Wireless Service Innovation Service a wireless network customer by locating a lost or stolen device and provide the ability to protect data.

Slides:



Advertisements
Similar presentations
Homeowners Insurance. A binding, legal contract between the policyholder and the insurance company to protect their home and belongings if they are damaged,
Advertisements

Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
Proper Pager Use. FAQs What do I do if my pager battery is low or expired? What do I do if my pager is broken or malfunctioning?What do I do if my pager.
High School 101 Electronic Device Policy Tuesday, August 19 th, 7 th period.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Bring Your On Device. What is BYOD? Students bring an electronic device such as smart phone, laptop, I-Pad, etc to school for: Researching information-
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Redshift for Hotels and Motels Managing your heating and cooling costs whilst supporting your customers.
Mobile Computing in Society Jared Sutherland CIS 497
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
ARMS Bring Your Own Technology ARMS Media Committee 2012.
Mrs. Jefferson Business Information Management I.
Wireless Security: Protect yourself when you’re mobile.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Miss Smith 7 th Grade Civics *pgs  Insurance- system of spreading risks over large numbers of people  People pay a small amount to the company.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
WHAT INSURANCE PROTECTS The purpose of insurance is to protect against the loss of something of value Designed to restore you to your financial position.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The State of Computer & Data Security in Corporations Independent Survey.
Preventing a Sensitive Data Loss: Laptops Marc Scarborough.
A measure of the uncertainty of an investment’s rate of return; possible losses involving income or standard of living; the possibility of a loss from.
Desktop Security: Making Sure Your Office Environment is Secure.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Miss Smith 7 th Grade Civics *pgs  Insurance- system of spreading _____ over large numbers of ______  People pay a _____ amount to the _______.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
1 Identity Theft Prevention and the Red Flag Rules.
“Changing the relationship between everyone and the car, everywhere” 26 January, 2010 North Bethesda TMD Advisory Committee.
Monday, November 30, 2015 Objective: Students will be able to evaluate the costs and benefits of buying insurance. Purpose: You will need insurance to.
Mobile Device Security Management Leyna Belinsky.
Tools and equipment are an essential part of many industries, providing the means for individuals to do their jobs accurately and proficiently across.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
“Changing the relationship between everyone and the car, everywhere” April 6, 2010 TPA Conference Joanna May.
IDENTITY PROTECTION INFORMATION SECURITY LEADING DATA SOLUTIONS Innovative technology, collaborative relationships and real-time actionable alerts offer.
LISD Mobile Learning Initiative. mLISD Overview ♦ Why the mLISD Initiative ♦ Maintenance Fee/Support ♦ Lost/Stolen Device Fees ♦ Repairs for Accidental.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Cell phone use is prohibited.
E&O Risk Management: Meeting the Challenge of Change
Insurance against Hardship
Mac Customer Service Phone Number
Have Wordpress Technical Issues Wordpress Technical Support is avail at toll free number
Cyber Issues Facing Medical Practice Managers
Protecting Your Credit
Forensic and Investigative Accounting
Security.
What are some different types of insurance, and why do you need them?
Mobile Insurance For 9/16/2019.
Presentation transcript:

Wireless Service Innovation Service a wireless network customer by locating a lost or stolen device and provide the ability to protect data.

Objective Attempt to locate the missing device. Identify if the device is lost or stolen? Safeguard a customer’s personal and business information on the device. Allow a customer the possibility of recovering a lost wireless device. Protocol renders the device unusable and notifies of a loss and the return options available.

Customer Requirements Ever loose your wireless communication device? (Cell phone, PDA, pager, laptop computer) Someone ever steal your identity? Passwords? Phone numbers? Contacts? Locate a device and protect the data while attempting to retrieve your property. Locate and Protect Lost? Stolen? Safeguard

Meeting the Needs Providing customer’s with options when faced with the uncertainty of loss. Giving piece of mind to a customer that’s looking to protect against data theft while attempting to retrieve a device. Protect Data Locate Stolen? Retrieve Locate Lost?

Cost Analysis A service plan is a reasonable expense when having to consider replacing a wireless device. A service that provides more than just an insurance policy. What’s the average cost for identity theft worth these days? Service plan and/or menu for fee options.

Our Strengths OPTIONSLocateRetrieve Contact Protect SOLUTIONSLicensePartner Venture advocate TECHIdentifyPinpoint Instruct Warning

Key Benefits Offering an innovative service solution. Ability to safeguard personal and protect business private information. Options for locating and retrieving a lost or stolen wireless device. Ability for the customer to restore service and data. Alternatives to replacing a device.

Next Steps Estimate the value of providing such a service to your customer’s and the network provider’s bottom line. Consider offering this technology innovation to your customer’s. Implement this loss control add-on service to your menu of services.