FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.

Slides:



Advertisements
Similar presentations
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
Advertisements

LEADS Law Enforcement Agencies Data System
CYBER CAFÉ VISITOR TRACKING SYSTEM A Comprehensive Portal for Tracking Cyber Café Visitors.
Jacqueline A. Gill, Associate Professor Slides will change automatically or you may click the screen to move forwards.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Department of Labor HSPD-12
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Electronic Official Personnel Folder (e-OPF) for Federal Employees 2014.
Click and Connect - Session 2 More Internet Searching Introduction to BenefIT 3 Dept. Communications Energy & Natural Resources
Arizona Criminal Justice Information System
Copyright © 2007 by Thomson Delmar Learning. ALL RIGHTS RESERVED.1.
Texas Department of Public Safety Sex Offender Registration Bureau
Ethics and the Law. Ethics Ethics comes from a Greek word ethe’ which means character. A set of theories of value, virtue or of right action A set of.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
TNKids Duplicate Social Security Number. The following graphics are designed to help you to navigate through this Computer Based Training. The navigational.
Governor’s Office of Crime Control & Prevention ✪ Law Enforcement Instructional Guide Domestic Violence – Protective Orders – Notification of Service June.
SEX OFFENDER REGISTRY DISCUSSION SEARCH Membership Group Meeting St. Louis, Missouri July 19, 2006.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Understanding the IRS 990n e-Postcard COPYRIGHT 2010 Gold Wing Road Riders Association, Inc. All rights reserved under International and Pan-American Copyright.
Chapter 11 Databases.
Chapter 11 Databases. 11 Chapter 11: Databases2 Chapter Contents  Section A: File and Database Concepts  Section B: Data Management Tools  Section.
Campus Safety The Sullivan University System There were no hate crimes reported that fit any reportable crime bias categories. In accordance with the Crime.
CACFP Internet Claim Procedures Wisconsin Department of Public Instruction Child and Adult Care Food Program (CACFP) At Risk After School Sites Emergency.
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Criminal Justice Information Systems and Case Management Systems.
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
Welcome to Stanford! Summer Session All students who received an I-20 (including transfers students) MUST check in with personnel outside in order.
GSA’s Vendor and Customer Self Service (VCSS)
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Guide to Computer Forensics and Investigations CJ 317.
00870B2F.0/Internet%20Safety.jpg.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
DATABASES Southern Region CEO Wednesday 13 th October 2010.
Louisiana Department of Revenue Electronic Filing.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
ICT Infrastructure Used By Organisations Additional Exercise ANSWERS.
RECORDING AND MAINTAINING MEAL COUNTS ~ THE ADULT CARE COMPONENT ~ Wisconsin Department of Public Instruction Child and Adult Care Food Program (CACFP)
Welcome to The Wonderful World Theodore J. Leibowitz of Corporate Compliance.
Costa Rica´s business registry: Directory of institutional units and establishments Contacts: Odilia Bravo:
INTERNET SAFETY.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Texas Sex Offender Registration Program Vincent Castilleja Sex Offender Registration Coordinator Texas Department of Public Safety.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Guidelines for Internet Safety Chad Olivard ITC 525 Kutztown University Summer 2011.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Brady Act Requirements In November 1993, the Brady Handgun Violence Prevention Act of 1993 (Brady Act), Public Law , was signed into law requiring.
Using Using Computers Safely, Effectively and Responsibly.
COMPLETING THE TRANSPORTED MEALS DAILY MEAL PRODUCTION RECORD North Carolina Department of Public Instruction School Nutrition Services Revised July 2015.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Not Tested and Void Codes. Topics Introduction/Purpose User Roles When to Use Not Tested Codes How to Use Not Tested Codes When to Use Void Codes Multiple.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Please Note: Do not complete answer sheets for the following exams:
Safe Surfin’ on the Internet
How to Apply for an NPI Instructions for Completing the National Provider Identifier (NPI) Online Application
CACFP Child Enrollment Forms (CEFs)
Not Tested and Void Test Score Codes
CJA 394 Competitive Success/snaptutorial.com
CJA 394 Education for Service/snaptutorial.com
CJA 394 Teaching Effectively-- snaptutorial.com
New User Guide Learning how to use your NxPay Account
The Internet An Overview.
General Data Protection Regulation Q & A Session
Employee Self-Service (ESS) Portal
Presentation transcript:

FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315

Last Week - Questions Welcome to Unit 4 Cyber-ethics Chapter 5: Regulating Internet Privacy What happens in other countries in this area? Your Work? Your Kids? Your feelings?

