Adobe Social Security Overview

Total Page:16

File Type:pdf, Size:1020Kb

Adobe Social Security Overview Social Security Overview White Paper Adobe Social Security Overview Adobe Security At Adobe, we take the security of your digital assets seriously. From our rigorous integration of security into our internal software development process and tools to our cross-functional incident response teams, we strive to be proactive and nimble. What’s more, our collaborative work with partners, researchers, and other industry organizations helps us understand the latest threats and security best practices, as well as continually build security into the products and services we offer. This white paper describes the proactive approach and procedures implemented by Adobe to help increase the security of your data and Adobe® Social experience. Table of Contents About Adobe Social 1 Adobe Security Adobe Social is a social management platform that ties data to your bottom line. A part of the Adobe 1 About Adobe Social Marketing Cloud suite of services, Adobe Social goes beyond just likes and follows to manage the deep 1 Adobe Social Application relationship between your customers’ sentiments and your business goals. With Adobe Social, you can Architecture 2 Adobe Social Application monitor and moderate conversations, publish and promote content, and analyze engagement and Security and Network conversion data in a single, mobile-friendly interface. What’s more, Adobe Social lets you truly measure Architecture the impact of your social content by automatically attaching tracking codes to each piece of content, 3 User Authentication via enabling you to identify what activities drive engagement and conversion. And with integration with Adobe Marketing Cloud other Adobe Marketing Cloud services, you can use these social insights to improve targeting strategies 4 Adobe Social Hosted Data Centers and optimize the customer experience. 4 Adobe Social Network Management Adobe Social Application Architecture 6 Adobe Social Administrative Security Features The Adobe Social solution includes four (4) components: 7 Adobe Social Moderation • Listening: Collects and categorizes public and private social data. The Listening component collects Component Hosting social data through the Twitter API and directly from other social networks (including Facebook, 7 Operational Responsibilities Google+, YouTube, LinkedIn, and Sina Weibo) and then sends all collected data through a categoriza- of AWS and Adobe tion engine. This engine checks for spam, categorizes emotion, determines language, categorizes 7 Secure Management sentiment, and adds geographic data. The categorized data is then stored where it can be accessed by 8 About Amazon Web Services (AWS) other systems via API calls and, when appropriate, sent to Adobe Analytics and other data sources for 9 The Adobe Security reporting purposes. Organization 10 Adobe Secure Product • Publishing: Proactively publishes social network communications, such as Facebook posts, Twitter Development tweets, Google+ content, YouTube videos, LinkedIn post, and Sina Weibo posts either immediately or 11 Adobe Security Training on a customer-defined schedule. The Publishing component tracks incoming social data against 11 Adobe Common Controls published content and any other content that has been specifically configured for tracking by the Framework customer. Security and group management allow different users of an organization to be set up with 11 Adobe Risk & Vulnerability different roles within a social network. Other functionality includes reports and dashboards, as well as Management a URL shortening service. All social content is provided in a single application, which handles authenti- 12 Adobe Corporate Locations 13 Adobe Employees cation, navigation, and the framework UI. 14 Conclusion • Moderation: Enables the customer’s social community manager to react to social data, develop a social data feed based on specific filters, and interact with the company’s consumers or users on all defined social feeds. The social community manager can view, reply, retweet, escalate, prioritize, mark as spam, and star any social interactions that come in through the defined feeds. Additionally, the manager can pull up additional user profile information to add comments and store internally. • Social Analytics: Collects, processes, and reports insights and metrics related to social content. Social content is composed of user-generated content (e.g., Tweets and posts by consumers or users of the brand) and owned content (e.g., Tweets and posts generated by the brand itself). Adobe Social tracks three (3) types of analytics: – Property Analytics — Includes insights related to Facebook pages, Twitter handles, YouTube channels, LinkedIn profiles, Google+ pages, Sina Weibo handles (i.e., properties owned by the Adobe customer); – Post Analytics — Allows the customer to view and report on insights based on posts originat- ing from customer-owned social properties; and – Social Buzz — Creates a report based on customer-defined terms, including graphs, posts, tracked terms, and mentions by platform and by geography. By default, the report shows data for the last 12 hours, but this timeframe can be changed by the customer. Adobe Social maintains 30 days of verbatim posts. Data from Social Buzz can also be sent to Adobe Analytics for deeper analysis and reporting. Customer User Interface Feed Data & Cong Social Publishing Data Store Content & Reports Moderation Reactive Listening Publishing Analytics Responses Collect & Scheduled Social Buzz Create Feeds Categorize Publishing Post Analytics Escalation Public Data Real-time Workow Collection Publishing Property Analytics Dashboard Data Publishing Overview Processing Approval Adobe Analytics Workows Integration Manage Data