Download presentation
Presentation is loading. Please wait.
Published byGriffin Harmon Modified over 8 years ago
1
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles 100 200 300 400 500
2
Examples of these are Facebook, MySpace, Flickr, and LinkedIn. Just Browsing - 100
3
An example of this is when you notice a padlock icon displayed somewhere in your browser window (location depends on the browser being used). Just Browsing - 200
4
You should never use these in your passwords anywhere, especially on Web sites. Just Browsing - 300
5
I should ensure this is done regularly in order to make sure a computer is better secure from Internet attacks. Just Browsing – 400
6
This person is ultimately responsible to protect information entrusted to him/her and computers he/she operates from threats. Just Browsing - 500
7
These are blue, and should not be used for the secure authorized disposal of media or documents. Keep out – Private! - 100
8
The Freedom of Information and Protection of Privacy Act applies to briefing notes, personal information, emails, hand written memos but not this. Keep out – Private! - 200
9
If you suspect private information has been compromised you should notify this person in your organization. Keep out – Private! - 300
10
This is the number of days that a government ministry or agency has to respond to an applicant’s request for access under FOIPPA. Keep out – Private! - 400
11
Acknowledging the request is considered the first step followed as part of this obligation when a request for access to information is made. Keep out – Private! - 500
12
If you use a mixture of alpha- numeric characters, allowable symbols, and ensure you use 8 or more characters in total, you have one of these. Pushing IT - 100
13
If you use peer-to-peer software or install unauthorized software while using a government computer, or use government e-mail to operate a personal business you are in violation of this. Pushing IT - 200
14
You should contact this person if you receive a phone call asking you to share your password with the caller. Pushing IT - 300
15
My laptop should not spend any time in this state while I am not in a safe place (my office or in my locked home). Pushing IT - 400
16
This term is used to collectively describe software viruses, spyware, worms, and trojan horses among others. Pushing IT - 500
17
Records that pertain to the "housekeeping" activities including the management of facilities, property, material, human resources, and information systems. You sound like a broken record - 100
18
These include convenience copies, transitory records, published records, and non- work related records that may be disposed of without written authorization from the Provincial Archivist. You sound like a broken record - 200
19
If a person wants to request access to records in the possession of the Government of Saskatchewan they use this. You sound like a broken record - 300
20
This refers to the authority under which government organizations may dispose of records no longer required. Include the timetables for both the retention and the destruction of records. You sound like a broken record - 400
21
This type of record schedule is a classification system and retention schedule related to the operations specific for the services provided by your ministry or branch according to mandate or policy. You sound like a broken record - 500
22
A common acronym for The Freedom of Information and Protection of Privacy Act. Legal Beagles - 100
23
This event is recognized in Saskatchewan the last week of September and relates to a citizens right to access information. Legal Beagles - 200
24
The commonly known name for sections in The Freedom of Information and Protection of Privacy Act that outlines types of information in government records that must or may be withheld from access if requested. Legal Beagles - 300
25
The law in Saskatchewan that allows an individual to request access to any government record. Legal Beagles - 400
26
The three Saskatchewan statutes that address either access to personal information or personal health information. Legal Beagles - 500
27
What are social networking sites? Just Browsing - 100
28
What is a secure Web site? Just Browsing - 200
29
What are dictionary words? Just Browsing - 300
30
What is patch or update software? Just Browsing - 400
31
Who is the user? Just Browsing - 500
32
What are recycling bins? Keep out - Private! - 100
33
What is personal health information? Keep out - Private! - 200
34
Who is my organization's Privacy Officer? Keep out - Private! - 300
35
What is thirty (30) days? Keep out - Private! - 400
36
What is "Duty to Assist?" Keep out - Private! - 500
37
What is a hard to guess password? Pushing IT - 100
38
What is the Information Technology Acceptable Usage Policy? Pushing IT - 200
39
Who is my organization's Security Officer? Pushing IT - 300
40
What is unattended? Pushing IT - 400
41
What is malware? Pushing IT - 500
42
What are administrative records? You sound like a broken record - 100
43
What are non-government records? You sound like a broken record - 200
44
What is the Access to Information Request Form? You sound like a broken record – 300
45
What are records retention schedules? You sound like a broken record - 400
46
What are Operational Records Systems (ORS)? You sound like a broken record - 500
47
What is FOIP? Legal Beagles - 100
48
What is Right to Know Week? Legal Beagles - 200
49
What are exemptions? Legal Beagles - 300
50
What is The Freedom of Information and Protection of Privacy Act? Legal Beagles - 400
51
What is The Freedom of Information Protection of Privacy Act, The Local Authority Freedom of Information and Protection of Privacy Act and The Health Information Protection Act? Legal Beagles - 500
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.