SlideShare una empresa de Scribd logo
1 de 29
+
Risks of Social Media
+
This Session
 The Risks of using Social Media
 Personal Use
 Break
 Business Use
+
Social Media
 We have covered a lot of social media within the course, but
it would be irresponsible not to cover the risks associated
with using these platforms.
 This is particularly important if you have children who use
the internet, or you know of vulnerable adults who may
access social media.
 It’s easy to forget that social media is public – even if we have
shared something with a limited range of people through
Facebook, the content is still online to be viewed.
 Tomorrow we’ll cover using social media for job seeking so
hopefully all of this will help!
+
The Main Risks
 Disclosure of private information.
 Bullying.
 Cyber-stalking.
 Access to age-inappropriate content and online grooming.
 Prosecution or recrimination from posting offensive or
inappropriate comments.
 Phishing emails.
 Hacking and viruses.
+
Social Media
 Seeing these risks, it would be easy to panic and delete all of
your accounts, but when used correctly, the platforms can be
fun and easy to use.
 This session will consider the risks associated with social
media, and how to avoid them.
 We will also look at the differences between social media for
personal use, and social media for business use.
+
Risks – Personal Use
 Disclosure of private information
 Don’t advertise when you are going on holiday if your house
will be empty.Wait until you come back to talk about it.
 Don’t put your whole date of birth in your profile.
 Also be aware that you can sometimes accidentally give
away the answer to your ‘secret question’ to reset your
password through the information on your profile.
 Also be aware about posting your phone number, or address,
in your profile, even if it’s set to be viewed by ‘friends only’.
+
Risks – Personal Use
 Bullying
 Bullying can take many forms, and happens to adults as well
as teenagers and children.
 If someone on your friends list is posting unpleasant
comments, then simply unfriend them.
 Report users for bullying, and get your friends and family to
report the user as well if they also have profiles on the
platform where the bullying is happening.
+
Risks – Personal Use
 Cyber-stalking
 People often post phone numbers, addresses, or social plans
online, making it easier for strangers to stalk them. Only
share specific details with individuals who need them.
 Turn the ‘location’ off on your updates, and take advantage of
Facebook’s ‘friends only’ or Google + circles features to
prevent your statuses being hugely public.
 Also be aware of posting photos that look like passport
photos – this makes it a lot easier to replicate your online
presence for identity theft purposes.
+
Risks – Personal Use
 Age-inappropriate content and online grooming
 If you have children or teenagers, investigate adding
parental controls to your internet security in order to restrict
access to content. Place PCs in family areas.
 Teach your children not to give away their personal details
online – they’re also YOUR personal details.
 Encourage them to talk to you about who they’re talking to
online and never let them meet anyone on their own.
 Google Hangouts lets you have chats via webcam, which is a
great way to ‘see’ that someone is who they say they are.
+
Risks – Personal Use
 Prosecution or recrimination from posting offensive or
inappropriate comments
 Jurors are forbidden from discussing the contents of a trial,
so it’s best to adopt the same practice – if in doubt, don’t talk
about it!
 Bear in mind what can be considered libel or defamation – if
someone could suffer loss of earnings or reputation based
on what you say, then don’t say it.
 Also consider that not all jokes are universally considered
funny and some people may take offence. Others may also
not be taken as a joke at all!
+
Risks – Personal Use
 Phishing emails
 If you get an email from a company that warns you of a
problem with your account, and asks you to visit a link
embedded in the email, don’t click the link.
 Type the address of the company into the address bar of
your browser and log in that way.
 In addition, emails that begin “Dear Customer” are probably
fraudulent.
 If in doubt, check with the company themselves.They’ll be
only to happy to help.
+
Risks – Personal Use
 Hacking and viruses
 Many of the social media profiles come with options to allow
you to turn on log-in controls.
 Try to use a different password on every site so if one of
them is compromised, they can’t all be hacked.
 Use a combination of symbols, letters and numbers in
passwords.
 Don’t click on links in emails that ask you to log in – go
directly to the website and log in there.
 Don’t open attachments unless you know what they are.
+
TASK
 Create a new blog post.
 Write ‘Risks of using Social Media for Personal Use’ as a
heading within the post.
 Using bullet points, identify risks associated with using social
media for personal use.
+
Other Risks – Personal Use
 Be careful not to over promote on a personal profile.
 Try to keep the negativity to a minimum.
 Be aware what photos or statuses you’re being tagged in.
 Be mindful when posting opinions about politics, religion, or
sexuality. Arguments can quickly get out of hand.
 A polished, well-balanced profile will recommend you to
employers far better than something disorganised or full of
swearing.
+
Privacy Controls
 Remember when posting
 Now we’re going to have a look at the privacy controls on
Google +, LinkedIn,Twitter and Facebook.
 There are a range of security and privacy settings that you
can change.
 Luckily they’re very easy to change.
+
Risks – Business Use
 While social media can bring benefits to businesses, namely
in the realm of marketing exposure, access to social media
can also be problematic to use and regulate.
 Some businesses ban access to social media on their
premises, essentially to prevent time wasting, but this does
not stop employees using social media on mobile devices, or
at home.
