https://www.podbean.com/media/share/pb-7sqgm-11745a0
What is a digital footprint? How is it created? What impact can it have on our lives? How can we control it? We’ll answer these questions and give you some hints on what you can and can’t do to protect your digital footprint on this episode of Insights Into Teens.
Show Notes
INTRO THEME]
[INTRODUCTIONS]
Insights Into Teens: Episode 133 “Teens and their Digital Footprint”
My responsible and mature co-host Madison Whalen
Summary
What is a digital footprint? How is it created? What impact can it have on our lives? How can we control it? We’ll answer these questions and give you some hints on what you can and can’t do to protect your digital footprint on this episode of Insights Into Teens.
Show Plugs
Subscriptions:
Apple Podcasts
Spotify
Google Podcasts
Stitcher
iHeartRadio
Tunein
Contact Info
Email us at:
Comments@insightsintothings.com
Twitter:
@insights_things
Hi-res videos on Youtube:
http://www.youtube.com/insightsintothings
Streaming 5 days a week on Twitch:
http://www.twitch.tv/insightsintothings
Audio Versions:
http://podcast.insightsintoteens.com/#
Facebook:
https://www.facebook.com/InsightsIntoThingsPodcast/
Instagram
https://www.instagram.com/insightsintothings/
Links to all these on the web Web:
https://www.insightsintothings.com
[TRANSITION]
[SEGMENT 1]
What is a Digital Footprint?
https://www.webwatcher.com/ways-to-protect-your-teens-digital-footprint/
https://bit.ly/3HDxiOO
Essentially, it’s the record of everything you have ever done or will do online.
It’s the record of the websites you log into, the online games you play, the pictures you share on social media, the comments you make under news articles and on websites, the online classified ads you post, and anything else you do online.
The two biggest wrong assumptions that teens (and others) make about their online activity are assuming that anything is private and assuming that anything is ever really gone.
Something like a teen uploading a photo, deciding a minute or so later that they don’t look good in that photo, and immediately deleting it can seem minor.
Probably no one or not that many people saw it, and now it’s gone, right?
Not necessarily – that photo could still be on the servers of the site the teen uploaded it to.
And if anyone saw it and screenshotted it, they could do anything with that photo – share it, save it, even edit it.
Nothing is ever fully private online, and nothing that’s put online is ever really completely gone.
Keep that in mind as you learn more about digital footprints, and make sure that your teen understands it as well.
Understanding Your Digital Footprint
Whether or not you’re aware, you contribute to your digital footprint or profile each day when you log onto the Internet.
The websites you visit, the news posts you comment on, the comments you leave on social media platforms— each of these items come together to create a portrait of your online life.
The digital footprint that is left behind can have repercussions in all areas of your teen’s life, potentially resulting in missed job opportunities, public sharing of personal information, ruined relationships — or, in what is likely more relevant to them right now: –
Their parents finding out what they’ve been up to and subsequently being punished.
Your child’s digital footprint and the way they behave online, their digital citizenship, are important because teens have grown up with technology all around them and are not yet equipped with the knowledge that their actions go far beyond that blog comment or Facebook post they just left.
A poor decision made in a split second can damage your child’s digital footprint and follow them to adulthood, which is why teaching your child about good digital citizenship and social media etiquette is of the utmost importance.
Take for example, the teens who had their admission offers rescinded because of their behavior in a Facebook group for newly admitted students.
Those students likely spent their entire academic careers preparing for admission to an Ivy League school, only to have their online behavior ruin what they had worked towards.
The Harvard Crimson, the daily student newspaper of Harvard University reported that:
“In the group, students sent each other memes and other images mocking sexual assault, the Holocaust, and the deaths of children, according to screenshots of the chat obtained by The Crimson.
Some of the messages joked that abusing children was sexually arousing, while others had punchlines directed at specific ethnic or racial groups.”
After being notified of the chat and its contents, Harvard administrators acted by rescinding offers for at least 10 members of the group.
While the students in question did not intend for their highly inappropriate posts to be seen worldwide, the moral of the story is – nothing is truly private on the Internet.
And, while this seems like an obvious statement to make, the truth is that kids of all ages are still making social media mistakes that could affect their future.
Make sure your teen is aware of what their digital footprint looks like and what it means for them now, and further down the line.
[AD1: SSE]
[SEGMENT 2]
5 Potential Harmful Digital Footprint Impacts For Teens
Family Online Safety Institute https://www.fosi.org/good-digital-parenting/harmful-digital-footprint-impacts-teens
https://bit.ly/3sVOMSm
In our previous segment we discussed one very real-world scenario in which digital footprints had direct consequences. Here are the top five things that could be harmed by an inappropriate digital footprint.
College Admissions & the Military:
As mentioned above college admissions officers can and do read your teen’s online profile.
If your son or daughter is applying to college and is on the bubble against another applicant, the difference between them gaining acceptance, and receiving a rejection letter could be something immature that was posted on social media.
This extends to moral aptitude requirements in the military if your child is planning on enlisting.
Scholarships:
Scholarships often ask applicants to share their social media profiles as part of the process in applying online.
Any immature posts, cyber bullying, or generally distasteful material found on your child’s profile could prevent them from gaining a scholarship.
Sports:
Is your son or daughter planning on playing sports in college?
Recruiters and coaches surely will want to know about your teen’s conduct on social media.
Employers & Internships:
Employers will Google your kids.
Even if it’s just a job they are applying for to make some extra money while going to college.
Additionally college internships are now becoming a prerequisite for gaining employment post-college.
Internships are competitive enough.
The difference between your son or daughter and another applicant could be their digital footprint.
Identity Theft:
Your teen’s identity is at risk.
Any photo that is publicly shared is fair game for identity thieves.
Posting personal information is a serious liability.
Identity theft is on the rise and is a serious problem with very damaging consequences.
The good news is there are things you can do to protect your digital footprint. When we come back we’ll talk about what we can and can’t do to protect our digital footprint.
[AD2: ENTERTAINMENT]
[SEGMENT 3]
What Teens Can Do to Protect Their Digital Footprint
https://www.webwatcher.com/ways-to-protect-your-teens-digital-footprint/
https://bit.ly/3HDxiOO
Obviously, your teen is going to have some type of digital footprint.
They can’t avoid the internet entirely, and they probably wouldn’t want to even if they could.
But they can minimize their chances of creating a digital footprint that can cause problems for them later.
For starters, make sure that your teen knows about privacy settings and why it’s important to look for them on all of the social-media and websites they use.
Not all websites make their privacy settings obvious, and some sites, like Facebook, are rather notorious for changing privacy settings without notifying users.
So it’s important to check them regularly after setting them to make sure that nothing has changed.
But most websites do have privacy settings that can be adjusted to make your teen’s sessions less public.