Feed Rules Categorization Content Calendar Auto-Delete Data Storage External Social Platform Data Figure 1: The Adobe Social product architecture and data flow Adobe Social Application Security and Network Architecture Adobe Social Data Flow Adobe Social collects social content in two primary ways: It collects Twitter public content via GNIP and other social network content (e.g., Facebook, LinkedIn, YouTube, Google+, and Sina Weibo) directly via API calls. Adobe Social collects the raw data from each social network and pushes this data into a queuing system for internal processing on Adobe servers. All content deemed to come from social properties owned by the Adobe customer (the customer’s Facebook account or Twitter handle, for example) is also sent to Adobe Analytics. Social Security Overview White Paper 2 After collecting the social content, the Listening component sends all data through a categorization engine, which checks for spam, categorizes emotion, determines language, categorizes sentiment, and adds geographic data. The content is then stored in an Adobe Social database on one of Adobe’s servers. If the content is determined to be customer-owned, it is sent via HTTPS API endpoints to Adobe Analytics for further analysis and reporting. The data is sent to the specific data center to which the customer is assigned based on Adobe Analytics. The Publishing component of Adobe Social enables customers to create, schedule, and publish social content from a single dashboard. The customer creates the schedule and workflow (e.g., author and approver) in the component’s user interface. These schedules and workflows are synced to the Adobe Social servers. When a scheduled submission is ready for posting, the server sends the selected content to the Publishing back end, which then publishes the content to the selected social network. The URL shortening service within Adobe Social launches when a user clicks a shortened URL. The long URL includes the Adobe Analytics Campaign ID and redirects the user to the actual customer website. The customer website then forwards the included Campaign ID and data directly to Adobe Analytics for tracking and metrics. The Moderation component pulls social content from the Social database as well as receives Twitter Direct Messages and profile information directly from Twitter APIs. Social content is pulled based on listening rules defined by the customer. The Moderation component can also communicate back to Twitter and update the Social database with events and information. As social content comes in, it is filtered based on the defined feed criteria and is stored in the database. Customers view their social feeds through the Moderation UI, which allows them to engage with users and take action—such as reply, retweet, etc.—on certain feed events, which are either sent back via the Twitter API (for immediate posting) or pushed into the Publishing component (for scheduled posting). User Authentication via Adobe Marketing Cloud Access to Adobe Social requires authentication with username and password. For users accessing Adobe Social using Adobe IDs, Adobe leverages the SHA 256 hash algorithm in combination with password salts and a large number of hash iterations. We continually work with our development teams to implement new protections based on evolving authentication standards. Users can access Adobe Social in one of three (3) different types of user-named licensing: Adobe ID is for Adobe-hosted, user-managed accounts that are created, owned, and controlled by individual users. Enterprise ID is an Adobe-hosted, enterprise-managed option for accounts that are created and controlled by IT administrators from the customer enterprise organization. While the organization owns and manages the user accounts and all associated assets, Adobe hosts the
Recommended publications
  • A Longitudinal Study of Facebook, Linkedin, & Twitter
    Session: Tweet, Tweet, Tweet! CHI 2012, May 5–10, 2012, Austin, Texas, USA A Longitudinal Study of Facebook, LinkedIn, & Twitter Use Anne Archambault Jonathan Grudin Microsoft Corporation Microsoft Research Redmond, Washington USA Redmond, Washington USA [email protected] [email protected] ABSTRACT messaging, and employee blogging were first used mainly We conducted four annual comprehensive surveys of social by students and consumers to support informal interaction. networking at Microsoft between 2008 and 2011. We are Managers, who focus more on formal communication interested in how these sites are used and whether they are channels, often viewed them as potential distractions [4]. A considered to be useful for organizational communication new communication channel initially disrupts existing and information-gathering. Our study is longitudinal and channels and creates management challenges until usage based on random sampling. Between 2008 and 2011, social conventions and a new collaboration ecosystem emerges. networking went from being a niche activity to being very widely and heavily used. Growth in use and acceptance was Email was not embraced by many large organizations until not uniform, with differences based on gender, age and the late 1990s. Instant messaging was not generally level (individual contributor vs. manager). Behaviors and considered a productivity tool in the early 2000s. Slowly, concerns changed, with some showing signs of leveling off. employees familiar with these technologies found ways to use them to work more effectively. Organizational Author Keywords acceptance was aided by new features that managers Social networking; Facebook; LinkedIn; Twitter; Enterprise appreciated, such as email attachments and integration with calendaring. ACM Classification Keywords Many organizations are now wrestling with social H.5.3 Group and Organization Interfaces networking.
