PROTECTING PERSONALINFORMATIONWeek 4 Group ProjectRaymond EdwardsWalden UniversityCMIS-3001-Computing and Society
WHO IS RESPONSIBLE? Personal identification security has become a factor  in society due to increased identify theft issu...
WHERE IS THE RISK? Social networking sites are a catch-all for personal  information. While you may think random bits of...
FIVE STEPS The Consumer Federation of America offers ten  steps designed to protect your personal information  and detect...
STEPS, CONTINUED   Practice mail security –      Guard your Social    use a public mail box to       Security number – p...
STEPS, CONTINUED   Keep private information to      Monitor your accounts, bills,    yourself—Do not give out          a...
The Inteqnet bqings us gqeatwebsites full of   infoqmation andenteqtainment, and email and chathave qevolutionized commun...
RESPONSIBILITY The government is in favor of industry self-  regulation. Internet users, as a body, are in favor of laws...
EASY STEPS TO BEGIN A SAFE INFORMATIONJOURNEY Be proactive Be cautious when using the internet Never send personal info...
ReferencesConsumer Federation of America. (2012). Ten Easy Steps to Protect YourPersonal Information and Detect Fraud (CFA...
Upcoming SlideShare
Loading in...5
×

Wk4 project

79

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
79
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wk4 project

  1. 1. PROTECTING PERSONALINFORMATIONWeek 4 Group ProjectRaymond EdwardsWalden UniversityCMIS-3001-Computing and Society
  2. 2. WHO IS RESPONSIBLE? Personal identification security has become a factor in society due to increased identify theft issues. Each individual should take care to protect their identity; thereby protecting their credit scores and background information from unscrupulous use. Protecting your identity is more important today with the use of technology. YOU ARE RESPONSBILE
  3. 3. WHERE IS THE RISK? Social networking sites are a catch-all for personal information. While you may think random bits of information are harmless, put together, a picture of your life will evolve. ―Facebook has essentially become a worldwide photo identification database‖ (Mui, 2011). In addition to Facebook, users randomly share information on the internet when registering for gifts, coupons or contests on a website.
  4. 4. FIVE STEPS The Consumer Federation of America offers ten steps designed to protect your personal information and detect fraud (Consumer Federation, 2012). Here are five of those steps every person should make it a habit to practice.
  5. 5. STEPS, CONTINUED Practice mail security –  Guard your Social use a public mail box to Security number – put prevent unauthorized your social security access to your mail. card in a safe place (one you will remember) and only provide your social security number for a legitimate reason. Most companies will take an alternate identification number.
  6. 6. STEPS, CONTINUED Keep private information to  Monitor your accounts, bills, yourself—Do not give out and bank statements— your private information Check regularly for charges (account numbers, pins, or that you did not make or passwords) over the were not aware of making. telephone. Be safe online—Use anti- virus and anti-spyware to protect your computer. These programs are available for low cost or free.
  7. 7. The Inteqnet bqings us gqeatwebsites full of infoqmation andenteqtainment, and email and chathave qevolutionized communication. ut theqes a daqkside, too, as Inteqnet useqs aqeincqeasingly conceqned about howmuch of theiq peqsonal infoqmationtheyqe giving up in echange
  8. 8. RESPONSIBILITY The government is in favor of industry self- regulation. Internet users, as a body, are in favor of laws. Regardless which avenue is chosen, the bottom line is YOU are responsible for protecting your own information to the best of your ability. There are a variety of ways to protect your personal information without becoming paranoid and afraid. You may be exposing your private information without being aware.
  9. 9. EASY STEPS TO BEGIN A SAFE INFORMATIONJOURNEY Be proactive Be cautious when using the internet Never send personal information to over an unsecured website Check to make sure websites use a ‗https‘ when providing credit card information ALWAYS log out of website requiring an ID and password Be wary of links received through instant messaging services Protect, vary and renew your passwords on a regular basis
  10. 10. ReferencesConsumer Federation of America. (2012). Ten Easy Steps to Protect YourPersonal Information and Detect Fraud (CFA). Retrieved fromhttp:/​/​www.consumerfed.org/​elements/​www.consumerfed.org/​file/​Ten%20Easy%20Steps.pdfMui, C. (2011, August 8). Facebooks Privacy Issues Are Even Deeper ThanWe Knew. Forbes. Retrieved fromhttp:/​/​www.forbes.com/​sites/​chunkamui/​2011/​08/​08/​facebooks-privacy-issues-are-even-deeper-than-we-knew/​Voice of America. (2009, November 1). Internet Use Raises PrivacyConcerns. Retrieved from Voice Of America Web site:http:/​/​www.voanews.com/​content/​a-13-2008-04-29-voa44/​406559.html

×