Yes, your teen should never assume that anything is entirely private.
But strong privacy settings still provide a better measure of protection than weak or no privacy settings.
It’s also important to talk to your teen about making responsible choices and being good digital citizens.
They should avoid oversharing.
If they’re going to share secrets, it’s usually better to do that offline than online.
They should keep personal details private as much as possible – addresses, phone numbers, and what school they attend are all examples of information that shouldn’t be shared publicly.
They should avoid posting photos or videos online that they wouldn’t be comfortable with a college admissions office, a boss, or their grandparents seeing – because you never know where those images can end up.
They should make good choices about how they talk to and interact with others online.
Threats, angry messages, name-calling, and so-on can be interpreted as cyberbullying.
Even if your teen is responding to similar messages or has been otherwise provoked, their words could be taken out of context.
Sharing inappropriate jokes or memes, especially if they are making fun of or causing harm to others (think racist or sexist material) can come back to haunt your teen.
Even if they didn’t mean it or didn’t expect to be taken seriously, it will be taken seriously and can do serious damage.
It’s important to teach your teen to avoid these kinds of actions online because it’s the right thing to do, but also for their own sake.
What Your Teen Can’t Do to Protect Their Digital Footprint
Teens also need to be aware of what’s out of their control.
Every device on the internet has a traceable semi-unique identifier called and IP (or Internet Protocol) Address
IP addresses are linked to specific devices and logged every time you visit a website.
Your teen can’t change their IP address or erase the history of their device visiting a particular site – at least not without using a VPN (Virtual Private Network)
VPN’s are online services that encrypt your connection to the internet from your device to the service’s network then allows you to connect to the internet from that service.
This allows you to anonymously connect to web sites and other online services using the IP address of the VPN provider
Assuming of course the VPN provider doesn’t log your activity
Is this a problem?
Probably not for most teens.
School and university officials and employers may take a look at a teen’s social media profiles or use a search engine to see what pops up when they Google a teen’s name.
But they’re not going to try to track a teen’s IP address.
However, law enforcement has the means to track an IP address and will do so if they suspect a device, or the owner of a device, has been involved in something illegal, so that’s important to keep in mind.
And hackers may be able to obtain an IP address and use it to trace a device’s activity or identify the person linked to that device, which could lead to anything from the release of embarrassing information to actual threats to physical safety.
While these things are out of your teen’s control, your teen can minimize any risk to themselves by being careful about where they go and what they do online, as well as by utilizing privacy settings, password protecting devices, and generally using good judgment.
You can help keep your teen safe online by using monitoring tools to ensure that you’re aware of any potential problems before they get out of control.
[TRANSITION]
[CLOSE]
Closing thoughts shoutouts
[OUTRO AND CREDITS]
Show Plugs
Subscriptions:
Apple Podcasts
Spotify
Google Podcasts
Stitcher
iHeartRadio
Tunein
Contact Info
Email us at:
Comments@insightsintothings.com
Twitter:
@insights_things
Hi-res videos on Youtube:
http://www.youtube.com/insightsintothings
Streaming 5 days a week on Twitch:
http://www.twitch.tv/insightsintothings
Audio Versions:
http://podcast.insightsintoteens.com/#
Facebook:
https://www.facebook.com/InsightsIntoThingsPodcast/
Instagram
https://www.instagram.com/insightsintothings/
Links to all these on the web Web:
https://www.insightsintothings.com
Transcription
00;00;01;21 – 00;00;07;25
Madison
Insightful podcasts. By informative host.
00;00;11;05 – 00;00;16;05
Michelle
For Insights Into.
00;00;16;05 – 00;00;16;23
Michelle
Things.
00;00;18;00 – 00;00;18;24
Narrator
A podcast.
00;00;18;24 – 00;00;19;08
Michelle
Network.
00;00;26;15 – 00;00;42;24
Narrator
Welcome to insights into Tease, a podcast series exploring the issues and challenges of today’s youth. Your hosts are Joseph and Madison, as well as a father and daughter team making their way through the challenges of the teenage years.
00;00;51;14 – 00;01;05;06
Joseph
Welcome to insights in the teens, this is episode 133. Teens and their digital footprint. I’m your host, Joseph Whalen, and my responsible and mature cohost, Madison Weyland.
00;01;05;11 – 00;01;06;01
Madison
Hi, everyone.
00;01;06;06 – 00;01;07;09
Joseph
Hey, don’t take Maddie.
00;01;07;26 – 00;01;09;07
Madison
I’m doing all right. How about you?
00;01;09;08 – 00;01;19;10
Joseph
I’m doing fantastic. So this is our first episode getting back into things after the holiday. How was your holiday?
00;01;20;19 – 00;01;21;21
Madison
I’d say it went pretty good.
00;01;22;02 – 00;01;33;10
Joseph
I’m good that you get all the stuff that you want. You know all the stuff to ask for in the last podcast. Yes. Yeah. Good thing we had that podcast because most of that stuff was bought right after the podcast.
00;01;33;12 – 00;01;33;23
Madison
Yeah.
00;01;36;17 – 00;01;59;12
Joseph
So today we’re talking about teens and their digital footprint. So what is a digital footprint? How’s it created? What impact can it have on our lives? How can we control it? We’ll answer all these questions and give you some hints on what you can and can’t do to protect your digital footprint on this episode of Insights into
00;01;59;12 – 00;02;21;13
Joseph
teens. Before we do that, I do want to. Invite our listening and viewing audience to subscribe to the podcast, you can get audio versions of this podcast listed as insights into teens. VIDEO versions of the podcast can be found listed as insights into things that were available pretty much anywhere.
00;02;21;13 – 00;02;38;17
Joseph
You get a podcast, Pandora, Castro, Stitcher Pod being Buzz, Sprout, et cetera. I would also invite our audience to write in, give us your feedback, give us your show suggestions on what you’d like us to talk about. Let us know if you have any questions for us.
00;02;38;17 – 00;03;03;02
Joseph
You can email us at comments and insights into things dot com. We’re at Twitter at insights underscore things. You can get us on Facebook at Facebook Dot Com Slash Insights Into Things podcast or Instagram at instagram.com. Slash insights into things a little little mishap here with our digital device, but that’s OK.
00;03;03;26 – 00;03;04;24
Madison
And not to mention that.
00;03;05;25 – 00;03;12;20
Joseph
Or you can get links to all that stuff on our official website and insights into things on rt.com. Are we ready to get started?
00;03;12;25 – 00;03;13;08
Madison
Yeah.
00;03;13;19 – 00;03;32;28
Joseph
All right. Here we go. You’re not going to drop anything else right now. OK, here we go. OK, so what is a digital footprint, so this definition, depending on depending on who you ask. You get a different answer, but they’re pretty much all consistent.