    [Show full text]
  • Social Media Usage and Cultural Dimensions: an Empirical Investigation
    Proceedings of the 50th Hawaii International Conference on System Sciences | 2017 Social Media Usage and Cultural Dimensions: An Empirical Investigation Majid Dadgar Joseph Vithayathil John Kalu Osiri University of San Francisco Washington State University University of Nebraska-Lincoln [email protected] [email protected] [email protected] Abstract information technology and organizational studies can benefit each other by exchanging and analyzing the Cultural attributes of employees affect organizations in socio-material properties of their subject matter. The several different ways through their impact on organizational social media literature has focused organizational goals and decision-making processes. mainly on disciplinary or domain-based research. Such Social media create ample opportunities for focus may have hindered possibilities of investigating organizations to improve competitiveness and efficiency such important interdisciplinary questions [27]. of marketing and communications. We empirically Social media create a variety of new opportunities investigate the impact of employee cultural dimensions for organizations which are not managed well to on social media usage at work and at home. Such a study improve [21]. Organizations can use social media to stay has not been undertaken before to the best of our competitive and improve the efficiency of marketing knowledge and this would be the first study to connect and communications [1,2,3,10,17,18,25,29]. Employees cultural dimension characteristics of individuals with use different types of social media platforms in their social media usage. Specifically, we investigate the professional and personal lives, and their use of social effect of Power Distance (PD), Uncertainty Avoidance media can have an impact on various organizational (UA), and Individualism-Collectivism (IC) on the use of goals and strategies [20].
    [Show full text]
  • Australian Employer Perceptions of Unprofessional Social Media Behaviour and Its Impact on Graduate Employability
    The Journal of Teaching and Learning for Graduate Employability ISSN: 1838-3815 (online) Journal Homepage https://ojs.deakin.edu.au/index.php/jtlge/ Australian employer perceptions of unprofessional social media behaviour and its impact on graduate employability Karen Sutherland1, Karen Freberg2 and Christina Driver1 Corresponding author: Karen Sutherland ([email protected]) 1University of the Sunshine Coast, Queensland, Australia 2University of Louisville, Kentucky, USA Abstract Social media has become a tool used for the process of employee recruitment in a range of Keywords industries. The technology is utilised by job candidates and by employers and job-recruiters social media, to screen and source suitable staff for their organisations. Research has investigated issues job-recruitment, relating to ethics, privacy and accuracy regarding employers’ use of social media to screen employability, prospective employees. Yet, limited research has been conducted to investigate employer professional perceptions of prospective/current employees’ unprofessional social media behavior. Our behaviour, study involved a survey of 396 Australian employers from a range of industries to explore the employment, influence of job-candidates’ social media presence on employer decision-making and the personal most unprofessional social media behaviors according to employers. Our investigation found branding 82% of employers are influenced by a job candidate’s social media presence and using social media to intentionally cause harm to others was perceived by employers as the most unprofessional social media behavior. The findings from this study will assist educators in guiding university students and graduates to meet industry expectations as professionals and provide scholars with new knowledge as to what is deemed to be unacceptable behavior in a professional context at this point in the evolution of social media.
