SlideShare une entreprise Scribd logo
1  sur  11
PROTECTING PERSONAL PRIVACY
         Securing Your Online Information




                             http://www.life123.com/career-money/credit-
                                debt/identity-theft/common-identity-theft-
                                                             scams.shtml
How safe is your
 information on the web?
• As technology
  advances, information
  becomes easier and
  faster to send between
  locations. This
  convenience is nice,
  but security becomes
  paramount in
  guaranteeing that
  private information is
  not accessed by
  unauthorized viewers.
                           https://blog.facebook.com/blog.php?post=4
                                                         13846952130
Personal information can be disclosed
            on all kinds of websites
• Social Media Sites:
  Facebook, Twitter,
  Myspace, etc.
• Purchasing Websites:
  Amazon, E-Bay, etc.
• Any other website that
  requires creating an
  account
• Other parties may not
  even have to put in any
  effort to gather
  information. Depending
  on settings, the user may
  have all their information
  already displayed.
                                       *This is a fake profile
What can they do with
    your information?
• Use it to access
  other personal
  accounts
• Identity theft,
  reputation
  damage
• Sell your
  information to
  other parties
• Blackmail, bribery   http://www.wikinvest.com/concept/Identity_Theft
Some information should never be given out unless

      you know the source is completely trustworthy



•   Social Security Number
•   Credit Card Numbers
•   Account passwords
•   Addresses and Phone
    Numbers
                                   http://issbs.com/how-to-find-the-best-option-in-
                                                                    credit-cards-2/
Methods used to access
   personal information

• Phishing
• Spyware/
Malware
• Hacking
• Simple searches

                    http://ant.sillydog.org/blog/2004/000293.php
You may not even know your information is
         compromised until its too late
• Universities have been
  targets for ID thieves
• One attack went
  unnoticed for over a
  year
• No U.S. law was
  implemented requiring
  the university to notify
  individuals that their
  information had been
  stolen                      http://en.wikipedia.org/wiki/Ohio_University
Apprehending violators is
       difficult
• Anonymity adds to
  difficulty
• Victims must spend time
  and $$ to attempt to
  correct the situation
• Law enforcement,
  government and credit
  industries add
  complications to
  resolving the situation in
  a timely manner
                               http://appraisalnewsonline.typepad.com/appraisal_n
                                                     ews_for_real_e/identity_theft/
However, there are punishments for
 those caught committing these crimes
• State laws vary, but
  federal laws have
  begun to crack down
  on identity theft related
  crimes
• Identity Theft Penalty
  Act raises max
  sentence from 3 to 5
  years in prison with
  additional years
  depending on the
  specific crime              http://www.cybercrimesunit.com/?p=374
Simple Steps to Protect
 Your Online Information
• Never give out your
  information to people you
  do not know or trust
• Be sure to have all your
  essential programs
  updated to their current
  release
• Use secure passwords for
  accounts
• Have antivirus and
  spyware/malware
  programs installed and
  enabled
• Keep other electronic       http://simpleit1.tech.officelive.com/ProtectionSoftware.aspx

  devices with links to
  personal accounts secure
Useful Computer
              Programs
• CCleaner: http://www.piriform.com/ccleaner
• MalwareBytes: http://www.malwarebytes.org/
• NoScript(If using Mozilla Firefox browser):
  http://noscript.net/
• Antivirus Programs and more:
  o   AVG: http://free.avg.com/us-en/homepage
  o   Nod32: http://www.eset.com/us/
  o   Avast!: http://www.avast.com/en-us/index
  o   Aviria: http://www.avira.com/en/index
  o   Comodo: http://www.comodo.com/
  o   Norton: http://www.symantec.com/index.jsp

Contenu connexe

Tendances

Cabaran penggunaan internet dan media sosial
Cabaran penggunaan internet dan media sosialCabaran penggunaan internet dan media sosial
Cabaran penggunaan internet dan media sosialShaiffulnizam Mohamad
 
slide maraknya HOAX di era digital
slide maraknya HOAX di era digitalslide maraknya HOAX di era digital
slide maraknya HOAX di era digitalasky M
 
Slaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan KomputerSlaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan Komputerrazak12345
 
Maksud internet dan perkhidmatan internet [kb1]
Maksud internet dan perkhidmatan internet [kb1]Maksud internet dan perkhidmatan internet [kb1]
Maksud internet dan perkhidmatan internet [kb1]eza aziz
 
Bab 3 teori gelagat pengguna
Bab 3 teori gelagat penggunaBab 3 teori gelagat pengguna
Bab 3 teori gelagat penggunaSyahira Md Desa
 
