Вы находитесь на странице: 1из 58

INVESTMENT PRODUCTS: NOT FDIC INSURED NO BANK GUARANTEE MAY LOSE VALUE

IMPORTANT INFORMATION
This material is provided on an informational basis only and should not
be construed as a solicitation for any specific Legg Mason product or
service.
Any mention of particular websites or web-related properties should not
be construed as an endorsement or recommendation.

CLICK TO EDIT MASTER


TITLE STYLE
Agenda
Get a copy of our
Understanding Social
Media and Staying Safe
Online: Privacy Settings
and Safety Guidelines
brochure

Introduction to social media


Staying in touch through social media
What is social media?
An overview of this fast-growing phenomenon
How social media is used
Recognizing the risks
Types of social networks
Understanding social media
Facebook
Twitter
LinkedIn
Staying safe online: What you need to know
Cyberbulling
Online predator
Identity theft
Action Steps

LEADING SOCIAL MEDIA SITES


Facebook
facebook.com
Connects people with friends and
others who work, study and live around
them.
Twitter
twitter.com
Offers the ability to connect to friends,
experts, celebrities and news outlets
for timely updates and insights.
LinkedIn
linkedin.com
The worlds largest professional
network designed exclusively for
business use.
You Tube
youtube.com
This website offers the ability to
discover, watch and share original
videos.
Instagram
instagram.com
A photo-sharing site.

Click icon
to add
picture
Foursquare
foursquare.com
Designed to help users find great places and
make the most of your visits.
Pinterest
pinterest.com
Content sharing service that allows
members to pin images, videos and other
objects to their individual pinboard.
Google Plus
plus.google.com
Service that allows you to connect with
friends, acquaintances, thought leaders and
news outlets.
Flickr
flickr.com
Online photo management and sharing site.
Tumblr
Tumblr.com
Blogging site that allows users to post and
share text, photos, quotes, links, music, and
videos.

INTRODUCTION TO
SOCIAL MEDIA

STAYING IN TOUCH: THE POWER OF SOCIAL


NETWORKING

Click icon
to add
picture

A FAST-GROWING PHENOMENON
If Facebook were a country,
it would be the worlds 3rd
largest

Two new members


join LinkedIn every
second

69

of parents are
friends with their
children on social
media

92

of children under
the age of 2 have
a digital shadow

Generation Y
and Z consider
email pass

7 10
out
of

Internet users
are members of
at least one
social media
site

Sources: Social Media Around the World 2012 by Insites Consulting, http://www.insites-consulting.com/social-media-around-the-world-2012; Amazing Social Media Facts 2013 by Juan Cole, March 13, 2013,
http://www.juancole.com/2013/03/amazing-social-video.html; State of the Media: The Social Media Report 2012 Nielsen http://nielsen.com/content/dam/corporate/us/en/reports-downloads/2012-Reports/The-Social-MediaReport-2012.pdf ; LinkedIn Adding a New Member Per Second, by Jennifer Van Grove, November 17, 2010, mashable.com; http://www.socialnomics.net/2010/05/05/social-media-revolution-2-refresh/; The Social Media
Revolution in Remarkable Facts and Figures,by Stan Schroeder, June 28, 2011, mashable.com, based on data from socialnomics.com; Digitalbuzz.com, using data from money.cnn.com, emergencemedia.com,
cheatedbylife.com, readwriteweb.com, Google.
7

A Fast-growing Phenomenon

Click icon
to add
picture

Sources: This Is How Much Time You Spend on Facebook, Twitter, Tumblr, by Zoe Fox, November 28, 2012, mashable.com; State of the Media: The Social Media Report 2012 Nielsen
http://nielsen.com/content/dam/corporate/us/en/reports-downloads/2012-Reports/The-Social-Media-Report-2012.pdf
8

A Fast-growing Phenomenon
Click icon
to add
picture

Behind the Social Media Phenomenon


Many people now rely on social media rather than email for day-today communications
Companies large and small are rushing to establish a presence on
social media websites
Enables people to easily exchange ideas, information and
documents
Offers a tremendous opportunity to meet new people, enhance your
business/professional life, explore new possibilities and expand your
social circle
Makes staying connected to relatives, co-workers, neighbors, former
classmates a snap

THE POWER OF SOCIAL MEDIA

Imagine a party where you decide the guest list

Click icon
to add
picture

that runs 24 hours a day, 7 days a week


that you can visit or leave whenever you like
where you can speak to any guest or eavesdrop on any conversation
at any time..
and where all the guests have their own parties that you may be able
to attend as well
It could never happen in real life, of course,
but it happens every day online thats the
magic of social media!