    [Show full text]
  • Avatara: OLAP for Web-Scale Analytics Products
    Avatara: OLAP for Web-scale Analytics Products Lili Wu Roshan Sumbaly Chris Riccomini Gordon Koo Hyung Jin Kim Jay Kreps Sam Shah LinkedIn {lwu,rsumbaly,criccomini,gkoo,ekim,jkreps,samshah}@linkedin.com ABSTRACT queries. This means expensive operations like joins can be precom- Multidimensional data generated by members on websites has seen puted. Additionally, queries span relatively few—usually tens to massive growth in recent years. OLAP is a well-suited solution for at most a hundred—dimensions. These queries, and consequently, mining and analyzing this data. Providing insights derived from the cubes, can be sharded across a primary dimension. For WVMP, this analysis has become crucial for these websites to give members we can shard the cube by member id, as the product does not allow greater value. For example, LinkedIn, the largest professional social analyzing profile views of anyone other than the member currently network, provides its professional members rich analytics features logged in. Similarly, for WVTJ, the cube can be sharded by the job like “Who’s Viewed My Profile?” and “Who’s Viewed This Job?” itself because queries do not span across jobs. Each shard contains The data behind these features form cubes that must be efficiently a relatively small amount of data (a few megabytes, up to tens of served at scale, and can be neatly sharded to do so. To serve our megabytes), though there are many shards (160 million, one for growing 160 million member base, we built a scalable and fast each LinkedIn member, for WVMP). We call this class of OLAP OLAP serving system called Avatara to solve this many, small cubes the many, small cubes scenario.
    [Show full text]
  • Author Publicity Toolkit
    RTI Press Publicity Toolkit for Authors Sharing your research is a crucial part of research visibility Amplify (30–60 minutes) in the 21st century. Promoting your ideas to a wide Send targeted email messages to a curated set of contacts, audience can boost your scientific stature and raise your professional profile both within and outside of RTI. RTI highlighting the key contributions of your paper. Press publications are issued with a Creative Commons • RTI Press can help with formatting and mailing. We would license to facilitate sharing and reuse of our publications. also be happy to provide examples of previous emails. The following tools offer options for every researcher, • Reach out to co-authors, colleagues, unit communications regardless of time or skill. They will help you share, amplify, and build on your RTI Press publication, as well partners, and SalesForce to build your distribution list. as help you learn more about other tools for scholarly • For books, include “blurbs” from reviewers in the message communications. for additional credibility. Register/update your ORCID profile to help others to find Share (5–30 minutes) your publications. Add a link to your publication in your email signature. • ORCID allows you to create a unique digital identifier that Announce your publication on LinkedIn, Twitter, Yammer, links all your work. Some research databases rely on these Facebook, or other social media. identifiers to categorize and connect your publications. • If you only have time to post your publication once, update • Your RTI Press publication may not be automatically your LinkedIn profile. included in your ORCID profile.
    [Show full text]
  • Facebook Linkedin Twitter Blogs Instagram Platform Management
    IDEA’S SOCIAL MEDIA GUIDE Tips to increase your company’s presence on social media. Twitter Gain traction Communication Media usage Hashtags Use media in every post either in Utilize @ to communicate wth Always try to add an engaging and Hashtags can be useful for live the form of a link, image, hashtag followers. This requires constant relevant photo to a tweet. events. Try to create a specic and (#), or user mentions (@). This will monitoring of twitter to reply unique hashtag for any big event or help attract your customers’ quickly. It’s important to be part If you add a link, use a website like promotion so all interaction and attention and result in greater of the conversation and directly Bitly to shorten the URL, and be sure communicaiton can be tracked with this word/phrase. engagement. engage with your customers! to track the number of clicks to measure its impact. TIP: If you start a tweet to mention someone, it will go directly to them. If you want the tweet to be public, put a period before the mention (.@IDEA). Followers Customers Customers Identify customers and Gain followers by tweeting important inuencers to follow relevant information that and monitor. Align your encourages follower company with similar engagement. Use rewards to companies by following them, increase retweets to raise retweeting relevant tweets, and brand awareness and interest. mentioning them in your tweets. Listen and target followers with specic industry language. Promoting on Twitter Accounts Promoted By promoting your account, your account gains more visibility which could lead to an Use twitter’s analytics tool to see what is increase in followers.
