What are
the privacy and security repercussions of social media? Are we sharing too much
information? Is what we share on social media whether knowingly or
inadvertently and what we click, putting our security and privacy at risk?
Social media is now
considered a commonplace form of communication. Almost everyone has a Facebook
page, and at the very least many people use email. Some jobs actually expect
users to have social media profiles, and require them before hiring. All of
this open information has led to multiple issues regarding privacy and security
that are still being explored. In this post we will examine the issues involved
in online privacy when sharing information through the electronic world.
EMAIL
Email in the workplace has not been considered private for a
long time. Some workplaces increase security through the use of encryption
software and other security measures to secure proprietary company data, but
personal information is most often considered property of the company, “Even if there
is no signed agreement or written policy, an employer can still peek into email
(or your desk for that matter) -- assuming, as is usually the case, that you
have no reasonable expectation of privacy as to the contents,” (NOLO 2012).
What about personal email from home however?
Obviously, personal information should be sent from a personal location. The
catch is that you no longer have control of information once it is sent out
over the web. This will be a common theme when discussing any social media
issue as this blog continues. NOLO, an online law advice website explains the
situation better, “After your email leaves your home it travels over multiple
online services and open networks to reach its destination. Although
interception of email transmission -- that is, snooping while an email is in
"real-time" transmission between sender and receiver -- is a federal
crime under the Electronic Communications Protection Act (ECPA) (18 U.S.C.A
2517(4)), it has been accomplished by hackers.” (NOLO 2012). This real time
transmission is only a partial issue, as data once sent is then stored on hard
drives, ISP’s, public and private network, or even sampled for other use. Once
it is sent, your email is out of your control, so the best practice is not to
send something you don’t want to acknowledge later.
For online resources looking further into email
privacy, please see:
“Email Privacy: If
you want privacy, don't count on email. Here's why.”NOLO
2012.
Retrieved
online from http://www.nolo.com/legal-encyclopedia/email-privacy-29610.html on May 7th, 2012.
PHOTOS
Online
photo sharing can be achieved through many different venues, such as Flickr,
Facebook, and Picasa. While the process differs for each area, the basics are
the same. Users upload photos to an online storage site with varying levels of
privacy.
I remember
the first time my phone automatically uploaded its photos to my Google+
account. I was aghast with horror. Sure, my privacy setting was on private, but
my phone didn’t check with me before each picture. In truth, the most that was
likely to happen was that I uploaded those ugly photos of myself that I had
meant to delete – the picture with the eyes closed the one that makes me look
fat, etc. To Google’s credit, I did not see these pictures on any public
display either. The fear is that I had no control. What if I had been drinking
on a day I called in sick? What if I was kissing some guy who wasn’t my
boyfriend? What if my boyfriend had a picture that wasn’t all that publicly
appropriate of me?
Concerns
over these questions keep people up at night. No one wants employers to see
pictures like this in the morning.
Kelly O.
(December 2009). Drunk of the Year. the
Stranger. Retrieved online http://www.thestranger.com/seattle/drunk-of-the-year/Content?oid=3096053
May 7th, 2012.
The first way to alleviate concerns
of this nature is to use simple common sense. In the example above I would
recommend a) not getting crazy drunk via beer pitcher, and b) not getting your
picture taken if you DO get crazy drunk via beer pitcher. Secondly, check your
privacy settings. In online sharing, your privacy settings can’t work if you
don’t activate them. Basics.
My next section of advice is based
from the New York Times. Companies, data miners, and simple interested
individuals have more ways than one to analyze online users. The one hardest to
control is your “social signature.” In summation, your social signature is your
online personality based upon multiple choices and interactions. In Netflix
this helps to develop your preference list, in Facebook it targets your advertisements.
With photos, it usually targets your friends.
“You may not disclose personal
information, but your online friends and colleagues may do it for you,
referring to your school or employer, gender, location and interests. Patterns
of social communication, researchers say, are revealing.” (Lohr 2010). In
addition to limiting the exposure you put out there personally, pay attention
to the exposure of yourself put out there by friends and acquaintances. I’ll
detail this more in my discussion of social media networking sites. Lohr, S. (March
16, 2010). How Privacy Vanishes Online. The
New York Times. Retrieved online from http://www.nytimes.com/2010/03/17/technology/17privacy.html
on May 7th, 2012.
SOCIAL NETWORKS
So what is the real danger of social
networks? Embarrassment? Job security? Crime? Bullying? It seems that each of
these topics deserves addressing.
