Your SlideShare is downloading. ×
Wk4 project
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
72
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. PROTECTING PERSONALINFORMATIONWeek 4 Group ProjectRaymond EdwardsWalden UniversityCMIS-3001-Computing and Society
  • 2. WHO IS RESPONSIBLE? Personal identification security has become a factor in society due to increased identify theft issues. Each individual should take care to protect their identity; thereby protecting their credit scores and background information from unscrupulous use. Protecting your identity is more important today with the use of technology. YOU ARE RESPONSBILE
  • 3. WHERE IS THE RISK? Social networking sites are a catch-all for personal information. While you may think random bits of information are harmless, put together, a picture of your life will evolve. ―Facebook has essentially become a worldwide photo identification database‖ (Mui, 2011). In addition to Facebook, users randomly share information on the internet when registering for gifts, coupons or contests on a website.
  • 4. FIVE STEPS The Consumer Federation of America offers ten steps designed to protect your personal information and detect fraud (Consumer Federation, 2012). Here are five of those steps every person should make it a habit to practice.
  • 5. STEPS, CONTINUED Practice mail security –  Guard your Social use a public mail box to Security number – put prevent unauthorized your social security access to your mail. card in a safe place (one you will remember) and only provide your social security number for a legitimate reason. Most companies will take an alternate identification number.
  • 6. STEPS, CONTINUED Keep private information to  Monitor your accounts, bills, yourself—Do not give out and bank statements— your private information Check regularly for charges (account numbers, pins, or that you did not make or passwords) over the were not aware of making. telephone. Be safe online—Use anti- virus and anti-spyware to protect your computer. These programs are available for low cost or free.
  • 7. The Inteqnet bqings us gqeatwebsites full of infoqmation andenteqtainment, and email and chathave qevolutionized communication. ut theqes a daqkside, too, as Inteqnet useqs aqeincqeasingly conceqned about howmuch of theiq peqsonal infoqmationtheyqe giving up in echange
  • 8. RESPONSIBILITY The government is in favor of industry self- regulation. Internet users, as a body, are in favor of laws. Regardless which avenue is chosen, the bottom line is YOU are responsible for protecting your own information to the best of your ability. There are a variety of ways to protect your personal information without becoming paranoid and afraid. You may be exposing your private information without being aware.
  • 9. EASY STEPS TO BEGIN A SAFE INFORMATIONJOURNEY Be proactive Be cautious when using the internet Never send personal information to over an unsecured website Check to make sure websites use a ‗https‘ when providing credit card information ALWAYS log out of website requiring an ID and password Be wary of links received through instant messaging services Protect, vary and renew your passwords on a regular basis
  • 10. ReferencesConsumer Federation of America. (2012). Ten Easy Steps to Protect YourPersonal Information and Detect Fraud (CFA). Retrieved fromhttp:/​/​www.consumerfed.org/​elements/​www.consumerfed.org/​file/​Ten%20Easy%20Steps.pdfMui, C. (2011, August 8). Facebooks Privacy Issues Are Even Deeper ThanWe Knew. Forbes. Retrieved fromhttp:/​/​www.forbes.com/​sites/​chunkamui/​2011/​08/​08/​facebooks-privacy-issues-are-even-deeper-than-we-knew/​Voice of America. (2009, November 1). Internet Use Raises PrivacyConcerns. Retrieved from Voice Of America Web site:http:/​/​www.voanews.com/​content/​a-13-2008-04-29-voa44/​406559.html

×