SlideShare a Scribd company logo
1 of 18
A short guide featuring some useful tips!

HOW TO KEEP YOUR DIGITAL IDENTITY
SAFE






Staying connected with friends and
family is easier than ever with social
networking sites such as ‘Facebook’
and ‘LinkedIn’.
Mastering these sites and learning
how to use all the features is
important, but more than that, there is
a lot to be learned about using them
appropriately.
Use these top tips to keep your
personal information safe and secure
from falling into the wrong hands.
BE FRIENDS WITH FRIENDS


Social media is the best
platform to share stories,
photos and experiences
with your friends and
family; that’s the intended
purpose.



But, before accepting an
unfamiliar friend request
on Facebook and tweeting
to unknown followers,
stop.
BE FRIENDS WITH FRIENDS


Making new friends is
great, but you wouldn’t go
up to a stranger on the
street and tell them details
of your life and what your
plans are for the next few
weeks.



If you have Twitter
followers you don’t know
and you are sharing
information about yourself,
that’s what you’re at risk of
doing.
BE YOUR OWN FOLLOWER


Whether you are
posting on
Facebook, writing a
blog post or sending
a tweet with Twitter,
think critically about
what you are
writing.
BE YOUR OWN FOLLOWER


With every message
you send out, ask
yourself: is this
engaging and
interesting; would I
want to read this?
Make sure what you
write is relevant to your
friends and followers.
Don’t just write about
yourself. But if you do,
think about what
message you are
sending.
BE YOUR OWN FOLLOWER


Short messages enter
the world of social
media often without
context and with little
emotional perspective.
Even with the use of
emoticons, emotions
like sarcasm are
difficult to express.
GOOGLE YOURSELF


Just as you might ‘Google’ the
name of your friends or
someone famous, it’s a good
idea to keep track of your online
presence. An easy way to do
this is by ‘Googling’ your name –
as mentioned in your
homework.



Find out where your name
shows up and what information
on social media platforms is
available to the general public.
Once you know what’s out
there, you can learn to manage
your digital footprint.


SECURE SIGN-UPS


Every time you go
onto Facebook it
seems like there is
something new to
sign up for. Online
offers, promotions
on T.V., and handouts at events all
seem to ask you to
sign-up for one
thing or the other.
SECURE SIGN-UPS




Before signing up, make
sure you trust the
company or organization
that is asking for your
information. Be careful
with the information you
give and look for the icon
that shows you are on a
secure site.
Usually it is a padlock icon
found near the top of the
web server. The padlock
icon indicates the site is
SSL (Secure Sockets
Layer) certified.
SECURE SIGN-UPS


Many sites will allow
you to sign in using
your Facebook or
Twitter account. This is
a quick and easy way
to gain access but
when you allow
access, the two parties
share information. So
before you click
approve, be confident
in your choice.
CRACKING THE CODE


You know the drill. A
unique, more
complicated and
diverse password for
every application and
device is more difficult
to crack. It might seem
like too much
unnecessary work, but
if you misplace your
tablet, you want to
know all of your
information is secure.
CRACKING THE CODE


Besides, remembering
complex passwords is
good for your brain. Be
sure to lock all your
devices with
passwords.



After this presentation
you will have the
opportunity to test your
password strength and
try new combinations!
GO UNDERGROUND




Turn ‘Geotagging’ off.
Geotagging identifies your
exact location and attaches it
to photos, posts, tweets and
more.
Many Smartphone's and
social media applications
Geotag automatically. While
it might seem like fun to
share with everyone where
you are, do you really want
all of your contacts to know
where you are? This setting
is typically turned on unless
you turn it off.
MORE THAN 999


Know who to turn to in
case of an emergency by
keeping a list of
emergency contacts in
your Smartphone.



While you want to
memorize key numbers
like your parents numbers
in case something
happens to your phone, a
list of other numbers like
your local police
department, your school
and other family members
is good to keep in one
place.
CHECK PRIVACY SETTINGS


Make sure you know what
information you are sharing on
the websites you use, in
particular on social networking
sites.



Most social networking sites
have privacy settings to help
you manage the content you
share and who you share it with;
you can decide if you want your
posts to be shared with your
online friends and followers only
or with the public. Keep in mind
that your friend’s content and
their settings can also affect
your digital footprint.
DEACTIVATE AND DELETE:


When you stop using a
social networking
website, it’s a good idea
to deactivate or delete
your account. This will
mean the content is no
longer live and should not
be searchable online; it
will also remove the risk
of these accounts being
hacked without you
knowing.
MAKE A POSITIVE FOOTPRINT:


We hear a lot about the negative footprints left
behind online. The best way to keep your online
reputation and brand healthy is to use your time
online to get creative and create a positive footprint.