00;03;33;17 – 00;03;55;29
Joseph
This particular definition comes from web watcher dot com. Essentially, it’s a record of everything that you do or will do online. It’s the record of the website you log into the online games, you play, the pictures you share on social media, the comments you make on their news articles and on websites, the online classified ads you post
00;03;55;29 – 00;04;12;29
Joseph
or anything else you do online. There’s really two big wrong assumptions that teens and others, even adults make about their online activity. They assume that anything that they do can be private or they assume that anything is ever really going.
00;04;14;00 – 00;04;29;20
Joseph
one good example of this is something like a teen uploading a photo, deciding a minute or so later that they don’t look good in the photo and then immediately deleting it, which can seem minor to them. Probably no one.
00;04;29;20 – 00;04;44;15
Joseph
Or not that many people saw it, and now it’s gone right? Well, not necessarily. The photo could still be on the servers of the site. The teen uploaded the tune. And if anyone saw it and screenshot of it, they could do anything with that photo.
00;04;44;19 – 00;05;03;20
Joseph
Share it, save it or even edit it. Nothing is ever fully private online. And nothing that put that’s put online is ever fully gone. Keep that in mind as you learn more about your digital footprint and make sure that your teen understands it as well, it’s a moment to stop for a second.
00;05;03;22 – 00;05;24;29
Joseph
Let me kind of talk about what we do. So if you post a picture on Instagram or Facebook or even on Twitter. People have this impression that oh, that photos on my phone, I’m posting it, so if I delete it, I have control over the instant that you post that, whether it’s a photo or a meme or
00;05;24;29 – 00;05;48;05
Joseph
even a text post itself that leaves your device goes over the mystical internet waves and lands on some server somewhere. And a lot of times, in most cases, the way the networks work, it lands on many servers. And if you delete that, you don’t have the ability to delete it from all the servers, you can usually hide
00;05;48;05 – 00;06;09;21
Joseph
it from your profile, but that stuff always shows up out there. And even even then, you have services like the Wayback Machine, which is an internet archive that periodically goes through and captures what’s called spider little spider web sites captures static images of those and then store that on its own site.
00;06;10;19 – 00;06;25;16
Joseph
So there are things from the 1990s you can go back and look at on their site that’s not available anywhere else on the internet anymore because some of the servers might not even be online. So it’s very important to be careful about the type of stuff that you put out there.
00;06;25;26 – 00;06;40;12
Joseph
Do you put anything? I mean, aside from the podcasts, obviously we put out there for everyone. Do you post on social media? Do you put images out there? Do you do anything like that where you’re you’re producing for your digital footprint.
00;06;41;06 – 00;06;57;23
Madison
Other than the podcast? No, I don’t use really any social media. I’m not on Instagram, I’m not on Facebook. Definitely not on Twitter. I’m really not on any social media sites and I never really like. Like other than maybe the texting app.
00;06;58;27 – 00;07;01;21
Madison
Like the messages on iPhone and, you know.
00;07;01;22 – 00;07;19;17
Joseph
Just well, and that’s a good example, too, because even the texting app, that text is not on your phone and the person you’re sending it to when you text to someone like you use an iPhone, for instance. So if you message someone on your your your messaging app on iPhone that goes out and sits on Apple’s website
00;07;19;24 – 00;07;40;24
Joseph
, Apple’s server at that point in time. So even if you delete it, they potentially have a copy of it. So again, anything that goes out there is potentially something that’s going to be preserved. For I would say eternity, but the internet has been around that long to make bold gestures like that.
00;07;42;10 – 00;07;51;20
Joseph
So it’s important to understand what our digital footprint is and the impact that it has. Why don’t you tell us more about how we can understand our digital footprint?
00;07;52;10 – 00;08;06;25
Madison
So whether or not you’re aware you contribute to your digital footprint or profile each day when you log on to the internet, the websites you visit, the news post you comment on, the comment you leave on us, on social media platforms.
00;08;07;07 – 00;08;31;06
Madison
Each of these items come together to create a portrait of your online life. The digital footprint that is left behind can have repercussions in all areas of your teen’s life, potentially resulting in missed job opportunities, public sharing of personal information, ruined relationships or in what is likely more relevant to them right now, their parents finding out what
00;08;31;06 – 00;08;33;26
Madison
they’ve been up to and subsequently being punished.
00;08;33;29 – 00;08;34;24
Joseph
Don’t, don’t, don’t.
00;08;35;17 – 00;08;37;10
Madison
I’m really glad.
00;08;37;28 – 00;09;01;01
Joseph
I didn’t have the sound cued up, so I had to do it myself. Hmm. Your child’s digital footprint is the way they behave online. Their digital citizenship. Are important because teens have grown up with technology all around them and are not yet equipped with the knowledge that their actions go far beyond the blog comment or Facebook post
00;09;01;01 – 00;09;18;04
Joseph
, they just left. A poor decision made in a split second can damage your child’s digital footprint and follow them through adulthood, which is why teaching your child about good digital citizenship and social media etiquette is of the utmost importance.
00;09;19;09 – 00;09;44;20
Joseph
Take, for example, the teens who had their admission offers rescinded because of their Facebook, because of their behavior in a Facebook group for newly admitted students. Those students likely spent their entire academic careers preparing for admission to an Ivy League school, only to have their online behavior ruin what they had worked towards, the Harvard Crimson, the daily
00;09;44;20 – 00;10;10;22
Joseph
student newspaper of Harvard University reported. In the group, students sent each other means and other images mocking sexual assault, the Holocaust and the deaths of children, according to screenshots of the chat obtained by the Crimson. Some of these messages joked that abusing children was sexually arousing, while others had punch lines directed at specific ethnic or racial groups
00;10;11;24 – 00;10;20;13
Joseph
. After being notified of the chat and its contents, Harvard administrators acted by rescinding offers for at least ten members of the group.
00;10;21;19 – 00;10;36;05
Madison
All the students in question did not intend for their highly inappropriate post to be seen worldwide. The moral of the story is nothing is truly private on the internet. And while this seems like an obvious statement to make.
00;10;36;16 – 00;10;49;18
Madison
The truth is that kids of all ages are still making social media mistakes that could affect their future. Make sure your teen is aware of what their digital footprint looks like and what it means for them now and further down the line.
00;10;50;12 – 00;11;08;26
Joseph
There was a time when it was difficult to find out information like this about people like for jobs. OK, so when you went to apply for a job, if it was a high paying job or a high level job, you’d typically go through a series of interviews.
00;11;09;15 – 00;11;28;13
Joseph
They’d vet your background that you give on your resume or your your CV, and they’d call previous employers and they try to build a profile of the type of person that you are. Some companies would even go so far as to hire a private investigator to do background checks on you.
00;11;29;07 – 00;11;41;01
Joseph
If you work, you’re applying for a government job or a contractor for a government agency. They might even have the government do a security background check on you where they check your credit and debt and all that stuff.
