In a world of social media,

it is often way too easy to forget that our activity online doesn’t necessarily stay online, nor is it completely anonymous even when we think it might be. Everything from Instagram likes, down to the embarrassing page you liked on Facebook in 2013 can be tracked back to your name, address, or even the old iPhone 4 or Blackberry Curve you had all of those years ago. Here’s a guide on how not to sabotage your offline prospects with your online presence.

Archives.

Against popular belief, it is absolutely legal and perfectly normal for websites to keep archives of all posts created on the website. Even if you were to delete the content in question, the website may retain rights to archiving material for upto 5 years. This means that even if you delete those tweets from 2014, the website may still have possessory rights to them, and can reproduce the archive on request. If therefore, you feel as though you can produce socially insensitive or derogatory content/commentary, you may be in for a bit of an unpleasant shock.

Many occupations, especially within the public sector, as well as aerospace and travel, will often run background checks on their prospective employees, to ensure their fitness for the position in question. This is where many people lose out on attractive occupational opportunities because of a slightly less-than-polite series of tweets, a less-than-tasteful instagram caption, or an aggressively worded facebook comment. It is therefore very important to think twice before posting on social media.

Reverse Searching

As technological advances race forward, as does the potential ability for damage to be dealt with a heavy online presence. The availability of online search engines which allow reverse imaging searches has gone from serious FBI level stuff, to hundreds of websites which provide the service completely free of charge.

Catfishes beware, this can blow your cover very quickly and get you into a lot of trouble. The use of someone’s content or personal photos can be seen as theft of intellectual property, fraud, or identity theft. When reported, it often ends in the confiscation of devices with an internet connection, as well as restraining orders, probation and constant authoritative monitoring of the online presence.

What is a VPN?

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Employment Prospects

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

IP Tracking

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.