By Ted Claypoole and Theresa Payton
Who is looking at you online?
The government, your neighbors, employers, friends – the short answer is EVERYONE. This book is a handy guide that digs deep past the media headlines to tell you how your data is collected and used. The author’s provide practical tips on how to regain control of your internet persona while also fending off identity thieves and other cybersnoops.
And, for those with kids in their lives, Chapter 9 is dedicated to digital natives – the generation born into our digital age that cannot imagine life without instant access to info!
Chapter 6 gives pointers on internet impersonation:
The Face of Online Impersonation
Internet image impersonation is easy to do. Anyone can open a free email account with Yahoo!, Hotmail, Google, or any other email provider and use your name. Setting up a social media account on social networking sites such as Facebook or MySpace is equally simple. With a little information about your life, your impersonator could even fool those people closest to you.
Unfortunately, it can be very difficult to remove these accounts from the Internet. Most Online companies assume that an account is opened in good faith, and you will probably have to prove the damage was done by an imposter (and prove that the imposter is not simply another person who happens to have the same name), before a site such as Yahoo! or Facebook would consider closing an active account.
We have a 6 question quiz for victims of internet defamation; here is question #1:
Do You Have The Facts to Support a U.S. Lawsuit to Protect Your Online Image?
1) If someone has written unflatteringly about you online, were those comments
b) Intentionally malicious or made with a reckless disregard for the harm they might cause;
d) Not stated in a formally privileged way, such as filed legal pleadings;
e) All of the above?
Ted and Theresa’s new book, Protecting Your Internet Identity: Are You Naked Online?
Order today on Amazon!
Follow Theresa Payton on Twitter.