Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Protecting Personal Privacy


Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Protecting Personal Privacy

  1. 1. PROTECTING PERSONAL PRIVACY Securing Your Online Information debt/identity-theft/common-identity-theft- scams.shtml
  2. 2. How safe is your information on the web?• As technology advances, information becomes easier and faster to send between locations. This convenience is nice, but security becomes paramount in guaranteeing that private information is not accessed by unauthorized viewers. 13846952130
  3. 3. Personal information can be disclosed on all kinds of websites• Social Media Sites: Facebook, Twitter, Myspace, etc.• Purchasing Websites: Amazon, E-Bay, etc.• Any other website that requires creating an account• Other parties may not even have to put in any effort to gather information. Depending on settings, the user may have all their information already displayed. *This is a fake profile
  4. 4. What can they do with your information?• Use it to access other personal accounts• Identity theft, reputation damage• Sell your information to other parties• Blackmail, bribery
  5. 5. Some information should never be given out unless you know the source is completely trustworthy• Social Security Number• Credit Card Numbers• Account passwords• Addresses and Phone Numbers credit-cards-2/
  6. 6. Methods used to access personal information• Phishing• Spyware/Malware• Hacking• Simple searches
  7. 7. You may not even know your information is compromised until its too late• Universities have been targets for ID thieves• One attack went unnoticed for over a year• No U.S. law was implemented requiring the university to notify individuals that their information had been stolen
  8. 8. Apprehending violators is difficult• Anonymity adds to difficulty• Victims must spend time and $$ to attempt to correct the situation• Law enforcement, government and credit industries add complications to resolving the situation in a timely manner ews_for_real_e/identity_theft/
  9. 9. However, there are punishments for those caught committing these crimes• State laws vary, but federal laws have begun to crack down on identity theft related crimes• Identity Theft Penalty Act raises max sentence from 3 to 5 years in prison with additional years depending on the specific crime
  10. 10. Simple Steps to Protect Your Online Information• Never give out your information to people you do not know or trust• Be sure to have all your essential programs updated to their current release• Use secure passwords for accounts• Have antivirus and spyware/malware programs installed and enabled• Keep other electronic devices with links to personal accounts secure
  11. 11. Useful Computer Programs• CCleaner:• MalwareBytes:• NoScript(If using Mozilla Firefox browser):• Antivirus Programs and more: o AVG: o Nod32: o Avast!: o Aviria: o Comodo: o Norton: