Government Agency’s Name April 2013.  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

By: Jack, Anna, Cassidy and Patrick October 7, 2008.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Identity Theft What you need to know Betty White, April 2010.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
10 Essential Security Measures PA Turnpike Commission.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
How To Protect Your Privacy and Avoid Identity Theft Online.
Securing Information in the Higher Education Office.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Scams & Schemes Common Sense Media.
Identity theft: Real or Virtual? By: Alex Metzler.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Privacy and Information Management ICT Guidelines.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protecting PHI & PII 12/30/2017 6:45 AM
Mrs. Esman Computer Special
Protecting What’s Yours: Your Identity
Scams and Schemes.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Welcome to the SPH Information Security Learning Module
Protecting Your Identity
Presented by Elizabeth Kunkel Member Service Trainer
“Credit score vocabulary”
PERSONALLY IDENTIFIABLE INFORMATION: AUDIT CONSIDERATIONS
Identity Theft Samuel H. Slater.
Presentation transcript:

Government Agency’s Name April 2013

 At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples of personally identifiable information ◦ Define identity theft ◦ Explain how identity theft impacts individuals and businesses ◦ List ways to prevent identity theft

 Personally Identifiable Information includes: ◦ Social security number ◦ Date of birth ◦ Driver’s license number ◦ Passport ◦ Student ID number ◦ Account numbers ◦ Address ◦ Access codes

Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial gain

 Every 28 minutes someone in the U.S falls victim to identity theft  Every 79 seconds a thief steals personal data to open false accounts  Over 11.1 million reports of identity theft in 2009  Over $22 billion lost by businesses  * This information reported by Identity Theft Protection, about-recovering-from-identity-theft/ about-recovering-from-identity-theft/

 As a HR rep, you can access and handle sensitive information on a daily basis  Protect information by ◦ Recognizing and protecting personally identifiable information (PII) ◦ Locking hard copy information away in desk and cabinets ◦ Using encryption when sending s containing sensitive information

 PII can be in electronic or hard copy format and both need to be protected equally ◦ Put away hard copies or conceal hard copies when others are in your work area ◦ Lock away PII when you are away from your desk ◦ Use a shredder when destroying hard copy files

 If you handle PII in electronic format be sure to protect PII by: ◦ Use strong password to ensure that your account is securely locked ◦ Always lock your computer when you step away from your desk ◦ Keep your computer screen concealed when others are in your work area ◦ Always use encryption when transmitting PII electronically

 Create strong passwords that have at least 16 characters, including numbers and special characters  Use encryption when sending s containing PII  Do not take sensitive information out of the office  Keep hard copy information locked in cabinets or drawers  Only share information with others on a need to know basis

 Ponemon studies show that data breaches cost organizations $5.5 million dollars last  39% of organizations say negligence was the root cause of the data breaches  Businesses lost $3.01 million due to reputational damage because of data breaches *Information provided by Ponemon Institute

Listen to this victim testimony at