SlideShare une entreprise Scribd logo
1  sur  27
Security and Privacy
for Creating Confident Customers

                        Know how. Know now.

  Jenny Nixon, Jay Jenkins, Connie Hancock
          UNL Extension Educators
Reputation Economy
   E-Commerce has moved from a big impersonal
    space to a personalized customer experience

   Customers are looking for:
      Reasons to be confident of your business
       reputation
         Testimonials from previous customers
         Ease of use
         Certificates of authenticity
         Stated privacy and security policies
                              Know how. Know now.
What is Security and Privacy?
   Process of identifying and protecting your assets
      Business data
      Customer data
      Hardware
      Software
      Reputation

   Restricting access to authorized people



                               Know how. Know now.
Security - Define
   A Security Plan is used to:
      identify, measure, monitor, and control risks
       arising from the electronic exchange of
       information

   A Security Policy is a written statement that
    describes:
      What assets are to be protected, why, and who is
       responsible


                                Know how. Know now.
Privacy Policy - Defined
Privacy policy: a statement that declares a business'
policy on how it


                Collects,                     Stores,   Releases

                            Personal Information
It informs what information is collected, whether it is
kept confidential, shared with partners, or sold to others.
http://en.wikipedia.org/wiki/Privacy_policy




                                                 Know how. Know now.
Data Security vs Use
   Data Needs
      Confidentiality
         Secure from unauthorized disclosure
      Integrity
         Unchanged
         Authentic
         Secure from destruction
      Available for use


                              Know how. Know now.
What information do I need to collect?
   Know what information you are collecting
   Know why you collect each piece of information




                             Know how. Know now.
What will I do with collected data?
   Develop a policy for storing and accessing
      collected data
     Publish this policy on your web site
     Follow your policy
     Re-examine policy periodically




                               Know how. Know now.
Do Your Homework
 How much business do you expect to
 conduct electronically?

   A few items?
   A moderate number of items?
   Large scale electronic sales?


                           Know how. Know now.
Things to Consider
   What forms of payment do I want to accept?
     Credit cards
     Debit cards
     Checks
     Gift cards
     International payments
   What sort of processing features do I need?
   What reporting features do I need?



                              Know how. Know now.
E-Commerce Options
 Third Party Store
   eBay
   Etsy
   Amazon
   Grow Nebraska
 Third Party Payment Processor
   Google Checkout
   PayPal
   Love Apple Farms

                      Know how. Know now.
E-Commerce Options

 Third Party Payment Gateway
   Authorize.net
   PayPal
   Harley Farms


 Totally Integrated CMS

                      Know how. Know now.
Pros and Cons
 Third Party Store
   Pro
      Minimal setup
      Flexible fee schedules
      Payment security is taken care of
   Con
      Minimal customization
      No “Home Page”
      Minimal SEO
                            Know how. Know now.
Pros and Cons
 Payment Processor
   Pro
      No integration into backend
      No security needed for payments
   Con
      Customer goes to different site and may
      reconsider purchase




                            Know how. Know now.
Pros and Cons
 Payment Gateway
   Pros
      Customers stay on your site
      Purchase process is integrated into your site
   Cons
      Takes more work
         Higher level of technology needed
         Must obtain SSL certificate

                             Know how. Know now.
Features to Consider
   24/7 availability and support
   Real time feedback for customers
   Redundancy
   Anti-fraud and security solutions
   Rates and fee structures
   Trusted platform
   Stocking and order tracking
   Tax calculations
   Integration into current platform
   Ease of use
                               Know how. Know now.
Payment Processor Questions
   Data
      Where is it?
      Who has access? Are they authorized?
      How is it protected?
      How is it shared or transmitted?
      Do I have insurance against a security breach?
      What happens in a disaster? Redundancy?
      How is data backed up and restored?
      Is it scanned for vulnerability?

                               Know how. Know now.
Local Security
   Know what you have
      Data
      Hardware
      Networks
      Software
   Know where it is and how it is secured
   Know who has access
   Use policies, procedures, and reporting
   Understand legal compliance

                               Know how. Know now.
Local Security
   Secure and limit access to digital as well as physical
    assets
      Keys vs Passwords
         Hardware
         Software
         Network
      Safe or vault vs Redundant and offsite backup
      Visual vs Electronic identity
      US Mail vs Cryptography
   Keep hardware and software up to date

                                 Know how. Know now.
Create Confident Customers
 Create and post Security and Privacy
    Policies
   Stick to your policy
   Be vigilant
   Use visual clues




