I hope this doesn't sound familiar to any of your kids: "A recent college grad with a distinctive last name would like to get rid of an entry on someone else's long-abandoned online journal. The entry mentions her full name in a rambling tale of drug-induced debauchery and sexual high jinks. It always shows up as the fourth or fifth result in a Google search on her name" – a problem, since she's now trying to get a job, reports Computerworld, referring to this as a real-life example. Basically, people have four options in cleaning up their online image: 1) Find and appeal to the person who posted the photos and associated text, 2) file an abuse report or take-down request with the site hosting that profile or blog entry, 3) pay a service such as ReputationDefender.com or ReputationHawk.com to do the above sort of legwork for you, and/or 4) create search-engine-friendly Web pages about yourself and/or a blog that push the negative stuff down in the search results. ComputerWorld offers a lot more detail, as well as other tough reputation scenarios, so check it out. The good news is, the above, fairly typical reputation situation has a pretty good chance of getting deleted. The bad news in the article was that ComputerWorld's reporters, who tried the do-it-yourself approach themselves, ended up with no idea of who among all the contacts they pursued actually got those images taken down.
NetFamilyNews – by Anne Collier
- Pretty faces in social media vs. mass media
- Risk implications of kids going mobile: Research
- A positive, insightful new book for schools on bullying
- Students called heroes in this 6th-grade class
- In the face of school violence, what do we default to?
- Popularity: The other kind of vulnerability
- FB & Oculus VR: The potential of a virtual-reality platform
- What’s (importantly) different about Snapchat
Analysis & News – by Larry Magid
- Anonymous apps and services are not synonymous with ominous
- Facebook’s ‘Nearby Friends’ feature: What you need to know
- Identity theft a problem from cradle to grave — Kids most vulnerable
- How to protect your family from Heartbleed security flaw (slideshow)
- Beware of Heartbleed inspired phishing scams
- Are sites you use vulnerable to Heartbleed security flaw?
- Microsoft ends support of Windows XP: Machines highly vulnerable to security risks
- The evolution of online safety: Lessons learned over 20 years