Common Social Media Profile Picture Mistakes

Consultsweb Logo

How you present yourself on social media can either draw clients to you, or send them packing.

What’s the first thing you notice about someone’s social media account? Their profile picture. There are over 645 million active Twitter users, 829 active daily users on Facebook, and over 200 million users on Instagram. Profile pictures are the first thing any of these users will see when your account is searched or suggested on social platforms, so it is vital that your picture send the right message.

Do’s and Don’ts of social media profile pictures:

DON’T make yourself so far away that the person has to play a strategic game of “Where’s Waldo” just to identify you.

Where's Waldo

DON’T filter your picture so heavily so that the viewer can’t even imagine what the original looked like.

Filter 2

DON’T pose like you’re on the cover of a magazine. There is a time and a place for glamour shots, but your professional profile is not it.

Model

DON’T set your profile image as a picture of you and your spouse. Marriage is a beautiful thing, but this is your profile, not yours and your significant other’s.

Spouse

DON’T make your profile picture your firm’s logo. While it is important to gain exposure for your firm, your profile picture isn’t the ideal place to do so. A profile picture should personalize you as an attorney. You can, however, put something like a logo as your cover photo so that it is the background to your profile image.

Logo

DON’T leave your image as the default, such as the signature Twitter egg. Doing this will not only look impersonal, but also come off like you didn’t care enough to put in the effort to change the photo.

Twitter egg

DO follow these guidelines for profile pictures:

Profile Picture

  • Crop the picture so it is an up-close, professional shot of your face.

  • Make sure it is well-lit and that you’re looking directly at the camera.
  • Smile! This can showcase how personable you are and also be inviting to the people who see it.
  • Don’t have anything directly behind you; it is ideal to have professional head shots in front of a green screen.
  • Your profile picture needs to be large enough that it can be recognized without actually having to click on the image. Be mindful of general size requirements across social media networks.

ARTICLE BY

OF

How to Build Trust Online by Being Human

The Rainmaker Institute

All you have to do is troll your own Facebook or LinkedIn account to know that there is LOTS of content online.

In fact, a recent post at Buffer.com noted that more content is published every day on Facebook than is found in every book published in human history!

Building Blocks with Trust

So how do you stand out from that enormous crowd and earn the trust you need to succeed with your social media marketing program?  Buffer provides these tips:

Use personal pronouns.  Using personal pronouns in your posts — I, we, you, me, etc. — and being more conversational elicits empathy from an audience, getting  you a better response.

Use simple words.  By using simple words, you can convey your idea in a way that people don’t have to think about before understanding it.  Big words and legalese will tend to alienate people, not draw them in.

Use stories.  Since the beginning of time, humans have communicated by telling stories and the propensity to listen to a story is ingrained in our DNA.  A Buffer study showed that adding a story to your blog post can increase readership by 300%.

Use contemporary culture references.  Weaving a pop culture reference or two into your post, especially if you’re able to add a celebrity name or two like Beyoncéor George Clooney (see how I did that?), helps boost readership and interest.

Use the Shaq Rule.  Shaquille O’Neal is a social media powerhouse, with a Twitter following of 8.5 million and 4.7 million Facebook fans.  His rule for posting is that 80% of his posts must be entertaining, 15% must be informative and only 5% should sell something.  People can sniff out a sales pitch online immediately, and just as quickly they are on to the next thing.

ARTICLE BY

OF

Grow Your Email List for Free in 5 Simple Steps

The Rainmaker Institute

Lots of law firms struggle with compiling and maintaining a robust email marketing list, and they really struggle with how to keep adding qualified names to help them build a better list.  If you are recognizing yourself as you read this, then the good news is that you can actually build a great list for your firm and it doesn’t need to cost you a dime.

Here are five simple steps you can take to keep growing that important list of people you want to market to:

Grow Your Email List for Free in 5 Simple Steps, Money Tree

1.  Provide something of value.   Take the top 5 or 10 questions that clients ask you most often, write down the answers and turn that content into an e-book or report.  Post this on your website and blog and offer it as a free download to people who provide you with their name and email address.  The people who take you up on your offer are good prospects since they are clearly interested in the kind of problems you solve.  Add their names to your email marketing list to continue the conversation.

