Challenges Faced In Today’s Digital Society

By | August 19, 2014

HP.com (Hewlett-Packard)

 

Savvy computing means you possess the tools and realize computers are what I consider a “double edge sword.” That you’re aware and understand their capabilities and limitations. On this side of the coin there are a lot of opportunities and challenges of living in a digital society for obvious reasons, such as you can explore anything and everything.

The digital society challenges we encounter today seem and at times are  intrusive, annoying, and down right overbearing, but believe me we need to be in the know.

You “Own” Nothing In The Work Place.
All Communications Are Monitored.
Management Monitor and Track data flow.
Life As We Knew It… KABOOM!
Shredding Is The New Be All End All.
Prevent Identity Theft By Learning Defense.
Technology Isn’t Disappearing…It’s Here To Stay Folks!
Disclosure:

Digital Challenges

You “Own” Nothing in the Work Place.

It enables you to experience sound, video, and graphics and a lot more. WOW! This is amazing. But on the other side of the coin it poses ethical, legal, and moral challenges.

At one time I worked on Wall Street and at the office I was under the illusion that I was operating my computer and talked on my phone. This was far from the truth. I didn’t know then what I know now and that is nothing is yours in the workplace. The challenge of working in a digital society is knowing everything belongs to the employer. The office equipment is accessible to you to perform your daily tasks ONLY.

All Communications Are Monitored.

You may feel your emails, phone conversations, cell phones (company issued), and Internet usage are private; they’re not. When it was brought to my attention I felt it was an intrusion on my privacy. I was wrong. Face it, living and working in a digital society means any interaction with anything digital is traceable.

Since the horrific events of 911 the Government signed into law the  Terrorism Act of 2001 a/k/a USA Patriot Act on October 26, 2001. Some interpret while protecting the our rights its protective claws have extended to impact our our personal freedoms; therefore, our emails, voice mail, online activities, credit / debit cards, etc are all monitored.


Today, it should be understood and well-known that employers have the legal right to monitor, retrieve, and investigate any activity performed on / to their property.

Management

The Authority

 

Have you noticed your social media sites are restricted or blocked? Do you think nobody’s the wiser if you attempt to visit job postings, porno sites, check lotto numbers, or maybe shoot an email to your wife asking her to wear that naughty number you like? You’re being monitored.

Who knows, it could be a situation where someone leaked sensitive data about a company merger to a competitor.

Management Monitor and Track data flow.

Once this comes to light the Chief Executive Officer (CEO) contacts the IT Department and instructs them to trace and retrieve all digital information from everyone involved. If the data was leaked using company devices that person(s) will be discovered.

I knew a co-worker who emailed a pornographic image to a co-worker after the HR department composed an addendum to the employee hand book; it cost him his job. It only takes one incident for everyone to get the message (news spread like wild fire).

If caught it’s likely you’ll face penalties and legal action. Today, new hires sign a policy / security agreement outlining procedures and consequences if breached. All your activities should be work related. These are some of the challenges of living in a digital society. And that’s the bottom line. Are employers entitled to this information?

PersonalizationMall.com - Personalized Gifts for All of Life's Celebrationsbanner


 

Did you know employers are NOT obligated to inform employees of surveillance cameras in the workplace? Cameras are so small they’re barely noticeable due to the advances in technology. The employer’s position is this will mitigate theft and industrial espionage. Is your employer watching you?

Life As We Knew It… KABOOM!

The attacks on September 11, 2001 by al-Qaeda were horrific and devastating. As a result initiatives were created to combat terrorism, which included government and privately own surveillance cameras.

I for one didn’t realize the impact or extent of this event or how it would affect my/our way of life. The Department of Homeland Security and privately owned security cameras were approved and installed  without guidelines to protect civil liberties.

Is it possible?

Is it possible?

It’s more likely than not our government / local law enforcement surveillance tactics are apt to be applied not only to prevent terrorists’ attacks, but spill over into the private sector; US.

Such as automatic license plate readers, monitoring phones, Internet traffic, etc. Is it more likely than not we’re morphing into a total surveillance society?

Shredding Is The New Be All End All.

