Content Management lifecycle

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
HOW TO ACT ONLINE Privacy Settings For Facebook, Twitter, LinkedIn and Google+
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
PRIVACY BOOTCAMP YpJU.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Christine Laham, Fahed Abdu, David Dezano,Shelly Kim.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Effects of Computing How have computers affected society?
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Helping your family to stay in control Living with technology.
Put a Lock on It: Protecting your online privacy A project of Consumer Action |
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Membership Competitions FIBA Organizer Information is stored offline, either on a desktop computer or on a Laptop. FIBA Organizer application installed.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Introduction to Technology. Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
Parents Guide to E-Safety
IT Security Awareness Day October 19, 2016
DATA SECURITY FOR MEDICAL RESEARCH
What does your digital footprint say about you?
Digital Citizenship.
Living with technology Helping you and your family to stay in control
Attention Identity theft Definition
Information Technology Deanship
Hot Topics:Mobility in the Cloud
More and more pre-schoolers are using their parents’ computers, smartphones or tablets to play games, use apps, and watch their favourite TV shows.  Habits.
Information Security 101 Richard Davis, Rob Laltrello.
A Single ‘Tap’ can change ANYTHING!
Internet Safety By Ruby.
Digital Citizenship.
ციფრული მარკეტინგი ნიკოლოზ არჩვაძე.
Columbus State University
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
Fix All Your Issues at Trezor Support Phone Number
GSBS IT Resources and Security
Digital Footprints.
Google Apps for Education
Digital $$ Quiz Test your knowledge.
Internet safety By DAGAS YACMAS team.
Chapter 3: Protecting Your Data and Privacy
Media Trends 2017 Edition.
Online Communication Overview
E-Safety Survey Results
Digital Citizenship.
Online Communication Overview
BTEC level 3 Learning Aim D.
Digital Citizenship.
Privacy and Data Mining
Online Communication Overview
Introduction-Cyber Safety
SEO Stats
Information Security in Your Office
Technology 101 Changing the way, we work, live, play and learn.
Presentation transcript:

Content Management lifecycle There is no delete button Mrs. Stacey Lee-Curbean University of Maryland University College

WHAT IS CONTENT? Content Communication Channels for Content Published and Digital Structured and Unstructured Created with/without user’s knowledge Communication Channels for Content Social Media Sites LinkedIn, Facebook, Snapchat, Instagram, Google+ Applications Chat Rooms Blogs Dating Websites Amazon Google

Technological advancements Smarter Devices and Computers Social Media Data Collection Software Improvements Data Analysis Software Enhancements Big Data Internet of Things (IoT)

Internet of things (IoT) Huge network of connected devices Relationships between people and web-enabled devices Devices includes tablets, cellphones, refrigerators, headphones, wearable devices, jet engines, and the like Gartner has predicted there will be over 26 billion connected devices by 2020 (Gartner, 2013) IoT produces an enormous amount of data that poses security and privacy risks

Digital footprint Why important? Used for A unique set of digital activities Passive Footprint Time-based Logged in to complete a specific activity Examples: Amazon, Macys Active Footprint Continuous Logged in continuously; not necessarily to complete a specific activity Examples: Facebook, Twitter, LinkedIn, SnapChat, eHarmony, Blogs, YouTube, Email Why important? Used for Employment Used for some colleges Security Clearances

content management lifecycle Content has a life cycle Begins when data is created Ends with destruction (from original source of collection) or permanent storage (where no longer used) Content Management Lifecycle 5 Phases Collection Management Storage Delivery Preservation

Collection

U. – (Understand what private information is being collected) S. – (Know the Source) U. – (Understand what private information is being collected) R. – (Research what, why, how, & who) E. – (Evaluate if you need to provide your private information) management Content Management is YOUR responsibility Be S.U.R.E. Personally Identifiable Information Before providing information online, find out What information is collected Why the information is being collected How information is shared Who will have access to your information

storage Computer CD/DVD Database/Data Warehouse Cloud Server Mobile and Portable Storage Devices

delivery Paper Mobile Devices Internet Fax Intranet Portal Email E-Statements

preserve Archive Backup Paper

Where is your information

Protecting your information Secure Information Offline Keep personal information in safe place Limit what you carry Lock and password protect your computers Safe disposal of computer and mobile devices Secure Information Online Encrypt data Use strong passwords and keep private Limit personal information shared on social media Two-Factor Authentication

Protecting your information Secure Devices Keeps devices on your person and password protected Use security software Avoid Phishing Emails Verify mobile apps before installing Secure Laptops, mobile devices, and portable devices Read privacy policies Limit use of public Wi-Fi

Questions

references Gartner (2013). Gartner says the Internet of Things installed base will grow to 26 billion units by 2020. Retrieved from https://www.gartner.com/newsroom/id/2636073