The Decline of Online Privacy

Size: px
Start display at page:

Download "The Decline of Online Privacy"

Transcription

1 The Decline of Online Privacy And the rise of personal identity management in the age of big data A uknow White Paper by Tim Woda, co founder of uknow.com, Inc.

2 Overview There is a sense of fear and powerlessness among the public as businesses and governments continue to gather more and more personal data. Nearly every interaction someone has on the Internet adds to an ever-growing collection of online data about them. With the explosive growth of social networking and online tools that help make our lives more fun and convenient, individuals have created an online version of themselves their digital self. There are many problems that result from having a digital self that becomes increasingly well-defined every day. Because there is no such thing as anonymous data, businesses and government entities are able to use anyone s digital self to identify the real person behind the data. High-profile data breaches and issues arising over who actually owns the data have raised important questions about online privacy and the security of personal information. There is a growing sense of fear and powerlessness among the public as businesses and governments continue to gather more and more personal data. This paper discusses concerns about the loss of personal privacy, the age of the digital self, and the future of personal identity management. 1

3 THE DIGITAL SELF IS AND BECOMING MORE DIFFICULT TO MANAGE 2

4 The Maturing Digital Self and the Expanding Digital Footprint The digital self is the amalgamation of the personal data generated while creating, exchanging, and receiving digital information through the Internet. The interaction between individuals and the Internet has brought new phrases into our vocabulary digital self and digital footprint. The digital self is the amalgamation of the personal data generated while creating, exchanging, and receiving digital information through the Internet. s, texts, online searches, photos, blog posts, requests for driving directions, website logins, account profiles, game logins, social check-ins, video streaming, music streaming, and financial transactions all blend together to create a digital self that is an eversharpening image of the Internet user. Any time an individual uses social media, mobile devices, and apps that generate GPS data they leave behind a digital footprint. By combining bits of location data from various sources, companies and government entities can accurately determine that individual s exact physical location. They can also keep a record of where that individual has been, when they were there, and where the will likely go next. The Internet never forgets The Internet records everything and forgets nothing. The trail of data that gives birth to and shapes the digital self exists permanently. Inappropriate public posts and photos on social media sites like Twitter, Facebook, Pinterest, and Google+ are there for 3

5 the entire world to see. Those photos and posts aren t just on the servers of those sites. Search engines index them and can be found at any time in the future by anyone. Even posts and photos that were intended to be private may be discovered. There is no such thing as anonymous data One of the best lessons that there is no such thing as anonymous data comes from Netflix. In 2006, the online video streaming company released 100 million anonymous subscriber records containing movie ratings made by those subscribers. Shortly after the release of the data, researchers were able to identify people in the database by name, and with a high degree of accuracy. They were able to do this even with a small number of movie ratings. Whether anonymous data is shared for well-intentioned reasons or for profit, it is best to assume that someone somewhere can use it to identify a specific individual. Individuals have no control over their data According to a report by Forrester Research, over the next few years we will see Internet search engines, financial service companies, health companies, entertainment companies, and technology startups competing in a free-for-all to collect and profit from individual s data. What s missing from this equation is the individual supplying the data. That s because individuals do not own the data they have shared. Terms of Use statements on websites may detail how the company intends to use collected data. However, the statements make it clear that they own the data shared or collected from users of the site. 4

6 MARKETERS VIEW CONSUMER DATA AS A VALUABLE ASSET 5

7 Marketer s Want More and Better Consumer Data In the age of Big Data, whoever controls the personal data of an individual controls the marketing relationship. Personal data is a valuable asset that can be leveraged, bought, and sold just like any other traditional asset. That s why companies in every market space are doing everything they can to collect more and better consumer data. Personal data has enormous value. In the U.S. alone, companies spend more than $2 billion per year on acquiring third-party data about individuals. That amount is in addition to the billions spent on market research and the creation of data derived from other data. From their point of view, companies are seeking to better understand what consumers want and need. They believe that the more detailed data they have, the better they will be able to create more desirable products, become more efficient marketers, and increase brand loyalty. In the age of Big Data, whoever controls the personal data of an individual controls the marketing relationship. Marketers with more, fresher, and better data win because they are in a better position to guess what an individual is interested in purchasing when, why, and how. With that knowledge, they can direct more effective marketing toward the individual. Even though commerce fuels our economic system, the refinement of marketing tactics must be counterbalanced by the privacy of each individual. 6