2.  Tell them what to do.  Your e-newsletter, your website and your blog should always contain easy-to-find calls-to-action that invite readers to subscribe, download a free report, make an appointment for a free consultation — anything you’d like them to do that could lead to business for you.  All your calls-to-action need to be simple and have the ability to collect email addresses for you.

3.  Keep reviewing your offers.  If your readers are not responding well to your calls-to-action or offers, then what you are offering is clearly not appealing to them.  First be sure that they are easy to understand.  If you’re still not getting a good response, change up your offers.  You should do this anyway every few months to keep things fresh.

4.  Use social media.  Using social media to spread the word about your valuable content and offers is a great way to attract more prospects that you might have otherwise missed.   LinkedIn groups are a great way to spread the word, but be sure you’re not being too promotional too often.

5.  Pay attention to the analytics.  You can gain valuable insight into what people are responding to on your website and in your e-newsletter by scouring the statistics.  Google Analytics is a free add-on for your website and blog and provides great information on what pages people are spending time on, and what isn’t working so well.  If you use Constant Contact or a similar service for your e-newsletters, these services provide information on how many people opened and read your newsletter and what they clicked on. 

By using these five simple steps, you are not just adding names to your list, you are getting truly qualified leads for your marketing efforts.

ARTICLE BY

 
OF

Analog in a Digital World: Journalism and Blogs and Where to find Good Information

Bracewell & Giuliani Logo

In an article profiling John R. MacArthur, the publisher of Harper’s Magazine, MacArthur is quoted as saying, “I’ve got nothing against people getting on their weblogs, on the Internet and blowing off steam. If they want to do that, that’s fine. But it doesn’t pass, in my opinion, for writing and journalism.” The article goes on to note that MacArthur is “analog in his habits” because he “prints out articles to read” and that “[h]is version of searching for [a fact] on Google was yelling to a staff member, who hurried to deliver the information.”

McArthur certainly expresses a sympathetic position. A 24-hour news cycle has contributed to an environment where airtime needs to be filled – recent examples of well-publicized overexposure include CNN’s coverage of the Malaysian Air disappearance or the Casey Anthony trial. And because anyone with an internet connection and a Twitter account can “break” news, there is a race to the bottom as to which organization can print the news first as opposed to which can report it most accurately. The inevitably incendiary rush to judgment after the report of a rumor reported as fact seems only to support MacArthur’s position.

But where MacArthur and I part ways is in our view of what blogs or “lighter” commentary may provide. Instead of web commentary offered as simply “blowing off steam,” the internet is more of a tray of samples. You can try a little of anything, and if you’d like more, then that’s available to you as well.

That’s really the beauty of the internet, right? You can critique Buzzfeed’s lists, but they are a quick read that provide you with the opportunity to read more – possibly even from a true “writing and journalism” source. I mean, no one would think to use this blog exclusively as a defense to criminal charges or as any sort of compliance manual. But ideally, it would help you spot issues or pique your interest so that you read more on a particular topic, consult with counsel, or find a way to improve your workplace.

I like to think about the internet like a newspaper with only headlines. I can get the gist of the story from the headline, and if I’m interested, I can read more. (Example: “Salmon Spawning in Seattle” will not encourage me to read further. But hit me with “Cowboys Sweep Eagles, Giants” and I’m 100 percent in.)

MacArthur and I simply diverge on this implied concept that analog habits are somehow better than digital habits. Perhaps it is the trial lawyer side of me, but I try to be open to ways in which you can convey information. People learn in a variety of different ways: some learn by hearing, some learn by seeing, some learn by doing. Some have longer attention spans; some give hummingbirds a run for their money. So the more ways that you can find to reach people, the better odds of success you have in conveying information that they can use.

And that’s the takeaway point here (yay!). Imagine if your organization disseminated a ten-page written policy on what to do if a federal agent knocks on the door. That’s some important information right there. Is everyone going to read and understand it? Unlikely, right? Too busy to get to it right now, will read it tomorrow, and so on? Yup, that’s the MacArthur way. It just doesn’t work by itself.

Okay, change it up. Skip the written policy and instead conduct a 10-minute training session covering the key facts. Have you taught everyone everything they need to know? Probably not, but  you hit the high points. Even if a couple of folks dozing in the back of the room missed it. Right. That would be the Buzzfeed way. This doesn’t work by itself, either.