 Freelancers must also be aware of their usage of social
media, and employ the same level of privacy and security
settings as personal users.
+
Risks – Business Use
 Businesses may suffer from problematic social media
usage in different ways, including;
 Damage to brand reputation through negative updates, or
links between bad employees and a company
 Disclosure of proprietary and/or confidential information
 Corporate identity theft
 Legal, regulatory and compliance violations
+
Risks – Business Use
 Damage to brand reputation through negative updates, or
links between bad employees and a company
 Other users of social media may use the platforms to
highlight bad customer service, poor quality work or
products, or other issues. Even if a business responds, there’s
no guarantee it will fix the ‘damage’ that is done.
 In addition, employees may behave poorly and their
behaviour casts the organisation for which they work in a
negative light.
 Reputation is key, so positive use of social media by both the
company and its employees can only be a good thing.
+
Risks – Business Use
 Disclosure of proprietary and/or confidential
information
 A social media manager posting information on behalf of the
company is unlikely to post something problematic, but an
employee might.
 This includes rumours about potential deals with other
companies, or information regarding specific transactions or
contracts.
 It’s best if employees refrain from talking about the company
at all, unless they work within its marketing or PR office.
+
Risks – Business Use
 Corporate identity theft
 There is very little to stop an individual setting up an online
social media account, purporting to represent a brand or
company.
 If a company has already set itself up on social media, this
can lessen the impact of this, as the correct names will have
already been claimed.
 In addition,Twitter allows companies and individuals to
verify their identity so that other users know they are dealing
with the genuine article.
+
Risks – Business Use
 Legal, regulatory and compliance violations
 Few people outside of the legal profession are well versed in
the minutiae of the law, meaning other users can violate
regulations without thinking.
 Again, if employees refrain from talking about the company,
and the company ensures that only a trained professional
handles their social media, this shouldn’t be a problem.
 Freelancers can attend training sessions, or just simply
refrain from making comments that could potentially cause
problems.
 If you’re not sure if you should post it, then don’t.
+
Risks – Business Use
 It’s not advisable to outright ban employees’ access to social
media – employees will always find ways around bans, which
could compromise security and cause even bigger problems
in future.
 Employees need some kind of guidelines regarding social
media.They need to know how to use it properly, and what
NOT to do when using it.
 The number of networks in use should be limited.There are
hundreds available, and some of them are not so innocent or
less secure.
 Keep security updated. A business network always needs to
be up to date with its security.
+
Risks – Business Use
 Settings should be locked down; most social networks do
provide privacy settings and these should be managed.This
will also benefit employees so make sure they know how to
use them properly.
 Employees should never click on a shortened URL without
first decoding it to see where it leads to. Shortened URLs can
be pasted into an URL lengthening service.
 IT personnel, or those in charge of managing technology,
need to be fully geared up with the risks of social media.
 The same goes for those in charge of managing the social
media accounts for the business.
+
TASK
 Write a subheading ‘Risks of using Social Media for
Business Use’ as a heading within the post.
 Using bullet points, identify risks associated with using social
media for business use.
+
Social Media Policies
 In 2013, a survey reported that 71% of the executives polled
said their company was concerned about possible risks, but
only 36% reported having social media training.
 Only 33% of companies currently have a social media policy.
 Bigger brands may face a different set of problems, but small
businesses or freelancers are more likely to face criticism
from unhappy customers.
 Having a social media policy in place ensures that everyone
knows what to do and how to react if a problem occurs.
 It should also help to avoid more commonplace errors to
happen in the first place.
+
Social Media Policies
 Businesses and freelancers need to be aware that efforts to
engage on social media sites can backfire.
 In November 2013, the bank JP Morgan asked people on
Twitter to send questions for a senior executive. Instead,
thousands of users replied to complain about how it conducts
its business.
 A social media policy would set out what a business can use
as content on any of the chosen platforms, and it would also
set out how those in charge of the accounts should use them
to engage with others.
 This sets out in writing what is permissible, and encouraged.
+
Social Media Policies
 A policy or strategy would also help a business to know what
they hoped to achieve by using social media, as well as
outlining who is in charge of the platforms for the company.
 It should also detail how usage should be monitored, as well
as how feedback should be handled – much like a
complaints procedure.
 In addition, a social media policy should also let other
employees know what they can and can’t post, both on
company time and on their own time.
 Acceptance of the policy should be a requirement of
acceptance of employment, and employees should also
receive training where possible.
+
TASK
BLOG Postupdate
 Write a subheading ‘Social Media Policies’ as a heading
within the post.
 Using bullet points, explain why a business should have a
social media policy.
+
TASK
 Go back to your blog post.
 Write a short paragraph detailing how you feel about
social media now, compared to when you started the
course.
 Publish!