10

HOW SOCIAL MEDIA IS USED


Reconnect and stay in touch with people
Express your personal views and values
Get useful feedback from people
Promote your skills and your business
Enable organizations to foster dialogue and
schedule gatherings
Disseminate discussion materials for classes
and encourage participants to exchange
ideas about it among themselves
Reach out to people with similar values to
rally support for fundraising and to raise
awareness of charitable causes
Highlight news and ideas that could have a
positive impact on local/national government
policies

11

RECOGNIZING THE RISKS

Cartoon by Peter Steiner, published in The New Yorker, 7/5/1993.


12

Click icon
to add
picture

Recognizing the risks

Click icon
to add
picture

You tweet a day-by-day diary of your three-week European vacation


You say something negative about your company and/or manager on
Facebook
Your teenage daughter friends a wonderful boy online, trades
messages for a month and secretly agrees to meet him
You make an unflattering remark about your company in a LinkedIn
group discussion, certain that your boss will never find out
Your son posts an unflattering photo of himself and his friends drinking
at a party in his college dorm

13

TYPES OF SOCIAL MEDIA


There are three types of social networks:

Professional networks
are primarily intended to help
businesspeople contact other
businesspeople about jobs and
industry trends, serving much the
same function as online versions of
industry associations and trade
groups.

Personal networks
are primarily intended for
socializing with friends and
acquaintances, but do have
business applications,
particularly the promotion of
products and services to
potential buyers.
14

Open networks
are intended for general
communications between any group
of participants and do not skew
toward any particular demographic.

UNDERSTANDING
SOCIAL MEDIA

15

UNDERSTANDING FACEBOOK
The undisputed leader of social media
Originally created as a tool to let college
students share personal information about
themselves
The emphasis remains on self-expression
and personal interaction
Each member has profile that includes:
o Cover photo
o About (contact number, email, birthday, locations,

activities, interests, etc.)


o Timeline (posts made by the user and by Facebook

friends)

Extensive features

16

Messages (similar to email)

Online games

Applications

How Facebook is used


Communicating with friends and
family
Share opinions

Updates on friends, family


Share photos and videos
Plan meetings and events
Send birthday and holiday wishes

Recommend restaurants, travel


destinations
Promote charitable causes and
events

17

Young people and Facebook


Socializing or hanging out with their friends, for the most part friends at school
Day-to-day news about their friends, acquaintances, relatives and peer groups
Collaborating on school work
Validation or emotional support
Self-expression and the identity exploration and formation that occurs in adolescent
development
What sociologists call informal learning, or learning outside of formal settings such as
school, including learning social norms and social literacy
Learning the technical skills of the digital age, which many businesspeople feel are
essential to professional development
Discovering and exploring interests, both academic and future professional interests
Learning about the world beyond their immediate home and school environments
Civic engagements participating in causes that are meaningful to them

18

Facebook and Child Safety: What you need to know

Source: Facebook Ought to Allow Children Under 13, by Larry Magid, www.safekids.com.

19

Facebook and Child Safety: What you need to know

Childrens Online Privacy Protection Act (COPPA)


o Prevents websites from collecting personal information about

children who are under the age of 13 without their parents


permission
o Facebook prohibits children under the age of 13 from opening

accounts and using the site

For children under 13, use of Facebook places them in an


online environment that is intended for teenagers and adults
o Children could be exposed to content that is inappropriate for them

Source: Facebook Ought to Allow Children Under 13, by Larry Magid, www.safekids.com.

20

Ways to keep you and your family safe on Facebook

Review the Privacy Settings page and choose settings that


are right for you
Make sure your account is secure by keeping your
password safe
Gain an understanding of Facebooks Community
Standards and Terms of Service
Block and/or report anyone who sends you unwanted or
inappropriate messagesand encourage your children to
do the same

21

PRIVACY SETTINGS: WHAT YOU NEED TO KNOW


Using Facebook lists to customize your audience
Lists are an optional way to organize your friends on Facebook so you can
determine who gets to see the information you post or that is posted to your
Facebook timeline.
Close friends
Acquaintances
Restricted

You can further customize lists into two other categories:


Smart lists
Custom lists

22

For instructions on how to


make/edit Facebook lists, please
refer to the Understanding Social
Media and Staying Safe Online:
Privacy Settings and Safety
Guidelines brochure

Privacy Settings: What you need to know

The Privacy Settings and Tools section of


Facebook allows you to customize your
privacy settings in a number of ways
By adjusting the settings, you can help to
ensure that you and your familys use of
Facebook doesnt expose you to any
potential pitfalls
Adjusting privacy settings is a personal
matter
The more you share and the more you
allow others to see, the more vulnerable
you may be to security issues