So instead, disseminate the policy to everyone, and you’ll capture the folks who learn by reading. And conduct your training session, and you’ll capture those folks who learn by listening. And then, as a bonus, rehearse the drill, so you capture those folks who learn by doing. It’s the last piece that most organizations miss, and thereby miss a huge opportunity to make sure their people understand the policies and that their policies actually work.

You can be analog like MacArthur or digital like Buzzfeed. But really effective communication is a blend of both … and just a touch more.

 
OF

Google, the House of Lords and the timing of the EU Data Protection Regulation

Mintz Levin Law Firm

(LONDON) Could the European Court of Justice’s May 13, 2014 Google Spain decision delay the adoption of the EU Data Protection Regulation?

In the Google Spain “Right to be Forgotten” case, the ECJ held that Google must remove links to a newspaper article containing properly published information about a Spanish individual on the basis that the information is no longer relevant.  The Google Spain decision has given a much sharper focus to the discussion about the Right to be Forgotten that may soon be adopted as part of the new Data Protection Regulation that is expected to be passed sometime in 2015.  With the advent of the Google Spain decision, an issue that was on the sideline for most businesses – and which was expected by some to be quietly dropped from the draft Data Protection Regulation – has become a hot political issue.  The Right to be Forgotten as interpreted by the ECJ has garnered international attention, deepened the UK/continental EU divide, and ultimately could delay the adoption of a final form of the Data Protection Regulation.

The Google Spain case has been controversial for various reasons.  The decision takes an expansive approach to the long-arm reach of EU data protection law.  It holds search engine providers liable to comply with removal requests even when the information in the search results is true, was originally published legally and can continue to be made available by the original website.  The decision makes the search engine provider the initial arbiter of whether the individual’s right to have his or her information removed from publically available search results is outweighed by the public’s interest in access to that information.   (For a pithy analysis of the “public record” aspects of the case, see John Gapper’s “Google should not erase the web’s memory” published in the Financial Times.)

Google started implementing the ruling almost immediately, but only with respect to search results obtained through the use of its country-specific versions of its search engine, such aswww.google.es or www.google.co.uk.  The EU-specific search engine results notify users when some results have been omitted due to EU’s Right to be Forgotten.  (See the Telegraph’s ongoing list of the stories it has published that have been deleted from Google.co.uk’s search results to get a flavor of the sort of search results that have been deleted.)  However, the “generic” version of Google (www.google.com), which is also the default version for users in the US, does not omit the banned results.

Google has been engaged in an ongoing dialogue with EU data protection authorities regarding Google’s implementation of the Google Spain ruling.  According to some media reports, EU officials have complained that Google is implementing the ruling too broadly, allegedly to make a political point, while other commentators have noted that the ruling give Google very few reference points for performing the balancing-of-rights that is required by the ruling.  Perhaps more interestingly, some EU officials want Google to apply the Right to be Forgotten globally (including for google.com results) and without noting that any search results have been omitted (to prevent any negative inferences being drawn by the public based on notice that something has been deleted).  If the EU prevails with regard to removing personal data globally and without notice that the search results contain omissions, critics who are concerned about distortions of the public record and censorship at the regional level will have an even stronger case.   Of course, if truly global censorship becomes legally required by the EU, it seems likely that non-EU governments and organizations will enter the dialogue with a bit more energy – but even more vigorous international debate does not guarantee that the EU would be persuaded to change its views.

The ongoing public debate about the potentially global reach of the Right to be Forgotten is significant enough that it could potentially delay agreement on the final wording of the Data Protection Regulation.  Recently, an important committee of the UK’s House of Lords issued a report deeply critical of the Google Spain decision and the Right to be Forgotten as enshrined in the draft Data Protection Directive. Additionally, the UK’s Minister of Justice, Simon Hughes, has stated publically that the UK will seek to have the Right to be Forgotten removed from the draft Data Protection Regulation.  The impact of the UK’s stance (and the efforts of other Right to be Forgotten critics) on the timing of the adoption of the Regulation remains to be seen.  In the meantime, search companies will continue to grapple with compliance with the Google Spain decision.  Other companies that deal with EU personal data should tune in as the EU Parliament’s next session gets underway and we move inevitably closer to a final Data Protection Regulation. 