In the past before the technology boom mind you, people didn’t feel threatened throwing out the trash in the usual manner. You’d collect household garbage, place them into garbage cans, and put it out for the garbage man to pick up. Job well done, right?

Today, it’s a far more tedious experience that has now become a way of life for most in our society for good reasons. Your trash is passed through many stages before it arrives at the landfill or incinerator. At each stage you’re risking somebody garbage diving for sensitive documents that will cause you damage.

Your garbage contains sensitive information including but not limited to financial statements, canceled checks, pay stubs, dummy credit cards with your name on them that frequently fill the mailbox, expired charge cards, bank statements, tax returns, receipts, or utility bills. Any one of these can be useful to commit identity theft and credit fraud on your behalf. Thank you very much.

Cross-cut paper

Cross-cut paper

 

 

 

 

 

 

 

To safeguard all your personal information from criminals you must shred them prior to trashing. I perform this task all the time and it’s time consuming, but better safe than sorry. You can locate shredders at any office supply store. Some are more expensive than others, but you can get a cross-cut shredder for under $25.00.

Strip-cut paper

Strip-cut paper

I consider cross-cut shredders the best when it comes to keeping a peace of mind. Strip- cut shredders offer less security. It really depends on your comfort or level of security required.

Prevent Identity Theft By Learning Defense.

These are measures we all can take to ensure we never fall victim to identity theft or credit fraud. The digital society challenges we face are atrocious at times. We can only do what is in our power to safeguard our privacy in hopes that it’s enough.

No agency can positively 100% assure that you’ll never be victimized in such a manner; however, you can substantially decrease the probability that it will. Consider these defense measures.

  • Don’t carry your Social Security card on your person; keep it in a safe place.
  • Never provide your Social Security number to anyone or online for purposes unknown to you.
  • Shred  (cross-cut) your personal documents including pre-approved credit offers.
  • Never enter your credit card information on a pop-up anti-virus program that demands you to run it and scares you because it just found hundreds of viruses.
  • Use collection boxes and the nearest post office to deposit your outgoing mail.
  • Get in the habit of collecting your incoming mail promptly.
  • Shut down anyone or any company using the a name such as “Windows Security” reporting your computer is infected with viruses.
  • If you’re going on vacation notify your local post office and ask for a vacation hold.
  • Don’t wait to contact a bill collector if the invoice is late.
  • Check your credit report constantly to catch inaccuracies.
  • Immediately contact your credit card company if your card is lost or stolen.

 

Being a victim of identity theft means your names and personal information can be used to access your existing credit and bank accounts, open new accounts, and fraudulent charges. You’re not held responsible for unauthorized charges; however, it will require years to wipe clean your financial and credit problems.

Technology Isn’t Disappearing…It’s Here To Stay Folks.

Getting in front of the curve and becoming computer literate  which enables us to make educated decision and congure opinions and not depend on media hype.  It will help us examine, consider , and manage the digital society challenges that affect our every day existence.



Full Disclosure:

The links / banners on windowsregistrykeys.com are affiliate links, which they have granted this website the honor of advertising their merchandise. I will earn a commission if you click on the link or make a purchase using that link. If you make a purchase, the price you pay will be the same whether you use my affiliate link or go directly to the vendor’s website. By using my affiliate links, you are helping support this site and I genuinely appreciate your patronage.


Author: Wanda

6 thoughts on “Challenges Faced In Today’s Digital Society

  1. Jeanne

    You share interesting things here. I think that your blog can go viral easily, but you must give it initial
    boost and i know how to do it, just type in google for – wcnu traffic increase

    Reply
    1. Wanda Post author

      I will perform some research and give it some thought.
      Thank you for your comment.

      Wanda

      Reply
  2. Rebecca

    hello Wanda, Excellent blog. I especially found some great tips from the tactics segment. Keep up the good work!

    Reply
  3. Joanne

    I really like what you’re doing, Wanda. I need information to keep me in the know. Thanks!

    Reply
    1. Wanda Post author

      You’re welcome, Joanne. Technology is like rollercoaster minus a stop button. I do my best to keep up and pass the information along.

      Cheers,

      Wanda

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *


*