IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.

Slides:



Advertisements
Similar presentations
The Help Desks Guide To Accessing Your Midlands Technical College Account Using Microsoft Outlook Web Access.
Advertisements

Legal Meetings: Extended Instructions on Movica and Screencast.
Click the home button to go to the map. Click the arrow to advance the slides.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Orgainizing Your Digital Documents. What is a File Structure Organizing your files Server space .
HOW TO CHANGED PASSWORD. Step 1 : Login Login to the computer using staf username. Go to Start  Control Panel Click Mail.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
LSM Teacher Online Recommendation Submission Process.
PII – Identifying and Managing Risk Presented by: UNL Office of Internal Audit and ITS Security March 2014.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Allison Dolan Program Director, Protecting PII Handling Sensitive Data - WISP and PIRN.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Information Security Office 1 Copyright Statement Copyright Mary Ann Blair This work is the intellectual property of the author.
What is the UF VPN Client, and How Do I Use it? (for Windows XP/7/ 8 Users). Presented by the Course Reserves Unit, George A. Smathers Libraries
What is the UF VPN Client, and How Do I Use it? (for OS X users). Presented by the Course Reserves Unit, George A. Smathers Libraries
Penn State University College Of Education Understanding College of Education Resources.
Protecting Sensitive Information PA Turnpike Commission.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.
Credit History Your Financial Reputation. What is credit? Credit is a promise.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Identity Theft.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Academic Search Premier Saving search results: mailing, printing, saving University Library next = click.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
ONE® Pages Training Presentation North York General Hospital.
You. are at risk for the fastest growing crimes crime.
Palm Creek RV and Golf Resort December 07, 2011 Garth Vanstone.
Cyber Safety Jamie Salazar.
Procedures Manual 1.Removing sensitive informationRemoving sensitive information.
GP 2015 Client Event. Management Reporter As of 5/1/2015 the most recent version of MR is 2012 Cumulative Update 12. Mainstream Support for FRx 6.7 ended.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
Instructional/6-8/General Session 1 of 1 Get Going with eChalk Digital File Locker.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
INFORMATION TECHNOLOGY AT UAB Rates and Services For FY
HOW CREATE AN OUTLOOK DATA FILE (.PST FILE?) ERICSON BRANDON M. BASCUG Alternate – REGIONAL NETWORK ADMINISTRATOR.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Topics to be discussed layout external layout internal Junk /spam Folders for storage Adding/Deleting contacts Adding/Deleting groups.
OST TO PST How to deal with the problem of OST when Outlook gets terminated abruptly ?
Before Starting Course Ensure Developer ribbon is visible in Microsoft Excel (see following slides) Check security settings (see following slides) You.
Using Microsoft Outlook Training By Gary Lane.
Identity Finder Client
ArcGIS Pro Overview June 2017.
Welcome © GTM Software. Welcome © GTM Software.
WikID installation/training
How to Do CD/DVD Data Recovery
EOC/NCFE/CTE Testing Laptop Preparations
* First of all, you need to click “Start”, “Control Panel” and then System and Security. After this, you need to click on the link ‘Back up Your Computer’
Information Security Seminar
EPaperlessOffice Setup, Use & Marketing.
ONE® Pages Training Presentation
EPaperlessOffice Setup, Use & Marketing.
Modular Object Scanning Technology (MOST)
Purchase Order Receiving
You can please some of the people some of the time…
Information Technology Services
You can please some of the people some of the time…
Saving emergency contacts to your smartphone
Presentation transcript:

IDENTITY FINDER TRAINING

What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally identifiable information, including social security numbers, credit card numbers, bank account numbers, and driver license numbers.

Why Should I Install Identity Finder?  In order to reduce the risk to the University, we need all faculty and staff to locate where sensitive data lives and eliminate all instances that do not need to be maintained.  Often times we don’t think we store sensitive data. However, after scanning we find that data lives in unexpected places and many times there are high thresholds of this data.

How Often Should I Scan?  You can scan as often as you like. However, at least one scan should be completed every six months and all sensitive data found that does not need to be maintained by the University should be digitally shredded using Identity Finder.

Who Should Use Identity Finder?  ITS strongly urges that all faculty and staff that have been provisioned Pace University computers should install and scan using Identity Finder.

What Files Does Identity Finder Scan?  Identity Finder will scan all user files that are located on your local computer. If you have Microsoft Outlook installed on your computer, it will search all that has been downloaded locally.

Review Your Scan  Next, click on the “Advanced” option to review your results.

Save and Close Identity Finder  Please make sure that after you have completed deleting items to save your work.  After saving your work, please close the Identity Finder program.