IROC2_logo_2                                              

National Anti-Bullying Award Recipient

Exemplary School Safety Program Award
Exemplary School Safety Initiative Award

 

INSTITUTE FOR RESPONSIBLE ONLINE AND CELLPHONE COMMUNICATION

What Is The Digital Risk Assessment?

 

This series of questions will help you to assess your level of 21st Century Digital Safety, Responsibility and Awareness.  Are you making responsible or risky decisions in the cyber world? 

 

- The LOWER your score, the lower your risk, and the less negative "attention" you are calling to yourself, thus, the better your chances of avoiding a challenging issue or event.

 

- The HIGHER your score, the more negative attention you draw towards yourself, and the less control you have over your content which makes you vulnerable to challenges that could potentially affect you and your loved ones.
 

  • I have a Personal Social Media Account...

    Examples: Instagram, Facebook, Youtube, Tiktok, Snapchat, etc).

    1

    data-a1:Yes:10

    data-a2:No

    Rationale:
    There is nothing wrong with having a personal social media account, but risk points do need to be assigned as your page (and your posts) now make you discoverable to millions of digital citizens...some of whom are less than altruistic.  When you are now visible to millions of people - as opposed to just a few people in your school or community -you do inherit some risk from that vast increase in visibility. 

     

    But this does not mean we cannot have a social webpage!  After all, there are risks associated with many things we do every day, like driving, using a stove, even taking a bath. 

     

    What it boils down to is, how responsible are we being with our social media accounts?  Are we drawing positive or negative attention to ourselves?  If we use a tool positively, we usually get positive results.  HOWEVER, if we abuse that tool, often times we will face harsh consequences!

  • I Post My Personal Phone Number on Social Media Sites, Chat Rooms, Message Boards, etc...

    2

    data-a1:Yes:10

    data-a2:No

    Rationale:
    It is never a good idea to post a home phone or cell phone number on an unsecure area of the World Wide Web as it is an entry way for anyone - including criminals and stalkers - to gain greater access and awareness into your home or personal location through phone number trace services and GPS tracking services.

     

    If your friends and family know your phone number, why must the rest of the World Wide Web? 

     

    Remember, there are millions of other internet users that you may not want having your phone number!

  • I Post My Home Address on Social Media Sites, Chat Rooms, Message Boards, etc...

    3

    data-a1:Yes:10

    data-a2:No

    Rationale: Do You Remember Stranger Danger?
    Would you give this information to a stranger at the mall?
    It is never a good idea to post a home address on an unsecured area of the World Wide Web as it is an entry way for anyone – including criminals and stalkers - to gain greater access and awareness into your home location through popular (free) platforms like Google Maps.
    If your friends and family know your home address, why must the rest of the World Wide Web? 
    Remember, there are millions of other internet users that you may not want to have your home address!

  • I Post My School / Work Address on Social Media Sites, Chat Rooms, Message Boards, etc...

    4

    data-a1:Yes:10

    data-a2:No

    Rationale:

    Once again, you would never give this information to a stranger at the local park right?  So why provide it to the global park?

     

    It is never a good idea to post a school or work address on an unsecure area of the World Wide Web, especially if the page you are posting this information on has your real name, pictures of you, and other identifiable information as it is an entry way for anyone – including criminals and stalkers - to gain greater access and awareness into your daily location and routines through popular (free) platforms like Google Maps.

     

    If your friends and family know your school or work address, why must the rest of the World Wide Web? 

     

    Remember, there are millions of other internet users that you may not want having your school or work address!

  • I "Check In" Online or Post "Future" Status Updates on the World Wide Web...

    Examples: Going on a business trip tomorrow, going to the movies tonight, having a great time on vacation.

    5

    data-a1:Yes:10

    data-a2:No

    Rationale:

    Would you take out an ad in your local paper or on television to tell people that you are headed on vacation or a business trip?

     

    Then why post it on a global publication?

     

    We incur risks when we “check in” or post future status updates on a global public platform as we are giving a crystal ball into our future for millions of people!

     

    Just because we can, does not always mean we should!

  • I Think Deleting a File or Files That Are Supposed To Automatically Disappear (i.e. Snapchat) From Digital Tools like Media Cards, Cell Phones, Computers, etc, Are Deleted Permanently...

    6

    data-a1:True:10

    data-a2:False

    Rationale:

    The delete button should really be called, the "hide" button, because that is all it typically does. Never discard an intact hard drive or media card thinking what you deleted is really 100% gone.

     

    Pressing "Delete" or counting on a company to automatiaclly delete content (i.e. Snapchat) does not make your file evaporate, disintegrate, or disappear.  Far too many digital citizens believe that delete means "gone" when it just means, hidden.

     

    There are many ways to recover or “undelete” deleted files off computers, cell phones, memory cards, etc.  Now, isn’t this AWESOME if you accidentally deleted a file, picture, or song?  You can get it right back! 

     

    HOWEVER, if we are abusing technology, and assume we can simply delete our irresponsibility, the same recovery opportunity we just thought was AWESOME - can become an issue!  Especially if we lose our device!  

     

    Recovery programs are designed to HELP us – to make sure we never have to lose our digital data.

     

    Digital = Permanence.  It is important we keep this in mind when we create anything digital – the permanence of what we created is supposed to be a benefit - so what awesomeness will you create with this power?

  • I have Anti-Malware Security Programs Installed on my Computer & Mobile Devices...

    7

    data-a1:Yes

    data-a2:No:20

    Rationale:

    It is vital that your computers and mobile devices have a reputable security program(s) installed. Not securing your computer is like leaving your home unlocked with your most private information and valuables sitting in the front window.

  • I UPDATE & RUN my Anti-Malware Security Programs Daily...

    8

    data-a1:Yes

    data-a2:No:20

    Rationale:

    Updating and running security programs daily reduces the risk of long term malware infection leading to exploitation and / or identity theft.  The longer you DON’T run your (up to date) antivirus and anti-spyware programs, the longer a malicious program could exist on your system.

     

    The longer a virus or spyware program is on your computer or mobile device, the higher your chance of becoming a victim of cybercrime(s).

     

    Here are a few programs you can review: http://www.iroc2.org/151.html

  • I Believe I Can Be Absolutely 100% Anonymous or "Private" Online...

    9

    data-a1:Yes:20

    data-a2:No

    Rationale:

    An individual’s lack of Digital Consciousness typically means that they subscribe to the illusion that there is Absolute privacy, anonymity, and invincibility in a digital world.  It is frightening to think that there are millions of people operating digital tools and technologies with these delusions.  

     

    If we can be 100% anonymous, then so could every criminal online – large and small.  In other words, we would be faced with complete digital anarchy because everyone would get away with everything – and that is simply not reality.

  • I Believe My Social Media Site Password Truly Keeps My Content Private...

    10

    data-a1:Yes:20

    data-a2:No

    Rationale:

    Understand that “passwords” (on unsecured social web sites) are a joke to many hackers and criminals. There have actually been applications available that help even the most novice citizen hack accounts.

     

    Passwords provide us with the illusion of privacy, of protection, but at the end of the day, our passwords can literally be brushed aside like a curtain.  Passwords are not the “steel doors” many believe they are.  Think about it like this:  Why would there even be a word called “hacking” if passwords were so secure? 

     

    How could anyone “hack” an account if passwords were impenetrable?  

     

    If we couldn’t illegally access an account, a page, a password, something that is supposed to be “private,” then we would never need a reason to label the act of illegally accessing an account, with the word “hacking”, right?

     

    The truth of the matter is that hacking exists because the action of hacking is very possible.  It occurs much more often than most people want to realize.  With this in mind, never place information on an unsecure website thinking that a password is going to keep everyone out.

     

    The previous information was extrapolated from the book, “Public and Permanent” with permission from Richard Guerry.

  • I've Created Digital Pictures or Videos of Myself I Would NEVER Show a Criminal, Enemy, College Review Board, Employer, Current or Future Family Member...

    11

    data-a1:Yes:50

    data-a2:No

    Rationale:
    The second you snap a digital photo or shoot a digital video of yourself that you would not show your family or enemy, is the second you have created a file that can be used against you to blackmail you, get you in trouble with school, work, family, or worse. 

     

    Further, there are millions of ways the file you created could get out into the public, meaning not only could your family see it, but so could the rest of the world - not to mention, future generations of your family.

     

    There is an entire black market dedicated to finding and exploiting this type of irresponsibility!

  • I Do & Say Things in Front of My Webcam That I Would NEVER Show a Criminal, Enemy, College Review Board, Employer, Current or Future Family Member...

    12

    data-a1:Yes:50

    data-a2:No

    Rationale:
    Webcams are amazing tools, but that does mean we should do things with them we would not do without them!

     

    Did you know that there is an entire black market dedicated to capturing irresponsibility of digital citizens who do and say things in front of their webcams they would not show the world?

     

    There are networks of (often illegal) websites and networks that do nothing more than collect and use stolen "private" webcam content for their sites.  Typically, they steal this content by watching people do and say things in front of their digital webcam that could get them into trouble, and then the criminal will record this behavior using various screen recording software programs.

  • I've Shared Pictures, Videos or Texts About Myself I Would NEVER Show a Criminal, Enemy, College Review Board, Employer, Current or Future Family Member...

    13

    data-a1:Yes:100

    data-a2:No

    Rationale:
    This is very risky as "private" pictures that you would not show family or an enemy would now be in the hands of someone else.  Once someone else is in control of content that could get you into trouble, your risk factors are very high.

     

    Let’s assume you did not share this “private content” on the World Wide Web which you share with billions of people - but only with a friend or significant other.  Even if your trust the individual you shared your “private” content with, how do you know they will not lose their device, have their device stolen, or hacked?  What if they lend their phone or computer to someone (a stranger to you) and that third party found what you wanted your friend to keep private?

     

    If you ask them to delete your content, how would you know if they really deleted it or that they did not make copies on other devices?

     

    There are a myriad of ways the content could get out beyond the person you shared it with, both intentionally and accidentally.  And what will you do if this content winds up online or falls into the hands of a criminal?

     

    ·Learn About Sextortion
    ·Learn About Revenge Porn

  • I've Harrassed or Bullied Others Online or via Digital Tools...

    14

    data-a1:Yes:100

    data-a2:No

    Rationale:
    Cyber Bullies, or people that practice cyber cruelty with threats, derogatory remarks, etc., should never assume any sort of privacy or anonymity when harassing someone via digital technology.  A “bully” does not warrant any privacy or protection based on the malicious actions they are employing and if a “bully” is investigated they will be found, just as we would want someone who was being cruel or threatening to us to get caught, or a terrorist to be found should they be plotting against our country.

     

    To their family and friends, a cyber-bully may be the greatest thing since sliced bread, but to a billion-other people, a bully looks like a jerk.  When we harass others over a global public platform known as the World Wide Web, we do not just “bully” the victim, we bully the world, and we never know who will take exception to our remarks. We never know when our victim’s friend or relative could turn out to be the next Eric Harris and Dylan Klebold (the shooters behind Columbine) or the next Charles Manson or Ted Bundy (serial killers).  Hurtful remarks may just move bullies to the head of a “kill list” ─ and it is not that hard to find anyone through the Internet.

     

    It is never the victim of bullying that will look bad to the public, a school, an employer, their family and friends, even future generations of their family, it is the BULLY, that stand to ruin their own reputation and legacy, because it is the BULLY, that is creating a digital footprint and legacy of hate!

     

    The previous information was extrapolated from the book, “Public and Permanent” with permission from Richard Guerry.

 

Public and Permanent® Video On Demand

Maintaining a Digital Consciousness™:
Before you or someone you know posts information to a global public platform called the World Wide Web consider this - “Am I ok with what I am doing becoming Public and Permanent®, because there are millions of ways it can be - instantly!"

 

- Learn More By Watching Videos: Click Here

 

- Learn More By Reading: Click Here

Have suggestions for improvement?  Please tell us!
---------------------------------------------------------------------------------------------------
                  Please use the scroll bar to the right
                 to review the assessment key below!

Remember, all citizens will incur some risk when using digital tools, just as we incur risks when we use tools such as cars, heat, even a drill - but using them responsibly limits our risk.

