Copyright Goodheart-Willcox Co., Inc. 370 Chapter 15 Digital Citizenship You must also plan to protect your mobile devices from theft. If you become careless and leave your smartphone or other device in an unexpected location, your identity can be stolen. You may also be stuck with a large telephone bill. If it is an employer-issued device, you may be responsible for replacing it using your personal funds. To protect your mobile device from use by a thief, create a password to lock it. Have the number of your mobile device in a safe place so that if the unexpected happens, you can contact your service provider. Secure Passwords Unfortunately, many people have weak passwords for even their most important accounts, such as banking or credit card accounts. Your employer will have guidelines for creating passwords for work accounts. When creating new passwords, use the tips shown in Figure 15-4. Case Cyberbullying Jim Hill is the writer of a popular blog devoted to professional hockey. He writes on virtually every topic of the sport from player trades and game summaries to rule changes and the governing of the sport. He is an opinioned writer and feels that it is his responsibility to give honest reports of the sport based on his interpre- tation. He is not bothered by the fact that many of his colleagues do not agree with what he writes. Some of those who read his blog tend to agree with his colleagues, while the majority of the readers leave positive com- ments on his blog posts. Last month, he was invited to serve as the luncheon speaker at the annual meeting of the local Sports Writers Association. The association announced on its website that Jim would be the guest speaker. Jim was honored to be invited to speak and was excited at the opportunity to share some of his ideas with fellow sports writers. Shortly after the announcement, Jim began seeing negative comments on his blog from people he did not know. The posts implied that he is a ter- rible presenter and that he regularly plagiarizes the work of others. Jim was shocked and humiliated at these false statements. He had spent most of his career working hard to get this kind of recognition, and has never used some- one else’s work without crediting the other writer. Jim had considered back- ing out of the speech due to the embarrassment of these posts, but decided rather to use the opportunity to prove that those statements are false. Critical Thinking 1. Do you think he is a victim of cyberbullying in the workplace? 2. What actions can Jim take to stop these false statements?