                           Know how. Know now.
Visual Security Clues
   Third party certificates of authority
   Green Address Browser Bar




   https://
   Padlock symbol



                                 Know how. Know now.
Mobile Payment Platforms
  Square
  Paypal Here
  GoPayment (Intuit)
  SalesVu
  ProPay Jak
  North American Bancard – Pay Anywhere
  Inner Fence



                         Know how. Know now.
Features to Consider
   Cost of reader and/or app
   Transaction costs
   Encrypted data
   Electronic receipts
   Tipping system
   Cash register and POS functions
   Reporting options
   Signature requirements
   Access to funds speed

                              Know how. Know now.
Optional Features
   Work with Windows machine
   Manage cash transactions
   Refunds/Credit
   Customized store




                           Know how. Know now.
Resources
   VISA e-Commerce Merchant’s Guide to Risk
    Management
   BBB Data Security FAQ
   Payment Card Industry Data Security Standard
   GeoTrust: Creating an e-Commerce Web Site
   AVG Small Business Security Guide
   E-commerce Security Best Practice Guidelines
   Fundamentals Guidelines of e-Commerce Checkout
    Design
   Broadband YouTube Videos
   Security Squad

                            Know how. Know now.
Upcoming Events
   Building Your Brand
      Women in Ag – Kearney, Feb 21,22
   eXtension Webinars - https://learn.extension.org/
      Cool Tools – Feb 14, 2013
      Pinterest – March 14, 2013
   Broadband Webinars – http://broadband.nebraska.gov
      Making Security a Priority Feb 20, 2013
      Going Mobile – March 20, 2013


                             Know how. Know now.
Contact Information
   UNL Extension Educators

   Jenny Nixon
      jnixon@unl.edu
   Connie Hancock
      chancock1@unl.edu
   Jay Jenkins
      jjenkins2@unl.edu


                              Know how. Know now.

Contenu connexe

Similaire à Security and Privacy

What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...i2Coalition
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataTyler Hannan
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web SiteDonny Shimamoto
 
eCommerce Course - Dan Bond - Dec. 2011
eCommerce Course - Dan Bond - Dec. 2011eCommerce Course - Dan Bond - Dec. 2011
eCommerce Course - Dan Bond - Dec. 2011Daniel Bond
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 

Similaire à Security and Privacy (20)

What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Just Enough Authentication
Just Enough AuthenticationJust Enough Authentication
Just Enough Authentication
 
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
Webinar: Protect Your Customers, Protect Yourself Learn How to Take Precautio...
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
 
eCommerce Course - Dan Bond - Dec. 2011
eCommerce Course - Dan Bond - Dec. 2011eCommerce Course - Dan Bond - Dec. 2011
eCommerce Course - Dan Bond - Dec. 2011
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 

Dernier

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Dernier (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Security and Privacy

