SlideShare a Scribd company logo
1 of 28
Chris Crosby
chris@inflectionpointglobal.com
(312) 285-0301
Social Network Privacy & Security
What’s on your customers’ minds?
Risks:
• Increased occurrence rate of identity theft
• Social Engineering/Phishing
• SPAM
• Hacked accounts
Risks:
• Cyber bullying
• Sexual Predators
• Reputation damaging posts and photos
• Lost privacy over sharing of location data
3
A Typical Online Family
• Over half of adolescents have been bullied online.1
• 20% of children on social networks have been approached by
a stranger in a sexual nature.2
• Malicious Facebook “apps” are designed to lure children to
give access to their personal data, making them more
exposed to identity theft and privacy invasion.
4
1. i-Safe America Foundation – Cyber bullying statistics.
2. Crimes Against Children Research Center.
Growing online threats for children
35% of college admissions officers
report finding something on an applicant’s social network page
that negatively impacted their admissions chances.*
*Kaplan’s 2012 Prep Test Survey
68% of employers have turned down a job candidate based on
negative information found on social network sites.
Personal Data Breaches
LinkedIn users are
106%more likely to be a victim of identity fraud…
and social media users who check-in using GPS are
67% more likely.
One Platform
One API
One Partner
Social Network Security
Reputation Management
Internet Privacy
Cyber bullying detection
Identity Theft Prevention
Personal Data Discovery and Control
Identity:One
• Child Social Network Protection
– Cyber bullying and sexual predator detection
• Adult Social Network Management
– Monitor Reputation, Privacy, Security
• Social Language Analysis
– Proprietary Social Network Threat Detection
– Language analysis designed for social media
The Identity:One Platform
• Consolidated view of all social activity
– Photos, Posts, Tweets
– See privacy settings on a per-post level
• Reputation Management
– See how you look to others
– Alerting to potential privacy infringements
• Identity Protection
– Prevent Identity Leakage and Theft
– Locate Personally Identifiable Information
Customer Benefits
Alert and Action
• Notify and alert users of
potential threats
• Remove social activity and
photos
Analyze
• Scan social network
profiles and activities for
potential threats.
Monitor
• Ongoing Monitoring
of Social Networks.
How it Works
Privacy & Profile Alerts
Privacy Alerts
Phone # Exposed
Email Address Exposed
Address Exposed
Date of Birth Exposed
Employer & Length of Employment Exposed
Current Position Exposed
IM Account Exposed
Hometown Found
Location data found in social content items
Privacy Settings of Posts and Photos
Content Related Alerts
Alcohol & Drug Related
Profanity and Vulgarity
SPAM
Bullying and Threats
Grooming (actions deliberately undertaken with the aim of
befriending and establishing an emotional connection with a
child, to lower the child's inhibitions in preparation for sexual
activity with the child, or exploitation.)
Sexual in Nature
Harm or other Abuse
Bigotry-Racism
Weapons
End User Actions
Remove Photos, Posts, Comments
Block Users
Unfollow
Expert Tips and Resources
Developer Friendly
Rapid development
• build and launch products in 6-8 weeks.
Create your own user experience
• choose what features and alerts to integrate
Build Your
Own Apps
Core
Platform
Privacy &
Security
Monitoring
The Identity:One Platform
Social Network Authentication Data Normalization Content Filtering
Alerts Customer Analytics
API for Partner Application Development
Behavioral Analysis
Identity Risk
Analysis
Lead Acquisition
& Customer
Insight
Custom
Improve Customer Experience
Increase Customer Acquisition & Retention
• Social data is living and breathing
– Send periodic summary emails recapping information that
you’ve monitored on their behalf:
“Hi Mary, just wanted to let you know that last month we scanned over
1,200 posts and comments in your social networks. Great news, we
detected no threats. Also, we know that you’re a busy professional and
mom, so we thought you might enjoy these quick tips on...”
• Become a Trusted Advisor
– Use their social profile information to create targeted and value
added advice and insight to your customers.
Create Meaningful Customer Experiences
Use Social to get customers into your sales funnel
• Provide website visitors a free social identity risk
assessment.
• Social Authentication can increase web sign-ups by up
to 90%1
• Build Trust. Build Your Sales Funnel.
Connect with more customers and prospects
1: Source, Gigya.com
• Demonstrate Immediate Value to Customer
– Low Cost to You, High Value to Customer = AWESOME
• Personalized Awareness of a Person’s Risk for ID theft.
– Give them a reason to take the next step.
• Create Your Own Variations
– Customize your assessment or Freemium offer to best position your
existing product offer.
– I.E. – if you know they’re a parent of a young teen, position Cyber
Bullying prevention.
Identity Risk Assessment [Freemium]
Sample Dashboards and Reports
Easy and simple sign-up process
Sample Alert Dashboard
Cross Platform Alerting and Analysis
Personal and Financial Information Discovery
A zoomed-in version
Sample User Experience
Thank you

More Related Content

What's hot

Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 
Presentation dangers of social media
Presentation   dangers of social mediaPresentation   dangers of social media
Presentation dangers of social media
Rich Hughes
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 

