SlideShare a Scribd company logo
Look both ways when you use Social NetworksSafe Use of Social Networks ** This work was possible only through significant help from several professional acquaintances, without them this work would not exist.Your feedback will help to make this even better. Feedback: Ravi.char@gmail.com
Evolution: Websites to Social NetworksYesterdayToday 	Static web pages
	Basic information 	on the products and 	services
	Information on 	What, but not 	Who, How, When 	and Where
Highly interactive and collaborative websites
Share and seek personal information
Information is no longer competitive advantage, it’s organized knowledgeSocial  Networks:  Creates tendency to share more information than what we need to!
Social Networks: Double Lane RoadORLook both ways when you use Social Networks
ThreatsSubversive techniques that leverage your trust relationship.Hackers that scan sites for Personal Information or Proprietary Information.Online Predators.Peer pressure to participate and give out more information than needed - exposing your personal and professional data.Fake online identities that can mislead you.Why Did The Chicken Cross The Road?
Beware!Enticing Applications such as Online Quiz – could ask your DOB in a subtle way or entice you.Installing Applications that have access to your Personal Profile information.Exposure to Worms, Viruses and Malwares that poses risk to Personal Information.Poorly Managed Trust Relationships – Accepting someone as a friend who you don’t know.Posting too much Personal Information.What route are your Security Guards taking to the bank today?
AwarePrivacy Settings. Example, my setting on Facebook:
Don’t forget your Meta data settings.
READ - Privacy Policy

More Related Content

PPTX
Your Digital Footprint
PPT
Linked in
PDF
Ethical Social Media Marketing for Lawyers
PPTX
2011.07.14 center-for-np-success-li
PPTX
Social media Challenges and Advantage
PPTX
Social Media and the Legal Profe
PPTX
Social & Professional Networking
PPTX
Ethical social media marketing for lawyers june 20
Your Digital Footprint
Linked in
Ethical Social Media Marketing for Lawyers
2011.07.14 center-for-np-success-li
Social media Challenges and Advantage
Social Media and the Legal Profe
Social & Professional Networking
Ethical social media marketing for lawyers june 20

What's hot (20)

PPT
My Online Image
PDF
Your Privacy & Security on the Web
PPTX
Social Media & Networking How-To
PDF
Why Networking Trumps a Job Posting
PPTX
Media Law
PPT
Worcester County Bar Association Presents The LinkedIn Lawyer
PPT
Conducting Anonymous Online Investigations - Webinar
PPTX
Tips to stay safe and responsible on social media
PPTX
Social Media - The Good, The Bad, and The Ugly
PDF
Internet Credibility
PDF
LinkedIn Smart Card 070314
PPTX
Deep Web Search Part 2 by Cynthia Hetherington
PPT
Darim Presents Facebook&Twitter For JCPSC
PPTX
Capilano University Personal Branding Online
PPTX
Web 2.0 Technology
PPT
Worcesterbar 01
PPT
Social Media And Web 2.0
PPTX
Social Media Education Workshop for the Plus Southwest Chapter
PDF
Class 2 social media and communication
PPSX
Social Media Insight
My Online Image
Your Privacy & Security on the Web
Social Media & Networking How-To
Why Networking Trumps a Job Posting
Media Law
Worcester County Bar Association Presents The LinkedIn Lawyer
Conducting Anonymous Online Investigations - Webinar
Tips to stay safe and responsible on social media
Social Media - The Good, The Bad, and The Ugly
Internet Credibility
LinkedIn Smart Card 070314
Deep Web Search Part 2 by Cynthia Hetherington
Darim Presents Facebook&Twitter For JCPSC
Capilano University Personal Branding Online
Web 2.0 Technology
Worcesterbar 01
Social Media And Web 2.0
Social Media Education Workshop for the Plus Southwest Chapter
Class 2 social media and communication
Social Media Insight
Ad

Viewers also liked (16)

PDF
Donor Retention Slides from 2016 Nonprofit Technology Conference (16NTC)
PDF
F z94 l-_pioneer__tuner__arp2134
PPTX
My Honors Thesis Presentation
PDF
Juee 2986
PPTX
Miche Summer 2012 Shells
DOC
33 Weeks Of Purity
PDF
20[1].03.Simplified Security
PPT
Business plan
PPSX
Gandhi Publicidad
PPSX
Planificación en el nivel inicial
PPSX
Planificación en el nivel inicial
PPTX
Secuencia didáctica-alicia pochettino
PPTX
Planificación en el nivel primario taller 24 06
PPT
KüBaşIk öğRenme
PPT
KüBaşIk öğRenme
PPTX
10 Lessons for 10 Years in Business
Donor Retention Slides from 2016 Nonprofit Technology Conference (16NTC)
F z94 l-_pioneer__tuner__arp2134
My Honors Thesis Presentation
Juee 2986
Miche Summer 2012 Shells
33 Weeks Of Purity
20[1].03.Simplified Security
Business plan
Gandhi Publicidad
Planificación en el nivel inicial
Planificación en el nivel inicial
Secuencia didáctica-alicia pochettino
Planificación en el nivel primario taller 24 06
KüBaşIk öğRenme
KüBaşIk öğRenme
10 Lessons for 10 Years in Business
Ad

Similar to Safe Use Of Social Networks Final Draft (20)

PPTX
Brandon + Eddie users guide phi 235
PPTX
Social groups for awareness
PPTX
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
PPT
Users guide
PPTX
Security and Privacy in Social Networks.pptx
PPT
Business Impact of Online Social Networking
PPT
kiran.ppt
PPTX
CYBER ETHICS, CRIMES AND SAFTY
PPTX
Social media-threats
PPTX
Companies that operate social networks are themselves collecting a variety of...
PDF
Social media-threats
PPTX
Professional and Ethical Impact of Using Social Networking in a Professional ...
PPT
Social networks and professionalism
PPTX
Mark Rogers' Social Network Presentation
PPTX
Presentation social networking service
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPTX
Leveraging Online Social Networking For Business
PPTX
Online Social Networking and the Workplace draft #3 final
PPTX
Social Networking Security
PPTX
Social Media Security
Brandon + Eddie users guide phi 235
Social groups for awareness
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
Users guide
Security and Privacy in Social Networks.pptx
Business Impact of Online Social Networking
kiran.ppt
CYBER ETHICS, CRIMES AND SAFTY
Social media-threats
Companies that operate social networks are themselves collecting a variety of...
Social media-threats
Professional and Ethical Impact of Using Social Networking in a Professional ...
Social networks and professionalism
Mark Rogers' Social Network Presentation
Presentation social networking service
Rayane hazimeh building trust in the digital age teenagers and students
Leveraging Online Social Networking For Business
Online Social Networking and the Workplace draft #3 final
Social Networking Security
Social Media Security

Safe Use Of Social Networks Final Draft

  • 1. Look both ways when you use Social NetworksSafe Use of Social Networks ** This work was possible only through significant help from several professional acquaintances, without them this work would not exist.Your feedback will help to make this even better. Feedback: Ravi.char@gmail.com
  • 2. Evolution: Websites to Social NetworksYesterdayToday Static web pages
  • 3. Basic information on the products and services
  • 4. Information on What, but not Who, How, When and Where
  • 5. Highly interactive and collaborative websites
  • 6. Share and seek personal information
  • 7. Information is no longer competitive advantage, it’s organized knowledgeSocial Networks: Creates tendency to share more information than what we need to!
  • 8. Social Networks: Double Lane RoadORLook both ways when you use Social Networks
  • 9. ThreatsSubversive techniques that leverage your trust relationship.Hackers that scan sites for Personal Information or Proprietary Information.Online Predators.Peer pressure to participate and give out more information than needed - exposing your personal and professional data.Fake online identities that can mislead you.Why Did The Chicken Cross The Road?
  • 10. Beware!Enticing Applications such as Online Quiz – could ask your DOB in a subtle way or entice you.Installing Applications that have access to your Personal Profile information.Exposure to Worms, Viruses and Malwares that poses risk to Personal Information.Poorly Managed Trust Relationships – Accepting someone as a friend who you don’t know.Posting too much Personal Information.What route are your Security Guards taking to the bank today?
  • 11. AwarePrivacy Settings. Example, my setting on Facebook:
  • 12. Don’t forget your Meta data settings.
  • 13. READ - Privacy Policy
  • 14. REMEMBER - Some sites make their privacy settings complicated!
  • 16. Do not give your full (complete) name. Example: Omit middle name or precise location
  • 17. Don’t be pressured or enticed to reveal more than needed.Data Protection – The protection of personal data is an important individual right.
  • 18. Data Protection Disclose data with careReveal in bits and pieces, don’t give out exact time, location and so on.
  • 21. What you write/post could be out there and could haunt you back some other time!
  • 22. Don’t give our your mobile number or e-mail.Disclose with Care & Entrust with Caution
  • 23. Data ProtectionTrustTrust but verify by offline means, if you accept someone as a friend, verify informally.
  • 24. Make good assessment on who you TRUST online.Trust but Verify
  • 25. Social Networks are Gaining CredibilitySocial Networks are used as a tool to screen behavior of potential job candidates. Social Networks data are used by Marketers, Forensic Investigators in various ways.Your Social Networks behavior forms the “Zeroth” impression, you may not even get a chance to make the First impression…Good online presence can enable your brand at the same time it can pose risks to your brand.It’s a part of life!
  • 26. Social Networks Safe UsageDo not disclose your company proprietary information on Social Networks – for example internal project, Intellectual Property.Do not use Social Networks in a way that it violates company Information Security Policy.Do not participate in online rumors, gossips and slandering related to work, colleagues or competitors.When you represent company on a Social Network, ensure that the information is approved by your company – follow proper process. Data leakage = Loss of customer trust = Negative business impact
  • 27. Social Networks Safe Usage Contd..Participate in a very few Social Networks, so you can keep a tab on your personal data.
  • 28. Professional Networking sites are no more trustworthy than Social Networking counterpart.
  • 29. Think before you ink. Ensure the content is appropriate. Don’t use inappropriate language or photos.
  • 30. Don’t brag or compelled to post data on Social Networks that you may regret later.
  • 31. Ensure that your account is protected with a strong password. Some sites might not enforce this.
  • 32. It may be a good idea to keep a tab on your kids activities on Social Networks.Social Networks: It is no fun being too careful, but being cautious and aware goes a long way.
  • 33. Social Networks Data TaxonomyService Data – Data you give to use service.Meta Data – Derivative data from your use of service.Disclosed Data – Data you provide on your site.Entrusted Data – Data you submit on other sites – you have no control.Incidental Data – Data that other people post about you, you have no control.Behavioral Data – Data site collects, your online habits.Social Networks: Different social networking sites give different level of user control for each data type.
  • 34. Thank you listLarry Magid http://www.larrysworld.com/about/Bruce Schneierhttp://www.schneier.com/blog/Bank Info Securityhttp://www.bankinfosecurity.com Cliff Reeser, DirectorJit Singh, CEO, eBislogichttp://www.ebislogic.com Hari Shetty, CEO, Jifflehttp://www.jifflenow.com