00;11;42;19 – 00;12;01;01
Joseph
But it was difficult to do so with with the advent of the internet. We put so much information out there voluntarily, which it’s frightening how much information people are willing to put on the internet, personal things that they talk about personal information.
00;12;01;02 – 00;12;24;20
Joseph
Do they talk about things that you would never go up to a stranger on the street and tell them these things or give them this information? People feel at ease on social media, especially or their personal websites or their personal blogs, people used to put so much stuff in their personal blogs that it made it so easy
00;12;24;20 – 00;12;39;08
Joseph
for people to go out there and figure out what kind of person you are to the point that even now you have situations where very high profile people are being called on the carpet for stuff they did ten years ago.
00;12;40;22 – 00;12;47;10
Joseph
Were you aware of the the the Jeopardy hosting scandal that happened last year?
00;12;47;16 – 00;12;47;28
Madison
No.
00;12;48;16 – 00;13;03;20
Joseph
So Alex Trebek was ill with cancer and he had to sort of step back from his hosting duties. So they went through this whole process of trying to find a new host, and they had different celebrities come in and guest hosts and stuff like that.
00;13;04;08 – 00;13;18;23
Joseph
Well, ultimately they made the decision of having an existing executive producer host, so he comes in host for a very short period of time and then controversial remarks that he had posted on the internet almost ten years ago come to light.
00;13;19;17 – 00;13;39;17
Joseph
Well, he’s immediately disgraced as a result of that and loses the job. And it’s staffed like, had you not said those things in the first place? You wouldn’t have gotten into the situation that you’re in, but ten years ago, when you said those things, you were probably a very different person.
00;13;40;28 – 00;14;01;29
Joseph
But that stuff sticks around, so. When you have I don’t want to say it’s incriminating information because it wasn’t anything criminal or anything. But when you willingly put information out there? And then. People find it when you’re trying to get a job or go to college or something like that.
00;14;02;29 – 00;14;27;17
Joseph
You’re basically giving them the ammunition they need to deny you what you want in life. So it’s very important to be aware of what you’re putting out there, you know, anonymize, were you? one of the terms that they tend to use in in in digital security is something called fuzzing, and fuzzing is when you confuse the data
00;14;27;17 – 00;14;41;25
Joseph
that you put out there, you anonymize it to a certain extent. Maybe you post it under an alias, or maybe you post conflicting information so that you can say, OK, well, I may have argued. Let’s take abortion, for instance.
00;14;42;11 – 00;14;54;19
Joseph
So I may have argued in one post in favor of abortion. And then I argued in another post in an opposition. Well, what’s my position? Well, I’m really just trying to look at it from two points of view.
00;14;54;19 – 00;15;09;09
Joseph
You can’t really tell what my position is at that point in time. That’s fudging your data. If I post it, as you know, Joe Raelyn my name, then it’s tied directly back to me if I post it as disgruntled guy in New Jersey.
00;15;09;12 – 00;15;22;21
Joseph
Well, then you can’t tie directly back to me. That’s another way of fudging your, your, your data. So how you present yourself, what you present out there and how how much detail you put out there is is stuff that you need to keep in mind.
00;15;24;03 – 00;15;35;11
Joseph
So we’re going to take a quick break, we’re going to come back and we’re going to talk about five potential harmful digital footprint impacts, one of which we’ve talked about already, but we’ll go through all five. We’ll be right back.
00;15;44;11 – 00;16;09;27
Joseph
For over seven years, the second Sith empire has been the Premiere Community Guild in the online game Star Wars The Old Republic, with hundreds of friendly and helpful active members, a weekly schedule of nightly events, annual guild meet and greets, and an active community both on the web and on Discord.
00;16;10;29 – 00;16;35;18
Joseph
The second Civ empire is more than your typical gaming group. We’re family. Joining us on the star forward server for nightly events such as operations, flashpoints, world boss funds, Star Wars trivia, Old Lottery and much more. Visit us on the Web today at W W W.
00;16;35;24 – 00;16;38;25
Joseph
But the second sip and fire dot com.
00;16;46;21 – 00;17;02;20
Madison
Welcome back to insights in the teens today, we’re talking about teens on their digital footprint. And now we’re going to be talking about five potentially potentially harmful digital footprint impacts for teens. And this comes to us from Family Online Safety Institute.
00;17;04;01 – 00;17;24;07
Madison
So in our previous segment, we discussed one very real world scenario in which digital footprints had direct consequences. Here are the top five things that could be harmed by an inappropriate digital footprint. The first we pretty much already talked about, which is call it admissions, but we also added on the military.
00;17;25;01 – 00;17;46;27
Madison
As mentioned above, college admissions admissions officers can and do. Read your teenage profile online profile if your son or daughter is applying to a college and is on the bubble against another applicant. The difference between them gaining acceptance and receiving a rejection letter could be something immature, though was posted on social media.
00;17;47;13 – 00;17;54;16
Madison
This extends to moral aptitude requirement in the military. If your child is planning on enlisting.
00;17;56;07 – 00;18;19;10
Joseph
Scholarships often are another target that fall prey to this. Scholarships often ask applicants to share their social media profiles as part of the process in applying online. Any immature posts, cyber bullying or generally distasteful material found on your child’s profile could prevent them from gaining a scholarship?
00;18;20;04 – 00;18;32;13
Joseph
It’s kind of goes hand in hand with sports. Our third one is your son or daughter. Planning on playing sports in college, recruiters and coaches surely will want to know about your teen’s conduct on social media.
00;18;33;22 – 00;18;50;08
Madison
The fourth we have is employers and internships. Employers will google your kids, even if it’s just a job they’re applying for to make some extra money while going to college. Additionally, college and college internships are now becoming a.
00;18;51;12 – 00;19;13;21
Madison
Prerequisite for gaining employment, post-college internships are competitive enough. The difference between your son or daughter and another applicant could be their digital footprint, and the final one we have is identity theft. Your teen’s identity is at risk. Any photo that is publicly shared is fair game for identity thieves.
00;19;14;12 – 00;19;23;23
Madison
Posting personal information is a serious liability. Identity theft is on the rise and is a serious problem with very damaging consequences.
00;19;24;10 – 00;19;36;28
Joseph
So let’s take a look at a couple of these and dove a little bit deeper. I think we kind of exhausted the potential for college admissions, military sort of. In the same thing, the military has a very strict code of conduct.
00;19;37;17 – 00;19;55;18
Joseph
So if you’re seen as as violating that code of conduct, even before you enter the military, it could hurt your chances. It could impact how you’re treated or what your potential future and position is in the military as well.