What's hot (20)

Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Presentation dangers of social media
Presentation   dangers of social mediaPresentation   dangers of social media
Presentation dangers of social media
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Slideshare online identity construction
Slideshare   online identity constructionSlideshare   online identity construction
Slideshare online identity construction
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 

Viewers also liked

Conversion Tracking Tutorial
Conversion Tracking TutorialConversion Tracking Tutorial
Conversion Tracking Tutorial
Nick ONeill
 
PilotLabs IBS - Facebook analysis rankings
PilotLabs IBS - Facebook analysis rankingsPilotLabs IBS - Facebook analysis rankings
PilotLabs IBS - Facebook analysis rankings
Bjorn M
 
After 55 facebook_tutorial
After 55 facebook_tutorialAfter 55 facebook_tutorial
After 55 facebook_tutorial
Tammy Fry, Ph.D.
 
Tutorial on twitter in the lmc
Tutorial on twitter in the lmcTutorial on twitter in the lmc
Tutorial on twitter in the lmc
micheleobrien
 

Viewers also liked (19)

Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sites
 
Presentation Dangers Of Social Media
Presentation   Dangers Of Social MediaPresentation   Dangers Of Social Media
Presentation Dangers Of Social Media
 
Comfort food for all
Comfort food for allComfort food for all
Comfort food for all
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Social media and the philippines
Social media and the philippinesSocial media and the philippines
Social media and the philippines
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Conversion Tracking Tutorial
Conversion Tracking TutorialConversion Tracking Tutorial
Conversion Tracking Tutorial
 
Facebook Usage Stats
Facebook Usage StatsFacebook Usage Stats
Facebook Usage Stats
 
Facebook Privacy Settings Tutorial (2015)
Facebook Privacy Settings Tutorial (2015)Facebook Privacy Settings Tutorial (2015)
Facebook Privacy Settings Tutorial (2015)
 
Facebook 101 personal usage
Facebook 101 personal usageFacebook 101 personal usage
Facebook 101 personal usage
 
Facebook Privacy Setting Tutorial
Facebook Privacy Setting Tutorial Facebook Privacy Setting Tutorial
Facebook Privacy Setting Tutorial
 
Facebook tutorial
Facebook tutorialFacebook tutorial
Facebook tutorial
 
PilotLabs IBS - Facebook analysis rankings
PilotLabs IBS - Facebook analysis rankingsPilotLabs IBS - Facebook analysis rankings
PilotLabs IBS - Facebook analysis rankings
 
Facebook Timeline Tutorial by Leapdog
Facebook Timeline Tutorial by Leapdog Facebook Timeline Tutorial by Leapdog
Facebook Timeline Tutorial by Leapdog
 
After 55 facebook_tutorial
After 55 facebook_tutorialAfter 55 facebook_tutorial
After 55 facebook_tutorial
 
Creating facebook page tutorial 2014
Creating facebook page tutorial 2014 Creating facebook page tutorial 2014
Creating facebook page tutorial 2014
 
Tutorial on twitter in the lmc
Tutorial on twitter in the lmcTutorial on twitter in the lmc
Tutorial on twitter in the lmc
 

Similar to Social Network Privacy, Security and Identity:One

My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 
2-12-14 Women in Leadership: Building and Managing Your Personal Reputation
2-12-14 Women in Leadership: Building and Managing Your Personal Reputation2-12-14 Women in Leadership: Building and Managing Your Personal Reputation
2-12-14 Women in Leadership: Building and Managing Your Personal Reputation
Elizabeth Keserauskis
 
2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation
2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation
2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation
Elizabeth Keserauskis
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
ravichar
 
May 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal Reputation
May 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal ReputationMay 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal Reputation
May 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal Reputation
Elizabeth Keserauskis
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
Jason Hong
 

Similar to Social Network Privacy, Security and Identity:One (20)

[Slides] Leveraging Social Identity, by Altimeter Group
[Slides] Leveraging Social Identity, by Altimeter Group[Slides] Leveraging Social Identity, by Altimeter Group
[Slides] Leveraging Social Identity, by Altimeter Group
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Seric Security Meetup Aug slides19
Seric Security Meetup Aug slides19Seric Security Meetup Aug slides19
Seric Security Meetup Aug slides19
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
2-12-14 Women in Leadership: Building and Managing Your Personal Reputation
2-12-14 Women in Leadership: Building and Managing Your Personal Reputation2-12-14 Women in Leadership: Building and Managing Your Personal Reputation
2-12-14 Women in Leadership: Building and Managing Your Personal Reputation
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation
2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation
2-13-14 St. Louis Urban League: Building and Managing Your Personal Reputation
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Update for School Social Workers
Update for School Social WorkersUpdate for School Social Workers
Update for School Social Workers
 
Ethics Update for School Social Workers
Ethics Update for School Social WorkersEthics Update for School Social Workers
Ethics Update for School Social Workers
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Social networking presentation
Social networking presentation Social networking presentation
Social networking presentation
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
May 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal Reputation
May 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal ReputationMay 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal Reputation
May 17, 2014 Ladies in Pharmacy Workshop: Managing Your Personal Reputation
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 

