Professional Documents
Culture Documents
RELATED TO SOCIAL
MEDIA
Module 6:2
Ethics in Technology
DIGITAL FOOTPRINT
Definition
https://techterms.com/definition/
digital_footprint
DIGITAL FOOTPRINT
https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT
https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT
https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT
https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT
So how can you manage your digital footprint? Here are a
few places to start:
Keep login info under lock and key: Never share any of your
usernames or passwords with anyone.
http://www.rasmussen.edu/student-life/blogs/main/your-
digital-footprint/
DIGITAL FOOTPRINT
So how can you manage your digital footprint? Here are a few
places to start:
Nix the pics: Any photo you post publicly is fair game for anyone
to dig up. If you do choose to share questionable pictures, be
sure to set your privacy settings accordingly.
http://www.rasmussen.edu/student-life/blogs/main/your-digital-
footprint/
DIGITAL FOOTPRINT
What are the benefits of having a digital footprint?
Before you start having nightmares about the dangers of
digital footprints, it’s important to know there are
positive aspects as well. It’s a way for you to create a
personal brand for yourself. You’re now aware that
employers are following your trail, so take advantage of
it! There are many ways you can leverage your digital
skills to land a job.
“The best thing to do is not to stay offline,” says Jessica
Koltz, Rasmussen College career services advisor. She
encourages you to participate in professional groups or
forums and network with others in your field. She says
creating a personal blog is another way to highlight your
strengths and personality online.
http://www.rasmussen.edu/student-life/blogs/main/your-
digital-footprint/
ABOUT USER PROFILES
The system creates a user profile the first
time that a user logs on to a computer. At
subsequent logons, the system loads the
user's profile, and then other system
components configure the user's environment
according to the information in the profile.
https://msdn.microsoft.com/en-us/library/
windows/desktop/bb776892(v=vs.85).aspx
ABOUT USER PROFILES
User profiles provide the following advantages:
When the user logs on to a computer, the system uses
the same settings that were in use when the user last
logged off.
https://msdn.microsoft.com/en-us/library/windows/
desktop/bb776892(v=vs.85).aspx
ABOUT USER PROFILES
Security of Profiles
Do not share your passwords or pin.
http://www.practicallynetworked.com/sharing/
good_passwords.htm
PASSWORDS
An example of a secure password would be
something like this: Hgs3@4j55nKX!sl
http://www.practicallynetworked.com/
sharing/good_passwords.htm
PASSWORDS
For workstations on a Windows network, Microsoft has
developed official password creation rules. These rules are as
follows:
Passwords MUST be at least 6 characters long
Passwords MAY NOT contain your username or any part of your
full name
Passwords MUST contain characters from at least three of the
four class characteristics, which are listed below.
Classes Characteristics:
English Upper Case
English Lower Case
Numerals
Non-Alphanumeric (Punctuation marks and other symbols)
http://www.practicallynetworked.com/sharing/
good_passwords.htm
PASSWORDS
Remember, having a secure password is
meaningless if you write it down and leave it
where anybody could find it. However, if you
have difficulty remembering a random
password, then you can use a common word like
"password," for example, but add three of the
four class characteristics to it to make it more
secure, such as "paSSw0rd." While not as secure
as a completely random password, it still meets
the outlined criteria, thus making it far more
efficient then your kid's name.
http://www.practicallynetworked.com/sharing/
good_passwords.htm
PASSWORDS
How Often Should You Change Your Password?
https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
When Should You Change Your Password
https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
Does It Really Help?
https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
Password Best Practices
https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
Password Management Software
https://itstillworks.com/should-change-password-
5559302.html
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing
https://www.lifewire.com/why-sharing-your-location-on-
social-media-is-a-bad-thing-2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad
Thing
https://www.lifewire.com/why-sharing-your-location-
on-social-media-is-a-bad-thing-2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing
also tells them where you aren’t. This information can be just as dangerous in
the hands of criminals, here’s why:
You are enjoying the first vacation you’ve had in years, you are thousands of
miles away in the Bahamas and you want to brag about a fancy umbrella drink
you just ordered, so you post a picture of it to Facebook, Instagram, or some
other site. Totally harmless, right? Wrong!
If you are taking a picture and posting it on Facebook from thousands of miles
away, you have just told potentially millions of strangers that you are not at
home, which means that your home is potentially not occupied, and you’ve also
let strangers know that you are at least 10 to 12 hours from returning home.
Now all they need to do is rent a moving van and take whatever they want from
your house. Check out our article on What Not to Post to Social Media While on
Vacation and also read about How Criminals Can Case Your House Using Google
Maps for details on how crooks know what gate is locked before they ever set
foot on your property.
https://www.lifewire.com/why-sharing-your-location-on-social-media-is-a-bad-
thing-2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing
https://www.lifewire.com/why-sharing-your-location-on-social-media-is-a-bad-thing-
2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing
https://www.lifewire.com/why-sharing-your-location-on-
social-media-is-a-bad-thing-2487165
IDENTITY THEFT
Identity theft is the act of a person obtaining
information illegally about someone else.
Thieves try to find such information as full
name, maiden name, address, date of birth,
social security number, passwords, phone
number, e-mail, and credit card numbers.