ARTICLE BY

 
OF 

Microsoft Ordered to Hand Over Data to the U.S. Government

Proskauer Law firm

In April, Microsoft tried to quash a search warrant from law enforcement agents in the United States (U.S.) that asked the technology company to produce the contents of one of its customer’s emails stored on a server located in Dublin, Ireland. The magistrate court denied Microsoft’s challenge, and Microsoft appealed. On July 31st, the software giant presented its case in the Southern District of New York where it was dealt another loss.

U.S. District Judge Loretta Preska, after two hours of oral argument, affirmed the magistrate court’s decision andordered Microsoft to hand over the user data stored in Ireland in accordance with the original warrant. Microsoft argued that the warrant exceeded U.S. jurisdictional reach. However, the court explained that the decision turned on section 442(1)(a) of Restatement (Third) of Foreign Relations. The provision says that a court can permit a U.S. agency “to order a person subject to its jurisdiction to produce documents, objects or other information relevant to an action or investigation, even if the information or the person in possession of the information is outside the United States.” Because Microsoft is located in the U.S. , the information it controlled abroad could be subject to domestic jurisdiction.

Microsoft had the support of large U.S. technology companies, including Apple, AT&T and Verizon. The larger issue for these companies lies in the U.S. government’s power to seize data and content held in the cloud and stored in locations around the world. When a conflict arises between the data sharing laws of the country where the servers are located and U.S. law, it can put these companies in the difficult position to choose to follow one country’s laws over the other.

Microsoft further argued that the ramifications for international policy are substantial. The company argued that compelling production of foreign stored information was an intrusion upon Irish sovereignty. It said that the decision could be interpreted by foreign countries as a green light to make similar invasions into data stored in the U.S. However, Judge Preska dismissed these concerns as diplomatic issues that were incidental and not of the court’s immediate concern.

The order has been stayed pending appeal.

ARTICLE BY

 
OF 

New Jersey Suit Against School District Regarding Tweet Settles

Jackson Lewis Law firm

As previously reported, in a March 2014 filing titled H.W. v. Sterling High School District, a New Jersey high school student filed suit claiming school officials had violated her constitutional rights when they punished her for content she posted on Twitter which criticized Sterling High School’s principal.

twitterThe settlement, which was approved by the Sterling High School District in April and entered by the Court on July 29, 2014, provides that the district will reimburse the student $9,000 for her legal fees.   However, the district will not pay additional damages to the student.  In addition, the school district agreed to revoke punishments imposed against the student for her Twitter postings, expunge documents related to the incident from the student’s academic record, and abandon its attempted requirements for drug testing of the student.  Specifically, the agreement provides that the student is eligible for graduation upon completion of outstanding assignments, is allowed to attend the senior class trip to Florida, and if the student does not seek press coverage or disclose the settlement terms she will be allowed to participate in prom and the graduation ceremony.

Beyond agreements directly between the school district and the student, the settlement also calls of the school to modify its student handbook to specify that administrators “may be monitoring student discussions on Facebook, Twitter or other social media outlets and may seek to impose penalties in accordance with the student code of conduct if such discussions cause a substantial disruption at the school.”

ARTICLE BY

 
OF 

HTTPS – Should I Implement It on My Site?

Consultsweb Logo

Google announced last Wednesday, August 6, that the search engine will use https as a ranking signal. HTTPS stands forHypertext Transport Protocol Secure, which protects the data integrity and confidentiality of users visiting a site. For example, when a user enters data into a form on a site in order to subscribe to updates or purchase a product, a secure site protects that user’s personal information and ensures that the user communicates with the authorized owner of the site. For the HTTPS connection to work properly, websites require an SSL certificate, which is what enables the site to make a secure connection.

HTTPS Hypertext Transport Protocol Secure

Even though Google is making this change, it is not something that webmasters should jump into lightly. Webmasters should implement https only when they really need it and have sections in their site where they need to protect their visitors’ information.

Before making any drastic changes to the site, it is important to take into consideration that Google stated that this change will affect less than one percent of queries, carrying less weight than other signals such as high-quality content.