23

Privacy Settings: What you need to know


Customizing privacy settings for your profile
page
Privacy Settings and Tools
This allows you to control the
following:
who can find you
who can see your posts
who can see posts and things
you are tagged in

24

Privacy Settings: What you need to know


Customizing privacy settings for your profile page
Who can see my stuff?
Determine who can see your future posts
o Helps you customize each post individually
o For example, if you are on vacation and only want to share with close friends

Review all your posts and things youre tagged in the Activity Log
o Great way to see all your Facebook activity in one place
o Important because it shows you else is seeing your activities

Limit the audience for posts youve shared


o Consider using if you want to limit how far back your timeline information is

available.
o Helpful if there are activities you are not comfortable sharing with certain

people

25

Privacy Settings: What you need to know

Customizing privacy settings for


your profile page
Who can look me up?
Who can look you up using the
email address or phone number
you provided?
Do you want other search engines
to link to your timeline?

26

Why are these important?


Consider using these features if you
want to be readily found on
Facebook or search engines such as
Google, Bing or Yahoo.
However, if you are concerned about
the risk of your profile being
searchable by the general public,
you may opt to turn this off.

Privacy Settings: What you need to know


Customizing how others connect with you on
Facebook
Timeline and Tagging Settings
This allows you to control your timeline and anything you may be tagged
in, such as:
Photos
Comments
Status updates
This features allows you to determine the following:
Who can post things to your timeline
Who can see things on your timeline
27

Privacy Settings: What you need to know


Customizing how others connect with you on
Facebook
Timeline and Tagging Settings:
Who can add things to my timeline?
Who can post on your timeline?
o Helpful if you want ultimate control on what is on your timeline
o For example, if you are concerned about what your Friends might post set to
Only Me

Review posts friends tag you in before they appear on your timeline?
o Good to use if you do not have access to Facebook
o For example, if you are on vacation and dont have access to the internet.

28

Privacy Settings: What you need to know


Customizing how others connect with you on
Facebook
Timeline and Tagging Settings:
Who can see things on my timeline?
Review what other people see on
your timeline
Who can see posts youve been
tagged in on your timeline?
Who can see what others post on
your timeline

29

Why is this important?


It allows you to control how
others are interacting with
you on Facebook.

Privacy Settings: What you need to know


Customizing how others connect with you on
Facebook
Timeline and Tagging Settings:
How can I manage tags people add and
tagging suggestions?
Review tags people add to your own
posts before the tags appear on
Facebook
When youre tagged in a post, who do
you want to add to the audience if they
arent already in it?
Who sees tag suggestions when photos
that look like you are uploaded?
30

Why is this important?


Good to use to be aware and in
control of who is being tagged
or who can add tags of others
to your own posts

For example, if you post a


photo of your children, you
might opt to be notified if
someone wants to add a tag

Privacy Settings: What you need to know

Manage Blocking
Manage all of the blocking capabilities for your account
Determine if you need to block another user, apps, and
invites
Manage your Restricted List
Why is this important?
You can control how you interact with other users or apps
For example, if you (or your child) are being bullied by
another user, you can start by blocking that user so they
cannot interact with you
31

Privacy Settings: What you need to know

App Settings
With this setting, you can control
what gets shared with apps. Many
apps may request to access your
profile for information on you and
your friends.

32

FACEBOOKS COMMUNITY STANDARDS


Created by Facebook to govern use of their site which is largely self-regulated

by its users
Found by going to Facebook.com>Terms>Community Standards or

www.facebook.com/communitystandards
Features content standards related to:

o Threats
o Promoting self-harm
o Bullying and harassment
o Hate speech
o Graphic violence
o Sex and nudity
o Theft, vandalism or fraud
o Intellectual property
o Phishing
o Spam

33

FACEBOOKS TERMS OF USE


Governs the relationship Facebook has with its users and others who

interact with Facebook


Found by going to www.facebook.com>Terms>Statement of Rights

and Responsibilities
Outlines specific policies around:
o Privacy
o Sharing of content and information
o Safety
o Registration and account security
o Protecting others rights
o Mobile usage
o Payment and deals
o Sharing links
o Provisions for operators of applications/websites
o Advertisements and commercial content

34

REPORTING INAPPROPRIATE ACTIVITY ON


FACEBOOK
Reporting Approaches:
Report a profile
Report a message
Report a post

Threatening messages that indicate an


intention to commit an act of violence
should be brought to the attention of
both school and local authorities
immediately.