8 GOVERNMENTS VIEW PERSONAL DATA AS A TOOL FOR SURVEILLANCE 7

9 Governments Want More and Better Individual Data Governments can use the Internet as a mass surveillance and intelligencegathering network. Governments are increasingly using the data of individuals for law enforcement and national security purposes. All mobile devices and vehicles using GPS capabilities are essentially tracking devices. However, citizens would never knowingly agree to carry a government-issued tracking device. Citizens would rebel if the government required that they report when they made a new online friend, when they Liked a friend s photo, or where they ate lunch. No one would stand for being compelled to deliver to the government the content of texts, s, and Skype calls. Even though such requirements don t seem realistic in a Democratic society, governments already have access to this information. That s because governments can use the Internet as a mass surveillance and intelligence-gathering network. If they can t access the information directly, they can easily get it from the company s that collect it. In 2011, the Brookings Institute reported that because of rapidly declining storage costs, it is technologically and financially feasible for governments to record nearly every phone conversation, electronic message, social media interaction, and the movements of nearly every person and vehicle. There is an urgent need to balance the aims of law enforcement and national security with the expectation of individual privacy. 8

10 THE FUTURE OF PERSONAL IDENTITY MANAGEMENT 9

11 The Movement Towards Personal Identity Management In this new data economy, personal data management will evolve from new rules that govern how individuals, companies, and government entities collect, use, and share personal information. As the public becomes more anxious about privacy and the security of their personal data, companies must respond with personal identity management solutions. Effective personal identity management puts individuals in control of their identity data, transactional data, webbrowsing history, location data, and all user-created data. The newly empowered individual will be able to decide how, when, why, and with whom they share their personal data. In this new data economy, personal data management will evolve from new rules that govern how individuals, companies, and government entities collect, use, and share personal information. There will be clearly stated rights and responsibilities as well as accountability and enforcement. Fortunately, there is currently a move led by consumer advocacy groups and forward-thinking companies in the identity theft industry toward creating effective personal identity management systems. There is also an increasing consumer awareness of what s at stake. Companies that understand that the real value of personal data is in how it empowers the consumer will be the leaders in developing personal identity management systems. Those companies will create an entirely new competitive advantage over companies that don t learn how to play by the new rules. By empowering the individual with comprehensive personal identity management systems, companies will be able to attract users who demand privacy, security, accountability, and a clear understanding of how their data will be used. 10

12 Conclusion A system of personal identity management must be developed to empower individuals to protect their digital footprint and decide how much of their digital selves they want to share. We are in the age of Big Data where companies and government entities treat personal data about individuals as a valuable asset to be collected, bought, sold, and used for purposes that were never foreseen by the individual sharing the data. A system of personal identity management must be developed to empower individuals to protect their digital footprint and decide how much of their digital self they want to share. The hallmark of a trustworthy personal identity management system will have the following components: Security: Personal data will be protected against both intentional and unintentional misuse and security breaches. Data Rights and Responsibilities: There will be easyto-understand statements of rights and responsibilities that ensure the integrity of the personal identity management system. Accountability and Enforcement: Clear rules will hold companies and government agencies accountable for securing and using personal data. 11

13 About uknow uknow powers smart tools that connect and protect digital families. At uknow, we strive to help families protect their personal data and information from being misused to invade their privacy, impact their reputation, steal their identity, or threaten their safety. Our flagship product, uknowkids, helps protect kids from the dangers of the Internet with uniquely intelligent tools. Unlike other parental control software, uknowkids enables parents to have their child s back without constantly looking over their shoulder. By giving parents the information they need to educate their children about staying safe online and the access to smarter tools to supervise them in a digital world, uknowkids helps make the Internet safer for kids and less intimidating for parents. 12

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

5 - Low Cost Ways to Increase Your

5 - Low Cost Ways to Increase Your - 5 - Low Cost Ways to Increase Your DIGITAL MARKETING Presence Contents Introduction Social Media Email Marketing Blogging Video Marketing Website Optimization Final Note 3 4 7 9 11 12 14 2 Taking a Digital

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

Facebook and Social Networking Security

Facebook and Social Networking Security Facebook and Social Networking Security By Martin Felsky November 2009 Table of Contents Introduction... 1 What is Facebook?... 2 Privacy Settings... 5 Friends... 7 Applications... 8 Twitter... 9 Should

More information

Best Practices in Digital Rights Management:

Best Practices in Digital Rights Management: Neustar Insights Whitepaper Best Practices in Digital Rights Management: Reducing the Risk to Online Content with IP Intelligence CONTENTS Executive Summary 2 Content Reigns on the Internet 3 The Need