Cons of using https

  • Up until this recent announcement, it was recommended only using https on the sections of the site that needed to protect the confidentiality of user data, such as payment forms that collected credit card information, the site’s login section or any page that would sends/receive other private information (such as street address, phone number or health records), because using https in the whole site can overload webservers and make sites slower, which affects negatively on a site’s ranking.
  • Changing to https also means that all of the URLs in your site will change and it will be necessary to redirect all of the URLs on the site, so that they can be indexed by Google and avoid having duplicate content between https and http URLs. Redirects usually increase the load time of the site, which can be negative ranking factor and reduce the link juice coming from external sites pointing to http URLs.
  • SSL certificates cost money, and certificates signed by well-known authorities can be expensive.

I advise against making an immediate decision to change to https because it is a recent change and apparently the effort to switch exceeds the benefit obtained in rankings. Right now it is better to stand back and observe how the change affects those sites that alter their URLs to https.

 

ARTICLE BY

OF

Generic Top Level Domains – Current Sunrise Periods Open – August 2014 Update

Sterne Kessler Goldstein Fox

As first reported in our December 2013 newsletter, the first new generic top-level domains (gTLDs, the group of letters after the “dot” in a domain name) have launched their “Sunrise” registration periods.  Please see our December 2013 newsletter for information as to what the Sunrise Period is, and how to become eligible to register a domain name under one of the new gTLDs during this period.

As of the date of this newsletter, Sunrise periods are open for the following new gTLDs:

.dental

.surgery

.hiphop

.audio

.yokohama

.juegos

.fund

.cash

.tax

.investments

.bio

.desi

.furniture

.discount

.fitness

.schule

.gratis

.website

.creditcard

.claims

.press

.host

.global

.okinawa

.xn—io0a7i (网络 – Chinese for “network”)

.xn—55qx5d (公司 – Chinese for “company”)

.reise

.bayern

.durban

.joburg

.capetown

.accountants

.digital

.finance

.insure

.ren

.xn—cg4bki (삼성 – Koreanfor “Samsung/Samseong”)

.republican

.guide

.loans

.church

.life

.surf

.beer

.hamburg

.scot

.place

.direct

.saarland

.hiv

.deals

.BLACK

.soy

.city

.attorney

.lawyer

.melbourne

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ICANN maintains an up-to-date list of all open Sunrise periods here.  This list also provides the closing date  of the Sunrise period.  We will endeavor to provide information regarding new gTLD launches via this monthly newsletter, but please refer to the list on ICANN’s website for the most up-to-date information – as the list of approved/launched domains can change daily.

Because new gTLD options will be coming on the market over the next year, brand owners should review the  list of new gTLDs (a full list can be found here) to identify those that are of interest.  

 

Firewall on the Hill: The Cybersecurity Information Sharing Act

Morgan Lewis logo

U.S. Treasury Secretary Jack Lew is urging Congress to pass legislation to bolster the country’s cyber defenses. The proposed bill—the Cybersecurity Information Sharing Act of 2014 (CISA)—may unleash a brute-force attack in the cyber war, but opposition based on privacy and civil liberties concerns could stop the bill dead in its tracks.

The CISA would enable companies to

  • share information with one another, including an antitrust exemption for the exchange or disclosure of a “cyber threat indicator,” which is broadly defined and includes information that indicates any attribute of a cybersecurity threat;
  • share information with the federal government, including the absence of any waiver of privilege or trade-secret protection and the retained ownership of the disclosed information;
  • launch countermeasures and monitor information systems under broad sets of circumstances, potentially expanding the information to be shared; and
  • monitor and share the information under an umbrella of protection from liability relating to the permitted activities, including a good-faith defense (absent gross negligence or willful misconduct) for activities not authorized by the CISA.

The CISA includes some protections for individuals. Namely, the U.S. Attorney General would develop governing guidelines to limit the law’s effect on privacy and civil liberties. Moreover, companies would be required to remove information that is known to be personal information (and not directly related to a cybersecurity threat) before sharing a cyber threat indicator.

In sum, companies could decide to share a wealth of information with one another and with the federal government if the CISA is passed, when sharing personal information depends on the reach of any future guidelines. If an extensive information-sharing program materializes, and there is at least a perception that sensitive personal information is being shared, companies could feel pressure from customers and advocacy groups to disclose their CISA activities and policies in their privacy statements. Companies should stay informed about developments in cybersecurity legislation, but the potential fallout regarding privacy could substantially weaken or postpone any new system. For every cybersecurity legislative effort, there will be bold countermeasures.

ARTICLE BY

OF: