Those who minister and work in pastoral settings must take great care to be consistent in representing the worth of their character online. Clear communication and respect for boundaries is needed at any level of contact. Emails, text messages, blog postings or comments, and YouTube videos are all public forums from which a permanent record can be obtained. As a representative of the Church, users should be diligent in avoiding situations which might be the source of scandal for themselves or others. Furthermore, those to whom we minister must be educated on the public nature of such communcation. Extreme caution should be exercised with regard to the nature of information sent via email.
INTERNET SAFETY TIPS
Practical Strategies to Protect Your Social Media Presence By Sameer Hinduja, Ph.D.
For better or for worse, social media is an integrated part of today’s society. Each one of us has the opportunity to use social media wisely, without compromising our safety, privacy or reputation. The following strategies are practical ways that you can improve your social media presence and perhaps share with the youth who are already utilizing these online platforms.
Do not post or send anything you would be embarrassed for certain others to see. Think about what your family, friends or future employers might think if they see it. How would you feel if that statement or picture was forever tied to your name and your identity? Does it really represent who you are? Remember, your keyboard may have a “delete” button, but once online it is often impossible to remove.
Do start early in building a positive online reputation. From the very first post you make on a new social media platform, think about how others will perceive and interpret what you share. Also, actively involve yourself in many positive activities. Get yourself featured in newsworthy projects. Figure out the best ways to create and maintain an online identity that strongly demonstrates integrity and maturity.
Do not compromise your identity. Identity thieves are constantly looking for new ways to obtain your personal information, usually for the purpose of benefiting financially at your expense. Never post your address, date of birth, phone number, or other personal contact information anywhere on social media. Even with restrictions, access can be gained through fraudulent means such as by phishing, hacking or malware.
Do be considerate of others when posting and interacting. If you message someone and they do not respond, or if someone messages you and asks that you not post about them, take the hint and move on. Also do not post pictures of others without their permission. And if someone asks you to remove a picture, post, or to untag them, do so immediately.
Do not vent or complain—especially about specific people or organizations, in public spaces online. People will negatively judge you based on your attitude, even if your complaint has merit. Employers, schools and others have access to social media, and they are looking. Is that spiteful comment about your boss or co-worker really worth losing your job over? Be careful, too, about complaining in seemingly private environments or sending direct messages to others you think you can trust. You just never know who might eventually see your correspondence or posts.
Do not hang out with the wrong crowd online. Resist accepting every friend and follower request that comes your way. Having a lot of followers is not the status symbol some people make it out to be, and can just increase your risk of victimization. Giving strangers access to your personal information opens you up to all sorts of potential problems. It is also true, though, that those who are most likely to take advantage of you will not be complete strangers, but will be those you have let into your life just a little bit (like allowing them to friend or follow you) and who use information they can now access against you. Go through your friends and followers lists regularly and take the time to delete those you do not fully trust, those that you have superficial and largely meaningless friendships with and those you probably are not going to ever talk to again.
Do not hang out with the wrong crowd offline. Maybe you are smart enough not to post that picture of you holding that red solo cup (even if just filled with lemonade). But your friend does—and tags you—along with the comment: “Gettin’ blitzed!!!” You also might not want others to record your legendary dance moves at last weekend’s party, but cameras and phones are everywhere. If you are associating with people who do not really care about you or your reputation, they may seize the opportunity to record and post the video for others to see (and laugh at). Trust us—you do not want that kind of attention.
Do properly set up the privacy settings and preferences within the social media apps, sites and software you use. Use the features within each environment to delete problematic comments, wall posts, pictures, videos, notes and tags. Do not feel obligated to respond to messages and friend/follower requests that are annoying or unwanted. Disallow certain people from communicating with you or reading certain pieces of content you share, and allow access only to those you trust. Turn off location-sharing, and the ability to check-in to places. If you need to let your friends know where you are, just text them using your phone rather than sharing it with your entire social network.
Do not post or respond to anything online when you are emotionally charged up. Step away from your device. Close out of the site or app. Take a few hours, or even a day or two, and allow your brain some downtime to think through the best action or response. Responding quickly, based on emotion, almost never helps make a problem go away, and often makes it much worse. Pause before you post!
Do secure your profile. Use complex passwords that consist of alphanumeric and special characters. Avoid using recovery questions that have easy-to-guess or common answers, such as a pet’s name. Never reveal your passwords to friends or family, or leave them written down somewhere. Avoid accessing your online profile from devices that are unsecure (like at a library computer), or do not have virus and malware protection.
Do not tell the world where you are at all times. Burglars use social media to target victims by reading posts that clue them in as to where you are (and when you are not at home). Checking in while on vacation or posting an update such as “At the beach for the day” or “Be back in town on Tuesday” may be a fun way of letting your friends know what you are up to, but it also lets those with bad intentions know when your home is empty and vulnerable.
Do regularly search for yourself online, just to see what is out there. Start with Google, but also use site-specific search engines on social networking sites, as well as sites that index personal information about Internet users. Some examples are: peekyou.com, zabasearch.com, pipl.com, yoname.com, and spokeo.com. If you do find personal information about yourself, investigate how you can have it deleted. Many sites provide some type of “opt-out” form that allows you to request its removal.
Do separate business from pleasure. The reality is that we all would probably rather not have our employers (and many others) know every little detail about our personal lives. For this reason, consider online social networking with work acquaintances via sites like LinkedIn or Google+ as opposed to mixing your professional contacts with more personal ones on Facebook and Instagram.
Almost all of us are on social media in one form or another. Or, if we are not, then certainly the young people in our lives are. Hopefully this article has provided you an additional avenue by which to make the most of your presence online, which can also be used to communicate to the youth within your care.