More information

BC s Digital Literacy Framework (DRAFT)

BC s Digital Literacy Framework (DRAFT) BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Inbound Marketing Strategies Dahlia Benaroya Dahlia Web Designs LLC 1-888-7-DAHLIA

Inbound Marketing Strategies Dahlia Benaroya Dahlia Web Designs LLC 1-888-7-DAHLIA Inbound Marketing Strategies Dahlia Benaroya Dahlia Web Designs LLC 1-888-7-DAHLIA The business world is advancing day by day, through valuable marketing and promotions. What is the procedure of this unbeaten

More information

January/February 2015. 2015-2016 Foresight Report

January/February 2015. 2015-2016 Foresight Report w w w.di.net V o l u m e 21 N u mber 1 2015-2016 Foresight Report 58 How SEO Can Help Your Firm Grow There s something about the phrase Search Engine Optimization that causes eyes to glaze over and makes

More information

Video, Social Media and Mobile

Video, Social Media and Mobile WHITE PAPER: How Businesses Are Leveraging New Internet Marketing Platforms Like Video, Social Media and Mobile to Acquire Customers and Build a Supportive Community Introduction: Businesses of all types

More information

Social Media Playbook

Social Media Playbook Social Media Playbook Personalized Experience Social technologies are changing the way we collaborate and communicate with each other. Many traditional forms of marketing and advertising have been replaced

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

www.appsbar.com How to Create an App For millions of people, there isn t an app for that By Scott Hirsch Founder appsbar.com

www.appsbar.com How to Create an App For millions of people, there isn t an app for that By Scott Hirsch Founder appsbar.com www.appsbar.com How to Create an App For millions of people, there isn t an app for that By Scott Hirsch Founder appsbar.com July 10, 2012 Contents Introduction: 1 App Problems: 1 Tools for Creation: 2

More information

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet Learning English with CBC Radio Living in Alberta Social Media: How Kids Use the Internet by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Topic: Social

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Pinterest has to be one of my favourite Social Media platforms and I m not alone!

Pinterest has to be one of my favourite Social Media platforms and I m not alone! Pinterest has to be one of my favourite Social Media platforms and I m not alone! With 79.3 million users, 50 billion pins and 1 billion boards it is host to an enormous amount of content. But many of

More information

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life School Technology 101 for Parents Tips for Monitoring Your Child s Digital Life ipad Helpful Tips Look at your child s ipad daily 70% of students surveyed last year said parents looked at their ipads rarely

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen *

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen * CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE by Kaofeng Lee & Erica Olsen * This article was published in Domestic Violence Report, August/September 2013, Vol. 18, No. 6. Can you hear me

More information

Social Media Curriculum Overview

Social Media Curriculum Overview Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?

More information

Monetizing Mobile Applications How to maximize investment, move up the value chain and expand into new markets

Monetizing Mobile Applications How to maximize investment, move up the value chain and expand into new markets Monetizing Mobile Applications How to maximize investment, move up the value chain and expand into new markets Strategic White Paper Network providers are well aware of the challenges presented by today

More information

Your Business s Online Check-Up

Your Business s Online Check-Up 1 Did you know?... From the smallest start-up to a multi-generational family business to Fortune 500 companies, all businesses have a web identity or citation made up of the business name, address, phone

More information

In fact, one of the biggest challenges that the evolution of the Internet is facing today, is related to the question of Identity Management [1].

In fact, one of the biggest challenges that the evolution of the Internet is facing today, is related to the question of Identity Management [1]. 1. Introduction Using the Internet has become part of the daily habits of a constantly growing number of people, and there are few human activities that can be performed without accessing the enormous

More information

79% use Internet to gather vehicle buying information

79% use Internet to gather vehicle buying information Conversations and customer opinions about car dealerships are being shared everyday on the Internet through social networks and customer review websites. The key to building customer loyalty that drives

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

WSI White Paper. Prepared by: Baltej Gill Social Media Strategist, WSI

WSI White Paper. Prepared by: Baltej Gill Social Media Strategist, WSI Understanding the Buzz Around Social Media WSI White Paper Prepared by: Baltej Gill Social Media Strategist, WSI Introduction You might have heard that social media can help build your brand, promote your

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,

More information

Guide to building a secure and trusted BYOID environment

Guide to building a secure and trusted BYOID environment e-healthcare e-gaming e-insurance e-commerce e-banking e-government Guide to building a secure and trusted BYOID environment Bring-Your-Own-Identity is not new. People have been using their social media

