Aaron Cauchi Nurse Informatics

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Hart District Acceptable Use Policy Acceptable Use Policy.
Department of Education Policy 311 Acceptable Use of School Computers.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
 I will not post personal information (includes picture)  I will not agree to meet someone I met online  I will notify teacher of inappropriate messages.
Riverside Community School District
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
GMT eBizOS DOs and DON’Ts DOs 1. Access to GMT Portal( to view all the system, user guide, application form & procedure.
Student 1-to-1 Netbook Program Care and Use of Computers.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Internet Driver’s License è Training è Test è Signed Internet Use Agreement.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Fort Bend ISD Acceptable Use Policy Student Training.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Security Training USAID Information Security.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Ethics. Ethics are the principles and standards we use to decide how to act.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
Squalicum High School Computer Network Student Use Guidelines.
Operational Circular No 5 Use of CERN Computing Facilities.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Nashwaaksis Middle School Student Laptop Program Care and Use of Computers.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Keeping it safe on the internet
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Misuses of ICT Malpractice and crime © Folens 2008.
HIPAA Online Student Orientation
LAUSD Responsible Use Policy (RUP)
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
What is it? Why do I keep getting from Barracuda? SPAM.
Student Accounts OFFICE 365 Student Accounts.
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Presentation transcript:

Aaron Cauchi Nurse Informatics

Security & Data Protection

Security Password [discipline] Use good strong passwords, change periodically Not easy to guess Not written down in public areas You are responsible for its use

Security Password Examples Incorrect / weak Passwords Less then 8 characters includes 3 or more consecutive characters from the login name (i.e. cauca008) Directory word

Security Password Examples Correct / Strong Passwords At least 8 characters or more includes Lower case, Upper case, numeric character and or a symbol (be carefull for keyboard setup) does not include your name, common names of people or places, etc

Security Disclose (do not sharing passwords or accounts for any reason, including for work-related reasons) Always log out of systems/applications when not using them Lock computer when not in use Do not leave computer unattended if it is logged in If you suspect others know your password – CHANGE IT IMMIDIATELY

Use Dos Do check the address line before sending a message and check you are sending it to the right person/s. Do treat all with suspicion. What you see in the body can be forged, the sender's address or return address can be forged and the header can also be manipulated to disguise its true origin.

Use Do Nots Do not use to send or forward material that could be seen as confidential, political, obscene, threatening, offensive or libellous. Do not auto forward gov.mt s to any private e- mail accounts. Do not forward chain letters, junk mail, jokes or news flashes. Do not use for monetary gain, political purposes or illegal activities. Do not download and/or distribute copyrighted materials including print, audio, and video. Do not download attachments from unknown sources.

Use Do Nots Do not send offensive, libellous, defamatory, racist, obscene, pornographic, harassing or threatening messages, hate mails, discriminatory remarks and other anti-social behaviour messages. Do not use to spread computer viruses, damage or destroy data, infiltrate systems, damage hardware or software, or in any way degrade or disrupt the network performance. Do not send messages using another person's account. Do not disguise or attempt to disguise your identity when sending out an . Do not use for private business.

Data Protection Data [do not] Store work-related data on pen-drives (memory sticks), CDs, External Hard Disks or on Laptops and taking it off hospital premises

Data Protection Patient Information [do not] Access, change, delete patient information without authorisation Use patient information for any reason that is not work-related Forwarding patient-related information (e.g. Test Results or other Clinical Information) without patient consent to third party Data Protection Act:

Internet Use

Dos Do be careful when using the Internet - remember you're representing the Government of Malta. Do a virus scan check on any downloaded files prior to opening. Do Nots Do not visit sites that contain obscene, hateful, pornographic or otherwise illegal material. Do not use the Internet to conduct any personal business or for commercial or promotional purposes. Do not install or use peer-to-peer (P2P) software. Do not redistribute downloaded material unless the owner has given permission in the copyright/licence terms. Do not use someone else's password to gain access to the Internet.

Correct use of MDH Computers (care of equipment)

Correct use of MDH Computers YOU CANNOT

Correct use of MDH Computers Install pirated software Install hacked software Hacking Install shareware, freeware software Change computer configuration settings Add, remove or move hardware You cannot

Correct use of MDH Computers View or share pornographic / illicit / illegal material Store or share photographic / audio / video material which is not work related on computer or on Server (Home or Project Folder) You cannot

Correct use of MDH Computers Use Government account for non work-related matters Use the Internet for non work-related matters You cannot