00;19;55;26 – 00;20;17;22
Joseph
Hmm. But scholarships, like most people, don’t think that scholarships would be affected by your social media presence, but you’d be surprised how many things affect your scholarships. And we actually have a. A podcast that we’re researching that we’re going to actually do on scholarships and what’s involved later on down the line here.
00;20;18;08 – 00;20;46;09
Joseph
But it’s important to note that when you apply for a scholarship. That’s it’s not free money, it’s not a gift, it’s not somebody thinks you’re a good guy, it’s institutes that backed the scholarships are are really trying to find someone who epitomizes their standards or someone that can represent that institution that’s backing the scholarship or someone that
00;20;46;09 – 00;21;08;24
Joseph
they think will go on to do things in line with what that institution stands for. And one of the biggest things is beyond academics or athletics, which probably the two biggest qualifiers for scholarships is character. You know, if you have a representation of a poor character.
00;21;10;06 – 00;21;26;29
Joseph
Think of a scholarship as a sponsorship, someone sponsoring you to to further your education. It could be because they think that you’re going to be a great athlete or a great scientist or, you know, you could potentially be a leader in the business world someday.
00;21;27;18 – 00;21;44;14
Joseph
But it’s a it’s a sponsorship and sponsors want people representing who. They think he represents them. So when they go out there and they look at your social media and they see. Inappropriate posts are just simply immature posts.
00;21;45;01 – 00;21;50;00
Joseph
It very quickly can turn them off. Any thoughts on that?
00;21;52;02 – 00;22;01;05
Madison
I can totally understand why people wouldn’t be giving given scholarships due to how they act. I definitely think you explained it pretty well.
00;22;02;03 – 00;22;24;25
Joseph
And your sports tend to go along the same path there because when you’re getting when you’re trying to get into a sports program in a college. There’s a lot of colleges are represented by their athletes. They’re the people, you know that on on Saturday afternoons when you’re watching college football.
00;22;25;23 – 00;22;45;11
Joseph
And you see, you know, your Notre Dame out there, those kids on that field are the college. And if they bring someone into their fold that doesn’t represent that college, then it looks bad for the college. It’s not just our well-heeled.
00;22;45;18 – 00;22;59;25
Joseph
They’re not going to get along with people. It’s we want people that are going to represent us and and present the college in a very positive light. And if you don’t do that, just the same thing with a scholarship if if you don’t do that.
00;23;01;21 – 00;23;18;25
Joseph
They need to find that out before they bring you in, because, you know, the old adage that one bad apple can ruin the batch, you know, they get a player out there who’s vulgar or outwardly aggressive or something like that.
00;23;19;03 – 00;23;32;28
Joseph
People see that on national television and immediately think that you know this colleges and for us and then they their their enrollees, the number of people going to college starts to drop off because of the image that’s being employed.
00;23;34;07 – 00;23;44;16
Joseph
I think probably the most significant one is employers. Yeah. Today, a lot of employers will google you. Have you ever googled yourself to see what you look like online?
00;23;44;20 – 00;23;46;10
Madison
I actually just did it today.
00;23;46;17 – 00;23;49;11
Joseph
And what did you find anything surprising?
00;23;49;22 – 00;24;03;10
Madison
Honestly, I just saw a bunch of other people who had the same name as me, and the only real images that actually had anything to do with me was one image of the inside and the team’s logo and the one cartoon image from the web.
00;24;03;23 – 00;24;04;04
Madison
Right?
00;24;04;14 – 00;24;15;16
Joseph
Yeah. So and that’s like, if I do a search on me, that’s pretty much what I find, too. But which is good, that means that, you know, our marketing program for the website is actually effective. Mm-Hmm. Mm-Hmm. Mm-Hmm.
00;24;15;19 – 00;24;29;14
Joseph
But the first thing that most employers do now, my employer does this, though Google you. They’ll look at your Facebook page, they’ll see what you do online, what you post online, but they don’t look at political beliefs or religious beliefs or anything like that.
00;24;30;07 – 00;24;47;05
Joseph
They look for any inappropriateness. You know, you can very quickly look at someone’s digital footprint nowadays and kind of sum up their personality. And once you understand someone’s personality, you can tell if they’re a good fit for the company.
00;24;48;16 – 00;25;04;10
Joseph
Now, that’s not to say that they don’t have the technical expertize to do the job, but that’s only one aspect of hiring someone. They have to be a good fit because if you hire someone who’s really good at their job but can’t get along with anyone and they have to work in a team, then they become a
00;25;04;10 – 00;25;12;08
Joseph
disruptive presence. And you can generally find that out from from someone’s social media profile. They’re real real quickly.
00;25;12;19 – 00;25;12;29
Madison
OK.
00;25;13;26 – 00;25;24;28
Joseph
The last one here is identity theft, and we haven’t really talked about that on the podcast before, and we probably should do a podcast on it. Do you know what identity theft is?
00;25;26;16 – 00;25;34;27
Madison
I know it’s basically where people basically take your identity, like use images of you use. Basically, they pretend to be you.
00;25;35;08 – 00;25;51;07
Joseph
Right. So a lot of times what happens is. There’s different forms of it. one area that a lot of people focus on is financial identity theft, where someone can impersonate you. They can gain access to your bank accounts, your credit cards.
00;25;51;10 – 00;26;07;25
Joseph
Stuff like that. They can open credit cards in your name if they get certain information and then they go off and they charge all this up and you get the bill for it. So that’s probably the biggest form of identity theft, but another form is impersonation, online impersonation.
00;26;08;08 – 00;26;28;03
Joseph
And I think most people kind of overlook that because we talked everything we’ve talked about here is about your image, your personality, who you are. Well, if you have someone that’s very mad at you for something, maybe you have an act you broke up with and you want to get back at you for revenge.
00;26;28;03 – 00;26;44;12
Joseph
Maybe you made somebody mad at school or something like that. They can actually go out there and generate it and find enough generated information about you that they can gain access to your social media or like you aren’t on Twitter.
00;26;44;12 – 00;27;06;16
Joseph
You said the safest thing really is to go and open accounts on all the social media platforms and claim your name. So that nobody else can claim that digital space of yours and make it yours, because if you’re not on Facebook, for instance, and somebody wants to make you look bad, they’ll go out and find an image
00;27;06;16 – 00;27;23;20
Joseph
of you and grab that image. They’ll go, create a profile and they’ll start acting inappropriately on social media under an account that you never had anything to do with. But because they’re impersonating you when you go for that college admissions board, they search you.
00;27;23;25 – 00;27;38;12
Joseph
They find this fake profile. You look bad and it impacts you. So a lot of people don’t think that they have to protect their image online when they think identity theft, they just think, Oh, I don’t want someone stealing my credit card or bank information.
00;27;39;17 – 00;27;47;10
Joseph
But your presence on the internet is valuable. Have you ever considered anything along those lines?
