CUSTOMER INFORMATION SECURITY LY, PHAM HIEN. Problem Fill out ABBank’s Customer Information Form. Then receive E-letter from VietinBank.

Slides:



Advertisements
Similar presentations
HIPAA Security.
Advertisements

Cyber Time First Grade.
ADMINISTRATION REVISION - BLOCK 4 HANDLING THE MAIL.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Using Your Voic M6 Release 7.1Business Feature Set Default Menu Options Revised August 31, 2007 TR
Soft Skills for a Digital Workplace: Verbal Communication Unit C: Developing Professional Telephone Skills.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Goodbye Snail Mail, Hello
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
ICT Essential Skills. (electronic mail) Snail Mail.
E mail Technology Ahmed Saif Al Romaithi H CL7.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Protecting ICT Systems
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
The Mail Room Unit 2d. Click to return to Sum up page MAIL HANDLING Internal Mail – communication between people within an organisation Internal Mail.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
THREATS TO MOBILE NETWORK SECURITY
9/8/20151 Voice Mail Training for State Employees Presented by: Stacy Knickerbocker Telecommunications Specialist DOA/ITSD/NTSB
Electronic Use Policies.   Social Media  Internet.
Why we use . ETIQUETTE COMMUNICATING MANAGING .
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Area Of Study 2 Information And Communications Technology(ICT)
CYBER CRIME.
At the supermarket. Bar codes The striped pattern is code for a number. The number is scanned and sent to a computer in the shop's office. The computer.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Communicating Electronically Business Communication, 15e Lehman and DuFrene Business Communication, 15 th edition by Lehman and DuFrene  Copyright 2008.
System Security and Problems Martin Coleman 10F. Problems with Security and performance There are many problems that can cause your system to perform.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
What is Data Communication? Data communication is the process of collecting and distributing data(text, voice, graphics, video, etc) electrically from.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
Edit the text with your own short phrase. The animation is already done for you; just copy and paste the slide into your existing presentation.
By :Mitchell Christie by :Mitchell Christie safety.
Internet Safety By. Connor G. Passwords  Never share your password online to strangers.  A password should be a combination of letters and numbers.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Stanford Voice Messaging Tech Express May 21, 2009.
Netiquette (Internet Etiquette)
EFFECTIVE COMMUNICATION PRESENTED BY THE SOLUTIONS GROUP.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Gmail Customer Support USA Toll-Free
4 ways to stay safe online 1. Avoid viruses and phishing scams
An Overview.
Handling Information Securely
Presentation transcript:

CUSTOMER INFORMATION SECURITY LY, PHAM HIEN

Problem Fill out ABBank’s Customer Information Form. Then receive E-letter from VietinBank.

Question How is the Bank’s Customer Information in the hand of the another Bank?

Possibility Sharing is caring Stolen the Data

Possibility 1. Share ABBank and VietinBank don’t have the relationship like partnership or corporation, considered each other as competitors. ABBank is a private-owned Bank and VietinBank is a state-owned Vietnamese Bank. Customer Information Security is one of the most important tasks. Of course: NO SHARE

Possibility Sharing is caring Stolen the Data

Possibility 2. Stolen Leaking Data from internal staffs External resources: Hackers (Viruses, Malware…) (specialization, intellectual property rights)

Simple Steps to Safeguard Confidential Business Information 1. Empty the Mailbox Never leave your Inbox overnight. This is your best defense against stealing mail. 2. Watch the Fax Try to stand by the fax machine to receive sensitive information as soon as it comes in. 3. Send Sparingly When sending sensitive information via , encrypt it first – or don’t send it at all. There’s always the possibility of interception or an accidental electronic distribution.

4. Make Copy Carefully 5. Leave the Discreet Voic Messages You never know who’s standing within earshot of someone’s work area, so avoid leaving a detailed voice- mail message if it involves sensitive information. 6. Keep things Private in Public When you’re in a public place, think twice before discussing proprietary information or any details about sensitive projects. You never know who’s listening. Simple Steps to Safeguard Confidential Business Information

7. Identify Stranger. 8. Limit Cellphone Conversation. Anyone can listen in on your cell phone conversation. All it takes is a good ear and a decent scanner. Avoid sharing any sensitive information over a cell phone.

Thank for your attention! Questions and Comments?