Más contenido relacionado

La actualidad más candente

Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 
Dangers Of Social Media
Dangers Of Social MediaDangers Of Social Media
Dangers Of Social Media
rawadallah
 
Blog is Mightier Than the Sword
Blog is Mightier Than the SwordBlog is Mightier Than the Sword
Blog is Mightier Than the Sword
Wendy Angel, M.S.
 

La actualidad más candente (20)

Class 2 social media and communication
Class 2   social media and communicationClass 2   social media and communication
Class 2 social media and communication
 
Networking Considerations for Soldiers and Families
Networking Considerations for Soldiers and FamiliesNetworking Considerations for Soldiers and Families
Networking Considerations for Soldiers and Families
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Dangers Of Social Media
Dangers Of Social MediaDangers Of Social Media
Dangers Of Social Media
 
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
 
Stay Out of Twitter Hot Water
Stay Out of Twitter Hot WaterStay Out of Twitter Hot Water
Stay Out of Twitter Hot Water
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Social Networking and the Workplace draft #3 final
Online Social Networking and the Workplace draft #3 finalOnline Social Networking and the Workplace draft #3 final
Online Social Networking and the Workplace draft #3 final
 
Social marketing simplified
Social marketing simplifiedSocial marketing simplified
Social marketing simplified
 
Blog is Mightier Than the Sword
Blog is Mightier Than the SwordBlog is Mightier Than the Sword
Blog is Mightier Than the Sword
 

Similar a risks associated with using social Media

see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
bagotjesusa
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
jaggernaoma
 

Similar a risks associated with using social Media (20)

Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Social media compliance
Social media complianceSocial media compliance
Social media compliance
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media and HR - Friend or Foe?
Social Media and HR - Friend or Foe?Social Media and HR - Friend or Foe?
Social Media and HR - Friend or Foe?
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media security
 
AVG Small Business Digital Policy Guide
AVG Small Business Digital Policy GuideAVG Small Business Digital Policy Guide
AVG Small Business Digital Policy Guide
 
The Importance of a Social Media Policy in the Workplace
The Importance of a Social Media Policy in the WorkplaceThe Importance of a Social Media Policy in the Workplace
The Importance of a Social Media Policy in the Workplace
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
 
Social media-facebook-twitter-mishaps
Social media-facebook-twitter-mishapsSocial media-facebook-twitter-mishaps
Social media-facebook-twitter-mishaps
 
HR Professionals: Social Media Best Practices
HR Professionals: Social Media Best PracticesHR Professionals: Social Media Best Practices
HR Professionals: Social Media Best Practices
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Friendsfor youth socialmediapolicy_generated
Friendsfor youth socialmediapolicy_generatedFriendsfor youth socialmediapolicy_generated
Friendsfor youth socialmediapolicy_generated
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
 

Más de Oxford University - learning technologist (8)

specialist uses of Social Media
 specialist uses of Social Media  specialist uses of Social Media
specialist uses of Social Media
 
business use of social media continued
 business use of social media continued business use of social media continued
business use of social media continued
 
Social Media for business use
Social Media for business useSocial Media for business use
Social Media for business use
 
Looking for jobs using social media
Looking for  jobs using social media Looking for  jobs using social media
Looking for jobs using social media
 
business use of social media
 business use of social media  business use of social media
business use of social media
 
personal use of social media
 personal use of social media  personal use of social media
personal use of social media
 
blogging with word press
 blogging with word press  blogging with word press
blogging with word press
 
