Wednesday, January 22, 2020

Web Secret 608: Digital etiquette part 2

Last week, I summarized an article in the New York Times, providing you with general principles about digital etiquette.

This week, some specifics:

Email signatures: Should you use a digital signature? It depends on what you’re trying to accomplish. If you’re selling something, include a link to whatever you’re selling. Ditto if you’re very active on social media: Include a link. An email signature can even be inspiring. The signature of TV producer Shonda Rhimes states: “Please Note: I will not engage in work emails after 7 p.m. or on weekends. IF I AM YOUR BOSS, MAY I SUGGEST: PUT DOWN YOUR PHONE.”

Direct messages. A direct message — DM — is a one-on-one conversation with another user hosted on a social media platform. Most of the places you spend your time online — like Facebook, Twitter, Instagram, Snapchat, LinkedIn and so on — offer some form of DM communication.You can DM just about anyone, whether you know them or not, without needing to know their contact information. The barrier to communicating with people outside your realm socially, professionally and geographically is shrinking. A DM is tantamount to sitting across the table from someone who has given you their time and their openness. You want to use that opportunity well.

1. Keep it short. Think a few sentences, not several paragraphs. “When DMing, give the recipient the information they need. If you’re interested in continuing the conversation, suggest moving it over to email within the first two or three messages.

2. Don’t make demands. If you’ve never sent somebody a message before, your first message to them should never be a request of them.

3. Avoid chasing someone across several platforms. Don't send DMs across multiple platforms hoping to catch the person's attention.

4. Be interesting. Use your introductory message to offer something relevant to the person you’re DMing (a video, an article), and say, “Here’s something I thought you’d find interesting.

5. Never assume this is a private exchange. Anything we write through direct messaging could become part of a public post. Act accordingly.

6. Explain why you’re reaching out. Be specific. Pose precise questions, such as, “I’m wondering about the following two things.”

7. Check your DMs regularly, especially your requests folder. This way you won’t miss out on any professional opportunities. Ninety-two percent of H.R. people use social media before making hiring decisions. DM might not be the place you sign the contract, but it could be the place you first shake hands.

8. Let people know how you’d like to be contacted. Consider sharing your email address in your social media profiles, along with a note that lets people know how you want them to connect with you and what you wish to connect over.

9. Be realistic. If you admire a person in your field or industry, chances are that other people do, too. It’s probably not personal if they don’t respond to you. You’re allowed one follow-up email if your DM is unanswered. Saying something like, “I’m sorry to bother you, but I just want to make sure that you saw that I asked you about X,”

Lastly, when using social media for work purposes, Don't use emojis. Consider using emoticons sparingly.

:)

Wednesday, January 15, 2020

Web Secret 607: Digital etiquette part 1

A basic grasp of digital etiquette is an essential aspect of modern “soft skills.” However, there is no real consensus on what actually constitutes “good” digital manners, and even if there were, that consensus would be constantly shifting as technology advances and social mores evolve.

So sayeth, the New York Times in a lengthy article on the subject. As always, I have summarized the essential information from said article:

Digital communication is usually text-based. Both the content of your message and its tone will live or die based on what you type on your keyboard, so the gap between, say, landing a joke and causing mortal offense can be perilously fine.

In digital messaging, a period is no longer required to show that the message is over; a sent message is presumed to be complete. Used in a sincere context — as in, “That’s terrible.” — the period reinforces the seriousness of the message. When used after a short, positive phrase — “That’s great.” — the tone of voice implied by the period can add a sense of sarcasm.

As in the real world, a lot of digital etiquette is highly context-dependent; you wouldn’t behave the same way when sending an email to your manager as you would when texting your best friend. As well as choosing the right level of formality for the situation, you should be prepared to adapt according to the culture and background of the person you are speaking with and the medium through which you are communicating.

In an email chain, this could mean starting with a formal means of address, such as “Dear Mr. Wesson,” but then switching to “Hi Rupert” if the conversation becomes more familiar.

There are plenty of specific digital etiquette pointers to live by: don’t reply-all to an all-office email; always get consent before sending an intimate photo; never leave a voicemail (a text message shows much more respect for the other person’s time).

Etiquette in the digital world can shift particularly quickly as new technologies and platforms call for the development of new standards.