More information

Google: Trust, Choice, and Privacy

Google: Trust, Choice, and Privacy Google: Trust, Choice, and Privacy Gus Meuli, Caitlin Finn Trust is hard to earn, easy to loose, and nearly impossible to win back. 1 This statement seems to ring true in the constantly changing world

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

8 STEPS TO AN EFFECTIVE CONTENT MARKETING SYSTEM

8 STEPS TO AN EFFECTIVE CONTENT MARKETING SYSTEM 8 STEPS TO AN EFFECTIVE CONTENT MARKETING SYSTEM Produced by Katie Wilson Aspire Internet Design www.aspireid.com @aspireid Overview... 2 1: Set Goals and Create a Set of Metrics for Your Content Marketing

More information

CONTENT MARKETING AND SEO

CONTENT MARKETING AND SEO CONTENT MARKETING AND SEO How to Use Content Marketing and SEO to Reach Customers and Business Goals What do you consider the most essential ingredient for your business s marketing success? In today s

More information

Cloud Computing: The Gathering Storm

Cloud Computing: The Gathering Storm Cloud Computing: Independent research Martin Wootton, RS Consulting Cloud Computing: The Gathering Storm What UK consumers really feel about cloud-based services We rely more than ever on computing and

More information

Building Your Business Online EPISODE # 203

Building Your Business Online EPISODE # 203 Building Your Business Online EPISODE # 203 LESSON LEVEL Grades 6-9 KEY TOPICS Entrepreneurship Online business Identity protection LEARNING OBJECTIVES 1. Become familiar with tools to do business online.

More information

SPECIAL REPORT. VIDEO, SOCIAL MEDIA, and MOBILE. How Businesses Are Leveraging New Internet Marketing Platforms Like

SPECIAL REPORT. VIDEO, SOCIAL MEDIA, and MOBILE. How Businesses Are Leveraging New Internet Marketing Platforms Like SPECIAL REPORT How Businesses Are Leveraging New Internet Marketing Platforms Like VIDEO, SOCIAL MEDIA, and MOBILE to Acquire New Customers and Dominate Their Markets Introduction Businesses of all types

More information

Securing the Mobile App Market

Securing the Mobile App Market WHITE PAPER: SECURING THE MOBILE APP MARKET White Paper Securing the Mobile App Market How Code Signing Can Bolster Security for Mobile Applications Securing the Mobile App Market How Code Signing Can

More information

Technology & Applications. Three Technology Must-Haves to Improve Sales Effectiveness and Boost Win Rates

Technology & Applications. Three Technology Must-Haves to Improve Sales Effectiveness and Boost Win Rates Technology & Applications Three Technology Must-Haves to Improve Sales Effectiveness and Boost Win Rates Executive Summary To drive sales excellence, sales professionals need to monitor their objectives,

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

GfK 2016 Tech Trends 2016

GfK 2016 Tech Trends 2016 1 Contents 1 2 3 Evolving behavior today s connected consumers Driving you forward 10 tech trends for 2016 Growth from knowledge turning research into smart business decisions 2 Evolving behavior today

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

ACQUIRING NETFLIX: SYNERGY MAKES THE WORLD GO ROUND

ACQUIRING NETFLIX: SYNERGY MAKES THE WORLD GO ROUND ACQUIRING NETFLIX: SYNERGY MAKES THE WORLD GO ROUND Heather Curler, Zachary Ford, Jordan Jones, Elizabeth Likins, Dan Oliver, Jonathan Sawyer Ladies and gentlemen of the board, thank you for letting us

More information

Facebook Guidelines For Parents

Facebook Guidelines For Parents Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

It may look like this all has to do with your password, but that s not the only factor to worry about.

It may look like this all has to do with your password, but that s not the only factor to worry about. Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).

More information

Tulix. Sponsored Content

Tulix. Sponsored Content Tulix Sponsored Content The market for over-the-top set-top boxes has grown considerably in recent years as many consumers have looked towards devices like Roku, Google TV, and Apple TV to either replace

More information

How To Be Successful With Social Media And Email Marketing

How To Be Successful With Social Media And Email Marketing Brought to you by: ExtremeDigitalMarketing.com B2B Social Media + Email Marketing: Rock Solid Strategies For Doing It Right! Businesses Connecting With Businesses Through The Power Of Social Media! By

More information

Helping to keep your children safe online

Helping to keep your children safe online Helping to keep your children safe online Chat speak how many of these do you know? gr8 BRB DEGT LMIRL POS KPC P911 PAL PAW PIR Adults often have anxieties about new media Everything that s already in

