Difference between revisions of "Checklists; Protecting identity checklist"
m (1 revision imported) |
|||
Line 14: | Line 14: | ||
http://devsummit.aspirationtech.org/index.php?title=Protecting_Your_Organizational_Identity_Online | http://devsummit.aspirationtech.org/index.php?title=Protecting_Your_Organizational_Identity_Online | ||
+ | |||
+ | [[Category: 2014 Los Angeles]] [[Category: Process]] [[Category: Branding]] |
Latest revision as of 20:13, 4 May 2016
As nonprofits move increasingly to "the cloud", with hosted applications and online services playing a central role in their program and operations, a new category of risk exposures has emerged. From proper domain registration to ownership and management of hosted data to control of social media accounts, many organizations fail to consider the long term when they set up online presences and increase their dependency on online tools. This session will provide practical steps organizations can take to take full control of their online identity and long-term destiny.
Resources:
Aspiration Online Indentity Webinars
1. Another Cloud is Possible
2. Taking Control of Your Online Identity
https://aspirationtech.org/events/webinars/onlineid
Previous Session Notes
http://devsummit.aspirationtech.org/index.php?title=Protecting_Your_Organizational_Identity_Online