Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.

Similar presentations


Presentation on theme: "PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer."— Presentation transcript:

1 PRIVACY IN COMPUTING BY: Engin and Will

2 WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer to attack others (money, revenge) Xxx-rated sites make your modem call some places that will cost you Xxx-rated sites make your modem call some places that will cost you They can steal your job related information from your computer (industrial espionage) They can steal your job related information from your computer (industrial espionage) They can steal your information, use your money, use your good name (identity theft), in some cases that can be used just to terrorize you They can steal your information, use your money, use your good name (identity theft), in some cases that can be used just to terrorize you

3 IDENTITY THEFT It is so hard to keep a good credit line It is so hard to keep a good credit line What happens if some criminal or psycho steals your information by stealing or hacking into your computer? What happens if some criminal or psycho steals your information by stealing or hacking into your computer?

4 TYPES OF ID THEFT Estimated 10 million people in US found out that they were victims of ID Fraud in previous year. Financial Fraud Financial Fraud Criminal Activities Criminal Activities Computer and Cyber Crimes Computer and Cyber Crimes Organized Crimes Organized Crimes Drug Trafficking Drug Trafficking Alien Smuggling Alien Smuggling Money Laundering Money Laundering

5 STEALING IDENTITY Credit Card Fraud Credit Card Fraud Paying at a restaurant or a market Paying at a restaurant or a market On the phone On the phone Via internet Via internet

6

7 When you throw away a paper, look at; Your full name Complete address SSN, date of birth Complete bank account number Employer’s name and address Rate of pay

8 ACCESSING YOUR PERSONAL INFORMATION Dumpster diving Dumpster diving Sales clerks, waitresses (memorizing or copying) Sales clerks, waitresses (memorizing or copying) Mailbox (financial statements, bills) Mailbox (financial statements, bills) Employer’s file (secretly or with inside help) Employer’s file (secretly or with inside help) Hospital records Hospital records Purchased online databases Purchased online databases Collected from “clone” web sites Collected from “clone” web sites Stolen through hacking computers (personal, work or any merchants PCs) Stolen through hacking computers (personal, work or any merchants PCs)

9

10 PROTECTION Don’t give away your SSN Don’t give away your SSN Destroy any unwanted credit card offers Destroy any unwanted credit card offers Don’t put any information on your check other than your name and your address Don’t put any information on your check other than your name and your address Shred any sensitive document Shred any sensitive document Don’t carry SSN card, passport, or birth certificate Don’t carry SSN card, passport, or birth certificate Review your credit report at least once every year Review your credit report at least once every year Never give away important personal information on the phone unless it’s really necessary Never give away important personal information on the phone unless it’s really necessary Identity Theft Insurance ?

11

12 INTERNET TRANSACTIONS Use the latest internet browser Use the latest internet browser Look for digital certificates Look for digital certificates Read the privacy policies Read the privacy policies Only use one credit card Only use one credit card Never give personal information unless you know for sure why they need it Never give personal information unless you know for sure why they need it Keep records for internet transactions Keep records for internet transactions After you made a purchase, check your emails After you made a purchase, check your emails

13 IF IT HAPPENS TO YOU Immediately contact your credit card issuers Immediately contact your credit card issuers Close any account that thief has opened Close any account that thief has opened Call the fraud units of the three credit reporting bureaus Call the fraud units of the three credit reporting bureaus If SSN used, notify Social Security Administrator’s Office of Inspector General If SSN used, notify Social Security Administrator’s Office of Inspector General

14 Who to contact The Credit Bureaus Equifax Credit Information Services - Consumer Fraud Div. P.O. Box 105496 Atlanta, Georgia 30348-5496 Tel: (800) 997-2493 www.equifax.com The Credit Bureaus Equifax Credit Information Services - Consumer Fraud Div. P.O. Box 105496 Atlanta, Georgia 30348-5496 Tel: (800) 997-2493 www.equifax.com Experian P.O. Box 2104 Allen, Texas 75013-2104 Tel: (888) EXPERIAN (397-3742) www.experian.com Experian P.O. Box 2104 Allen, Texas 75013-2104 Tel: (888) EXPERIAN (397-3742) www.experian.com TransUnion Fraud Victim Assistance Dept. P.O. Box 390 Springfield, PA 19064-0390 Tel: (800) 680-7289 www.transunion.com TransUnion Fraud Victim Assistance Dept. P.O. Box 390 Springfield, PA 19064-0390 Tel: (800) 680-7289 www.transunion.com

15 References http://computer.howstuffworks.com/identity- theft.htm http://computer.howstuffworks.com/identity- theft.htm http://computer.howstuffworks.com/identity- theft.htm http://computer.howstuffworks.com/identity- theft.htm http://www.microsoft.com/mscorp/twc/privac y/default.mspx http://www.microsoft.com/mscorp/twc/privac y/default.mspx http://www.microsoft.com/mscorp/twc/privac y/default.mspx http://www.microsoft.com/mscorp/twc/privac y/default.mspx


Download ppt "PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer."

Similar presentations


Ads by Google