Sites like Facebook, Twitter, MySpace , LinkedIn, Orkut, Zorpia, Flicker, twicpic, yfrog and YouTube.etc, are social media sites designed to share information such as who and where you are and what you are doing, photos and video. This is a comical example of how information is shared using social media sites to tell the Digital Story of the Nativity.
Social media sites are a great way to connect to close friends and family, or even re-connect with old classmates and old co-workers. Also it can be a great way to find and connect to new groups with interests common to your own.
With just a few clicks people can access messages, know where their contacts are, what are they doing. All this makes for an entertaining experience network. The speed and immediacy that characterizes them are useful to inform and share content, true, but it can also jeopardize your own job or worse and compromise your privacy and security. Also the content posted on the site stays on the server even after you disable your account and is searchable.
The trouble starts when it becomes an addiction, if people spend too much time discussing everything that happens in their lives without taking the necessary steps to protect what is shared. It is logical to enjoy safely social media sites, which have the ability to control how visible your information and pictures are on the site as well as any search engines who parses that data.
Below is a series of recommendations to protect the identity information in digital networks and it is up to you to decide how visible you want your contact and profile information, videos, photos, and other posts need to be, and take the time to set the appropriate controls within the media site in question. For each one of us it is important to have a good view of what is published and learn to manage and protect our identity.
Although this presentation is from last year some of the information is still relevant
The search is an important aspect of social networks. It is up to the users if they want to be seen by all members of a network or just want to be seen only by their contacts.
It should make a conscious choice and set the profile, rather than leave it to the default settings, they usually allow some of the profile information such as name and main photo to be found on page and through Internet search engines.
Be cautious about posting and sharing personal information. Do not reveal passwords, keys, date of birth, home address, phone number and place of birth. Do not put your full resume online, if you must, remove it when you find a job. Protect the answers to secret questions that make social networks. The combination of that publicly available information and your public post about hanging out with friends on Saturday night across town could be enough for someone to take advantage of the situation and break into your house.
Generally every page has a link that explains how to use the information by users and gives tips for safe keeping. Note that when entering a network, it is giving license or right to use any information that is on these sites.
All sites have a link to a “Privacy” page that explains how your information is used and provides tips on staying safe. Determine how visible the information is that you post on social networks and search engines (profile, photos, videos and posts.) Each page allows you to select privacy settings, read them and adjust by trial the level of control and privacy you want.
There is an option that messages, pictures and videos that can only be seen by their followers, for this you must change the default settings of Twitter.
Think twice before posting or even clicking on a post. Consider what could happen if a post becomes widely known and how that may reflect both on you (as the poster) or your family, friend or workplace. i.e. Jason Manford quits The One Show over sex messages
With a little effort and some common sense you can enjoy and safely participate in social media sites. Ultimately though, it’s up to you to manage your digital identity. You must use good judgment about what you post and learn how you protect your personal data and reputation from the digital networks.