Public Information Online. Timothy WhitneyCaroline Aaron.

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Database Security College of Alameda Copyright © 2007 Patrick McDermott Himeji Castle Hyogo, near Osaka Momoyama period c
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
Security, Privacy, and Ethics Online Computer Crimes.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Issues Raised by ICT.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
The Social Effect of Information System
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Unethical use of Computers and Networks
CYBER CRIME.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Welcome to Kittatinny Regional High School Internet Safety and Social Networking Workshop.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Gaby Orduna Period 1. Public records contain info about individuals, often very sensitive information. Are accessible electronically Courts and government.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Identity Theft It’s a crime!
Small Business and Personal Credit
The impact of I.T on society
Add video notes to lecture
Protecting Your Identity:
Pre-writing topic discussion: Speak to your partner
cybercrime Presented to you by : NAMES MATRIC NO
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
Five Unethical Uses of Computers
How the Online Background Check Search a Person's History?
BCT 2.00 Analyze Technology Issues
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Cybersecurity and Personal Finance
Other Sources of Information
Lesson 2- Protecting Yourself Online
Communicating in the IT Industry
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

Public Information Online

Timothy WhitneyCaroline Aaron

General Information –Definition –Types of PIO –Who can find information Advantages –Protection –Convenience and Efficiency –Environment Disadvantages –Intentional Misuse –Unintentional Error Conclusion (Group Agreement)

What exactly is Public Information Online? Basically, information about a person that is published on the internet which the public has access to “Public information and records are the property of the people and thus are to be made available to the people” (NC General Assembly)

Types of PIO Government –Tax Information –Marriage/Divorce Records –Criminal Records –Property Information Personal –Addresses –Phone Numbers –Family History

Ways of accessing PIO Free on websites On a fee basis

Who can find information? Anyone and Everyone has access as long as they have the Internet –Companies can do background checks on their employees

Privacy Assignment Property Information Property Information Tax Information Personal Information –Address, husband, children, jobs, pets

General Information –Definition –Types of PIO –Who can find information Advantages –Protection –Convenience and Efficiency –Environment Disadvantages –Intentional Misuse –Unintentional Error Conclusion (Group Agreement)

Online Information Used for Protection Sex Offender Database Sex Offender Database –Useful tool in protecting families (Ex. Megan Kanka) (Ex. Megan Kanka)

Convenience and Efficiency Look up information from home vs. physically securing a hard copy Data can be accessed quickly and easily

Environmental Benefits Conservation of natural resources

General Information –Definition –Types of PIO –Who can find information Advantages –Protection –Convenience and Efficiency –Environment Disadvantages –Intentional Misuse –Unintentional Error Conclusion (Group Agreement)

Intentional Misuse Intentional Misuse: Identity Theft, Hackers, Phishing –CD Universe –Red Cross

Identity Theft Commercial “crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception” Identity Theft is a Federal Offense

(Stop Internet Fraud and Identity Theft)

Hacking Databases are what contain online information Software problems are the result of holes in code Hackers exploit these glitches Example of how easy it is to hack into a website

Unintentional Error Unintentional Error: accidentally entering wrong information (SSN, address, bank numbers), information that is not up-to- date, etc.

They inherited the earth and then the army came and scorched it.

Conflicting Information

General Information –Definition –Types of PIO –Who can find information Advantages –Protection –Convenience and Efficiency –Environment Disadvantages –Intentional Misuse –Unintentional Error Conclusion (Group Agreement)

Solution Centralized Database All the information is in one place Easier to maintain and protect the information Types of Restrictions: Who can access What can be accessed Who controls database

Timothy WhitneyCaroline Aaron