Bab 1 kemahiran komunikasi
Bab 1   kemahiran komunikasiBab 1   kemahiran komunikasi
Bab 1 kemahiran komunikasiIzyani Ma'syuqi
 
Textiles online reservation(jakel)
Textiles online reservation(jakel)Textiles online reservation(jakel)
Textiles online reservation(jakel)Chaerry Cha
 
Undang undang dalam komunikasi
Undang undang dalam komunikasiUndang undang dalam komunikasi
Undang undang dalam komunikasiFreedy Kalang
 
kepentingan-ict-dan-komputer-dalam-kehidupan-seharian
kepentingan-ict-dan-komputer-dalam-kehidupan-sehariankepentingan-ict-dan-komputer-dalam-kehidupan-seharian
kepentingan-ict-dan-komputer-dalam-kehidupan-seharianainzd78
 
Perkhidmatan Psikiatri di Malaysia
Perkhidmatan Psikiatri di MalaysiaPerkhidmatan Psikiatri di Malaysia
Perkhidmatan Psikiatri di MalaysiaMuhammad Nasrullah
 
Be A Digital Superhero: Digital Citizenship for Children
Be A Digital Superhero: Digital Citizenship for ChildrenBe A Digital Superhero: Digital Citizenship for Children
Be A Digital Superhero: Digital Citizenship for ChildrenIndriyatno Banyumurti
 
Borang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa Widad
Borang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa WidadBorang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa Widad
Borang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa Widadfizanmahat1
 
Budaya keamanan digital
Budaya keamanan digitalBudaya keamanan digital
Budaya keamanan digitalUnggul Sagena
 

Tendances (20)

Cabaran penggunaan internet dan media sosial
Cabaran penggunaan internet dan media sosialCabaran penggunaan internet dan media sosial
Cabaran penggunaan internet dan media sosial
 
slide maraknya HOAX di era digital
slide maraknya HOAX di era digitalslide maraknya HOAX di era digital
slide maraknya HOAX di era digital
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Slaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan KomputerSlaid bab 1.3 Keselamatan Komputer
Slaid bab 1.3 Keselamatan Komputer
 
Maksud internet dan perkhidmatan internet [kb1]
Maksud internet dan perkhidmatan internet [kb1]Maksud internet dan perkhidmatan internet [kb1]
Maksud internet dan perkhidmatan internet [kb1]
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Bab 3 teori gelagat pengguna
Bab 3 teori gelagat penggunaBab 3 teori gelagat pengguna
Bab 3 teori gelagat pengguna
 
Etika Penggunaan Internet
Etika Penggunaan InternetEtika Penggunaan Internet
Etika Penggunaan Internet
 
Bab 1 kemahiran komunikasi
Bab 1   kemahiran komunikasiBab 1   kemahiran komunikasi
Bab 1 kemahiran komunikasi
 
Mail server
Mail serverMail server
Mail server
 
Masalah komputer
Masalah komputerMasalah komputer
Masalah komputer
 
Textiles online reservation(jakel)
Textiles online reservation(jakel)Textiles online reservation(jakel)
Textiles online reservation(jakel)
 
Phishing
PhishingPhishing
Phishing
 
Undang undang dalam komunikasi
Undang undang dalam komunikasiUndang undang dalam komunikasi
Undang undang dalam komunikasi
 
kepentingan-ict-dan-komputer-dalam-kehidupan-seharian
kepentingan-ict-dan-komputer-dalam-kehidupan-sehariankepentingan-ict-dan-komputer-dalam-kehidupan-seharian
kepentingan-ict-dan-komputer-dalam-kehidupan-seharian
 
Perkhidmatan Psikiatri di Malaysia
Perkhidmatan Psikiatri di MalaysiaPerkhidmatan Psikiatri di Malaysia
Perkhidmatan Psikiatri di Malaysia
 
Be A Digital Superhero: Digital Citizenship for Children
Be A Digital Superhero: Digital Citizenship for ChildrenBe A Digital Superhero: Digital Citizenship for Children
Be A Digital Superhero: Digital Citizenship for Children
 
Borang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa Widad
Borang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa WidadBorang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa Widad
Borang Soal Selidik Masalah Keewangan Dikalangan Mahasiswa Widad
 
Budaya keamanan digital
Budaya keamanan digitalBudaya keamanan digital
Budaya keamanan digital
 

