A PowerPoint Presentation by Helen Chelan Johnson.

Slides:



Advertisements
Similar presentations
IT in Healthcare IT Careers in Healthcare Emerging opportunities for IT professionals Prof. Vance Wilson Arizona State University.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Dangers of Cloud Computing How to keep your documents safe.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
ENGR101/HUM 200: Technology and Society November 10, 2005.
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber Security and the Global Business Environment Jeremy Schaar:)
ICT at Work Banking and Finance.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
 Identity theft is the taking of one’s personal information and using it for yourself. Usually for illegal reasons. Though its all illegal if you even.
By: Andrew Nieto. Value is something that differs from person to person, but what about from generation to generation? Money has always been an issue.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bellwork for April 17, 2014 Take any handouts from the back counter. Write in your agenda. Complete numbers in your TCAP booklet.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Medical Database By: Emily Michels Ben Pruitt November 27, 2006.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
Opening a bank account.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Presentation about Robots!.  I choose the subject of robots because I find them very interesting and the future of technology and robots can be anything.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Best way to safeguard your personal information Made by Rita, Catherine, Annabelle,Rebecca and Nicole.
Presented by Allyson Medina, RN
EP M6 E-Commerce.  Today we will have a look at the benefits for businesses that use E-Commerce against traditional methods.  There are benefits both.
It seems to me when it comes weight loss foods, we suffer a collective loss of common sense. We need to step back and look at the big picture before we.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
By Hannah, Bethany and Amanda. It all started in America. In the sixties, the US Government were very worried about being blown to smithereens by nuclear.
1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Powerpoint Presentations Problems. Font issues #1 Some students make the font so tiny that it cannot be read.
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
VS.  The Internet was created in the 1970’s by the Pentagon.  It was designed to be used as an alternate means of communication during wartime.  The.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
ICT in Healthcare. Electronic prescription service GPs and nurses can send electronic prescriptions to a dispenser (pharmacy) of the patients choice.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Have you ever lost a pet? It wont happen to you, right? By Zaida A. Rendon.
What can ICT do for the NHS?. What is the NHS going to become? What will it do / what services will it offer? Who will run it? …? Who will do what, when,
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
All you need to know to keep you and your computer safe!!!
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
 READING FOR COLLEGE SUCCESS. Who Am I? Why Are You Here?  This course is a half credit course that will count for your online graduation requirement.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Society & Computers PowerPoint
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
The Color of Money I What would you do if you won $1,000? (share answers) Many of us have different answers. Some of you would blow it. Some would save.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
Common Methods Used to Commit Computer Crimes
Lesson 1- Introduction to Health Information Technology
SAGE Lecture Spark [10/2/18] The Publisher of the Social Sciences.
Data Recovery: Why Secure Deletion is so Important.
Cybercrime By: Kimberly Foreiter
Presentation transcript:

A PowerPoint Presentation by Helen Chelan Johnson

Have you ever had to take your computer to the shop to get it fixed? It’s been hacked, and there’s a big possibility that someone has stolen all of personal your information. What now? You have to call the credit bureau and have your social security number flagged. It’s time that you take the necessary steps to make sure your identity stays safe. You’ll probably never put your personal information online again. Lesson learned, right? What would you do?

Your body has been hacked. It’s shutting down. Something has malfunctioned inside of you. We’re unsure of the current cause, but a few diagnostic scans should reveal it the problem shortly… Eureka! We’ve found the problem. It’s looks like you have been infected by a virus. It’s a simple solution, though. We’ll just have to erase everything from your hard drive, and start fresh. Is there anything you’d like to save? It’s not guaranteed, but we’ll put our best efforts into recovering them before wiping the slate clean. Wait… erase everything?! From my body?! Surly not. Something doesn’t seem right about that. It doesn’t seem right because it isn’t right. The human body shouldn’t have anything in common with a computer. ……Should it? But, wait…. What if your computer was you?

A controversial new computer chip, made by VeriChip, was designed to be implanted into a human arm was approved by the FDA in December of last year. It was designed to speed up the process of getting vital patient information to doctors and hospitals. The chip is roughly the size of a single grain of rice and is inserted into the arm with the pinch of a syringe, a procedure that takes less than twenty minutes and leaves no stiches. The cost of the device is likely to be somewhere around $150-$200. FDA Approves Computer Chips for Humans

PositiveID Corporation announced today that it has received an order for it’s VeriChip™ microchip to be used for disaster preparedness and emergency management in Israel by an integration partner. The Company’s integration partner intends to provide the microchips to the Israel Defense Forces (IDF), the State of Israel’s military force. Marc Poulshock, PositiveID’s Vice President of Business Development, said, “We believe there are many important applications for the VeriChip and our associated intellectual property including next-generation identification and bio- sensing capabilities. Our partner is looking to help healthcare organizations, militaries including the IDF, and governments with their disaster preparedness and emergency response needs.” Where did the idea come from?

President Bush had a ten year plan to get the majority of the US population implanted with microchips. “The U.S. Department of Health and Human Services on Wednesday announced $139 million in grants to help make real President Bush’s push for electronic health records for most Americans within a decade.” Medical records aren't stored on the chip its-self, but rather on a so called "secure" server. George W. Bush

Here's a bit of truth for you. There’s no such thing as a “secure" server. If it's physically connected to the internet then it's possible it can be hacked, period. Just like with Sony and their violations of the consumer code that states a customers credit information should NEVER be stored on a server connected to the web. Instead customer information, credit card numbers and passwords, should be on a server that's NOT connected to the web except for when a customer makes a transaction. If Sony would have followed these laws they never would have lost people's credit information. The other main concern is this chip does allow the person who has been chipped to be tracked at all times. Good luck trying to hide if you ever needed to. Now, one could argue that if you don't do anything wrong there's no reason for you to care whether or not you can be tracked by satellite. It’s not about that – it’s about privacy don’t want anyone to see where I am at every second of the day because I've been tagged like some cattle.

FDA approves computer chip for humans, George W. Bush, Mark of the Beast, Micro chipping the Population, The Truth about VeriChip, PositiveID Corporation, Sources