Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles 100 200 300 400 500.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Let’s Talk About Cyber Security
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
IT Security Essentials Ian Lazerwitz, Information Security Officer.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Online Safety 2.02 Remember the rules of online safety.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CPS Acceptable Use Policy Day 2 – Technology Session.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Electronic Use Policies.   Social Media  Internet.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
What is Spam? d min.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Data Practices in Minnesota December Outline for this presentation Minnesota data practices laws Classification of government data Government entity.
Online Safety 2.02 Remember the rules of online safety.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Records Management in Government Prepared by the Information Management Unit Saskatchewan Archives Board.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Privacy and Security Challenge "Private" Benjamin For the Record Top Secret Green Eggs and Spam Hi ho, hi ho it's of to FOIP I go
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Managing Windows Security
Remember the rules of online safety.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Move this to online module slides 11-56
Protecting Your Information Assets
Part 3.
King Saud University- College OF Applied Studies
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
King Saud University- College OF Applied Studies
Good Spirit School Division
Presentation transcript:

Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles

Examples of these are Facebook, MySpace, Flickr, and LinkedIn. Just Browsing - 100

An example of this is when you notice a padlock icon displayed somewhere in your browser window (location depends on the browser being used). Just Browsing - 200

You should never use these in your passwords anywhere, especially on Web sites. Just Browsing - 300

I should ensure this is done regularly in order to make sure a computer is better secure from Internet attacks. Just Browsing – 400

This person is ultimately responsible to protect information entrusted to him/her and computers he/she operates from threats. Just Browsing - 500

These are blue, and should not be used for the secure authorized disposal of media or documents. Keep out – Private! - 100

The Freedom of Information and Protection of Privacy Act applies to briefing notes, personal information, s, hand written memos but not this. Keep out – Private! - 200

If you suspect private information has been compromised you should notify this person in your organization. Keep out – Private! - 300

This is the number of days that a government ministry or agency has to respond to an applicant’s request for access under FOIPPA. Keep out – Private! - 400

Acknowledging the request is considered the first step followed as part of this obligation when a request for access to information is made. Keep out – Private! - 500

If you use a mixture of alpha- numeric characters, allowable symbols, and ensure you use 8 or more characters in total, you have one of these. Pushing IT - 100

If you use peer-to-peer software or install unauthorized software while using a government computer, or use government to operate a personal business you are in violation of this. Pushing IT - 200

You should contact this person if you receive a phone call asking you to share your password with the caller. Pushing IT - 300

My laptop should not spend any time in this state while I am not in a safe place (my office or in my locked home). Pushing IT - 400

This term is used to collectively describe software viruses, spyware, worms, and trojan horses among others. Pushing IT - 500

Records that pertain to the "housekeeping" activities including the management of facilities, property, material, human resources, and information systems. You sound like a broken record - 100

These include convenience copies, transitory records, published records, and non- work related records that may be disposed of without written authorization from the Provincial Archivist. You sound like a broken record - 200

If a person wants to request access to records in the possession of the Government of Saskatchewan they use this. You sound like a broken record - 300

This refers to the authority under which government organizations may dispose of records no longer required. Include the timetables for both the retention and the destruction of records. You sound like a broken record - 400

This type of record schedule is a classification system and retention schedule related to the operations specific for the services provided by your ministry or branch according to mandate or policy. You sound like a broken record - 500

A common acronym for The Freedom of Information and Protection of Privacy Act. Legal Beagles - 100

This event is recognized in Saskatchewan the last week of September and relates to a citizens right to access information. Legal Beagles - 200

The commonly known name for sections in The Freedom of Information and Protection of Privacy Act that outlines types of information in government records that must or may be withheld from access if requested. Legal Beagles - 300

The law in Saskatchewan that allows an individual to request access to any government record. Legal Beagles - 400

The three Saskatchewan statutes that address either access to personal information or personal health information. Legal Beagles - 500

What are social networking sites? Just Browsing - 100

What is a secure Web site? Just Browsing - 200

What are dictionary words? Just Browsing - 300

What is patch or update software? Just Browsing - 400

Who is the user? Just Browsing - 500

What are recycling bins? Keep out - Private! - 100

What is personal health information? Keep out - Private! - 200

Who is my organization's Privacy Officer? Keep out - Private! - 300

What is thirty (30) days? Keep out - Private! - 400

What is "Duty to Assist?" Keep out - Private! - 500

What is a hard to guess password? Pushing IT - 100

What is the Information Technology Acceptable Usage Policy? Pushing IT - 200

Who is my organization's Security Officer? Pushing IT - 300

What is unattended? Pushing IT - 400

What is malware? Pushing IT - 500

What are administrative records? You sound like a broken record - 100

What are non-government records? You sound like a broken record - 200

What is the Access to Information Request Form? You sound like a broken record – 300

What are records retention schedules? You sound like a broken record - 400

What are Operational Records Systems (ORS)? You sound like a broken record - 500

What is FOIP? Legal Beagles - 100

What is Right to Know Week? Legal Beagles - 200

What are exemptions? Legal Beagles - 300

What is The Freedom of Information and Protection of Privacy Act? Legal Beagles - 400

What is The Freedom of Information Protection of Privacy Act, The Local Authority Freedom of Information and Protection of Privacy Act and The Health Information Protection Act? Legal Beagles - 500