SlideShare uma empresa Scribd logo
1 de 10
PROTECTING PERSONAL
INFORMATION
Week 4 Group Project
Raymond Edwards
Walden University
CMIS-3001-Computing and Society
WHO IS RESPONSIBLE?
 Personal identification security has become a factor
  in society due to increased identify theft issues.
 Each individual should take care to protect their
  identity; thereby protecting their credit scores and
  background information from unscrupulous use.
 Protecting your identity is more important today with
  the use of technology.
 YOU ARE RESPONSBILE
WHERE IS THE RISK?
 Social networking sites are a catch-all for personal
  information.
 While you may think random bits of information are
  harmless, put together, a picture of your life will
  evolve.
 ―Facebook has essentially become a worldwide
  photo identification database‖ (Mui, 2011).
 In addition to Facebook, users randomly share
  information on the internet when registering for
  gifts, coupons or contests on a website.
FIVE STEPS
 The Consumer Federation of America offers ten
  steps designed to protect your personal information
  and detect fraud (Consumer Federation, 2012).
 Here are five of those steps every person should
  make it a habit to practice.
STEPS, CONTINUED
   Practice mail security –      Guard your Social
    use a public mail box to       Security number – put
    prevent unauthorized           your social security
    access to your mail.           card in a safe place
                                   (one you will
                                   remember) and only
                                   provide your social
                                   security number for a
                                   legitimate reason.
                                   Most companies will
                                   take an alternate
                                   identification number.
STEPS, CONTINUED
   Keep private information to      Monitor your accounts, bills,
    yourself—Do not give out          and bank statements—
    your private information          Check regularly for charges
    (account numbers, pins, or        that you did not make or
    passwords) over the               were not aware of making.
    telephone.

   Be safe online—Use anti-
    virus and anti-spyware to
    protect your computer.
    These programs are
    available for low cost or
    free.
The Inteqnet bqings us gqeat

websites full of   infoqmation and

enteqtainment, and email and chat

have qevolutionized communication.



    ut theqe's a daqk

side, too, as Inteqnet useqs aqe

incqeasingly conceqned about how

much of theiq peqsonal infoqmation

they'qe giving up in echange
RESPONSIBILITY
 The government is in favor of industry self-
  regulation.
 Internet users, as a body, are in favor of laws.

 Regardless which avenue is chosen, the bottom
  line is YOU are responsible for protecting your own
  information to the best of your ability.
 There are a variety of ways to protect your
  personal information without becoming paranoid
  and afraid.
 You may be exposing your private information
  without being aware.
EASY STEPS TO BEGIN A SAFE INFORMATION
JOURNEY

 Be proactive
 Be cautious when using the internet
 Never send personal information to over an
  unsecured website
 Check to make sure websites use a ‗https‘ when
  providing credit card information
 ALWAYS log out of website requiring an ID and
  password
 Be wary of links received through instant
  messaging services
 Protect, vary and renew your passwords on a
  regular basis
References

Consumer Federation of America. (2012). Ten Easy Steps to Protect Your
Personal Information and Detect Fraud (CFA). Retrieved from
http:/​/​www.consumerfed.org/​elements/​www.consumerfed.org/​file/​Ten%20Ea
sy%20Steps.pdf

Mui, C. (2011, August 8). Facebook's Privacy Issues Are Even Deeper Than
We Knew. Forbes. Retrieved from
http:/​/​www.forbes.com/​sites/​chunkamui/​2011/​08/​08/​facebooks-privacy-
issues-are-even-deeper-than-we-knew/​

Voice of America. (2009, November 1). Internet Use Raises Privacy
Concerns. Retrieved from Voice Of America Web site:
http:/​/​www.voanews.com/​content/​a-13-2008-04-29-voa44/​406559.html

Mais conteúdo relacionado

Mais procurados

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 

Mais procurados (20)

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 

Destaque

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)Heinz Marketing Inc
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 

Destaque (6)

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 

Semelhante a Wk4 project

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Tanvi Jindal
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying EyesEllie Sherven
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Saad Ahmad
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014John Bambenek
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 

Semelhante a Wk4 project (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Users guide
Users guideUsers guide
Users guide
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 

Último

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Último (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Wk4 project

  • 1. PROTECTING PERSONAL INFORMATION Week 4 Group Project Raymond Edwards Walden University CMIS-3001-Computing and Society
  • 2. WHO IS RESPONSIBLE?  Personal identification security has become a factor in society due to increased identify theft issues.  Each individual should take care to protect their identity; thereby protecting their credit scores and background information from unscrupulous use.  Protecting your identity is more important today with the use of technology.  YOU ARE RESPONSBILE
  • 3. WHERE IS THE RISK?  Social networking sites are a catch-all for personal information.  While you may think random bits of information are harmless, put together, a picture of your life will evolve.  ―Facebook has essentially become a worldwide photo identification database‖ (Mui, 2011).  In addition to Facebook, users randomly share information on the internet when registering for gifts, coupons or contests on a website.
  • 4. FIVE STEPS  The Consumer Federation of America offers ten steps designed to protect your personal information and detect fraud (Consumer Federation, 2012).  Here are five of those steps every person should make it a habit to practice.
  • 5. STEPS, CONTINUED  Practice mail security –  Guard your Social use a public mail box to Security number – put prevent unauthorized your social security access to your mail. card in a safe place (one you will remember) and only provide your social security number for a legitimate reason. Most companies will take an alternate identification number.
  • 6. STEPS, CONTINUED  Keep private information to  Monitor your accounts, bills, yourself—Do not give out and bank statements— your private information Check regularly for charges (account numbers, pins, or that you did not make or passwords) over the were not aware of making. telephone.   Be safe online—Use anti- virus and anti-spyware to protect your computer. These programs are available for low cost or free.
  • 7. The Inteqnet bqings us gqeat websites full of infoqmation and enteqtainment, and email and chat have qevolutionized communication.  ut theqe's a daqk side, too, as Inteqnet useqs aqe incqeasingly conceqned about how much of theiq peqsonal infoqmation they'qe giving up in echange
  • 8. RESPONSIBILITY  The government is in favor of industry self- regulation.  Internet users, as a body, are in favor of laws.  Regardless which avenue is chosen, the bottom line is YOU are responsible for protecting your own information to the best of your ability.  There are a variety of ways to protect your personal information without becoming paranoid and afraid.  You may be exposing your private information without being aware.
  • 9. EASY STEPS TO BEGIN A SAFE INFORMATION JOURNEY  Be proactive  Be cautious when using the internet  Never send personal information to over an unsecured website  Check to make sure websites use a ‗https‘ when providing credit card information  ALWAYS log out of website requiring an ID and password  Be wary of links received through instant messaging services  Protect, vary and renew your passwords on a regular basis
  • 10. References Consumer Federation of America. (2012). Ten Easy Steps to Protect Your Personal Information and Detect Fraud (CFA). Retrieved from http:/​/​www.consumerfed.org/​elements/​www.consumerfed.org/​file/​Ten%20Ea sy%20Steps.pdf Mui, C. (2011, August 8). Facebook's Privacy Issues Are Even Deeper Than We Knew. Forbes. Retrieved from http:/​/​www.forbes.com/​sites/​chunkamui/​2011/​08/​08/​facebooks-privacy- issues-are-even-deeper-than-we-knew/​ Voice of America. (2009, November 1). Internet Use Raises Privacy Concerns. Retrieved from Voice Of America Web site: http:/​/​www.voanews.com/​content/​a-13-2008-04-29-voa44/​406559.html