0 comments on “100 Words on Media Purging”

100 Words on Media Purging

It has now been three months since dropping all social media except LinkedIn.  No Facebook, Twitter, or others.  I felt some apprehension, endured some ridicule, and heard some dissent from others.

How do I feel now?  In a word, Indifferent.

It was not revolutionarily nor was it detrimental to my career or relationships.  Everything remains static.  I still call, email, and text people.  I still post on LinkedIn.  Am I missing Social Media drama? Am I missing amazing professional opportunities?  Are there people I am no longer connected with I miss?

Maybe, but that is likely your opinion; not mine.

0 comments on “100 Words on Unwelcome Opportunity”

100 Words on Unwelcome Opportunity

Does the Notifiable Data Breaches Scheme create legal opportunism?  While this amendment has been a step forward in privacy protection, are there unwelcome consequences in compliance?  Opportunities abound to assist and protect organisations, but what about those that were breached, assessed the compromise, and have correctly reported it?  With our privacy at risk, and in addition to loss of trust, reputational damage, and the recovery costs, will businesses now face the inevitable backlash of lawsuits?  With news a Sydney law firm is considering a class action against PageUp, does this set a precedent of future litigation for every reported breach?

0 comments on “100 Words on Digital Shadows”

100 Words on Digital Shadows

Some understand what their “Digital Footprint” is, but how many are aware of their “Digital Shadow?”  The term has existed for over a decade and consists of indirectly provided but related data.  Your Digital Shadow is information about you, akin to metadata.  Sources include CCTV footage, phone records, internet searches, others’ social media posts, and more.  Interestingly, this Digital Shadow is much larger than you think with an untold number of known (and possibly unknown) places containing a wealth of your private and sensitive information.  It is critical those possessing this data protect it; third party privacy must be considered.

0 comments on “100 Words on Managing Private Data”

100 Words on Managing Private Data

You must ask four questions about responsibly managing the private data of others.  First, “Do we possess personally identifiable and sensitive information about others?”  Second, “If that information were compromised, can harm befall those whose information has been exposed?”  Third, “What are we doing to protect that data?”  Finally, “When, not if, a breach occurs, how will we react, respond, and recover?”  The first may be simple to answer.  The second is more difficult and subjective, but necessary.  The third is very important and demands an answer, but the fourth is critical and must be addressed.  What are your answers?

0 comments on “100 Words on Privacy”

100 Words on Privacy

In the digital age, is privacy merely a concept?  With the ability to universally share information, voluntarily or not, the only privacy realised might be physically behind closed doors.  Consider that now, with our mobile addiction, even that gap is bridged.  Strangely, the more communication technology possessed, the less “communication” occurs, but the more others know about us.  Human existence becomes digitally vicarious, represented online through manufactured personas.  When considering third party privacy, what others inadvertently reveal further obscures the lines of privacy and our control over it.  Sharing personal information rarely divides our digital footprint, but rather multiplies it.