The thief can then use this information to
gain access to bank accounts, e-mail, cell
phones, identify themselves as you, or sells
your information.
https://www.computerhope.com/jargon/i/
identhef.htm
IDENTITY THEFT
Tips on preventing identity theft:
https://www.computerhope.com/jargon/i/
identhef.htm
IDENTITY THEFT
Tips on preventing identity theft:
https://www.computerhope.com/jargon/i/identhef.htm
IDENTITY THEFT
Tips on preventing identity theft:
https://www.computerhope.com/jargon/i/identhef.htm
SCAM
A scam is a term used to describe any
fraudulent business or scheme that takes
money or other goods from an unsuspecting
person. With the world becoming more
connected thanks to the Internet, online scams
have increased, and it's often up to you to help
stay cautious with people on the Internet.
https://www.computerhope.com/jargon/s/sca
m.htm
SCAM
Types of computer and Internet related scams:
(1) Phishing
Receive an e-mail from someone pretending to be your
bank indicating you are overdrawn or made a purchase you
really didn't make and asking you to log in and verify the
information. However, the link in the e-mail actually points
to a fake site that logs your username and password
information. See our phishing page for further information,
real examples, and related links.
https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:
https://www.computerhope.com/jargon/s/scam.
htm
SCAM
Types of computer and Internet related scams:
https://www.computerhope.com/jargon/s/scam.h
tm
SCAM
Types of computer and Internet related scams:
(4) Catfish
A person who creates a fake online profile with the
intention of deceiving someone. For example, a
woman could create a fake profile on an online
dating website, create a relationship with one or
more people and then create a fake scenario that
asks others for money. See the catfish definition for
further information and related links. See
our catfish page for further information.
https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:
https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:
(6) 419
419 or the Nigeria scam gives the impression you
can gain a large amount of money and only requires
bank information to deposit the money into your
account. In reality, the bank information is used
against the person or the deposits are kept with no
reward. See the 419 page for additional
information.
https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:
https://www.computerhope.com/jargon/s/scam
.htm
SCAM
Types of computer and Internet related scams:
https://www.computerhope.com/jargon/s/s
cam.htm
ONLINE SOCIALISING
Online forums and social media sites are great
for keeping in touch with friends and family,
but be careful about what information you put
online and who you allow to see it.
https://www.staysmartonline.gov.au/protect-
yourself/doing-things-safely/socialising-online
ONLINE SOCIALISING
Use social media safely.
https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
Following a few rules and learning about how your social media platform
handles and displays your information can help reduce risk when
socialising online.
Take the time to read and understand the social network site’s terms
and conditions and privacy policy.
Don't use social networking sites that do not offer any privacy
settings or that allow users to contact each other anonymously.
https://www.staysmartonline.gov.au/protect-yourself/doing-things-
safely/socialising-online
ONLINE SOCIALISING
Following a few rules and learning about how your social media
platform handles and displays your information can help reduce
risk when socialising online.
https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
Following a few rules and learning about how your social media platform
handles and displays your information can help reduce risk when
socialising online.
https://www.staysmartonline.gov.au/protect-yourself/doing-things-
safely/socialising-online
ONLINE SOCIALISING
Important: Be especially careful what you say about others
online. Posting rude, offensive or derogatory comments
about another person or business can have legal
consequences.
Also be aware that many companies check job applicant’s
online profiles. You might not want the photos and
information you share with your friends to be seen by a
prospective employer!
Be wary of strangers – and don’t get scammed!
Remember, people are not always who they say they are
online. If you are 'friends' with people you don’t know, be
especially careful about the amount of information you
reveal - and take care if you choose to meet them in person.
https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
Protect yourself from dating and romance scams
Dating scams are where a criminal pretends to have a
romantic interest in a victim in order to steal their money
or personal information. These scams are often
perpetrated via social media, but use the following
guidance to limit your risk of being scammed in this way.
Check the profile of new friend requests, especially if you
have only met the person online. Look out for:
new profiles with limited content
hidden friend lists or friend lists full of people of the opposite
gender
profiles that read like a dating profile
grammar and spelling errors.
https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
Don’t send money to someone you’ve never met in person.
Be cautious when sharing personal pictures or videos,
especially if you’ve never met them before in person.
Scammers are known to blackmail their targets using
compromising material.
Don’t share personal information with someone you have
never met in person.
Do an image search of your admirer to see if they really
are who they say they are. Use image search services such
as Google or TinEye.
For more information on dating and other scams online,
visit SCAMWatch.
https://www.staysmartonline.gov.au/protect-yourself/
doing-things-safely/socialising-online
ONLINE SOCIALISING
Check the site's privacy policy
Privacy policies govern how your personal information can be
used by the site – it is very important that you take the time to
read the website's privacy policy before you sign up.
Some sites may share your information, such as email addresses
or user preferences, with third party businesses, that may send
you spam.
Privacy policies change. In many cases by continuing to access
or use the services after those changes become effective, you
agree to be bound by the revised privacy policy.
Tip: Regularly review privacy policies and check how much
information you reveal in your profile.
https://www.staysmartonline.gov.au/protect-
yourself/doing-things-safely/socialising-online
THE END