Thinking about your online presence Kirsten Thompson @_ KirstenT | [email protected] | Digital Dates Programme | University of Leeds
Jan 29, 2015
Thinking about your online presence
Kirsten Thompson@_KirstenT | [email protected] | Digital Dates Programme | University of Leeds
By the end of the session you will be better able to:
1. Manage your online presence
2. Recognise the benefits and challenges of managing personal and professional digital identities
3. Recognise the key issues relating to managing your online presence including public digital communications, online safety and privacy
Outcomes
Make informed choices about your digital identity and use of the web
1. Digital identity is…
2. Personal VS Professional
3. Managing your identity
Outline
1. Digital identity is…
‘Digital identity can be defined as all the online information and data specifically about an individual.’
(Last accessed 26/06/13 at: http://distance.uvic.ca/students/identity.htm)
Your Digital Identity
Creating an account on the social web is a choice.
Having a digital identity is not.
We all have a digital footprint.
Your digital identity = everything about you
on the webVerified / non-verified
– both important
What else are you sharing?
WHOIS databaseLocation servicesSocial media privacyMobile device security
How do you verify who you are talking to online? How do others verify you?
How easy is it to steal your online identity?
Who manages your digital identity?
This was posted on Twitter during a recent conference presentation #NoEscape
Some companies create profiles for
us using public information on the web – inaccurate
and merging identities.
You can manage your digital identity, you cannot control it
2. Personal VS Professional
“Don’t say (or do) anything you wouldn’t on 5 Live.”Rory Cellan-Jones
Social media = public
Separate personal and professional, makes each presence more useful to your networks
You’re not anonymous on social media – dangerous to think you are
Impact of liking, re-tweeting
Click the video to watch
Do you use the same e-mail address to manage all your social media accounts?
Are you merging personal, professional and institutional social profiles?
Social media sites encourage us to integrate our email address book – your email contacts will find you, whether you want to be found or not.
http://news.uk.msn.com/uk/twitter-trolls-u-turn-after-users-threaten-to-tell-his-mum
Case: Lord McAlpine falsely accused Alleged offence: Libel
Case: Twitter users name victim of rape by footballer Ched EvansOffence: The Sexual Offences (Amendment) Act 1992
Case: Social media users circulated alleged pictures of child killer Jon VenablesAlleged offence: Contempt of Court
http://www.bbc.co.uk/news/magazine-20782257
Case: Juror Joanne Fraill contact defendant in trial by FacebookOffence: Contempt of Court
Case: Paul Chambers joked on Twitter that he would blow up Robin Hood AirportOffence: Sending a “menacing electronic communication” under the 2003 Communications Act
Case: Reading man Sean Duff mocks dead children on social media sitesOffence: Making “grossly offensive” comments under the Malicious Communications Act 1988
http://www.bbc.co.uk/news/magazine-20782257
3. Managing your identity
University Guidance
Click the website images to visit each
site.
Are you feeling lucky?
Start thinking like a search engine – be the top of your own search results.
Use Google Alerts to keep updated on what others are saying about you (your work, project etc) on the web. It won’t search everything, but can assist in managing your digital identity.
accidentaloutlaw.knowthenet.org.uk
Existing laws apply online as they do offline – new Defamation Act 2013 (good news). BBC Defamation article
Only share information when you have permission and obtain permission to publish someone else’s work
Avoid making comments and being supportive of the comments or actions of others, if they could get you in trouble.
Everything shared on social media, regardless of privacy settings can be captured.
Educate your social network – your “private” Facebook Timeline is only as secure as the devices you/your Facebook “friends” use.
Put simply…think first, share second
Think about security1. Use official mobile apps and trusted third-party apps – check reviews.
2. Location services – what else are you sharing with the world?
3. Are your mobile devices secure? What information are you giving away if your device is lost/stolen? Is your device set up for remote wiping?
4. A service or App might be secure, your internet access might not be – think about what you do/where you do it – public Wi-Fi can be dangerous.
5. Do you need to remain logged into all apps at all times? Think about your web history too.
6. Be wary of hackers, account cloning, phishing scams, rogue links.
7. Unused accounts at risk – monitor or close | consider strong password security.
Keep updated
about online safety
and the law
www.socialmedialaw.co.uk www.thatsnonsense.com/