En vedette

Support for the Internet of Things
Support for the Internet of ThingsSupport for the Internet of Things
Support for the Internet of ThingsRadialpoint
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkReadWrite
 
Our Mobile Planet - Les chiffres France
Our Mobile Planet - Les chiffres FranceOur Mobile Planet - Les chiffres France
Our Mobile Planet - Les chiffres FranceDenis Verloes
 
The New Multiscreen World By Google
The New Multiscreen World By GoogleThe New Multiscreen World By Google
The New Multiscreen World By Googleservicesmobiles.fr
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

En vedette (10)

Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Support for the Internet of Things
Support for the Internet of ThingsSupport for the Internet of Things
Support for the Internet of Things
 
Data protection act
Data protection act Data protection act
Data protection act
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
 
Our Mobile Planet - Les chiffres France
Our Mobile Planet - Les chiffres FranceOur Mobile Planet - Les chiffres France
Our Mobile Planet - Les chiffres France
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Vietnam E-commerce Report 2016
Vietnam E-commerce Report 2016 Vietnam E-commerce Report 2016
Vietnam E-commerce Report 2016
 
The New Multiscreen World By Google
The New Multiscreen World By GoogleThe New Multiscreen World By Google
The New Multiscreen World By Google
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similaire à Protecting Personal Privacy

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy ARYAS87
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internetomarjohni
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 

Similaire à Protecting Personal Privacy (20)

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Day 2
Day 2Day 2
Day 2
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internet
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Protecting Personal Privacy

  • 1. PROTECTING PERSONAL PRIVACY Securing Your Online Information http://www.life123.com/career-money/credit- debt/identity-theft/common-identity-theft- scams.shtml
  • 2. How safe is your information on the web? • As technology advances, information becomes easier and faster to send between locations. This convenience is nice, but security becomes paramount in guaranteeing that private information is not accessed by unauthorized viewers. https://blog.facebook.com/blog.php?post=4 13846952130
  • 3. Personal information can be disclosed on all kinds of websites • Social Media Sites: Facebook, Twitter, Myspace, etc. • Purchasing Websites: Amazon, E-Bay, etc. • Any other website that requires creating an account • Other parties may not even have to put in any effort to gather information. Depending on settings, the user may have all their information already displayed. *This is a fake profile
  • 4. What can they do with your information? • Use it to access other personal accounts • Identity theft, reputation damage • Sell your information to other parties • Blackmail, bribery http://www.wikinvest.com/concept/Identity_Theft
  • 5. Some information should never be given out unless you know the source is completely trustworthy • Social Security Number • Credit Card Numbers • Account passwords • Addresses and Phone Numbers http://issbs.com/how-to-find-the-best-option-in- credit-cards-2/
  • 6. Methods used to access personal information • Phishing • Spyware/ Malware • Hacking • Simple searches http://ant.sillydog.org/blog/2004/000293.php
  • 7. You may not even know your information is compromised until its too late • Universities have been targets for ID thieves • One attack went unnoticed for over a year • No U.S. law was implemented requiring the university to notify individuals that their information had been stolen http://en.wikipedia.org/wiki/Ohio_University
  • 8. Apprehending violators is difficult • Anonymity adds to difficulty • Victims must spend time and $$ to attempt to correct the situation • Law enforcement, government and credit industries add complications to resolving the situation in a timely manner http://appraisalnewsonline.typepad.com/appraisal_n ews_for_real_e/identity_theft/
  • 9. However, there are punishments for those caught committing these crimes • State laws vary, but federal laws have begun to crack down on identity theft related crimes • Identity Theft Penalty Act raises max sentence from 3 to 5 years in prison with additional years depending on the specific crime http://www.cybercrimesunit.com/?p=374
  • 10. Simple Steps to Protect Your Online Information • Never give out your information to people you do not know or trust • Be sure to have all your essential programs updated to their current release • Use secure passwords for accounts • Have antivirus and spyware/malware programs installed and enabled • Keep other electronic http://simpleit1.tech.officelive.com/ProtectionSoftware.aspx devices with links to personal accounts secure
  • 11. Useful Computer Programs • CCleaner: http://www.piriform.com/ccleaner • MalwareBytes: http://www.malwarebytes.org/ • NoScript(If using Mozilla Firefox browser): http://noscript.net/ • Antivirus Programs and more: o AVG: http://free.avg.com/us-en/homepage o Nod32: http://www.eset.com/us/ o Avast!: http://www.avast.com/en-us/index o Aviria: http://www.avira.com/en/index o Comodo: http://www.comodo.com/ o Norton: http://www.symantec.com/index.jsp