More information

Cyber Safety Handbook 2014

Cyber Safety Handbook 2014 Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires

More information

The Power of Relationships

The Power of Relationships The Power of Relationships How to build long-lasting customer relationships to help you do more business 2014 Copyright Constant Contact, Inc. 14-3931 v1.0 Helping Small Business Do More Business When

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Top Online Medical Marketing Trends This Year by docero 1 212.580.0988

Top Online Medical Marketing Trends This Year by docero 1 212.580.0988 Top Online Medical Marketing Trends This Year by docero 1 212.580.0988 If there s one thing that remains true in marketing, it s that you have to think ahead if you want to succeed. In this ebook, we outline

More information

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media

More information

Rushern L. Baker, III County Executive. Presented By: Eben Smith, Contract Compliance Officer Minority Business Development Division

Rushern L. Baker, III County Executive. Presented By: Eben Smith, Contract Compliance Officer Minority Business Development Division Rushern L. Baker, III County Executive a Presented By: Eben Smith, Contract Compliance Officer Minority Business Development Division 1 2 3 4 5 Social media includes web- and mobile-based technologies

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

WELCOME! LETS BEGIN. James Marchant Founder of Diligence Digital james@diligencedigital.co.uk 01424 447858

WELCOME! LETS BEGIN. James Marchant Founder of Diligence Digital james@diligencedigital.co.uk 01424 447858 James Marchant Founder of Diligence Digital james@diligencedigital.co.uk 01424 447858 Over 15 years of experience in the digital industry. Hello and congratulations on taking the time out to read our booklet.

More information

Central Ohio s Small Business Resource

Central Ohio s Small Business Resource Central Ohio s Small Business Resource Who is @Tonya Wilson? Program Coordinator for the Ohio SBDC at Columbus State Manage SBDC marketing, branding, outreach, digital media & events AAS Multimedia Production

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown

More information

Hello and Welcome to Karatbars! Here are some tips for dealing with Social Media.

Hello and Welcome to Karatbars! Here are some tips for dealing with Social Media. Hello and Welcome to Karatbars! Here are some tips for dealing with Social Media. Introduction The Internet has become indispensable in our society today, it is for not only for small start-ups, but also

More information

HOW TO USE SOCIAL MEDIA MONITORING TOOLS. Jamie Turner

HOW TO USE SOCIAL MEDIA MONITORING TOOLS. Jamie Turner HOW TO USE SOCIAL MEDIA MONITORING TOOLS Jamie Turner If you re like a lot of people, you re probably already using social media in some way, shape, or form. You might have a Facebook page, and you probably

More information

How to Attract More Customers Using the. Power of Online Marketing

How to Attract More Customers Using the. Power of Online Marketing How to Attract More Customers Using the Power of Online Marketing Introduction: Businesses of all types and scopes are just starting to become aware of what a small percentage of early adopters already

More information

How Businesses Are Leveraging New Internet Marketing Platforms Like to Acquire Customers and Build a Supportive Community

How Businesses Are Leveraging New Internet Marketing Platforms Like to Acquire Customers and Build a Supportive Community WHITE PAPER: How Businesses Are Leveraging New Internet Marketing Platforms Like Video, Social Media and Mobile to Acquire Customers and Build a Supportive Community Introduction: Businesses of all types

More information

Marketing Report 2015

Marketing Report 2015 The State of Marketing Report 2015 TABLE OF CONTENTS EXECUTIVE SUMMARY KEY FINDINGS DETAILED INSIGHTS 2 3 6 Meeting Consumer Needs Consumer Channel Preference Marketers Current Workflow How Marketers Workflow

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

2011-2012. Frisco ISD

2011-2012. Frisco ISD 2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...

More information

Strategic Execution for Restaurant Rewards App. Implementation of content strategy spanning search, blog, and social

Strategic Execution for Restaurant Rewards App. Implementation of content strategy spanning search, blog, and social Strategic Execution for Restaurant Rewards App Implementation of content strategy spanning search, blog, and social Company Overview Our sample company is a restaurant rewards startup with e-card app membership

More information

MARKETING. What is Online Reputation Marketing? Why is ORM Important to your Business? Netforce Performance Marketing - Call Us Today!

