Presentation is loading. Please wait.

Presentation is loading. Please wait.

Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.

Similar presentations


Presentation on theme: "Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual."— Presentation transcript:

1 Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual Property SectionTechnology Specialist

2 AGENDA Social Networking and Your Digital Dossier How to Avoid: Career Pitfalls Online Predators Identity Theft (P2P) Viruses & Spyware

3 Social Networking

4 Digital Dossier

5 How Do You Contribute to Your Digital Dossier? Social Networking Social Networking Creating & Collaborating Online Creating & Collaborating Online Other Thoughts? Other Thoughts?

6 Facebook User Agreement By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.

7 How Might Others Contribute to Your Digital Dossier? 33,139,666 Views (10/27/09)

8 What are Possible Consequences of the Content That Makes Up Your Digital Dossier?

9 Career Pitfalls… The Future is in YOUR Hands! One in five employers search social networking sites before hiring One in five employers search social networking sites before hiring One-third of those said they found information that caused them to toss out potential candidates One-third of those said they found information that caused them to toss out potential candidates Universities and colleges are also searching sites when reviewing applications Universities and colleges are also searching sites when reviewing applications Many teachers, administrators, and coaches are also reviewing these sites Many teachers, administrators, and coaches are also reviewing these sites Who is Looking at Your Digital Dossier?

10 Who Else Might Be Looking at Your Digital Profile?

11 Who Have You “Friended” Lately? “Yeah baby, I’m 6’1, tan, fit, washboard abs…”

12 How Can You Find Out What Is In Your Digital Profile?

13

14 Safety Tips for Safe and Responsible Social Networking

15 Protect Your Privacy & Reputation Use the privacy protection features to limit who can view your profile. Use the privacy protection features to limit who can view your profile. But remember private does not mean PRIVATE. But remember private does not mean PRIVATE. This profile is set to private. This user must add you as a friend to see his/her profile. view more This profile is set to private. This user must add you as a friend to see his/her profile. view more Private = Limited Access!

16 Even if you use privacy protection features, don’t post material that could… Allow a stranger to find you in Real Life Allow a stranger to find you in Real Life Attract a dangerous stranger Attract a dangerous stranger Be used by a cyber-bully to torment you Be used by a cyber-bully to torment you Damage your reputation, friendships, or future opportunities Damage your reputation, friendships, or future opportunities Cause harm or distress to another by contributing to others “digital dossier” Cause harm or distress to another by contributing to others “digital dossier”

17 Protect Your Privacy If someone posts inappropriate material about you on their profile, demand that it be removed. If not, tell a trusted adult or file a complaint. If someone posts inappropriate material about you on their profile, demand that it be removed. If not, tell a trusted adult or file a complaint. Recognize that personality quizzes and contests are techniques to obtain your personal information for advertising. Recognize that personality quizzes and contests are techniques to obtain your personal information for advertising.

18 Be Selective Be selective about who you add as friends Be selective about who you add as friends Block anyone who… Block anyone who… Communicates rudely Communicates rudely Sends “overly friendly” messages Sends “overly friendly” messages Wants to talk about sex Wants to talk about sex Does not fit your values Does not fit your values File a complaint if you receive harmful communications with social networking provider or cybertipline.com File a complaint if you receive harmful communications with social networking provider or cybertipline.com

19 Safe and Responsible Computing

20 Identify Theft-P2P

21 Identify Theft: The P2P Problem

22 P2P Example: Limewire

23 How do sensitive files get exposed? My Documents = Shared Folder  Music  Movies  Corporate Files  Personal Files PC Network Drive P2P file sharing programs “index” PC and Network Drives and expose them to anyone with access to the WW P2P

24 Files are shared unintentionally “Though it appears that filesharing has been disabled for all folders by clicking on the “Deselect All” button, the program continues to surreptitiously share the Downloads folder”

25

26 P2P-Ways to Protect Yourself Be careful about what “permissions” you have set up. Be careful about what “permissions” you have set up. Avoid sharing your own files and say no to any offers to install such software. Avoid sharing your own files and say no to any offers to install such software. Even then, there is no guarantee you will not experience problems as a result of having the software on your computer. Even then, there is no guarantee you will not experience problems as a result of having the software on your computer.

27 Viruses & Spyware P2P downloads can result in viruses & spyware-BotNets P2P downloads can result in viruses & spyware-BotNets Be careful of game cheat sites Be careful of game cheat sites Use Anti-Virus Software and keep updates current! Use Anti-Virus Software and keep updates current!

28 Conclusion

29 Keep Your Life In Balance Communicating with friends online can strengthen your friendships, but make sure you also spend time with your friends in Real Life. Communicating with friends online can strengthen your friendships, but make sure you also spend time with your friends in Real Life.

30 Be a Leader If you see someone who is making bad choices or is in danger…. Talk with the person about your concerns. Talk with the person about your concerns. Be a model for positive and productive online choices. Be a model for positive and productive online choices.

31 Questions?


Download ppt "Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual."

Similar presentations


Ads by Google