroponicsA review on plant without soil   hydroponics
A review on plant without soil hydroponics
 
NEW WAVE MEGAMIX
NEW WAVE MEGAMIXNEW WAVE MEGAMIX
NEW WAVE MEGAMIX
 
Saunier Duval TC C25E
Saunier Duval TC C25ESaunier Duval TC C25E
Saunier Duval TC C25E
 
COA 2017
COA 2017COA 2017
COA 2017
 
client relationships
client relationshipsclient relationships
client relationships
 
BLOOD OIL & CORPORATE RECKLESSNESS
BLOOD OIL & CORPORATE RECKLESSNESSBLOOD OIL & CORPORATE RECKLESSNESS
BLOOD OIL & CORPORATE RECKLESSNESS
 
Aula18 nbr12721-140702171822-phpapp02
Aula18 nbr12721-140702171822-phpapp02Aula18 nbr12721-140702171822-phpapp02
Aula18 nbr12721-140702171822-phpapp02
 
Blue Devil LOR
Blue Devil LOR Blue Devil LOR
Blue Devil LOR
 
Health information system for crm implementation in ttd
Health information system for crm implementation in ttdHealth information system for crm implementation in ttd
Health information system for crm implementation in ttd
 
laudo de avaliação dos bens e ativos
laudo de avaliação dos bens e ativoslaudo de avaliação dos bens e ativos
laudo de avaliação dos bens e ativos
 
Time to buy REO's
Time to buy REO'sTime to buy REO's
Time to buy REO's
 
Evaluation of topsoil iron oxide from visible spectroscopy
Evaluation of topsoil iron oxide from visible spectroscopyEvaluation of topsoil iron oxide from visible spectroscopy
Evaluation of topsoil iron oxide from visible spectroscopy
 
The Public Records Act, Digital Storage and Disposal of Information, Presenta...
The Public Records Act, Digital Storage and Disposal of Information, Presenta...The Public Records Act, Digital Storage and Disposal of Information, Presenta...
The Public Records Act, Digital Storage and Disposal of Information, Presenta...
 
Avaliacao Imobiliaria: método comparativo de dados do mercado
Avaliacao Imobiliaria: método comparativo de dados do mercadoAvaliacao Imobiliaria: método comparativo de dados do mercado
Avaliacao Imobiliaria: método comparativo de dados do mercado
 

Similar to Protect Your Identity During Social Networking

Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
Grayzon Gonzales, LPT
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
kamranrazzaq8
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
PriyanshuPatel363793
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
shanikosh
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
tomasztopa
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
MelchorTolentino2
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
Sandeep Thoniparambil
 
Facebook
FacebookFacebook
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Taylor Van Sickle
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
fig2381
 

Similar to Protect Your Identity During Social Networking (20)

Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
Users guide
Users guideUsers guide
Users guide
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
Facebook
FacebookFacebook
Facebook
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 

Protect Your Identity During Social Networking

  • 1. Protect Your Identity During Social Networking Linda Vincent, RN. PI. The Identity Advocate © Vincent & Associates. Reprints available by permission
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. The moral of the story? Have fun on social networks and be cautious. You never know who may want to be your “friend.” © Vincent & Associates. Reprints available by permission
  • 10. Thank You for watching For More Information Web: www.theidentityadvocate.com Phone: 310-831-4400 Twitter: www.twitter.com/IDAdvocate © Vincent & Associates. Reprints available by permission

Editor's Notes

  1. Millennium – Unity Surgery Center AquaPT – PharmaDeliberate misreporting of wholesale prices Infusion therapy Generic Substitutions Medical Tourism
  2. An abusive incident may become fraudulent if persisted in over time
  3. The 80/20 rule
  4. Licensing, Certifications, Medicare Wheelchairs Incontinence kits