Embarrassment
is the least harmful, but most common consequence of social missteps. While the
situation may not go viral, pictures and posts often take longer to delete than
the average user would desire. For example:
Retrieved online from http://www.holytaco.com/25-most-embarrassing-facebook-updates/ May 7th, 2012.
“Embarrassing
Photos You Don’t Want Tagged on Facebook: Part Deux” LA Weekly.
Retrieved online from http://www.laweekly.com/slideshow/embarrassing-photos-you-dont-want-tagged-on-facebook-part-deux-31571668/ May 7th, 2012.
More serious considerations include job security. Many people
have been fired over Facebook posts, from various industries. Here are some
examples from the Huffington Post.
All pictures below from: Kanalley, C. and Smith, C. (July 26, 2010). Fired Over Facebook: 13 Posts That Got
People CANNED. Huffington Post. Retrieved online from http://www.huffingtonpost.com/2010/07/26/fired-over-facebook-posts_n_659170.html#s114542&title=Waitress_Fired_For
May 7th, 2012.
But what about crime? Can posting
something get you in serious trouble? In recent news that answer would be
“yes.” The United States Marines recently discharged Sgt. Gary Stein for
anti-Obama posts on his Facebook page. He will get an other-than-honorable
discharge for violating his company policy, and when that company is the United
States government those consequences can be serious (CBS 2012). AP. (April 25th, 2012). Marines discharge sergeant for ant-Obama
Facebook posts. CBS News. Retrieved online http://www.cbsnews.com/8301-201_162-57421223/marines-discharge-sergeant-for-anti-obama-facebook-posts/
on May 9th 2012.
Divorce and custody battles are also
at risk with social media. In most court battles, your words will be used
against you. In a divorce, anything that looks like infidelity is easily
applied against you. That means IM’s, Messages, etc. Also pictures can be
terribly incriminating. Tags of you drinking on a school night don’t always
paint a great picture as a responsible parent. If you are going through legal
battles of this nature, Atkins Law Firm has assembled a number of helpful
resources on social media practices.
Tripp.
(March 23, 2010). Is Your Facebook Page
Going to Be Used Against You in Your Divorce? Atkins Law Firm. Retrieved
online from http://www.upstatefamilylawblog.com/is-your-facebook-page-going-to-be-used-against-you-in-your-divorce/
on May 9th, 2012.
In addition to crime, a new area of
concern has arisen on cyber bullying. Cyber bullying should not be confused
with the highly similar cyber stalking. Cyber bullying also differs from sexual
exploitation by online predators. Online predators and identity thieves have
become common knowledge over the internet, and most people understand the
precautions needed to combat these. Cyber bullying is a newly defined category
of crime, and www.stop.cyberbullying.org explains the distinctions very well.
"Cyberbullying" is when a child, preteen or
teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise
targeted by another child, preteen or teen using the Internet, interactive and
digital technologies or mobile phones. It has to have a minor on both sides, or
at least have been instigated by a minor against another minor. Once adults
become involved, it is plain and simple cyber-harassment or cyberstalking.
Adult cyber-harassment or cyberstalking is NEVER called cyberbullying.
STOP
Cyberbullying. Retrieved online from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
on May 9th, 2012.
Cyber
bullying is seen as a larger threat than schoolyard bullying because the
bullies have 24 hour access to their victims. The harassment doesn’t simply end
at the end of the school day. High profile cases such as Kylie Kennelly and the
suicide of Ryan Halligan have called for reform in our current laws to help
combat this threat. Struglinski,
S. (Aug 18, 2006). Schoolyard Bullying
has gone high-tech. Desert News. Retrieved online from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
on May 9th, 2012.
SUMMARY
Online media is a presence here to stay. Our function now is
to figure out how to deal with it in a manner that is both safe and secure. It
seems by studying the multiple cases followed in this blog there are a few
important guidelines.
1) If you don’t want it out there don’t
send it.
2) If you don’t want it in a picture,
don’t do it.
3) Know your audience. Not everything
should be public knowledge.
4) Know your friends. Associations
matter. Block people as needed.
5) If your job has a media policy –
follow it.
6) Once something has been sent, it
can’t be unsent.
FINAL NOTE
While it
is important to protect your own privacy and take responsibility for your
online actions, most of us still have an expectation of personal privacy in the
electronic world. A new trend has been started by employers requesting Facebook
passwords. The debate is still ongoing about the ethics and legality of this
practice, but some helpful practices have been passed on, such as those from
Career Enlightenment. Waldman, J. (May 1, 2012). What to do if a company asks for your
Facebook password in a job interview. Career Enlightenment. Retrieved
online http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
on May 9th, 2012.
No comments:
Post a Comment