Facebook use
Facebook useFacebook use
Facebook use
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

risks associated with using social Media

  • 2. + This Session  The Risks of using Social Media  Personal Use  Break  Business Use
  • 3. + Social Media  We have covered a lot of social media within the course, but it would be irresponsible not to cover the risks associated with using these platforms.  This is particularly important if you have children who use the internet, or you know of vulnerable adults who may access social media.  It’s easy to forget that social media is public – even if we have shared something with a limited range of people through Facebook, the content is still online to be viewed.  Tomorrow we’ll cover using social media for job seeking so hopefully all of this will help!
  • 4. + The Main Risks  Disclosure of private information.  Bullying.  Cyber-stalking.  Access to age-inappropriate content and online grooming.  Prosecution or recrimination from posting offensive or inappropriate comments.  Phishing emails.  Hacking and viruses.
  • 5. + Social Media  Seeing these risks, it would be easy to panic and delete all of your accounts, but when used correctly, the platforms can be fun and easy to use.  This session will consider the risks associated with social media, and how to avoid them.  We will also look at the differences between social media for personal use, and social media for business use.
  • 6. + Risks – Personal Use  Disclosure of private information  Don’t advertise when you are going on holiday if your house will be empty.Wait until you come back to talk about it.  Don’t put your whole date of birth in your profile.  Also be aware that you can sometimes accidentally give away the answer to your ‘secret question’ to reset your password through the information on your profile.  Also be aware about posting your phone number, or address, in your profile, even if it’s set to be viewed by ‘friends only’.
  • 7. + Risks – Personal Use  Bullying  Bullying can take many forms, and happens to adults as well as teenagers and children.  If someone on your friends list is posting unpleasant comments, then simply unfriend them.  Report users for bullying, and get your friends and family to report the user as well if they also have profiles on the platform where the bullying is happening.
  • 8. + Risks – Personal Use  Cyber-stalking  People often post phone numbers, addresses, or social plans online, making it easier for strangers to stalk them. Only share specific details with individuals who need them.  Turn the ‘location’ off on your updates, and take advantage of Facebook’s ‘friends only’ or Google + circles features to prevent your statuses being hugely public.  Also be aware of posting photos that look like passport photos – this makes it a lot easier to replicate your online presence for identity theft purposes.
  • 9. + Risks – Personal Use  Age-inappropriate content and online grooming  If you have children or teenagers, investigate adding parental controls to your internet security in order to restrict access to content. Place PCs in family areas.  Teach your children not to give away their personal details online – they’re also YOUR personal details.  Encourage them to talk to you about who they’re talking to online and never let them meet anyone on their own.  Google Hangouts lets you have chats via webcam, which is a great way to ‘see’ that someone is who they say they are.
  • 10. + Risks – Personal Use  Prosecution or recrimination from posting offensive or inappropriate comments  Jurors are forbidden from discussing the contents of a trial, so it’s best to adopt the same practice – if in doubt, don’t talk about it!  Bear in mind what can be considered libel or defamation – if someone could suffer loss of earnings or reputation based on what you say, then don’t say it.  Also consider that not all jokes are universally considered funny and some people may take offence. Others may also not be taken as a joke at all!
  • 11. + Risks – Personal Use  Phishing emails  If you get an email from a company that warns you of a problem with your account, and asks you to visit a link embedded in the email, don’t click the link.  Type the address of the company into the address bar of your browser and log in that way.  In addition, emails that begin “Dear Customer” are probably fraudulent.  If in doubt, check with the company themselves.They’ll be only to happy to help.
  • 12. + Risks – Personal Use  Hacking and viruses  Many of the social media profiles come with options to allow you to turn on log-in controls.  Try to use a different password on every site so if one of them is compromised, they can’t all be hacked.  Use a combination of symbols, letters and numbers in passwords.  Don’t click on links in emails that ask you to log in – go directly to the website and log in there.  Don’t open attachments unless you know what they are.
  • 13. + TASK  Create a new blog post.  Write ‘Risks of using Social Media for Personal Use’ as a heading within the post.  Using bullet points, identify risks associated with using social media for personal use.
  • 14. + Other Risks – Personal Use  Be careful not to over promote on a personal profile.  Try to keep the negativity to a minimum.  Be aware what photos or statuses you’re being tagged in.  Be mindful when posting opinions about politics, religion, or sexuality. Arguments can quickly get out of hand.  A polished, well-balanced profile will recommend you to employers far better than something disorganised or full of swearing.
  • 15. + Privacy Controls  Remember when posting  Now we’re going to have a look at the privacy controls on Google +, LinkedIn,Twitter and Facebook.  There are a range of security and privacy settings that you can change.  Luckily they’re very easy to change.
  • 16. + Risks – Business Use  While social media can bring benefits to businesses, namely in the realm of marketing exposure, access to social media can also be problematic to use and regulate.  Some businesses ban access to social media on their premises, essentially to prevent time wasting, but this does not stop employees using social media on mobile devices, or at home.  Freelancers must also be aware of their usage of social media, and employ the same level of privacy and security settings as personal users.