    [Show full text]
  • Marketing and Communications Plan You’Ve Built a Team of Stakeholders and Provided Access to On-Demand Instruction
    PLANNING GUIDE Marketing and communications plan You’ve built a team of stakeholders and provided access to on-demand instruction. It’s time to introduce LinkedIn Learning and encourage learners to get started. Explore this marketing and communications plan and adapt it to your organization. Use multiple communications channels to reach your audience, mindful that people process information in dierent ways. A good plan will drive adoption and keep learners engaged. Sample marketing and communications plan PRE-LAUNCH LAUNCH POST-LAUNCH 1-3 WEEKS WEEK ONGOING EMAILS POSTERS & FLYERS INTRANET & LMS LEARNING PATHS FACE-TO-FACE & WEBINARS FUNCTIONAL LEADER SESSIONS COMPETITIONS CHAMPIONS & POWER USERS Pre-launch (1 to 3 weeks out) Goal: Build excitement • Finish technical setup. Ensure the access method you’ve selected (for example, upload via CSV or single sign-on) is implemented before launch. • Tap internal communication channels. Explore a sample email that outlines what employees can expect. • Create an intranet page. Direct learners here for more information. If you don’t have an intranet page, consider creating a landing page. Explore our "Intranet" tip sheet. • Get partner buy-in. Identify managers or department leaders who can help promote LinkedIn Learning to their teams. Hold a meeting of these leaders to generate engagement. They can also help select and recommend content for their teams. Find out how to engage partners. • Plan learning content. Map course and Learning Path content to core competency training and key roles in your organization. Launch (1 to 2 weeks duration) Goal: Formally launch LinkedIn Learning • Inform learners how they can get access.
    [Show full text]
  • Linkedin Tumblr FACEBOOK Instagra
    instagram FACEBOOK-F Tumblr Linkedin-In Center for Developmentally Disabled | Annual Report 2021 • cddkc.org 1 Center for Developmentally Disabled Who We Are: Our Values: CDD is a private, not-for-profit corporation founded in 1972. CDD provides • Each person is unique and their personal journey should be respected and residential care services and day habilitation to adults with developmental supported. disabilities in the greater Kansas City, MO area. Accredited by CARF, CDD maintains national quality of service standards for our housing and community • With encouragement and assistance, everyone can make lifestyle choices. placement options and opportunities. • Each person has the right to be treated with kindness and respect and freedom from intimidation. Our Mission: • Lives are enriched through social relationships, community involvement, and access to comfortable and safe residential (and enrichment) opportunities. To support persons with disabilities in achieving their fullest potential. • Everyone has the means to express themselves, to communicate, to interact, and to develop relationships resulting in a positive self-image. Our Vision: Individuals with disabilities are connected to their communities, benefit from the highest standard of sustainable quality supports, and are living their best lives. Center for Developmentally Disabled | Annual Report 2021 • cddkc.org 2 Letter From Our President and CEO I look back on this past year and the challenges we move into our homes, we have had DSPs take care of individuals have endured, I am grateful for the commitment in hotel rooms and Airbnb’s for weeks at a time. The DSPs demonstrated at all levels of this organization. As tiring as it who “ride this out” with the individuals are amazing.
    [Show full text]
  • Role of Social Media in Recruitment Process
    © 2019 JETIR May 2019, Volume 6, Issue 5 www.jetir.org (ISSN-2349-5162) Role of Social Media in Recruitment Process Sowmya J Head of the Department, BBA, New Horizon College, Marathalli, Bangalore Abstract Role of social networking sites is increasing drastically in day to day life. New hires looking for work turn to the Internet first, lesser looks in the local newspaper. It's not enough for employer anymore just to post a job vacancy on Monster.com, Naukri.com, Timesjob.com or other online job boards. Employers are spammed with hundreds of resumes from unqualified applicants when they post on the big boards. Employers recognize, that as the online social networking world is expanding, there are better ways to recruit superior employees. Since world of recruiting is changing, Employers are using LinkedIn, Facebook , Viadeo and other popular networking sites for recruitment. Most people at the end of the day are hired through a referral -- a friend of a friend of a friend. This is the basic structure behind social networking sites -- the trusted one-to-one relationship. This research paper contributes impact of social networking sites in organization and for jobseekers. They are useful for jobseeker as well as employer. But its increasing popularity also giving threat to privacy of an individual. Whatever people are posting can help them or hurt them in regards to their career. Study has been conducted with the help of inputs received from various sources like publications, websites, Research paper, survey, etc. Comprehensive analysis of the shifting trend has been done and explained through various graphs and figures Overall, social media has improved the recruitment process by making it more open and democratic.