00;27;48;07 – 00;27;49;01
Madison
No, not really.
00;27;50;04 – 00;28;05;19
Joseph
It’s very important because. The other thing you have to think of is when you go to a site like Google, OK, and you use Google services, they don’t charge you for it. Because the service itself isn’t where they make their money.
00;28;06;17 – 00;28;27;11
Joseph
Where they make their money is you. You’re their product. You’re you way here. Have you ever heard the word metadata? Maybe so metadata is the information they gather when you use their services. OK. When you log on where you log on from geographically, where you are.
00;28;27;24 – 00;28;41;22
Joseph
What as you look at what things you click on, what you getting your email, if you have a Gmail account, Google can look at it. It’s in their user agreement. So what they do is they compile all this information and then they sell it to people.
00;28;42;19 – 00;28;55;02
Joseph
They’ll sell it to advertising companies, they’ll sell it to Facebook, and Facebook puts it in their algorithm. And then that generates more stuff that shows up in your inbox. So you’re the product of all these services that are free.
00;28;56;05 – 00;29;15;29
Joseph
So it’s important to keep in mind that if you’re not paying for a service, then you’re the product, you’re the profit maker for them and your actions are the profit maker. So any actions that you have can influence that, and it builds your digital profile, so all the information that you put out there online is a fingerprint
00;29;15;29 – 00;29;30;11
Joseph
for you. It says who, what advertising you respond to, what product you’re interested in, what TV shows you watch, what social networks you, you’re on. All that information is valuable to someone and someone’s going to make money off of you.
00;29;31;04 – 00;29;52;08
Joseph
And that money they make peace for you to have a Gmail account for free. So it’s very important to kind of have this is I’ve talked to other people about this in the past, and it’s kind of blowing to some people when they hear these types of things because it’s so innocuous, it’s so transparent to the average
00;29;52;08 – 00;30;04;27
Joseph
user that you don’t realize it like somebody is literally making money off of you. Like that kind of offends me a little bit like people should only make money off of me when I choose to give it to.
00;30;06;12 – 00;30;25;26
Joseph
And all these internet companies are bringing enough to figure out how to how to do it otherwise. So you’re a product, anyone who uses the internet is a product that’s being sold to some degree on the internet. And a lot of people aren’t aware of that, so when they hear that, they sort of start looking at things
00;30;25;26 – 00;30;41;28
Joseph
differently. And that’s really what we need to look at. That’s that’s the the revolution in thinking we have to have when we talk about our digital fingerprint. So the good news is even all that doom and gloom I just gave you there.
00;30;42;17 – 00;31;00;21
Joseph
The good news is there are things you can do to protect your digital footprint. When we come back, we’ll talk about what we can and can’t do to protect our digital footprint. And then you kind of have to make your decision of whether or not you want to use these services and give them your information and go
00;31;00;21 – 00;31;14;26
Joseph
from there. I used to be on Facebook. I still have an account on Facebook. I never log in to Facebook. Never. They don’t have. They don’t have a clue what I do. I don’t use Facebook. Log in. I don’t use any of the services they have.
00;31;15;25 – 00;31;27;22
Joseph
Because it’s all them tracking me. Of course, that doesn’t stop Mommy from sending me 20 million links on Facebook automatically, because they’re trying to lure you back into the fold. And it’s not mommy’s fault, it’s just that’s what they do.
00;31;27;27 – 00;31;39;00
Joseph
It’s it’s almost like a drug dealer trying to get you hooked again. Hmm. So you just have to learn what what you can avoid and how to protect yourself. We’re going to talk about that. When we come back, we’ll be right back.
00;31;47;20 – 00;32;09;12
Narrator
Insights into entertainment, a podcast series taking a deeper look into entertainment and media. Are husband and wife, team of pop culture fanatics are exploring all things for music and movies to television and fandom. We’ll look at the interesting and obscure entertainment news of the week.
00;32;11;19 – 00;32;29;20
Narrator
We’ll talk about theme park and pop culture news. We’ll give you the latest and greatest on pop culture convention. We’ll give you a deep dove into Disney, Star Wars and much more. Check out our video episodes at youtube.com.
00;32;29;20 – 00;32;42;00
Narrator
Backslash insights into things are audio episodes and podcast insights into entertainment dot com or check us out on the web at insights into things dot com.
00;32;49;16 – 00;33;02;20
Madison
Welcome back to inside 19 today, we’re talking about teens and your digital and their digital footprint. So now we’re going to talk about what teens can do to protect their digital footprint. And this comes to us from Worldwatch Adcom.
00;33;03;25 – 00;33;18;23
Madison
Obviously, your teen is going to have some type of digital footprint. They can’t afford the internet entirely, and they probably wouldn’t want to, even if they could. But they can minimize their chances of creating a digital footprint that can cause problems for them later.
00;33;20;09 – 00;33;43;06
Madison
For starters, make sure that your team knows about privacy settings and why it’s important to look for them on all the social media and. Websites they use, not all websites make their privacy settings obvious. And some sites like Facebook are rather notorious for changing privacy settings without notifying users.
00;33;43;29 – 00;34;05;19
Madison
So it’s important to check them regularly after setting them to make sure that nothing has changed. But most web sites do have privacy settings that can be adjusted to make your ten sessions less public. Yes, you should never assume that anything is entirely private, but strong privacy settings still provide a better measure of protection than a weak
00;34;05;19 – 00;34;07;05
Madison
or no privacy settings.
00;34;07;08 – 00;34;15;28
Joseph
Sounds like we’re really bashing. Facebook today here, obviously, I’m not a big Facebook fan, you can tell from the Shownotes today.
00;34;15;29 – 00;34;16;25
Madison
I mean, yeah.
00;34;17;11 – 00;34;35;14
Joseph
But really, Facebook’s one of the biggest culprits here. Facebook has a proven history of misusing your information, as well as changing there you go in and change your privacy settings. Next week, they could change their policy and reset your privacy settings.
00;34;35;22 – 00;34;42;12
Joseph
Hmm. And you don’t know it because they don’t tell you about it unless you go in and look and police it yourself, which is really inappropriate.
00;34;42;15 – 00;34;42;28
Madison
Yeah.
00;34;44;03 – 00;34;59;26
Joseph
It’s also important to talk to your teen about making responsible choices and being good digital citizens. They should avoid oversharing as as you should in any crowd of people that you don’t know. I mean, some of the stuff is common sense.
00;35;00;21 – 00;35;16;07
Joseph
If they’re going to share secrets, it’s usually better to do that offline and online. If you keep personal details private as much as possible, addresses, phone numbers and what school they attend are all examples of information they shouldn’t share publicly.
00;35;16;07 – 00;35;23;21
Joseph
Would you grab a stranger on the street and say, Hey, my phone number is blah blah blah? No. So why would you post it on the internet?
00;35;24;10 – 00;35;42;24
Madison
Yeah, that’s obviously a really good example just to throw out people because like, really? Would you do that if like basically you post something on the internet once strangers are going to see it? So if you don’t feel comfortable going to a stranger and just screaming it at them, why are you posting it on the internet?
00;35;42;25 – 00;35;59;25
Joseph
Exactly. There’s billions of people on the internet. You’d be safer doing that on the street because there are fewer people you’d propagate that information to. Yeah. So you kind of have to put that scenario in mind. When you’re doing stuff, you should avoid posting photos and videos online.
00;35;59;25 – 00;36;16;23
Joseph
That wouldn’t be you wouldn’t be comfortable with a college admission office, your boss or your grandparents. And I love that. I think that’s probably the best example. Don’t do something or say something that you wouldn’t be comfortable doing or saying to your grandparents.
00;36;17;13 – 00;36;34;04
Joseph
I think that’s a good measure there, because I think grandparents have a pretty good, grounded reality of what is and isn’t appropriate. Yeah, you never know where the images are going to end up. They should make good choices about how they talk to and interact with others online.
00;36;34;07 – 00;36;54;11
Joseph
This is this is also very important because social media today and I’m not going to point fingers at any particular group, political or religious or whatever, but social media today really is a cesspool. It’s really it brings out the absolute worst in human nature.
00;36;55;02 – 00;37;13;11
Joseph
There are so many attacks, so much nastiness, so much negativity. It’s just it’s literally the the depths of human depravity on social media today. Yeah. So you have to be careful how how much you allow that to muddy you when you get into it.
00;37;14;05 – 00;37;35;17
Joseph
So threats, angry messages, name-calling and so on can be interpreted as cyber bullying, even if you’re teens responding to similar messages or has been otherwise provoked. The words can be taken out of context, and the problem is it’s like quicksand, you know, especially the the short, quick fire back of like Twitter.
00;37;36;14 – 00;37;53;01
Joseph
You know, you get on Twitter and you very quickly can fall into the quagmire of this negativity and attacks and hatefulness. And it’s like the news. You know how often you turn on the news and you get good news, you know you don’t.
00;37;53;10 – 00;37;55;17
Joseph
It almost never happens because it doesn’t sell.
00;37;55;27 – 00;37;56;10
Madison
Yeah.
00;37;57;00 – 00;38;19;13
Joseph
And social media thrives on that negativity to the point that the algorithms of YouTube and Facebook, they’re geared towards it. They’re geared towards poking and sticking your cage to get a reaction. Because the more reaction they can get out of you, the longer you’re going to stay on the site, which means the more ads you’re going to
00;38;19;13 – 00;38;35;20
Joseph
see, the more times you’re going to click on things. And that’s that’s how they make their money. So if you log in and you see three articles that are that are happy and nice and, you know, puppy dogs cuddling with you and stuff like that, you’re not going to stay on line that long.
00;38;36;19 – 00;38;53;15
Joseph
But if they flash something in front of your face that offend you or makes you mad or, you know, attacks you, you’re more likely it’s human nature that you’re going to get more engaged in that. And Facebook thrives on that, and that’s what makes it so terrible.
00;38;54;16 – 00;39;12;20
Joseph
And then it just builds like a like a virus, really, it spreads quickly. Their algorithm adjusts itself because their algorithm is almost always key to what gets more clicks. So if the negative ads and the negative articles get more clicks, they’re going to be thrown up in your face more often.
00;39;13;14 – 00;39;30;12
Joseph
And it’s it’s just it’s like a snowball rolling downhill. It gets bigger and bigger and bigger. And before you know it, you’re caught up in it. Because they’ve provoked you at this point. And four or five years later, you’re just as bad as the first guy who posted something.
00;39;31;21 – 00;39;38;09
Joseph
And that’s what people see when they look at your digital footprint. So you have to be very careful about how you present yourself.
00;39;40;16 – 00;39;55;13
Madison
Sharing inappropriate jokes or memes, especially if they are making fun of or causing harm to others like racist or sexist material can come back to haunt your teen, even if they didn’t mean it or didn’t expect to be taken seriously.
00;39;55;21 – 00;40;06;26
Madison
It will be taken seriously and can do serious damage. It’s important to teach your teen to avoid these kinds of actions online because it’s the right thing to do, but also for their own sake.
00;40;07;21 – 00;40;21;17
Joseph
So that’s some good stuff that you can do to protect yourself. But there are some things just by the very nature of the internet that you can’t do to protect your digital footprint. So teens also need to be aware of what is out of their control.
00;40;21;18 – 00;40;46;14
Joseph
For instance, every device on the internet has a traceable semi unique identifier called an IP address or an internet protocol address. IP addresses are linked to specific devices and logged every time you visit a website. Your team can’t change their IP address or erase the history of their device visiting a particular site, at least not without a
00;40;46;14 – 00;41;10;13
Joseph
VPN, which if you’re not familiar with it, VPNs or virtual private networks and their online services that encrypt your connection so you would connect to the internet, you would connect to your VPN provider and then your device wherever you go in the internet is that at that point goes from your device through your network, out to the
00;41;10;13 – 00;41;35;17
Joseph
VPN provider. Encrypt it so nobody can see it, and then you emerge on the internet someplace else. From that virtual private networks service. This allows you to anonymously connect to Web sites. In other online services, using an IP address of the VPN provider, which allows you to be anonymous assuming the V, the VPN provider doesn’t log your
00;41;35;17 – 00;41;39;28
Joseph
activity, so there’s certain things to look for in VPN providers there.
00;41;41;11 – 00;41;55;25
Madison
So is this a problem? Probably not for most teens. School and university officials and employers may take a look at it in social media profiles or use a search engine to see what pops up when they Google when they Google a teen’s name.
00;41;56;19 – 00;42;14;16
Madison
But if they’re not, but they’re not going to track to try to track teens IP address. However, law enforcement has the means to track an IP address and will do so if they suspect a device or the owner of a device has been involved in something illegal.
00;42;14;25 – 00;42;33;28
Madison
So that’s important to keep in mind. And hackers may be able to obtain an IP address and use it to trace a device’s activity or identify the person linked to that device, which could lead to anything from the release of embarrassing information to actual threats to physical safety.
00;42;34;17 – 00;42;56;11
Joseph
So one other thing to keep in mind is there are. More secure devices and more secure services out there than others and. The one I’m going to throw out there, and I know my loving wife is going to growl at me for this, but I have to throw on Apple.
00;42;57;00 – 00;43;10;18
Joseph
Apple is a company that has a proven history of. Being interested in protecting your privacy, and the reason for that is they don’t make any money off of you. And why don’t they make any money off of you?
00;43;11;08 – 00;43;26;17
Joseph
Because all their products are ridiculously overpriced, so they make their money off of the services that you buy because they don’t give anything away for free? Apple doesn’t do anything for free if you want to use something from Apple, a device or a service or whatever you pay for it.
00;43;27;05 – 00;43;42;11
Joseph
That’s how they make their money. And that’s a good measure of how secure something is if you have to pay for it. Then what you’re getting in return is the products. If you don’t have to pay for it, you’re the product.
00;43;43;24 – 00;44;07;10
Joseph
And when you don’t have to pay for something, you have to think something is up because you all manage it, nothing is free is more true on the internet than it ever has been. one good example is IP addresses, so Apple phones, modern operating, modern Apple OSes on their phones have a feature where they automatically mask your
00;44;07;10 – 00;44;20;20
Joseph
IP address for you so you don’t need a VPN. So every time you connect to the internet, you switch cell towers or you switch to your Wi-Fi or whatever. They give you a different IP address, which makes it very difficult.
00;44;21;17 – 00;44;39;03
Joseph
The other thing is. Apps that you install on your devices are tracking you. People don’t realize that new latest version of Apple OS iOS for their devices now tells you when an app decides that they want your information and you have a choice whether or not to give it or not.
00;44;40;01 – 00;44;56;03
Joseph
And it’s the only operating system in the world that does that right now. Which should tell you right there about how much they value privacy. So if you’re interested in digital privacy and controlling your digital footprint. Do a little bit of research.
00;44;56;27 – 00;45;14;01
Joseph
Email us. I’ll be happy to give you suggestions. I’ll be happy to answer any questions you might have on digital privacy. It’s something that’s a kind of a a hobby or pet peeve of mine, but I also work in digital technology, so it’s something that I’m immersed in pretty deeply.
00;45;15;00 – 00;45;25;20
Joseph
So feel free to reach out to us in emails or comments and insights into things economic, you have any questions. I know I’m preaching a lot here and I don’t want to go into a lot of technical detail and and bore people any more than I already have.
00;45;26;15 – 00;45;29;29
Joseph
So if you have questions, reach out. I’ll be happy to answer them for once.
00;45;29;29 – 00;45;33;08
Madison
You’re actually a subject matter expert for once.
00;45;33;09 – 00;45;37;21
Joseph
Thanks. I appreciate that. 133 episodes in, I’m finding a subject matter expert.
00;45;37;22 – 00;45;44;21
Madison
I mean, you are sometimes a subject matter expert on certain things, but this is definitely something that you know you are pretty much.
00;45;44;24 – 00;46;08;19
Joseph
Thank you, sweetheart. I preach that. Appreciate that Sammy vote of confidence. So while these things are out of your team’s control, your team can minimize many of the risks to themselves by being careful about where they go, what they do online, as well as by utilizing privacy settings, password protecting devices and generally using good judgment.
00;46;09;04 – 00;46;30;17
Joseph
You can help your team help keep your team safe online by using monitoring tools to ensure that you’re aware of any potential problems before they get out of control. So there is a ton of tools out there that we can use directly on our devices through our web browsers, through the sites that we use, the social media
00;46;30;17 – 00;46;51;09
Joseph
services that we choose to use. There’s a lot that we can do to control our digital footprint. You’re not going to make it go away. Be careful what you put out there, and again, if it’s not something that you’d be comfortable with your grandparents saying, or if it’s not something you’d be comfortable grabbing a random stranger on
00;46;51;09 – 00;47;09;02
Joseph
the street and telling them, then it’s probably something that you shouldn’t be putting on the internet because it’s just as open and exposed. That’s all we have here. We’ll take a quick break and come back, get your closing thoughts and go from there.
00;47;09;21 – 00;47;17;14
Joseph
We’ll be right back. Go for your closing remarks.
00;47;17;28 – 00;47;37;23
Madison
All right. So I just wanted to say to everyone out there, your digital footprint can really matter and a lot of really big scenarios, whether it be scholarships, getting into college, going in, in the military, your employment or even just being getting your identity stolen.
00;47;38;16 – 00;47;58;08
Madison
Honestly. It really. You can really do a lot of damage by just a simple pose that can be offensive, so it’s very important to keep track of what you do and to get the thoughts out of your head that you have.
00;47;58;09 – 00;48;14;19
Madison
You are more you have more privacy than you actually do. And that you. And that when you delete something, it’s gone forever. You basically both of those are untrue. You always need to make sure you have as much privacy as you can, but that you don’t.
00;48;14;19 – 00;48;33;00
Madison
But you need to know you don’t have complete privacy and that what you post online pretty much stays there. And basically what Danny said, basically, if you’re not comfortable sharing it with your grandparents or grabbing a random stranger on the street and telling them, then you probably shouldn’t be posting it.
00;48;33;09 – 00;48;51;12
Joseph
Sage advice, as always, thank you. Before we go, I want to once again encourage you to subscribe to the audio version of our podcast, and insights into teen should be listed as insights into teens. Our video version is listed as insights into things.
00;48;51;25 – 00;49;10;05
Joseph
We’re available on Apple Podcasts, Spotify, Google, Stitcher, et cetera, et cetera. Also, feel free to reach out to us. If you do have questions, please let me know. I’ll be happy to answer any questions that you have. You can email us your comments and insights into things dot com.
00;49;10;26 – 00;49;20;27
Joseph
You can hit us on Twitter at twitter.com slash insights into things. And it’s funny because I’ve just preached against all these social media sites, and now I’m going to list our listings on there.
00;49;20;29 – 00;49;22;02
Madison
Yeah, it’s kind of funny.
00;49;23;03 – 00;49;41;05
Joseph
It’s not hypocritical in order to get our stuff out there. This is really the only way that we can with a zero dollar marketing budget. Yeah, I’m not even on the list Facebook this time, but Instagram. We’re at Instagram dot com slash insights into things I did promise and before the break that we would have a Discord
00;49;41;05 – 00;50;02;23
Joseph
server up. Technically, it is up. It’s just not ready yet, so I was working on it today. Ironically, I’m not ready to release it to the listening viewership at this listening audience at this point in time because I haven’t had a chance to lock it down at this point and try to make it as secure as possible
00;50;02;23 – 00;50;20;14
Joseph
. So once I do that and get that all straightened out, I hope to have it up on our next podcast. But anyway, you can get links to all those contacts on our official website at WW W Dot Insights into things dot com and you.
00;50;20;20 – 00;50;30;07
Madison
And don’t forget to check out our other two podcast insights and entertainment hosted by you and Mommy and then Santana tomorrow. Our monthly podcast hosted by you and my brother, Sam.
00;50;30;13 – 00;50;32;10
Joseph
And that’s another one of the books.
00;50;32;12 – 00;50;33;00
Madison
By everyone.
00;50;33;04 – 00;50;33;20
Joseph
By.