Well, our previous blog post (10/20/2008) opened some interesting conversations…fortunately we moderate comments. Having been in communication with a couple of “buyers” of products from some of these Internet gurus, a message was forwarded to us whereby one of these gurus sent an ominous message threatening to “lynch“ the member. He actually used that word in his email. So, here is a perfect example of how to ruin one’s online reputation. What’s interesting, since today the word lynch is not politically correct — let’s face it, had such an email been sent to an African-American, it would be considered a “hate crime”, a serious felony that would have resulted in the arrest of that Internet guru — is that this so-called smart Internet marketer was so stupid as to write such an email creating a document that will now live forever.
This will seem a little amusing right now, but some years ago I attended a high-level CEO management forum with about 800 C-suite types from all over the country involved in technology and/or the Internet in one way or another. The keynote speaker was then Attorney-General Elliot Spitzer. Yes, that Elliot Spitzer, and how apprapro to now be speaking of him in an online reputation blog. Anyway, his opening remarks, which he often used in these keynotes, went like this: “First of all, I want to let all of you know that before I came in here today, I have already read all your emails.” [This brought lots of laughter, achieving his intention of opening with some humor.] He then went on to say, “Here’s the message I can give you for your business practices. If you can nod, don’t speak, if you can speak, don’t write, and if you have to write, don’t record or save.”
You may recall that it is always discovery of EMAILS that brought down his targets and resulted in so many successful prosecutions for him that eventually led to him being elected governor of New York. Apparently, he forgot to follow his own advice. This is the hubris of success and moral depravity I touched on in my REPUTATION 2009 – THERE WILL BE BLOOD posting below, only now, in some cases, because of the fear in the economy, and job losses, it is spilling into this latest “bubble” of Internet marketing to the gullible and ill-informed. If one is qualified, and has done their homework, great! But when I read about someone who just spent over $5,000 buying one suspect online program in the last 30 days or so, who, for 25 years has spent 12 hours a day as a plumber/welder and is “hoping 2009 is the end of my day job…and can’t wait to get started…” [obviously a newbie], my message to the Internet gurus is similar to that given to brokers who sell other types of investments: “Know Your Customer“, avoid obvious over-the-top puffery, avoid earnings representations, and disclose everything with transparency. These are the basics of online reputation management.
How aout this headline from a squeeze page making the rounds now:
“The Turnkey Money Machine
That Prints Non-Stop Profits
For You Automatically,
The Lazy Way!”
“…I’ll make money automatically 24/7, even while I’m sleeping or having fun doing something else. I won’t be chained to my computer slaving away.”
Okay, you get the message…the FTC loves this stuff when they come after you.
Let’s move on to another potential reputation killer occurring in offices everywhere.
Profiles Are For Viewer’s Eyes Only
It could have been a workplace disaster of incalculable proportions. But thankfully, Bridget’s professional reputation got by without a scratch.
Here’s the story as she tells it:
“Many of my co-workers are blocked from seeing my more ”social” moments on Facebook . . . such as the booze-fueled housewarming bash I threw a few months back. Not exactly something you want the bosses to see.
So imagine my horror when I saw a co-worker (who had full profile access) not only browsing through my party photos at work — but also showing them to someone who walked by!
Lucky for me, the person who saw it already was my Facebook friend. And that co-worker quickly realized that a social network faux pas had been committed.
I thought I had it under control because I used privacy settings. I trusted that co-worker with access, but I didn’t take into account that the pictures could be shared with others at work.
So the lesson learned goes two ways. First, assume that things you see are for your eyes only. It’s disrespectful to let the whole department huddle around your monitor to look at someone else’s profile.
And, of course, don’t assume bosses won’t see a photo just because you blocked their access. Unless you block all co-workers, someone at work could share it in the office. Nothing is 100 percent safe from being seen just because you use privacy settings.”
Niala has experienced this same problem, a little differently:
“I’ve had a few incidents with co-workers who aren’t on social networks but like to get into people’s business. Hey, we’re all journalists — it’s sort of a hallmark of the trade that we’re all nosy. But I have to draw the line when they are hovering over my computer, and, in some cases, asking me to click on things in people’s profiles. I’m not sure that I’ve done the best job telling them to back off. I usually just tell them they need to open their own account.”
For some reason, people who would never read an e-mail on your screen have no problem being social network voyeurs. Sound familiar?
One more “secret” hideout that we’ve seen come back to haunt people, and companies: too many employees fail to erase or encrypt sensitive data on their mobile devices before tossing them out. To prove this point, one known to us, a university research team recently purchased 161 discarded handheld devices from online auction sites and secondhand outlets.
One in five (20%) contained details about salaries, company finances, business plans, or board meetings. A Blackberry once owned by the European sales director of a major Japenese firm, for instance, had the goods on company clients as well as the executive’s bank account numbers — along with his car make and registration.
Our general advice is to always delete your data, but the reality is not that simple. Someone inside your company has to set policy and tell people exactly what they should do when they get rid of these mobile devices.