  • 1. Security and Privacy for Creating Confident Customers Know how. Know now. Jenny Nixon, Jay Jenkins, Connie Hancock UNL Extension Educators
  • 2. Reputation Economy  E-Commerce has moved from a big impersonal space to a personalized customer experience  Customers are looking for:  Reasons to be confident of your business reputation  Testimonials from previous customers  Ease of use  Certificates of authenticity  Stated privacy and security policies Know how. Know now.
  • 3. What is Security and Privacy?  Process of identifying and protecting your assets  Business data  Customer data  Hardware  Software  Reputation  Restricting access to authorized people Know how. Know now.
  • 4. Security - Define  A Security Plan is used to:  identify, measure, monitor, and control risks arising from the electronic exchange of information  A Security Policy is a written statement that describes:  What assets are to be protected, why, and who is responsible Know how. Know now.
  • 5. Privacy Policy - Defined Privacy policy: a statement that declares a business' policy on how it Collects, Stores, Releases Personal Information It informs what information is collected, whether it is kept confidential, shared with partners, or sold to others. http://en.wikipedia.org/wiki/Privacy_policy Know how. Know now.
  • 6. Data Security vs Use  Data Needs  Confidentiality  Secure from unauthorized disclosure  Integrity  Unchanged  Authentic  Secure from destruction  Available for use Know how. Know now.
  • 7. What information do I need to collect?  Know what information you are collecting  Know why you collect each piece of information Know how. Know now.
  • 8. What will I do with collected data?  Develop a policy for storing and accessing collected data  Publish this policy on your web site  Follow your policy  Re-examine policy periodically Know how. Know now.
  • 9. Do Your Homework  How much business do you expect to conduct electronically?  A few items?  A moderate number of items?  Large scale electronic sales? Know how. Know now.
  • 10. Things to Consider  What forms of payment do I want to accept?  Credit cards  Debit cards  Checks  Gift cards  International payments  What sort of processing features do I need?  What reporting features do I need? Know how. Know now.
  • 11. E-Commerce Options  Third Party Store  eBay  Etsy  Amazon  Grow Nebraska  Third Party Payment Processor  Google Checkout  PayPal  Love Apple Farms Know how. Know now.
  • 12. E-Commerce Options  Third Party Payment Gateway  Authorize.net  PayPal  Harley Farms  Totally Integrated CMS Know how. Know now.
  • 13. Pros and Cons  Third Party Store  Pro  Minimal setup  Flexible fee schedules  Payment security is taken care of  Con  Minimal customization  No “Home Page”  Minimal SEO Know how. Know now.
  • 14. Pros and Cons  Payment Processor  Pro  No integration into backend  No security needed for payments  Con  Customer goes to different site and may reconsider purchase Know how. Know now.
  • 15. Pros and Cons  Payment Gateway  Pros  Customers stay on your site  Purchase process is integrated into your site  Cons  Takes more work  Higher level of technology needed  Must obtain SSL certificate Know how. Know now.
  • 16. Features to Consider  24/7 availability and support  Real time feedback for customers  Redundancy  Anti-fraud and security solutions  Rates and fee structures  Trusted platform  Stocking and order tracking  Tax calculations  Integration into current platform  Ease of use Know how. Know now.
  • 17. Payment Processor Questions  Data  Where is it?  Who has access? Are they authorized?  How is it protected?  How is it shared or transmitted?  Do I have insurance against a security breach?  What happens in a disaster? Redundancy?  How is data backed up and restored?  Is it scanned for vulnerability? Know how. Know now.
  • 18. Local Security  Know what you have  Data  Hardware  Networks  Software  Know where it is and how it is secured  Know who has access  Use policies, procedures, and reporting  Understand legal compliance Know how. Know now.
  • 19. Local Security  Secure and limit access to digital as well as physical assets  Keys vs Passwords  Hardware  Software  Network  Safe or vault vs Redundant and offsite backup  Visual vs Electronic identity  US Mail vs Cryptography  Keep hardware and software up to date Know how. Know now.
  • 20. Create Confident Customers  Create and post Security and Privacy Policies  Stick to your policy  Be vigilant  Use visual clues Know how. Know now.
  • 21. Visual Security Clues  Third party certificates of authority  Green Address Browser Bar  https://  Padlock symbol Know how. Know now.
  • 22. Mobile Payment Platforms  Square  Paypal Here  GoPayment (Intuit)  SalesVu  ProPay Jak  North American Bancard – Pay Anywhere  Inner Fence Know how. Know now.
  • 23. Features to Consider  Cost of reader and/or app  Transaction costs  Encrypted data  Electronic receipts  Tipping system  Cash register and POS functions  Reporting options  Signature requirements  Access to funds speed Know how. Know now.
  • 24. Optional Features  Work with Windows machine  Manage cash transactions  Refunds/Credit  Customized store Know how. Know now.
  • 25. Resources  VISA e-Commerce Merchant’s Guide to Risk Management  BBB Data Security FAQ  Payment Card Industry Data Security Standard  GeoTrust: Creating an e-Commerce Web Site  AVG Small Business Security Guide  E-commerce Security Best Practice Guidelines  Fundamentals Guidelines of e-Commerce Checkout Design  Broadband YouTube Videos  Security Squad Know how. Know now.
  • 26. Upcoming Events  Building Your Brand  Women in Ag – Kearney, Feb 21,22  eXtension Webinars - https://learn.extension.org/  Cool Tools – Feb 14, 2013  Pinterest – March 14, 2013  Broadband Webinars – http://broadband.nebraska.gov  Making Security a Priority Feb 20, 2013  Going Mobile – March 20, 2013 Know how. Know now.
  • 27. Contact Information  UNL Extension Educators  Jenny Nixon  jnixon@unl.edu  Connie Hancock  chancock1@unl.edu  Jay Jenkins  jjenkins2@unl.edu Know how. Know now.

Notes de l'éditeur

  1. In the past and sometimes now, the web seems like a big impersonal space. The trend in ecommerce is toward a personalization of the customer experience. We must now expect customers who have examined your business from many angles including the experiences of previous customers and your stated online policies. They will purchase when they are confident of their security and privacy with your business.Even if you are not doing “e-commerce” consider your security with payments made at your store.
  2. Visit:
  3. Use good passwords, test backup and restore process