This presentation was used during the "Thinking about your online presence" Digital Dates event for staff and students at the University of Leeds on Thursday 20/03/14. It is based upon the "Your Digital Identity" session which I facilitate for colleagues at the University.
Thinking about your online presence (Digital Dates, University of Leeds)
1. Thinking about your online presence
Kirsten Thompson
@_KirstenT | K.Thompson@adm.leeds.ac.uk | Digital Dates Programme | University of Leeds
2. By the end of the session you will be better able to:
1. Manage your online presence
2. Recognise the benefits and challenges of managing
personal and professional digital identities
3. Recognise the key issues relating to managing your
online presence including public digital communications,
online safety and privacy
Outcomes
Make informed choices about your digital identity and use
of the web
3. 1. Digital identity is…
2. Personal VS Professional
3. Managing your identity
Outline
5. „Digital identity can
be defined as all
the online
information and
data specifically
about an
individual.‟
(Last accessed 26/06/13 at:
http://distance.uvic.ca/students/identity.htm)
Your
Digital
Identity
6. Creating an account on
the social web is a
choice.
Having a digital identity
is not.
We all have a digital
footprint.
7. Your digital identity =
everything about you
on the web
Verified / non-verified
– both important
8. What else are you
sharing?
WHOIS database
Location services
Social media privacy
Mobile device security
9. How do you verify who you are talking
to online? How do others verify you?
16. “Don‟t say (or do)
anything you
wouldn‟t on 5
Live.”
Rory Cellan-Jones
Social media = public
Separate personal and
professional, makes each
presence more useful to
your networks
You‟re not anonymous on
social media – dangerous to
think you are
Impact of liking, re-tweeting
Click the video to watch
17. Email
Do you use the same e-mail address to
manage all your social media accounts?
Are you merging personal, professional and
institutional social profiles?
Social media sites encourage us to integrate
our email address book – your email contacts
will find you, whether you want to be found or
not.
19. Case: Lord McAlpine falsely accused
Alleged offence: Libel
Case: Twitter users name victim of rape by
footballer Ched Evans
Offence: The Sexual Offences (Amendment)
Act 1992
Case: Social media users circulated alleged
pictures of child killer Jon Venables
Alleged offence: Contempt of Court
http://www.bbc.co.uk/news/magazine-20782257
20. Case: Juror Joanne Fraill contact defendant in trial by
Facebook
Offence: Contempt of Court
Case: Paul Chambers joked on Twitter that he would
blow up Robin Hood Airport
Offence: Sending a “menacing electronic
communication” under the 2003 Communications Act
Case: Reading man Sean Duff mocks dead children
on social media sites
Offence: Making “grossly offensive” comments under
the Malicious Communications Act 1988
http://www.bbc.co.uk/news/magazine-20782257
24. Are you feeling lucky?
Start thinking like a search engine –
be the top of your own search
results.
25. Use Google Alerts
to keep updated on
what others are
saying about you
(your work, project
etc) on the web. It
won‟t search
everything, but can
assist in managing
your digital identity.
27. Existing laws apply online as they do offline – new Defamation
Act 2013 (good news). BBC Defamation article
Only share information when you have permission and obtain
permission to publish someone else‟s work
Avoid making comments and being supportive of the comments
or actions of others, if they could get you in trouble.
Everything shared on social media, regardless of privacy
settings can be captured.
Educate your social network – your “private” Facebook Timeline
is only as secure as the devices you/your Facebook “friends”
use.
Put simply…think first, share second
28. Think about security
1. Use official mobile apps and trusted third-party apps – check reviews.
2. Location services – what else are you sharing with the world?
3. Are your mobile devices secure? What information are you giving away if
your device is lost/stolen? Is your device set up for remote wiping?
4. A service or App might be secure, your internet access might not be –
think about what you do/where you do it – public Wi-Fi can be dangerous.
5. Do you need to remain logged into all apps at all times? Think about your
web history too.
6. Be wary of hackers, account cloning, phishing scams, rogue links.
7. Unused accounts at risk – monitor or close | consider strong password
security.