Even where the technology stays the same, social and cultural norms can rapidly shift. It used to be OK to upload whole albums full of photos to Facebook and tag everyone in them. Now, the rise of Instagram has correlated with a more curated approach to online photo-sharing, and people are generally more aware of privacy and security concerns.

Next week, some specifics.

Wednesday, January 8, 2020

Web Secret 606: Cyber security for solo practitioners

This week's post comes courtesy of Diana Wicker, Director of Compliance and Reporting at First Sun EAP and easily the coolest person I met in 2019. She is a social worker turned Chief Technology Officer of a major EAP.

How cool is that?Here is her post:

You can do this thing.

The one thing I would like everyone reading this to take away is – you can do this thing. You can learn about and implement cyber security even as a solo practice counselor.

Step 1: Read – You won’t know what you don’t know until you start reading. Right now, the US Federal government is diligently pushing to update regulations and create guidelines and frameworks that are easily accessible and understandable so that everyone that needs to comply can do so.

A great place to start: https://www.itgovernanceusa.com/federal-cybersecurity-and-privacy-laws.

Step 2: Watch – So, you’ve done the reading and some of it is still above your head. I get that. Look for videos so that you can see how these frameworks are intended to be used. Many of the government agencies are holding webinars and releasing video tutorials on how to do these things.

A great place to start is https://www.healthit.gov/topic/privacy-security-and-hipaa.

Step 3: Attend – Cyber security is hands on, and not everyone has experience with updating settings on computers, smart phones, tablets, and other electronic equipment. Many local technical schools, colleges, and universities hold continuing education classes in computer skills.

Step 4. Do – Download and use SRA Tool 3.1. https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool This is a freebie from the federal government that helps you track:

a. HIPAA Security Rule
b. HITECH Act
c. NIST Cybersecurity Framework

Step 5: Vendors – When in doubt, hire out. IT consulting firms abound. Seek one familiar with HIPAA, HITECH, and the most up to date guidelines and frameworks so they can review your office setup and help you ensure that you have everything set up as you need it to be.

The easy things you can do with the equipment you already have:

1. Modem/Router – how the internet gets to you

• Update the name of the device to something unique.
• Change the default password that came with the device to something unique.
• Update the Firmware on your wireless router so the security patches have been completed.
• Turn off unnecessary ports and services (such as FTP servers), if they are not routinely used.
• Encryption on your router: WPA2-PSK (AES) or WPA3 (SAE)

2. Machine – how you do your work

• Encrypt your machines with a password (computer, laptop, tablet, smart phone)
• Set password or PIN for the operating system
• Turn on virus protection
• Turn on security updates
• Do not set programs, apps, or websites to auto-fill passwords to login. Use a password keeper app instead.

3. Software – where your data lives

• Set password or PIN on all software that might contain PHI (18 PHI Identifiers: https://en.wikipedia.org/wiki/Protected_health_information)
• Encrypt your data – at rest and in transmission (this means email too)
• Know what your software touches – be mindful of integrated apps and what they have access to.

4. The Cloud – 3rd party services and vendors

• Software that lives on the internet and you log into it – Get a BAA if it touches PHI.

5. Internet of Things – smart toys

• Does it listen? Does it record? Does it respond? Then it is NOT HIPAA compliant. Turn these OFF in your clinical areas!

Oh, and, heads up, just in case you missed the announcement - The FAX machine is dead.

The Centers for Medicare & Medicaid have decreed that in 2020 the FAX is no longer to be used for healthcare information. Whither the government goest, business/industry will follow. Look for a HIPAA compliant cloud fax/email service.

I know, that really looks like a lot. Take one item on the list at a time and work your way through.

And remember, you can do this thing!

Thank you Diana!

Wednesday, January 1, 2020

Web Secret 605: Tik Tok

Happy 2020.

TikTok is an app that I have no use for.

And most likely, neither do you.

But you do need to know about it.

TikTok is an app that enables you to make a very short (20 second) mobile video and add music to it. It is super easy to use and fun.

And mostly loved by teenage girls.

And owned by China.

Never heard of it? It's the mot popular app in the world (see "China").

What is China going to do with all the data it collects from Tik Tok users?

I have no idea.

But I am concerned.

And you should too.

Wednesday, December 25, 2019

Web Secret 604: OK Boomer

Merry Christmas/Happy Hanukah. My gift to my Baby Boomer readers is to understand the phrase "OK Boomer."

