DNA DNA contains information of genetic make up and is often used to solve cases. The information of DNA made public may lead to genetic discrimination.

Slides:



Advertisements
Similar presentations
Networking Through Social Media. Module #1: Basis of Networking.
Advertisements

Testing the AutoMARK Ballot Marking Device on Election Day.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
BYOD Guidelines Crosswell Elementary. Definition of Device For purposes of BYOD, “Device” means a privately owned portable electronic device. That includes,
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
Certification Exams Hawkeye Community College Information Technology Programs.
COMP 381. Some thoughts  How could he use it as the sitting president?  Laptops and cats.
Can I See You Now?. What would it take to know everything? Today’s possibility - Pizza demoPizza demo Tomorrow’s - A life recorder? 200 Gb/year for audio,
Quest for Mobile and Pervasive Data Management Ryusuke Masuoka Fujitsu Laboratories of America, Inc. January 24, 2002.
Parking Space Finder Lucia Wiguno April 8,
Form vs Function in Design Design 11. Form and Function Form – the way something looks Form – the way something looks Function – the way something works.
Emergent Readers and Writers Emergent Readers/Writers.
Mobile phone: A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
Rules of the Road. A. Stop your vehicle B. Help the injured C. Warn other traffic D. Exchange information (insurance) E. Notify the police 911.
GROUP 5: DEFAULT_TEAM_NAME PROJECT: Pay for Parking Application.
Introduction to NFC Applications Course Description by Xiaoshu Qian.
The Social Effect of Information System
Internet Safety Portage Department of Public Safety.
Banking Online Safely. What can you use online banking to do? Immediate access to real-time account balances Pay bills and make transfers anytime.
Team: SALL-Z.  Between November 27 – December  40 million people got credit card information stolen  Target was giving 10% worldwide, and free.
Unit 5 Protecting Your Money Starting on p. 59. What Do You Think? Complete the “What Do You Think?” activity on p. 60.
IDENTITY By liverpoolmad and footymadboy09. What the dictionary says Who or what a person or thing is Who or what a person or thing is Being identical.
FOUR TYPES OF IDENTITY THEFT. 1. FINANCIAL IDENTITY THEFT  Just using your stolen credit card details to buy things is the example we all know about.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
What do you do in a car accident?. 1. REMAIN CALM! Do NOT Panic or become Irate!
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
PARKING -SMS REVERSE ENTERPRISES PARK SMS. What is SMS Parking How the System Operates The Technology Conclusion The Benefits The System.
METRORAIL SCHOOL SAFETY PROGRAM Keeping your kids safe around light rail.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Form vs Function in Design
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
METRORAIL SCHOOL SAFETY PROGRAM Keeping your kids safe around light rail.
The I Phone Multimedia Group Project Jameelah Hogan Jamell Matthews.
Mobile design. Proprietary standards Specifications for hardware or software that are controlled by one company. This means that a company might have.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Magnets Science SOL K.3. Magnets are Useful They help make work easier. You can find magnets in the lab, in jewelry, for fishing, on the construction.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Love My Credit Union Rewards App Sprint Verification Tutorial Android.
Special thanks to Dr. Zahid Anwar for extending us extraordinary help for the completion of this project. We will remain ever grateful to him for providing.
Unit Nine New Technology Joe Minella. Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END June.
Identity Theft: How Vulnerable are you? Ronald J. Leach.
“Changing the relationship between everyone and the car, everywhere” 26 January, 2010 North Bethesda TMD Advisory Committee.
The Benefits of Using Virtual Merchant. EMV cards have been extremely popular in recent times and it’s one of the greatest technological advances in recent.
Introduction Injured In A Car Accident Gathering Information Our Lawyer for Car Accident Contact Us.
Unit Nine New Technology Joe Minella. Unit 9 assignments Unit 9 quiz Unit 9 seminar Unit 9 discussion question Unit 9 project paper CLASS WILL END Feb.
“Changing the relationship between everyone and the car, everywhere” April 6, 2010 TPA Conference Joanna May.
Bad Credit Mobile Phone Contracts Bad credit leaves an unwanted mark on your profile, making it hard to apply for any forms of credit, be it a housing.
How to Track the Location of a Mobile Phone.
CHAPTER 9 Vehicle Information.
Welcome to Driver Education
Stovall and Klee Security
Take advice to solve password issue Contact our Toll-Free Number.
Malwarebytes Technical Support Number
FINGER ACCESS DEVICE.
CHAPTER 1 6 POINTS OF ID documents must total 6 points
Welcome to Driver Education
IGraphic Social impacts of IT
Alignment & Overlap This can be a very difficult concept for many officials and I know of very few if any who get it right every time.
Welcome to Traffic School
Gmail technical support number
This, These, That, Those (Demonstrative Pronouns)
Electroscopes S Explain electrostatic phenomena using the particle model of electricity.  
Presentation transcript:

DNA DNA contains information of genetic make up and is often used to solve cases. The information of DNA made public may lead to genetic discrimination.

GPS Able to track the position of a person holding a GPS device. GPS devices have a expanded to cell phones and cars.

Cell Phones Nearly everyone has a cell phone. Cell phones contain personal contact information and personal messages to other people which can be hacked and made public.

License Plates Contain information of the car and its owner. Information of license plates can be tracked by police.

Social Networks They require personal information that can be accessed by the public if not handled correctly.

EZ Pass Can determine when a person uses an EZ pass when that person uses a toll and can determine relative locations of a person.

Credit Cards Contains personal information and holds hard earned money that can easily be stolen. It can also be used to track when it has been used and where.

Traffic Cameras Are used to spot traffic violations and to also track people in certain locations if needed.

Finger prints Finger prints are used notoriously for processing inmates and for helping detectives solve cases. Anything that a person touches leaves a mark across locations that person has been.

Gym Membership IDs Gym membership ID’s hold personal information. The time and place when a person uses a gym can be tracked by when the person goes in to the gym with the gym ID card.