DATA PRIVACY DAY JANUARY 28, 2014 ONLINE SAFETY. From January newsletter – Tips and Tricks https://www.badwarebusters.org/ Get help on how to identify,

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Cyber Safety Assessment Review
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Lesson 5: Avoiding Fraud and Scams Module 10: Small Steps to Health and Wealth TM for Older Adults.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Company LOGO Internet Safety A Community Approach.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
SEARCHING FOR A JOB CCM Mission Station F.I.T. Program 2015.
Telemarketing Fraud: It’s a Crime University of Georgia Cooperative Extension Service Georgia Governor’s Office of Consumer Affairs.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
ESCCO Data Security Training David Dixon September 2014.
PRIVACY BOOTCAMP YpJU.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
CSC 8560Fall 2000 Computer NetworksBhargavi Balasubramanian & Bob Viola Project 1 Description: E-Commerce Objective:Build a web storefront to sell videos.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Society & Computers PowerPoint
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
ONLINE DATING SAFETY TIPS EVERY WOMAN SHOULD KNOW AND FOLLOW.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Elder Fraud Kaitlyn Flanagan. What Is Fraud? Fraud : A false representation of a matter of fact—whether by words or by conduct, by false or misleading.
Fraud Protection.
Fraud protection.
Personal spaces.
Digital Citizenship Middle School
Outsourcing your Social Media & Internet Marketing Jennifer Brosnan
Protecting your personal information and privacy
Phishing is a form of social engineering that attempts to steal sensitive information.
Internet Fraud By (NAMES).
Lesson 2- Protecting Yourself Online
Protecting Your Identity:
Being Aware of What You Share
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
October is National Cybersecurity Awareness Month
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

DATA PRIVACY DAY JANUARY 28, 2014 ONLINE SAFETY

From January newsletter – Tips and Tricks Get help on how to identify, remove, and prevent badware. Every site that you have an account with will have an address to contact you. You can check to see if your account has been compromised in a data breach by providing your address.

Data Privacy Day Submitted by Hewie on 2013, December :29am What are you doing to educate people about privacy in the digital world? Data Privacy Day is January 28, Data Privacy Day is an international effort to empower and educate people to protect their privacy and control their digital footprint. Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the January 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Data Privacy Day is now a celebration for everyone, observed annually on January 28. Data flows freely in today's online world. Everyone - from home computer users to multinational corporations - needs to be aware of the personal data others have entrusted to them and remain vigilant and proactive about protecting it. Being a good online citizen means practicing conscientious data stewardship. Data Privacy Day is an effort to empower and educate people to protect their privacy, control their digital footprint, and make the protection of privacy and data a great priority in their lives. Data Privacy Day is led by the National Cyber Security Alliance, a nonprofit, public-private partnership dedicated cybersecurity education and awareness, and advised by a distinguished advisory committee of privacy professionals.

StaySafe Online About Promote Get Involved Champions Privacy Library Events Check Privacy Settings

Privacy Library Why Privacy Matters Cookies and Behavioral Tracking Health Privacy Identity Theft Location-Based Technologies Mobile Phones Online Services – Banking, Dating & General Guidelines Travel Wireless

Privacy Library – Cookies and Behavioral Tracking Network Advertising Initiative – Opt-Out Some of the ads you receive on Web pages are customized based on predictions about your interests generated from your visits over time and across different Web sites. This type of ad customization — sometimes called “online behavioral” or “interest-based” advertising — is enabled through your computer browser and browser cookies. Such online advertising helps support the free content, products and services you get online. Using the tools on this page, you can opt out from receiving Interest-Based Advertising from some or all of our participating companies. Clicking on the above link begins a check of cookies on your web browser and shows which cookies are associated with companies that participate in the Network Advertising Initiative.

Privacy Library – Health Privacy What is HIPPA and why should you care You can’t get very far into health privacy without running across the acronym HIPAA, which stands for the Health Insurance Portability and Accountability Act, a 1996 US federal statute. Although many people associate HIPAA just with health privacy, the Act actually covers many topics unrelated to privacy. The part of the Act relevant to privacy directed the Department of Health and Human Services to write a health privacy rule. The rule originally took effect on April 14, Some refer to it as the health privacy rule, the HIPAA rule, or just plain HIPAA. Other HIPAA rules also exist, but they don’t relate to health privacy. When we say HIPAA in this document, it means the HIPAA health privacy rule unless we state otherwise. Index to Frequently Asked Questions (FAQs)

Privacy Library – Online Services Senior Scams Senior Scams - Just say no! (English) Everyone must be on guard against scams, but seniors can sometimes be more vulnerable to fraud. This brochure outlines the many guises of fraud, with special attention to scams that target seniors. Signs of fraud and tips for avoiding scams are included. Living trust scams Fake emergency appeals Home improvement scams Pyramid schemes Caregiver fraud Charitable solicitations Foreign lottery prizes and sweepstakes Work-at-home scams Drug plans Credit card fraud Investment fraud Burial and funeral fraud Fake check scams Fraudulent billing

Privacy Library – Online Services Senior Scams Protect yourself from scams Don’t be afraid to say no. You don’t have to talk to telemarketers—hang up if you are uncomfortable or you don’t trust the caller. Don’t give in to high-pressure sales tactics. Call the police if you feel threatened. Don’t reveal your credit card, bank account or Social Security numbers to unfamiliar companies or people. Do your own research on charities and other solicitors. It’s your money—never be afraid to ask where it’s going. Before you invest, do your homework, because you can lose money even on legitimate investments. Get the details of all deals in writing. If it sounds too good to be true, it probably is.

Check Your Privacy Settings -privacy-settings/ Would you like to view or change the privacy/security settings for your online device or service, but don't know where to find them? Here's your one-stop shop for easy instructions to update privacy settings wherever and however you go online. E-Commerce Mobile/Location Services Music Photo Sharing Search Engines Social Networks Video Web Browsers (Private Browsing)