Topics for the night Employee s. Can an employer legally check their employees e- mails? Should an employer check their employees s? Should an employee have an expectation of privacy when sending s? NCIC - who can view? Police Computer Systems? Det. Mark Ferman?

Project – Review (due tomorrow) You are the director of human resources for a large corporation and your task is to educate employees on what is acceptable use of the Internet in the workplace. Don’t reinvent the wheel ? Meaning ? Create a 6-8 slide PowerPoint presentation or 3-5 page document to inform employees of the corporation’s Internet Usage Policy. Address the following in your presentation: Areas in which the employee may have expectations of privacy The employer’s right to monitor the employees activities, and to address potential consequences for violating the policy -

What is Computer Ethics According to James H. Moore, who is believed to have first coined the phrase "computer ethics", Computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. What else should be here? What is your definition?

Can we stop a Cyber Attack this way? Terrorist attacks and the raise in cyber attacks have raised concern about the security of information, security of individuals, and a need to protect the nation’s cyber infrastructure. How safe are we?

Causes of Computer Hate – the need for Ethics Vendetta/Revenge  Demonstrations at World Trade Organization (WTO) in Seattle, Washington, the World Bank and the International Monetary Fund in Washington, D.C., Prague, Hungry, and Geneo Italy – against globalization. Joke/Hoax/Prank The Hacker's Ethics  All information should be free Terrorism Political and Military Espionage Business ( Competition) Espionage Hate (national origin, gender, and race) Personal gain/Fame/Fun/Notoriety Ignorance

Agency Programs & Ethics Needs Miami-Dade County – Real-time Analysis Robbery Information  Multiple Agencies  Reports are immediately processed  Review and Verification  BOLO sent to federal, state, and local agencies  What do you think takes place on their; MDT Laptops Department Cell/I phone Police Radio

National Crime Information Center (NCIC) Codes Codes Enhanced Name Search: Uses the New York State Identification and Intelligence System (NYSIIS). Returns phonetically similar names (e.g. Marko, Marco or Knowles, Nowles or derivatives of names such as William,Willie, Bill). Fingerprint Searches: Stores and searches the right index fingerprint. Search inquiries compare the print to all fingerprint data on file (wanted persons and missing persons). Probation/Parole: Convicted Persons or Supervised Release File contains records of subjects under supervised release. Online Manuals: State Control Terminal Agencies (CTAs) can download manuals and make them available to users on-line. Improved Data Quality: Point-of-entry checks for errors; validates that data is entered correctly (e.g., VINs); checks that data is entered in all mandatory fields; links text and image information; and expands miscellaneous fields. Information Linking: Connects two or more records so that an inquiry on one retrieves the other record(s). Mugshots: One mugshot per person record may be entered in NCIC One fingerprint, one signature, and up to 10 other identifying images (scars, marks, tattoos) may also be entered. Other Images: One identifying image for each entry in the following files: Article, Vehicle, Boat, Vehicle or Boat Part. A file of generic images (e.g., a picture of a 1989 Ford Mustang) is maintained in the system Convicted Sex Offender Registry: Contains records of individuals who are convicted sexual offenders or violent sexual predators. SENTRY File: An index of individuals incarcerated in the federal prison system. Response provides descriptive information and location of prison. Delayed Inquiry: Every record entered or modified is checked against the inquiry log. Provides the entering and inquiring agency with a response if any other agency inquired on the subject in the last five days. On-line Ad-hoc Inquiry: A flexible technique that allows users to search the active databases and access the system’s historical data.

No Seminar next week – Unit 6 Project Electronic profiling and how it is evidenced through telemarketing and spam. Unwanted intrusions are a result of your activities on the Internet. Write a 3-5 page paper (excluding cover and reference pages) analyzing the privacy concerns related to databases, electronic profiling, spam, and telemarketing.

Questions Grade UPDATE - how are you doing now? Your Concerns? - DARE Officer Ciccone