April 2012. “Security is everyone's business”

Slides:



Advertisements
Similar presentations
Bullying By Y1.
Advertisements

Being ready is important. When adults tell me to get ready, it is my job to do it. Being ready is my responsibility. Im ready!
I Can Use My Words.
Sending & Receiving Messages
Top 7 excuses students give for bad interviews. "He wouldn't say anything." This excuse is usually the result of nervous reporting. When people get nervous,
Communication Skills I Statements You idiot!. Conflict Resolution Definition: The process of ending a conflict by cooperating and problem solving.
Lesson 10: Dealing with Criticism
By:. Cyber space is a community where people can interact without actually seeing each other.
Protecting Your Identity: What to Know, What to Do.
Identity Theft What you need to know Betty White, April 2010.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
 Identity theft is the taking of one’s personal information and using it for yourself. Usually for illegal reasons. Though its all illegal if you even.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Strategies for Arguing Constructively Do’s and Don’ts for effective arguing.
Grammar Subject Pronouns
 My football coaches are always pushing us too be the best player we can for our team and too give 100% of your effort each and every down you are on.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
W.I.T.SL.E.A.D.S L:\Presentations and Resources\WITS-Rock Solid Foundation\LEADS 1.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Top 10 Safety Tips of the Year Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
What Is Active Listening?
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
“The foundation of knowledge is the willingness to listen
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Hello My Name Is… Introductory Presentation. Opening Activity Think about the following: 1.When you are feeling sad, how do you act? 2.How would someone.
Safety Rules for the Internet Christy Vaughn EDU 384.
Medicare & Medi-Cal Fraud Information and Prevention.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
By Kira Hall and Iliesa Sevudredre Do you guy’s know what Cyber Safety means? Well we are going to tell a story so you guys can understand what Cyber.
COMMUNICATION SKILLS CHAPTER 6 SHAPING YOUR FUTURE.
Communication C O M M U N I C A T I O N U- N- I. To change someone else’s behavior, we must first begin with changing our own behavior. Recognize what.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Communication skills Test. You can judge your communication skills by answering strongly agree, agree, neutral, disagree or strongly disagree.
Communication Skills. Skills that help a person share thoughts, feelings and information with others. There are several different ways to communicate.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
Soft skills training JUST A CALL AWAY When You Can’t Say YES.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By: Asfa Khan and Huda Mukhtar
Disagreements. It's easier to agree than disagree. But we can learn a lot from conversations where we don't see eye to eye — if we can listen and talk.
Joshua Fuller. - Passwords keep your information private - Never tell your password to ANYONE - Change your password regularly Basic Security.
Slide 1. Slide 2 AT THE SCHOOL BUTOP! ONE FEAR AND ONE HOPE FOR MY CHILD AND.
From Successful Strategies to Strategies that are DOOMED TO FAIL.
What is gossip? When people spread rumors about another person it is called gossip. Gossip is talking about something that is not your problem.
“Hi, I’m Officer Linda!” “Today, Officer George and I are going to be teaching you the rules of staying safe on the Internet!” “The Internet can be a.
E-Safety Quiz Are you cybersafe?.
Be Present. The first gift of God to humanity was the gift of relationship.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
How I Should Talk to My Teacher
What Makes a Good Discussion in a Grand Conversation?
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Anti-Bullying Week 2014 “Let’s stop bullying for all”
Frauds, Scams and Slams: Credit Card and ATM Fraud Prepared by Dr. Jan Park Gerontology Specialist Oklahoma Cooperative Extension service April 2002.
Managing Money Workshop The National Autistic Society AGM
This I Believe Essay Writer’s Workshop: Introductions, Juicy Details, & Conclusions 8 th ELA St. Joseph School.
You Have Two Ears and One Mouth… Hel-lo!!.  People have a tendency to want to swoop out of the sky like Superman and solve everyone’s problems before.
E-SAFETY BY THE DIGITAL LEADERS. SAFER INTERNET DAY 2016 H ello, welcome to our e- safety assembly to help you keep safe on the computer. We are going.
3-5 Lesson c: secret agent savings The big savings mistakes
Instead of Half Listening…
I’m writing in first person. I’m going to tell you my story
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Unit 1 Lesson 11 Practice: Listening and Responding to the Emotions of Others.
Seek First to Understand then be Understood
A Crime Free Christmas.
Unit 1 Lesson 11 Practice: Listening and Responding to the Emotions of Others.
Learning about Listening
Presentation transcript:

April 2012

“Security is everyone's business”

Be an active listener This means "making sure the person knows you're part of the conversation by asking questions and injecting verbal cues, like 'Uh huh' and 'I see.'" Another technique is repeating to someone what they just said to you. "If they say 'I'm upset my computer broke,‘Trysaying back, 'So you're upset that your computer failed. I'd be upset too.'" People feel better if they can tell their story.

Never store your computer passwords, PIN numbers, or any personal security information in your luggage, purse or wallet. These items are target for thieves and can be quickly carried away. Instead keep this information in your encrypted computer with a strong password. This will make it very difficult for thieves to retrieve information to steals your identity and your information.