At the beginning of class you were handed a foot print, you will need tolist the accounts the have online: websites, social networks, phones they text with, video games they play online, etc.You have about 5 minutes to pull your list together and have it ready for our discussion. Once your list is ready watch the video below while you are watching ask yourself the following questions:
- Why would people Google you?
- What is your digital reputation?
Have you ever Googled yourself ? Have you ever checked your virtual identity? Do you know that you leave a digital footprint every time you get online? Do you know that whatever you do online is accumulated into a digital dossier traceable by others ? These and several other similar questions are but the emerging tip of the sinking iceberg.One that is packed full of concerns related to issues of our online identity and privacy issues.
courtesy of :digitalfamilysummit.com
Managing one’s digital identity is a skill , so to speak, that we need to learn and teach our kids and students about. In a world digitally focused, the boundaries between the real and virtual are blurred .Watch this videoHere are some tips on how to protect your online identities and build a positive digital footprint .
- Never post anything that you might find embarrassing later.
- Be careful with the pictures you post on your public profiles. Remember others will see them and judge you based on their content.
- Change the privacy settings on your social networking sites so that only your Friends can see your information
- Do not disclose your personal address, phone number, passwords. Bank card numbers...etc even in private messages. There is always the possibility of somebody hacking into your account and finding them.
- Do not post things to bully, hurt, blackmail, insult, or afflict any kind of harm on others
- Always keep in mind that once information has been posted online, it
can be almost impossible to remove because of archiving and file
sharing. Even though you deactivate your accounts, the information may
still be retrieved by others.