Procedures Manual 1.Removing sensitive informationRemoving sensitive information.

Slides:



Advertisements
Similar presentations
Choose and Book Archive New functionality from November 2012.
Advertisements

Copyright 2007, Paradigm Publishing Inc. EXCEL 2007 Chapter 6 BACKNEXTEND 6-1 LINKS TO OBJECTIVES Workbook properties Workbook properties Workbook Sharing.
Using Track Changes in Microsoft Word Navigating Directions Click on the arrows or the home button located in the bottom right-hand corner of each.
E-Pay User Guide By Alphabeta Consulting Limited Liability Partnership.
Steps to Recover Private Encryption Keys
Service Point 5 ReportWriter How to create and run reports in ReportWriter.
Microsoft Expression Web-Illustrated Unit L: Using Code Tools.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs Using the Taskbar, opening & switching.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
HOW TO USE BY ALEX ROSS ALEX ROSS. HOW TO CREATE ACCOUNT FOR DUMMIES is a great way to communicate with others. We can interact with.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 FOR OFFICIAL USE ONLY How To Add a CATMS Team Mailbox to Your Outlook Profile.
Copyright 2007, EMC Paradigm Publishing Inc. WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs.
Penn State University College Of Education Understanding College of Education Resources.
Security SIG August 19, 2010 Justin C. Klein Keane
There is a description of each database on this page.
What is Yahoo Desktop Search? Yahoo! Desktop Search is an indexing tool that enables you to find any of your files, s, attachments, instant messages.
Step by Step Instruction: How to Conduct Direct Certification using Individual Student Look Up Released January 2014 “How to Conduct Direct Certification.
Quick Start Guide: Filters Advanced Learn about: 1.What filters are and their functionality 2.How to create a filter using Samples, Equipment & Labels.
Microsoft Office 2003 Illustrated Introductory with Programs, Files, and Folders Working.
What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 1 Exploring Microsoft Office Word 2007 Chapter 7 The Advanced User Robert Grauer, Keith Mulbery,
Data Analysis and Security 11 Session Version 1.0 © 2011 Aptech Limited.
Lesson 1: Reviewing Documents
Microsoft Windows 7 Essential Introduction to Windows 7.
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Office 2003 Advanced Concepts and Techniques M i c r o s o f t PowerPoint Collaboration Feature Delivering Presentations to and Collaborating with Workgroups.
1. Chapter 25 Protecting and Preparing Documents.
Configuring Data Protection Chapter 12 powered by dj.
VistA Imaging Workstation Configuration. October The information in this documentation includes functionality of the software after the installation.
Edmo.do/j/q4b8fs xnt8zb SAVE DOCUMENTS TO EDMODO WEBSITE.
Microsoft Publisher 2010 Chapter 1 Creating a Flyer.
1 Configuring Hardware on a Computer Running Windows XP Professional.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Welcome to the Business Source Premier tutorial By the end of this tutorial you should be able to: Do a basic search to find references Use search techniques.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
Microsoft Office XP Illustrated Introductory, Enhanced with Programs, Files, and Folders Working.
Security Planning and Administrative Delegation Lesson 6.
Moving and Copying Text Instructor: Glenda H. Easter ITSW 1401, Intro to Word Processing.
Track Changes: Electronic Editing Made Easy An Instruction Manual By Eme Crawford & Elizabeth Smith.
A STEP-BY-STEP GUIDE FOR NAVIGATING AROUND THE HOME PANE COMPOSING & SENDING MESSAGES REPLYING TO MESSAGES ATTACHING FILES DELETING MESSAGES PRINTING MESSAGES.
For the benefit of business and people Lotus Notes R6 Training 4 February 2016 IT Division.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
® Microsoft Access 2010 Tutorial 9 Using Action Queries and Advanced Table Relationships.
1 Logging into the new PCard (PaymentNet) System: PAYMENTNET * Introduction * May use IE 8.0 or greater or Firefox * Do not.
Service Point 5 ReportWriter How to run reports in ReportWriter.
Guide to downloading files from the communication centre March 2013.
Easy way to check if you have large Folders or Files Another way to check if you have large Folders or Files Deleting Files and Folders Flexible IT supporting.
OVERVIEW OF WINDOWS BCOMP0101 Introduction to Information Technology Noris Bt. Ismail Faculty of Information and Communication Technology Tel :
Identity Finder Client
The Login Page is the first page your customers
Service Point 5 ReportWriter
Customizing the Quick Access Toolbar in Microsoft Office
Service Point 5 ReportWriter
How to Disable or Enable Virus Protection on McAfee?
How to Fix a Norton Security Certificate Problem?
HOW TO PUT PASSWORD IN WORD, SPREAD SHEET AND DATABASE
Microsoft Word 2003 Illustrated Complete
How to Change File Associations in Windows 10?.  In order to change the file association for a particular file, you need to right-click a file and then.
How to use Avast to Disable SSL/TLS in Outlook.  Here, you need to begin with opening Outlook and launch the “File” tab. Then you are required to click.
Lesson 7: Plan a Presentation
Lesson 7 Plan a Presentation
Lesson 7 Plan a Presentation
Executive Reports, Instructions and Documentation
How To Password Protect A PDF Free With or Without Acrobat.
Computer Tips November 2018.
Presentation transcript:

Procedures Manual 1.Removing sensitive informationRemoving sensitive information

Running Identity Finder Identity Finder (IDF) is a program that finds sensitive personal information on your computer. IDF is automatically loaded on your computer. While IDF will show you the suspect information, it is up to you to dispose of it. This is what you will see… Choose Advanced…

Removing sensitive information These are the files suspected of containing Sensitive Information. You should decide what to do with each match, false positives can be deleted or ignored.

Removing sensitive information These icons are used to Shred, Scrub, and Secure or Ignore the findings. All findings MUST be resolved by one of these options.

Removing sensitive information Shred utilizes a secure wiping technique to delete files. Scrub is great when you no longer need the personal information but want to keep the original item. This feature is also known as Redact. Use these tabs to shred or Scrub the matches

Removing sensitive information The preview Pane on the right shows the suspected password, credit card # or SSN. Look at each line and decide if the data should be protected or ignored.

Removing sensitive information In this case, the password (Support) is an example in a user guide, it can be ignored. Highlight the line and Click ‘Ignore’, then ‘This Item Location’.

Removing sensitive information Verify that you want to ignore this location. Click Yes.

Removing sensitive information The file will be removed from the list and the next match will be shown in the preview pane and highlighted.

Removing sensitive information If Shred is chosen a verification box also pops up, choose Yes to shred the document.

Removing sensitive information You will get verification that the selected item was shredded. Click OK.

Removing sensitive information The next two documents contain multiple matches. Further examination reveals that they are not real SSNs and all can be ignored.

Removing sensitive information So select Ignore. Then ‘This Item Location’. These files will be ignored in future scans.

Removing sensitive information (continued) You are to select shred, scrub, secure, quarantine, recycle or ignore for each item found. If you do not select one of the above, your scan is incomplete. You can also right-click on the match to resolve it

Removing sensitive information In the end after all items are reconciled, Identity Finder should have no Items to show. Close the program.

Removing sensitive information (continued) If you have questions or need help please Or call (936)