Recently uploaded

Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
AroojKhan71
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Recently uploaded (20)

Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 

Social Network Privacy, Security and Identity:One

  • 2. What’s on your customers’ minds?
  • 3. Risks: • Increased occurrence rate of identity theft • Social Engineering/Phishing • SPAM • Hacked accounts Risks: • Cyber bullying • Sexual Predators • Reputation damaging posts and photos • Lost privacy over sharing of location data 3 A Typical Online Family
  • 4. • Over half of adolescents have been bullied online.1 • 20% of children on social networks have been approached by a stranger in a sexual nature.2 • Malicious Facebook “apps” are designed to lure children to give access to their personal data, making them more exposed to identity theft and privacy invasion. 4 1. i-Safe America Foundation – Cyber bullying statistics. 2. Crimes Against Children Research Center. Growing online threats for children
  • 5. 35% of college admissions officers report finding something on an applicant’s social network page that negatively impacted their admissions chances.* *Kaplan’s 2012 Prep Test Survey
  • 6. 68% of employers have turned down a job candidate based on negative information found on social network sites.
  • 8. LinkedIn users are 106%more likely to be a victim of identity fraud… and social media users who check-in using GPS are 67% more likely.
  • 9. One Platform One API One Partner Social Network Security Reputation Management Internet Privacy Cyber bullying detection Identity Theft Prevention Personal Data Discovery and Control Identity:One
  • 10. • Child Social Network Protection – Cyber bullying and sexual predator detection • Adult Social Network Management – Monitor Reputation, Privacy, Security • Social Language Analysis – Proprietary Social Network Threat Detection – Language analysis designed for social media The Identity:One Platform
  • 11. • Consolidated view of all social activity – Photos, Posts, Tweets – See privacy settings on a per-post level • Reputation Management – See how you look to others – Alerting to potential privacy infringements • Identity Protection – Prevent Identity Leakage and Theft – Locate Personally Identifiable Information Customer Benefits
  • 12. Alert and Action • Notify and alert users of potential threats • Remove social activity and photos Analyze • Scan social network profiles and activities for potential threats. Monitor • Ongoing Monitoring of Social Networks. How it Works
  • 13. Privacy & Profile Alerts Privacy Alerts Phone # Exposed Email Address Exposed Address Exposed Date of Birth Exposed Employer & Length of Employment Exposed Current Position Exposed IM Account Exposed Hometown Found Location data found in social content items Privacy Settings of Posts and Photos Content Related Alerts Alcohol & Drug Related Profanity and Vulgarity SPAM Bullying and Threats Grooming (actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation for sexual activity with the child, or exploitation.) Sexual in Nature Harm or other Abuse Bigotry-Racism Weapons
  • 14. End User Actions Remove Photos, Posts, Comments Block Users Unfollow Expert Tips and Resources
  • 15. Developer Friendly Rapid development • build and launch products in 6-8 weeks. Create your own user experience • choose what features and alerts to integrate
  • 16. Build Your Own Apps Core Platform Privacy & Security Monitoring The Identity:One Platform Social Network Authentication Data Normalization Content Filtering Alerts Customer Analytics API for Partner Application Development Behavioral Analysis Identity Risk Analysis Lead Acquisition & Customer Insight Custom
  • 17. Improve Customer Experience Increase Customer Acquisition & Retention
  • 18. • Social data is living and breathing – Send periodic summary emails recapping information that you’ve monitored on their behalf: “Hi Mary, just wanted to let you know that last month we scanned over 1,200 posts and comments in your social networks. Great news, we detected no threats. Also, we know that you’re a busy professional and mom, so we thought you might enjoy these quick tips on...” • Become a Trusted Advisor – Use their social profile information to create targeted and value added advice and insight to your customers. Create Meaningful Customer Experiences
  • 19. Use Social to get customers into your sales funnel
  • 20. • Provide website visitors a free social identity risk assessment. • Social Authentication can increase web sign-ups by up to 90%1 • Build Trust. Build Your Sales Funnel. Connect with more customers and prospects 1: Source, Gigya.com
  • 21. • Demonstrate Immediate Value to Customer – Low Cost to You, High Value to Customer = AWESOME • Personalized Awareness of a Person’s Risk for ID theft. – Give them a reason to take the next step. • Create Your Own Variations – Customize your assessment or Freemium offer to best position your existing product offer. – I.E. – if you know they’re a parent of a young teen, position Cyber Bullying prevention. Identity Risk Assessment [Freemium]
  • 23. Easy and simple sign-up process
  • 25. Cross Platform Alerting and Analysis
  • 26. Personal and Financial Information Discovery A zoomed-in version

Editor's Notes

  1. Privacy settings on social networks tend to be confusing and many users don’t realize that they are exposing personal photos or that they’re being tagged in photos that can be made public. A widely publicized event involved Randi Zuckerberg, Mark Zuckerberg’s sister, in which she posted a photo a family photo to Facebook that inadvertently got shared publically across Facebook and Twitter.