More Related Content

What's hot

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job World
Mike Schaffer
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
Holly Solomon
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 

What's hot (18)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Snap What? Apps/Websites that Parents Need to Know About! (Marshall, MN Mom'...
Snap What? Apps/Websites that Parents Need to Know About!  (Marshall, MN Mom'...Snap What? Apps/Websites that Parents Need to Know About!  (Marshall, MN Mom'...
Snap What? Apps/Websites that Parents Need to Know About! (Marshall, MN Mom'...
 
Social Media in Ministry 2.0
Social Media in Ministry 2.0Social Media in Ministry 2.0
Social Media in Ministry 2.0
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job World
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Digital footprint-by-boris-miletic
Digital footprint-by-boris-mileticDigital footprint-by-boris-miletic
Digital footprint-by-boris-miletic
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
 
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
 
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
 
Protecting Your Online Identity and Getting the Most out of Social Media
Protecting Your Online Identity and Getting the Most out of Social MediaProtecting Your Online Identity and Getting the Most out of Social Media
Protecting Your Online Identity and Getting the Most out of Social Media
 
Wellbeing bulletin November/December
Wellbeing bulletin November/DecemberWellbeing bulletin November/December
Wellbeing bulletin November/December
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
BrightonSEO 2013 Paul Madden - How to spot a shitty link
BrightonSEO 2013 Paul Madden - How to spot a shitty linkBrightonSEO 2013 Paul Madden - How to spot a shitty link
BrightonSEO 2013 Paul Madden - How to spot a shitty link
 

Similar to How to keep your digital identity safe

How Protected Are You?
How Protected Are You?How Protected Are You?
How Protected Are You?
Alyssa Lewis
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 

Similar to How to keep your digital identity safe (20)

digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
Heads up!
Heads up!Heads up!
Heads up!
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Project
ProjectProject
Project
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age
 
Crossroads Social Network Survival Guide
Crossroads Social Network Survival GuideCrossroads Social Network Survival Guide
Crossroads Social Network Survival Guide
 
Crossroads Social Network Survival Guide
Crossroads Social Network Survival GuideCrossroads Social Network Survival Guide
Crossroads Social Network Survival Guide
 
How Protected Are You?
How Protected Are You?How Protected Are You?
How Protected Are You?
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
social networking
social networkingsocial networking
social networking
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

More from TSageer

Online communication
Online communicationOnline communication
Online communication
TSageer
 
Online communication
Online communicationOnline communication
Online communication
TSageer
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
TSageer
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
TSageer
 
Online communication
Online communicationOnline communication
Online communication
TSageer
 
Personal branding
Personal brandingPersonal branding
Personal branding
TSageer
 
Brand mantra
Brand mantraBrand mantra
Brand mantra
TSageer
 
Social media and social networking
Social media and social networkingSocial media and social networking
Social media and social networking
TSageer
 
Social media power of networks - homework
Social media   power of networks - homeworkSocial media   power of networks - homework
Social media power of networks - homework
TSageer
 
Digital identity homework
Digital identity homeworkDigital identity homework
Digital identity homework
TSageer
 
Lesson 1 digital identity & footprint
Lesson 1   digital identity & footprintLesson 1   digital identity & footprint
Lesson 1 digital identity & footprint
TSageer
 

More from TSageer (11)

Online communication
Online communicationOnline communication
Online communication
 
Online communication
Online communicationOnline communication
Online communication
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Online communication
Online communicationOnline communication
Online communication
 
Personal branding
Personal brandingPersonal branding
Personal branding
 
Brand mantra
Brand mantraBrand mantra
Brand mantra
 
Social media and social networking
Social media and social networkingSocial media and social networking
Social media and social networking
 
Social media power of networks - homework
Social media   power of networks - homeworkSocial media   power of networks - homework
Social media power of networks - homework
 
Digital identity homework
Digital identity homeworkDigital identity homework
Digital identity homework
 
Lesson 1 digital identity & footprint
Lesson 1   digital identity & footprintLesson 1   digital identity & footprint
Lesson 1 digital identity & footprint
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

