1 Privacy at Home: Protecting Your Family’s Identity & Safety For Your Children Dara G. Murray Chief Information Security Officer Program Support Center.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
INTERNET SAFETY FOR STUDENTS
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Identity Theft Both Offline And Online It’s Not New Just Easier…
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
INTERNET SAFETY FOR STUDENTS
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Identity theft: Real or Virtual? By: Alex Metzler.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Be Cautious of Identity Theft By: Sydney Langley.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
IDENTITY THEFT. WHAT IS IDENTITY THEFT? Identity theft refers to stealing someone else’s personal information in order to obtain credit or other benefits.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Lesson 10A: The Three D’s of Identify Theft
An Introduction to Phishing and Viruses
how to prevent them from being successful
Protecting Your Identity:
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

1 Privacy at Home: Protecting Your Family’s Identity & Safety For Your Children Dara G. Murray Chief Information Security Officer Program Support Center Department of Health & Human Services October 4, 2007

2 Discussion  Introduction  Why Are You Here & Why Should You Care?  Protect Privacy/Fight ID Theft  Keep Your Home Computer Safe  Protect Our Children When Using the Internet

3 Security Is An Inconvenience  Security:  Balance Between Access and Convenience  History Lesson – Mainframe, Mini- Computers, Desktops, Laptops, PDA’s/Cell Phone & Blackberry’s

4 How Can Devices Be Misused?  Understand Devices for What They Are!  iPod, MP3 Players, Entertainment Devices  Removable Storage Media  Slurping

5 Removable Media  Thumb Drive (Jump Drive/Flash Drive  Utility Tool – 4GB  Extension of Personal Information/Removable Storage  Lose-able Storage

6 Cell Phones/Blackberry’s  Personal Information  Phone Numbers, Addresses, Calendar  = Stalker

7 Protect Your Wireless Network  Don’t Accept Defaults  Use Encryption!!!  Easy to Steal Your Information

8 Internet Privacy Threats Internet Privacy Threats include: –Phishing/spoofing - an attempt to steal passwords, financial or personal information, or introduce a virus attack by luring internet users to fake websites using authentic-looking –Spyware - software that is usually covertly downloaded to an end user’s computer and used to fraudulently collect and use sensitive, personally identifiable information (PII), such as bank account credentials and credit card numbers Source: International Association of Privacy Professionals: cyassociation.org/images/stories/pdfs/IAPP_Certification_Glossary.pdfhttps:// cyassociation.org/images/stories/pdfs/IAPP_Certification_Glossary.pdf

9 Snail Mail Privacy Threats  Mail privacy threats include: –Mailbox theft - the theft of mail that contains personal information from a home –“Junk-mail” - unsolicited commercial mail –Document theft - the theft of documents, such as bank or credit card statements disposed of without having been shredded, in order to obtain personal information

10 We Can Easily Be Fooled!  Don’t Be Socially Engineered!

11 Telecommunication Privacy Threats  Telecommunications privacy threats include: –Phone phishing - a phone-based attempt to collect information in return for ‘unclaimed’ prizes or exclusive offers –Telemarketing – an attempt to sell a product or service to a customer over the phone. Automated telemarketing poses the most significant threat to stealing personal information

12 Internet Privacy Tips  Basic ways of protecting yourself online include: –Learn how filtering and monitoring software can assist in protecting your family online. Check with your internet service provider to find out if filtering or monitoring is available –Never offer your personal information, such as a credit card or social security number, via or instant message –Never provide personal information via a website, without first consulting the website’s privacy policy

13 Internet Privacy Tips- Children  The Children's Online Privacy Protection Act (COPPA) is a U.S. Federal law that: –Requires website operators that target children under the age of 13 to post a privacy policy detailing any PII that is collected –Restricts website operators from using children’s information, unless parental consent is received

14 Internet Privacy Tips- Children  Explain to your children that they should: –NEVER give out personal information (name, address, phone, school name) –NEVER share their photo with strangers over the internet –NEVER meet anyone from online without your permission

15 Snail Mail Privacy Tips  Basic ways of protecting yourself against mail fraud include: –Drop your mail in a United States Post Office collection box, instead of your home mail box –Shred old documents, such as mailed credit card and bank statements, before disposing of them –Ensure that businesses and companies, such as credit card companies, have your correct mailing address

16 Telecommunications Privacy Tips  To protect your privacy via phone: –Never provide sensitive information over the telephone to someone you do not know –Register your telephone number with the “do-not- call” registry, found on the Federal Trade Commission website at –Do not answer calls that appear restricted or do not provide information regarding the source of the phone call

17 Privacy Resources and Helpful Links  General Privacy Links – –  Children’s Privacy Protection – dex.htmlhttp:// dex.html –

18 Privacy Resources and Helpful Links  Opt-Out Services – asphttp:// asp –  Financial Privacy – –

19 Protect Your Family & Children!  Personal Firewall  Anti-Virus – Update it Frequently  Spyware – Keyloggers  Browser Protections (MySpace, Craigslist, e-Bay)  Instant Messanger, (IM) Screen Names  Talk to Your Children  Spy on Your Children –Be a Parent –Handouts  Homework Assignment

20 Thank You For Inviting Me  Contact Information: Dara G. Murray (301)