MARKETING. What is Online Reputation Marketing? Why is ORM Important to your Business? Netforce Performance Marketing - Call Us Today! ONLINE REPUTATION MARKETING Your reputation is important. Unflattering news, pictures, negative reviews, blog posts, and comments about your person, your business, brand, products and services can be posted

More information

Social Media. Marketing Guide B2B

Social Media. Marketing Guide B2B Social Media Marketing Guide B2B Introduction Social media has revolutionised how people communicate and consume information online. By harnessing the power of the social media buzz and effectively incorporating

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

Digital Life 102 LESSON PLAN UNIT 1. Essential Question What is the place of digital media in our lives?

Digital Life 102 LESSON PLAN UNIT 1. Essential Question What is the place of digital media in our lives? LESSON PLAN Digital Life 102 UNIT 1 Essential Question What is the place of digital media in our lives? Lesson Overview Students test their knowledge of digital media and learn some statistics about media

More information

Gwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15

Gwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15 Gwinnett United In Drug Education, Inc. Social Media Policy Page 1 Updated 1-11-15 Introduction Gwinnett United in Drug Education, Inc. (GUIDE) recognizes the importance of social media to interact with

More information

App Reputation Report February 2013 The Authority in App Security

App Reputation Report February 2013 The Authority in App Security App Reputation Report February 2013 The Authority in App Security Introduction The Appthority App Report for February 2013 provides an overview of the security risks behind 100 free ios and Android apps.

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Viralheat Retail Report. Social Media in Retail

Viralheat Retail Report. Social Media in Retail Viralheat Retail Report Social Media in Retail Today Social media is used by 82% of the online population and a premier channel to address the retail consumer. The challenge is to bridge retail and social,

More information

Five key trends are reshaping customer- experience management:

Five key trends are reshaping customer- experience management: Top Five Contact Center Trends for 2013 By Irwin Lazar VP and Service Director, Nemertes Research Executive Summary Five key trends are reshaping customer- experience management: ± Increasing adoption

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

INTRODUCTION. We hope you enjoy this report from TrackVia. Sincerely, Walker Fenton, SVP Product TrackVia, Inc.

INTRODUCTION. We hope you enjoy this report from TrackVia. Sincerely, Walker Fenton, SVP Product TrackVia, Inc. INTRODUCTION Modern workers are killing spreadsheets. And it s not like they are reverting to paper and pencil. Ironic, isn t it? Spreadsheets started the PC movement. Going back as far as the early 1980s,

More information

Administrative Procedures Memorandum A1300

Administrative Procedures Memorandum A1300 Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing

More information

3Degrees Group, Inc. Privacy Policy

3Degrees Group, Inc. Privacy Policy 3Degrees Group, Inc. Privacy Policy Your privacy is important to 3Degrees Group, Inc. ( 3Degrees ). The following Privacy Policy discloses the information practices followed by 3Degrees with respect to

More information

4/7/15. Maintaining a Personal Touch in the Electronic Age. Jennifer Thompson & Corey Gehrold. About Us

4/7/15. Maintaining a Personal Touch in the Electronic Age. Jennifer Thompson & Corey Gehrold. About Us Maintaining a Personal Touch in the Electronic Age Jennifer Thompson & Corey Gehrold About Us Full-service medical marketing Online medical marketing education 1 The Digital Age Around 40% of the world

More information

Bricks And Clicks A Look At Today s Retail Marketing Trends

Bricks And Clicks A Look At Today s Retail Marketing Trends Bricks And Clicks A Look At Today s Retail Marketing Trends A Quick and Easy Guide to Digital Advertising for Local Businesses TABLE OF CONTENTS 3 4 7 11 The New Customer Path to Purchase The Rise of Mobile

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

Technology for Small Business

Technology for Small Business Technology for Small Business Steinar Knutsen February 2015 Agenda Importance of Online Marketing Online Marketing Blueprint Social Media Networks Tools of the Trade 2 Every 1 Second on the Internet Source:

More information

Enabling Global Marketing: The Use of Digital Asset Management in the Automotive Industry. January 5, 2011

Enabling Global Marketing: The Use of Digital Asset Management in the Automotive Industry. January 5, 2011 Enabling Global Marketing: The Use of Digital Asset Management in the Automotive Industry January 5, 2011 Introduction The automotive industry is in transition. An economic recession, new demands for fuel

More information

Healthcare Marketing White Paper. 2016 Healthcare Marketing Trends

Healthcare Marketing White Paper. 2016 Healthcare Marketing Trends Healthcare Marketing White Paper 2016 Healthcare Marketing Trends Speed and personalization of content are popular themes in 2016 H E ALTH C A R E M A R K ETI N G TRE NDS 2016 HEALTHCARE MARKETING TRENDS

More information