35

BLOCKING USERS OF FACEBOOK


Blocking Approaches:
Block List Function
Restricted List
Unfriend/Defriend

36

CHECK PERIODICALLY FOR POLICY CHANGES


Visit the Facebook Privacy Settings section monthly
Set up a Google Alert for Facebook Privacy
Educate yourself by taking a closer look at instructional websites and
books

37

UNDERSTANDING TWITTER

Fast-growing microblogging site


Lets you read real-time comments
(tweets) posted by other site
members that youve signed up to
follow
Each tweet is very short (140
characters)
Not designed to facilitate an ongoing
back-and-forth conversation

38

HOW TWITTER IS USED


Used by thought leaders,
politicians, entertainers and
other public figures to keep
constituents, fans and followers
aware of their latest activities
Used by many corporations,
non-profits and charities to
highlight key events and
announcements
Biggest impact: its ability to
broadcast messages that can
potentially reach the global
community at large

39

The Power of Twitter


NBC Reporter Ann Curry uses the site to
convince the U.S. Air Force to let Doctors
Without Borders planes land in Haiti after
the 2010 earthquake
Farmington, Connecticut resident Leigh
Fazzina uses the site to get rescued from
a remote location where she had a bike
accident
Used extensively in Iran to organize
protests of the 2009 Presidential election

KEEPING YOU AND YOUR FAMILY SAFE ON


TWITTER

Go to Twitters Safety Center at:

o http://support.twitter.com
o Click on the gear icon at the top right of

your page and select Help

Take the following precautions:

o Use a strong password


o Watch out for suspicious links
o Always make sure youre on Twitter.com

before you enter your login information


o Don't give your username and password

out to unfamiliar third parties


o Make sure your computer is up-to-date

with the most recent security patches,


upgrades, and antivirus software

40

ADDRESSING BAD BEHAVIOR ON TWITTER: DOS


AND DONTS

Dont retaliate
Do Block the user(s)
Do Unfollow the user(s)
Do Protect your account

41

REPORTING PRIVACY VIOLATIONS AND VIOLENT


THREATS ON TWITTER

Submit a Support ticket to Twitter


Twitter will investigate reports of
violent threats it is up to you to
contact the police or other local
authorities if you deem necessary and
appropriate
Contact a trusted individual

42

UNDERSTANDING LINKEDIN

Most popular professional network


Designed specifically to help
businesspeople network
Focused on your business and
professional background

43

HOW LINKEDIN IS USED


Stay in touch/network with former

co-workers, industry associates


Identify potential
employers/employees
Promote your professional
services to qualified clients
Use Groups industry, interests
to share and hear ideas related to
your profession
Gain access to a large network
by drawing on the connections of
other users

44

KEEPING SAFE ON LINKEDIN

Manage your information carefully


Set your privacy controls
o Turn your activity broadcasts on/off
o Select who can see your activity feed
o Customize your profile view
o Determine who can see your

connections and profile photo


o Twitter settings

Use the Helpful Links section for


additional ideas

45

STAYING SAFE ONLINE:


WHAT YOU NEED TO KNOW

46

CYBERBULLYING DEFINED

Online equivalent of physical


bullying
Refers to any situation where a
child or teenager is harassed,
taunted or humiliated by their
peers via email, social media or
other types of websites such as
blogs
Can have a devastating impact
on children
*Source: National Crime Prevention Center

47

At epidemic levels yet invisible


According to the National Crime
Prevention Center, over 40% of all
teenagers with Internet access have
reported being bullied online, yet only
10% actually told an adult.*

Cyberbulling
Posting malicious comments or false rumors
Gaining access to a persons name and password, and then using their
account to spread malicious comments about the persons friends to
damage their reputation
Posting unattractive or compromising photographs of the person
(sometimes altered using an photo editing program)
Revealing details about their personal lives that the person would rather
keep private
Creating polls or contests that make fun of the persons looks, habits or
personality
Posting a photo or personal information of the person on sexually
explicit websites with their real email address and/or phone number

Source: National Crime Prevention Center


48

What you can do


Communicate with your children regularly
Understand the ways to address cyberbulling
o Contact the bullys parents
o Block communications
o Report inappropriate activity to social media sites
o Understand the limits of social media sites
o Contact the bullys Internet Service Provider (ISP)
o Report the incident(s) to school authorities

49

ONLINE PREDATORS

Unscrupulous adult adopts a


false identity online with a child
to lure them into an
inappropriate relationship
Parents need to be vigilant in
warning their children about
online predators

Signs your child may be a target*


Your child makes or receives phone calls
from people or numbers that you dont
recognize
Your child receives mail or packages from
an unknown source
Your child tries to conceal what is
onscreen when you approach them
Your child is using an email or social media
account that belongs to another person
You discover sexually explicit material on
their computer or phone

*Source: FBI Safe Online Surfing website, www.fbi-sos.org


50

What you can do


Address the issue head-on with your children
o Make sure they understand that there are bad people as well as good people on the Internet and

that people may not be who they seem to be (especially online!)

Give your children specific rules to follow


o Instruct them to never open emails, messages and photo files from people they do not know and to

show them to you if you receive them


o Instruct them NEVER to agree to meet anyone in person that they have met online unless you are

present
o Ask them to talk to you if anything happens online that makes them uncomfortable or frightened

Do not get angry


o Make it clear you are grateful they have done the right thing
o Your childs trust and willingness to confide in you is your first and most powerful defense against

online predators

Carefully consider younger childrens use of social media


o Consider sites like webkinz.com, clubpenguin.com, whyville.com, dgamer.com

Conduct regular Internet searches for you and your family


o See if there is any information out there that can be used by a predator to gain confidence

51

WHEN YOUNGER CHILDREN GO ONLINE

Click icon
to add
picture

Limit access to a computer in a common area such as the living room


or den rather than a childs bedroom. You may even wish to limit
access to times in which you are physically in the room
Use filtering software (such as NetNanny, Puresight PC, Cybersitter,
McAfee Family Protection) that enables you to block access to specific
websites and specific types of content that you specify in advance
Review the history of sites visited on the web browser after your child
has finished using the computer. You can do this by going to
Favorites>History
Avoid giving your child a smartphone (a cellphone with Internet access)

52

IDENTITY THEFT
Identity theft is defined as someone using personally identifying
information like your name or social security number without your
permission to commit fraud or other crimes*
Phishing sending phony emails that seem to be from financial institutions,
Internet service providers or other trusted companies asking you to confirm or
change your personal information and/or account password
Sending emails that invite you to click on a link to view a photo, website, video
or online invitation that take you to a website that installs spyware that
tracks all of your online activities
Rummaging through discarded papers looking for bills or records that contain
personal information
Taking mail from your mailbox with sensitive data
Bribing corporate employees to obtain personnel records
Posing as government officials, repairmen or even a spouses/relatives to get
banks, utilities or other companies to reveal information about you
Hacking into corporate databases to obtain email and personal information
Conducting research using search engines such as Google to gather personal
data
*Source: U.S. Federal Trade Commission (FTC).
53

What you can do


Change all account passwords at least once a year
Monitor activity on your bank, brokerage and credit card accounts
monthly
Be careful who you friend on Facebook
Carefully consider what information you include in your Tweets
Know who you are connected to on LinkedIn
Set your privacy settings to reflect your intended limits
Request that a fraud alert be added to your credit report
Be on the alert for phishing attacks
Create strong passwords for your accounts
Dont click on links in email or social media messages unless they
come from a known and trusted source
Dont limit your vigilance to electronic records

54

ACTION STEPS

55

ACTION STEPS
Gain an understanding of social media
Learn the basics of Facebook, Twitter and LinkedIn
Refer to the Understanding Social Media and Staying Safe Online
brochure and accompanying Privacy Settings and Safety Guidelines
brochure
Get educated on identity theft, cyberbulling and predatory behavior
Talk to your children regularly safety starts at home
Monitor your childrens internet/social media usage
Give special considerations to young children (ages 13 and below)
Periodically conduct online searches of your name and the names of
immediate family members
Stay vigilant and educated

56

Social Media is about


sociology and psychology
more than technology.
Brian Solis, Principal of
FutureWorks

Batterymarch
Brandywine Global
ClearBridge Investments
Legg Mason Global Asset Allocation
Legg Mason Global Equities Group
Permal
Royce & Associates
Western Asset Management

www.leggmason.com

1-800-822-5544

youtube.com/leggmason

Legg Mason is a leading global investment company committed to helping clients reach their financial
goals through long term, actively managed investment strategies.
Over $654 billion* in
assets invested worldwide
in a broad mix of equities,
fixed income, alternatives
and cash strategies
A diverse family of
specialized investment
managers, each with
its own independent approach to research
and analysis
Over a century of
experience in identifying opportunities and delivering astute investment solutions
to clients

linkedin.com/company/legg-mason

@leggmason

For broker/dealer use only. Not for use with the public.
58

* As of May 31, 2013.


All investments involve risk, including loss of principal.
2013 Legg Mason Investor Services, LLC. Member FINRA, SIPC. Legg Mason Investor Services, LLC is a subsidiary
of Legg Mason, Inc. 5/13 FN1311824

Вам также может понравиться