 

The Digital Risk Assessment Key:

 

Below 30 Points:  
As we become more dependent on digital technologies for both personal and professional purposes, it is virtually impossible for any of us to earn or maintain a score total of 0. The fact that you fall into this category means you are ahead of the game and do seem to be using your digital tools and technologies responsibly. 

 

By maintaining a score under 30, you reduce the chances that you will find yourself at the epicenter of a devastating digital issue or challenge. If you are near 30, see what you can do to realistically bring the number down as you are largely still in control of your digital content.


 

30 - 120 Points:  
If your Risk Spike is this high, you are at moderate to high risk of facing a digital issue like identity theft or exploitation. A risk spike this high means that your personal information, schedule, lifestyle and identity is way too easy to find and exploit. 

 

If you fall into 80 or lower, you should immediately look at what items in the assessment you can reasonably stop doing ASAP to try and bring your score down. 

 

If you are over 80 and have not yet been affected, we suggest you start working to bring down your score ASAP. You may also want to start researching all email addresses and user names you have ever used online, as well as review search engine results and results on sites like Spokeo.com and Pipl.com after searching for your real name. Finally, you may want to take a close look at your credit score.

 
120+ Points:
If your Risk Spike is 120+, we HIGHLY recommend you discuss your results with an authority figure and / or consult a cyber-safety professional. You may also want to start researching all email addresses and user names you have ever used online, as well as review search engine results and results on sites like Spokeo.com and Pipl.com after searching for your real name. 

 

If your score is 120 or higher you are at high risk to face a severe and dangerous situation.  The reason for the high risk alert here is that a score this high usually means that another person(s), besides you, is already in possession of private information and/or content that can be used to harm or exploit you. They are in control of this content - not you - and whether they intentionally (e.g. for revenge) or unintentionally (e.g. lose their device) leak your digital content or information, you will have no power or recourse to get it back or offline.

---------------------------------------------------------------------------------------------------
    Always Remember To Practice & Share
                   Public and Permanent® 

                  Change Starts With You!

Under Construction

Important: We do NOT require a log in or ask any personal information to take this assessment and we do NOT in any way capture any data from this assessment.


Cyber Risk Assessment Reference Library

Use the examples below while you go through each question of the assessment above


Assessment Question

Video Library

(Click Images To Play)

Website Links

Question 1: I Have a Personal Social Media Account...

Click here to play

Question 2: I Post My Personal Phone Number on Social Media Sites, Chat Rooms, Message Boards, etc...

Click here to play

Question 3: I Post My Home Address on Social Media Sites, Chat Rooms, Message Boards, etc...

N/A


Question 4: I Post My School / Work Address on Social Media Sites, Chat Rooms, Message Boards, etc...

N/A


Question 5: I "Check In" Online or Post "Future" Status Updates on the World Wide Web...

Click here to play

Question 6: I Think Deleting a File or Files That Are Supposed To Automatically Disappear (i.e. Snapchat) From Digital Tools Like Media Cards, Cell Phones, Computers, etc, Are Deleted Permanently...

Click here to play

Question 7: I have Anti-Malware Security Programs Installed on my Computer & Mobile Devices...

Click here to play

Question 8: I UPDATE & RUN my Anti-Malware Security Programs Daily...

Click here to play

Question 9: I Believe I Can Be Absolutely 100% Anonymous or "Private" Online...

Click here to play

Question 10: I Believe My Social Media Site Password Truly Keeps My Content Private...

Click here to play

Question 11: I've Created Digital Pictures or Videos of Myself I Would NEVER Show a Criminal, Enemy, College Review Board, Employer, Current or Future Family Member...

Click here to play

Question 12: I Do & Say Things in Front of My Webcam That I Would NEVER Show a Criminal, Enemy, College Review Board, Employer, Current or Future Family Member...

Click here to play

Question 13: I've Shared Pictures, Videos or Texts About Myself I Would NEVER Show a Criminal, Enemy, College Review Board, Employer, Current or Future Family Member...

Click here to play

Question 14: I've Harrassed or Bullied Others Online or via Digital Tools...

Click here to play

Ecommerce | Ecommerce Web Design | Ecommerce Website Design | Cookies