How to keep your digital identity safe

  • 1. A short guide featuring some useful tips! HOW TO KEEP YOUR DIGITAL IDENTITY SAFE
  • 2.    Staying connected with friends and family is easier than ever with social networking sites such as ‘Facebook’ and ‘LinkedIn’. Mastering these sites and learning how to use all the features is important, but more than that, there is a lot to be learned about using them appropriately. Use these top tips to keep your personal information safe and secure from falling into the wrong hands.
  • 3. BE FRIENDS WITH FRIENDS  Social media is the best platform to share stories, photos and experiences with your friends and family; that’s the intended purpose.  But, before accepting an unfamiliar friend request on Facebook and tweeting to unknown followers, stop.
  • 4. BE FRIENDS WITH FRIENDS  Making new friends is great, but you wouldn’t go up to a stranger on the street and tell them details of your life and what your plans are for the next few weeks.  If you have Twitter followers you don’t know and you are sharing information about yourself, that’s what you’re at risk of doing.
  • 5. BE YOUR OWN FOLLOWER  Whether you are posting on Facebook, writing a blog post or sending a tweet with Twitter, think critically about what you are writing.
  • 6. BE YOUR OWN FOLLOWER  With every message you send out, ask yourself: is this engaging and interesting; would I want to read this? Make sure what you write is relevant to your friends and followers. Don’t just write about yourself. But if you do, think about what message you are sending.
  • 7. BE YOUR OWN FOLLOWER  Short messages enter the world of social media often without context and with little emotional perspective. Even with the use of emoticons, emotions like sarcasm are difficult to express.
  • 8. GOOGLE YOURSELF  Just as you might ‘Google’ the name of your friends or someone famous, it’s a good idea to keep track of your online presence. An easy way to do this is by ‘Googling’ your name – as mentioned in your homework.  Find out where your name shows up and what information on social media platforms is available to the general public. Once you know what’s out there, you can learn to manage your digital footprint. 
  • 9. SECURE SIGN-UPS  Every time you go onto Facebook it seems like there is something new to sign up for. Online offers, promotions on T.V., and handouts at events all seem to ask you to sign-up for one thing or the other.
  • 10. SECURE SIGN-UPS   Before signing up, make sure you trust the company or organization that is asking for your information. Be careful with the information you give and look for the icon that shows you are on a secure site. Usually it is a padlock icon found near the top of the web server. The padlock icon indicates the site is SSL (Secure Sockets Layer) certified.
  • 11. SECURE SIGN-UPS  Many sites will allow you to sign in using your Facebook or Twitter account. This is a quick and easy way to gain access but when you allow access, the two parties share information. So before you click approve, be confident in your choice.
  • 12. CRACKING THE CODE  You know the drill. A unique, more complicated and diverse password for every application and device is more difficult to crack. It might seem like too much unnecessary work, but if you misplace your tablet, you want to know all of your information is secure.
  • 13. CRACKING THE CODE  Besides, remembering complex passwords is good for your brain. Be sure to lock all your devices with passwords.  After this presentation you will have the opportunity to test your password strength and try new combinations!
  • 14. GO UNDERGROUND   Turn ‘Geotagging’ off. Geotagging identifies your exact location and attaches it to photos, posts, tweets and more. Many Smartphone's and social media applications Geotag automatically. While it might seem like fun to share with everyone where you are, do you really want all of your contacts to know where you are? This setting is typically turned on unless you turn it off.
  • 15. MORE THAN 999  Know who to turn to in case of an emergency by keeping a list of emergency contacts in your Smartphone.  While you want to memorize key numbers like your parents numbers in case something happens to your phone, a list of other numbers like your local police department, your school and other family members is good to keep in one place.
  • 16. CHECK PRIVACY SETTINGS  Make sure you know what information you are sharing on the websites you use, in particular on social networking sites.  Most social networking sites have privacy settings to help you manage the content you share and who you share it with; you can decide if you want your posts to be shared with your online friends and followers only or with the public. Keep in mind that your friend’s content and their settings can also affect your digital footprint.
  • 17. DEACTIVATE AND DELETE:  When you stop using a social networking website, it’s a good idea to deactivate or delete your account. This will mean the content is no longer live and should not be searchable online; it will also remove the risk of these accounts being hacked without you knowing.
  • 18. MAKE A POSITIVE FOOTPRINT:  We hear a lot about the negative footprints left behind online. The best way to keep your online reputation and brand healthy is to use your time online to get creative and create a positive footprint.