    [Show full text]
  • Marketing Communication Plan: Bumble Bizz
    Marketing Communication Plan: Bumble Bizz Jasmine Han, Tatum Harvey, and Justine Kim MKT 405 6 December 2018 1 CONTENTS Executive Summary …………………………….2 Rationale .…………………….……………...…………….3 Situational Analysis Historical Context …………….……..4 Cultural Context .…………….………...5 Industry Analysis ..…………………….6 Competitor Analysis ………………..7 Consumer Analysis ……….………...9 Target Market …………………………….…………...10 Objectives ...………….………………….………………..13 Strategy Message Strategy …..……….……….14 Promotional Strategy .…….……...14 Media Strategy …..………...…….……..18 Measure of Effectiveness ......……..……..22 Bibliography …………………………...……………….24 2 I. Executive Summary A primary player in the digital dating space, Bumble has recently expanded its offering to include professional networking in the form of its platform called Bumble Bizz. Bumble Bizz leverages the same swipe mechanism, user profile, and match system to facilitate business networking and the creation of meaningful and productive relationships. Despite its growing user base, Bumble Bizz lacks brand awareness in the younger, specifically Gen Z, female demographic, which much of their current messaging and promotional strategy is already targeted to. As the market for professional and personable networking applications is growing, and younger, female college students are looking to define their careers as entrepreneurs and self-starters rather than in traditional roles, it is imperative that Bumble speaks more effectively to this audience. In order to communicate with this target, Bumble must leverage social media, campus partnerships, and experiential marketing efforts to increase brand awareness for Bumble Bizz. What we hope to achieve from this communication plan is to establish Bumble Bizz’s credibility as a professional platform that yields results, and ultimately sparks product trial and conversion. II. Rationale Founded in 2014 by Whitney Wolfe Herd, also co-founder of Tinder, Bumble is a platform that brings together dating, friend-finding, and career-building into 3 a single, multi-use platform.
    [Show full text]
  • CHECKLIST How to Compare Social Software Platforms
    CHECKLIST How to Compare Social Software Platforms. Introduction Contents Solving social use cases today requires a variety of key capabilities. I. Content Planning & Publishing Amidst all the fancy pictures and hopeful promises, what technology capabilities do brands need to enable their success? II. Moderation Whether brands focus today in one key area (such as publishing across multiple channels), or more complex (such as integrating owned and III. Audiences & Onsite earned) this checklist covers the breadth of social needs. It is organized Engagement into sections to identify with your critical goals. But, each section’s capabilities should actually be inter-connected in the platform–built from one code base–to have all of social in one place. IV. Paid Advertising No matter what requirements are burning today, they will only continue to grow. Social use cases are becoming more advanced V. Listening & Visualization and spreading throughout the organization. When you invest in a social platform, it should easily scale as your needs and social maturity advance. VI. Reporting & Analytics VII. Additional a. Security & Governance b. Mobile c. Global scale & Internationalization d. Social Channels e. Integrations 1 I. Content Planning & Publishing Organize and distribute relevant content for the most impactful audience, time, and channel. Publishing τ Research and track current trends, events, weather, sports events, and more from a single view to Instantly draft, schedule, and publish content to τ inspire real-time content over 20 social
    [Show full text]
  • Google+ Smart Card G+ 121911 2000
    Google+ Smart Card G+ 121911_2000 Social Networks - Do’s and Don’ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don’t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Managing Your Google+ Profile Google+ provides privacy and sharing options using Circles. Circles are groups that users create for different types of connections, such as family, friends, or colleagues. Content is shared only with circles you select. Google+ requires that users provide real names - no pseudonyms. Click to access and edit Profile Profile Settings Apply and save the Profile settings shown below to ensure that your information is visible to only people of your choosing. Select Edit Profile to make changes This box is PUBLIC. Do not fill out additional information Uncheck both Name & Profile Picture are PUBLIC Uncheck DO NOT add links to other online presences, such as a webpage, Facebook, Twitter, or LinkedIn Change to Your Circles To share information on this page with specific people, select Custom then choose appropriate Circles Uncheck top button Change to Only You Change to Your Circles Uncheck Google+ Smart Card G+ 121911_2000 Account Settings & Minimizing Your Activities Apply the Account settings shown with arrows below to ensure that your information is shared in a limited fashion.
    [Show full text]