PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?

Slides:



Advertisements
Similar presentations
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Advertisements

1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
The Internet.
Parachute Neighborhood Watch Presentation February 9, 2010.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Ethical Hacking by Shivam.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
© 2004 TransUnion LLC. All Rights Reserved. August 10, 2005 Seven Easy Steps to Fraud Prevention Northwestern University Clifton M. O’Neal Director, Corporate.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
By : Injeong Lee 9CC. 1. Creator of this Presentation   2. What is Digital Security?   3. Why is Digital Security important?   4. How does Digital.
Protecting your money: Identity Theft
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Internet Safety Dr. Steve Broskoske Misericordia University.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
COMPUTER ETHICS Do you know the difference between right and wrong?
AUGUST 25, 2015 Cyber Insurance:
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Identity Theft.
Presented by Beang Tong ENGL393, Spring’03
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
CHAPTER 9 CREDIT PROBLEMS AND LAWS LESSON 9-1: RESOLVING CREDIT PROBLEMS Learning Goals -Explain how to dispute errors on billing statements and list ways.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
Identity Theft Project By: Timmy Townsend And Eric Fields.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Credit Identity
Protection of CONSUMER information
Digital Citizenship Middle School
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Identity Theft Prevention Program Training
Computers where, there, everywhere
LESSON THREE: SAVVY SHOPPING
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?

WHAT IS PRIVACY ACCORDING TO YAHOO.COM Dreaming that you have no privacy, suggests that you are feeling exposed and unprotected. What are you trying to hide? It indicates that you are repressing your emotions and not allowing them to be fully expressed. You are worried that others will see the real you and criticize you.

WHAT IS SECURITY measures taken as a precaution against theft sabotage. military security has been stepped up since the recent uprising. an electrical device that sets off an alarm when someone tries to break in. A guarantee that an obligation will be met. Freedom from anxiety or fear A department responsible for the security of the institutions property.

PRIVACY, SECURITY AND COMPUTERS Have you ever used your credit card on line to buy a: Plane ticket Books CD When buying things over the internet, do you ever worry about your privacy?

SURVEY A recent survey by Louis Harris and Associates indicates consumers are as worried as ever that their personal lives are now on public view,thanks to computers. The survey, commissioned by Equifax Inc., asked over 1,200 people how they felt about credit-service companies using "public record information" --

Result of Survey The Harris poll found that, while 79 percent of Americans feel computers improve the quality of life, 78 percent worry that their privacy is being invaded by electronic Peeping Toms. In addition, 55 percent fear that the situation will worsen by the year 2000.

HOW PRIVATE IS YOUR ACCOUNT AT WORK? Today's legal statutes do not clarify the rights of employees with concern to personal files such as that are stored on company computers. The privacy of an employee's paper files and personal desks has been upheld in numerous Supreme Court cases

PRIVACY AND SECURITY AT WORK CONT. One such case is Thomasson v. Bank of America, in which an employee successfully argued her company would not have discovered damaging personal information if it had not accessed the text of their computer's messages. Nearly all companies have the means to access personal files on a mainframe or server, even if the system uses passwords. Companies maintain that intrusion is necessary to assess the performance of employees.

WHAT IS BEING DONE TO PROTECT WORKERS Currently a bill has been introduced by Sean Paul Simon that would require employers to warn employees before phone, computer, or video activity is monitored or face further employee lawsuits and up to $10,000 in fines.

THE END THANKS FOR LISTEN AND WATCHING MY POWERPOINT: SHIMEKA CONWAY