Know Your Meme gives the history of this expression: OK boomer is a viral internet slang phrase used, often in a humorous or ironic manner, to call out or dismiss out-of-touch or close-minded opinions associated with the baby boomer generation and older people more generally.

The exact origin of the phrase is currently unknown. The earliest instances of its use on Twitter can be traced to April 2018, with users utilizing the catchphrase to respond to tweets written by politicians and to tweets criticizing Gen Z generation and Millennials.

The catchphrase did not see significant spread until January 2019.

Starting in mid-January 2019, the image received spread on Twitter as a reaction and was reposted on multiple Instagram accounts.

Through 2019, the catchphrase saw extensive use in memes on Instagram, iFunny, Reddit and other social networks and maintained popularity as a reaction, primarily used to mock and debase opinions offered by baby boomers and older people in general.

On October 29th, 2019, The New York Times published an article "'OK boomer' Marks End of Friendly Generational Relations", reporting about the meme.

Per the New York Times:

"“Ok boomer” has become Generation Z’s endlessly repeated retort to the problem of older people who just don’t get it, a rallying cry for millions of fed up kids. Teenagers use it to reply to cringey YouTube videos, Donald Trump tweets, and basically any person over 30 who says something condescending about young people — and the issues that matter to them....

“The older generations grew up with a certain mind-set, and we have a different perspective...A lot of them don’t believe in climate change or don’t believe people can get jobs with dyed hair, and a lot of them are stubborn in that view. Teenagers just respond, ‘Ok, boomer.’ It’s like, we’ll prove you wrong, we’re still going to be successful because the world is changing.”


And now you know.

How you use this knowledge is up to you, but I didn't want you to enter 2020 without knowing.

Wednesday, December 18, 2019

Web Secret 603: Secret consumer score

Call me horrified, but it appears little-known companies are amassing your data and selling the analysis to clients.

Last month, a New York Times article said we all have “secret scores”: hidden ratings that determine how long each of us waits on hold when calling a business, whether we can return items at a store, and what type of service we receive. A low score sends you to the back of the queue; high scores get you elite treatment.

These systems are largely invisible to the public, most people have no inkling they even exist. As an example, a company called Sift has a proprietary scoring system that tracks 16,000 factors for companies like Airbnb and OkCupid. Sift judges whether or not you can be trusted.

Great.

The companies gathering and paying for this data find it extremely valuable for rooting out fraud and increasing the revenue they can collect from big spenders. Sift has this data because the company has been hired by Airbnb, Yelp, and Coinbase to identify stolen credit cards and help spot identity thieves and abusive behavior. Still, the fact that obscure companies are accumulating information about years of our online and offline behavior is unsettling, and at a minimum it creates the potential for abuse or discrimination — particularly when those companies decide we don’t stack up.

As of this past summer, though, Sift and other similar companies must produce your file upon request.

Here's how to get your data:

Sift asks you to email privacy@sift.com.

Zeta Global, which identifies people with a lot of money to spend, lets you request your data via an online form.

Retail Equation, which helps companies such as Best Buy and Sephora decide whether to accept or reject a product return, will send you a report if you email returnactivityreport@theretailequation.com.

Riskified, which develops fraud scores, will tell you what data it has gathered on your possible crookedness if you contact privacy@riskified.com.

Kustomer, a database company that provides what it calls “unprecedented insight into a customer’s past experiences and current sentiment,” tells people to email privacy@kustomer.com.

Just because the companies say they’ll provide your data doesn’t mean they actually will.

Fantastic.

Wednesday, December 11, 2019

Web Secret 602: Euphoria

I had no intention of watching the HBO series "Euphoria."

From the trailer, it looked like an updated "Beverly Hills 90210"about angsty, unrealistically attractive, upper middle class teenagers - with more graphic sex and drug use. - because "hey, it's 2019."

But my 25 year old son, (who is either a very young Millennial, or a very old Gen Z,) assures me this is not the case.

It appears Euphoria can serve as a field trip to understand what Gen Z is all about.

Gen Z. They are the children born in the ashes of 9/11. Cursed from the start. One of the major characters in the series deadpans "The world’s coming to an end and I haven’t even graduated high school.”

One day after work, my son asked an 18 year old intern, (from Idaho no less,) if that is what she believes.

She said yes, without any hesitation. Her generation will suffer the consequences of climate change, the imminence of mass extinction events. A decline in living standards. Insurmountable college debt.

Now I'm going to watch it.