  • 17. + Risks – Business Use  Businesses may suffer from problematic social media usage in different ways, including;  Damage to brand reputation through negative updates, or links between bad employees and a company  Disclosure of proprietary and/or confidential information  Corporate identity theft  Legal, regulatory and compliance violations
  • 18. + Risks – Business Use  Damage to brand reputation through negative updates, or links between bad employees and a company  Other users of social media may use the platforms to highlight bad customer service, poor quality work or products, or other issues. Even if a business responds, there’s no guarantee it will fix the ‘damage’ that is done.  In addition, employees may behave poorly and their behaviour casts the organisation for which they work in a negative light.  Reputation is key, so positive use of social media by both the company and its employees can only be a good thing.
  • 19. + Risks – Business Use  Disclosure of proprietary and/or confidential information  A social media manager posting information on behalf of the company is unlikely to post something problematic, but an employee might.  This includes rumours about potential deals with other companies, or information regarding specific transactions or contracts.  It’s best if employees refrain from talking about the company at all, unless they work within its marketing or PR office.
  • 20. + Risks – Business Use  Corporate identity theft  There is very little to stop an individual setting up an online social media account, purporting to represent a brand or company.  If a company has already set itself up on social media, this can lessen the impact of this, as the correct names will have already been claimed.  In addition,Twitter allows companies and individuals to verify their identity so that other users know they are dealing with the genuine article.
  • 21. + Risks – Business Use  Legal, regulatory and compliance violations  Few people outside of the legal profession are well versed in the minutiae of the law, meaning other users can violate regulations without thinking.  Again, if employees refrain from talking about the company, and the company ensures that only a trained professional handles their social media, this shouldn’t be a problem.  Freelancers can attend training sessions, or just simply refrain from making comments that could potentially cause problems.  If you’re not sure if you should post it, then don’t.
  • 22. + Risks – Business Use  It’s not advisable to outright ban employees’ access to social media – employees will always find ways around bans, which could compromise security and cause even bigger problems in future.  Employees need some kind of guidelines regarding social media.They need to know how to use it properly, and what NOT to do when using it.  The number of networks in use should be limited.There are hundreds available, and some of them are not so innocent or less secure.  Keep security updated. A business network always needs to be up to date with its security.
  • 23. + Risks – Business Use  Settings should be locked down; most social networks do provide privacy settings and these should be managed.This will also benefit employees so make sure they know how to use them properly.  Employees should never click on a shortened URL without first decoding it to see where it leads to. Shortened URLs can be pasted into an URL lengthening service.  IT personnel, or those in charge of managing technology, need to be fully geared up with the risks of social media.  The same goes for those in charge of managing the social media accounts for the business.
  • 24. + TASK  Write a subheading ‘Risks of using Social Media for Business Use’ as a heading within the post.  Using bullet points, identify risks associated with using social media for business use.
  • 25. + Social Media Policies  In 2013, a survey reported that 71% of the executives polled said their company was concerned about possible risks, but only 36% reported having social media training.  Only 33% of companies currently have a social media policy.  Bigger brands may face a different set of problems, but small businesses or freelancers are more likely to face criticism from unhappy customers.  Having a social media policy in place ensures that everyone knows what to do and how to react if a problem occurs.  It should also help to avoid more commonplace errors to happen in the first place.
  • 26. + Social Media Policies  Businesses and freelancers need to be aware that efforts to engage on social media sites can backfire.  In November 2013, the bank JP Morgan asked people on Twitter to send questions for a senior executive. Instead, thousands of users replied to complain about how it conducts its business.  A social media policy would set out what a business can use as content on any of the chosen platforms, and it would also set out how those in charge of the accounts should use them to engage with others.  This sets out in writing what is permissible, and encouraged.
  • 27. + Social Media Policies  A policy or strategy would also help a business to know what they hoped to achieve by using social media, as well as outlining who is in charge of the platforms for the company.  It should also detail how usage should be monitored, as well as how feedback should be handled – much like a complaints procedure.  In addition, a social media policy should also let other employees know what they can and can’t post, both on company time and on their own time.  Acceptance of the policy should be a requirement of acceptance of employment, and employees should also receive training where possible.
  • 28. + TASK BLOG Postupdate  Write a subheading ‘Social Media Policies’ as a heading within the post.  Using bullet points, explain why a business should have a social media policy.
  • 29. + TASK  Go back to your blog post.  Write a short paragraph detailing how you feel about social media now, compared to when you started the course.  Publish!