Protecting Personal Privacy
Upcoming SlideShare
Loading in...5

Protecting Personal Privacy






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Protecting Personal Privacy Protecting Personal Privacy Presentation Transcript

  • PROTECTING PERSONAL PRIVACY Securing Your Online Information debt/identity-theft/common-identity-theft- scams.shtml
  • How safe is your information on the web?• As technology advances, information becomes easier and faster to send between locations. This convenience is nice, but security becomes paramount in guaranteeing that private information is not accessed by unauthorized viewers. 13846952130
  • Personal information can be disclosed on all kinds of websites• Social Media Sites: Facebook, Twitter, Myspace, etc.• Purchasing Websites: Amazon, E-Bay, etc.• Any other website that requires creating an account• Other parties may not even have to put in any effort to gather information. Depending on settings, the user may have all their information already displayed. *This is a fake profile View slide
  • What can they do with your information?• Use it to access other personal accounts• Identity theft, reputation damage• Sell your information to other parties• Blackmail, bribery View slide
  • Some information should never be given out unless you know the source is completely trustworthy• Social Security Number• Credit Card Numbers• Account passwords• Addresses and Phone Numbers credit-cards-2/
  • Methods used to access personal information• Phishing• Spyware/Malware• Hacking• Simple searches
  • You may not even know your information is compromised until its too late• Universities have been targets for ID thieves• One attack went unnoticed for over a year• No U.S. law was implemented requiring the university to notify individuals that their information had been stolen
  • Apprehending violators is difficult• Anonymity adds to difficulty• Victims must spend time and $$ to attempt to correct the situation• Law enforcement, government and credit industries add complications to resolving the situation in a timely manner ews_for_real_e/identity_theft/
  • However, there are punishments for those caught committing these crimes• State laws vary, but federal laws have begun to crack down on identity theft related crimes• Identity Theft Penalty Act raises max sentence from 3 to 5 years in prison with additional years depending on the specific crime
  • Simple Steps to Protect Your Online Information• Never give out your information to people you do not know or trust• Be sure to have all your essential programs updated to their current release• Use secure passwords for accounts• Have antivirus and spyware/malware programs installed and enabled• Keep other electronic devices with links to personal accounts secure
  • Useful Computer Programs• CCleaner:• MalwareBytes:• NoScript(If using Mozilla Firefox browser):• Antivirus Programs and more: o AVG: o Nod32: o Avast!: o Aviria: o Comodo: o Norton: