Privacy-in-a-Suitcase Presentation. Introduction – Learning Objectives At the end of this Program, you will: Have a better awareness of privacy issues.

Slides:



Advertisements
Similar presentations
THE FUTURE OF ONLINE STORAGE. Insurance Lockboxs Purpose To provide a secure place to store your policy numbers, real estate holdings, financial information,
Advertisements

Crichton Centre for Research in Health and Social Issues O4O Toolkit.
Department of Highway Safety and Motor Vehicles Driver Privacy Protection Act.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 “Stuff That Bugs Us: Litigation Do’s and Don’ts”
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Basic Banking Services - Activity 1
A NexGen Tax Primer: Life Insurance & Tax Efficient Wealth Planning With Dale Durand, VP, Estate & Tax Planning.
Works Cardholder Tutorial Initial Login, Transaction Review, & Reports.
Go to Click Check your browser If your browser is not compatible, then use another.
Have You Read Your Medical Record? Peggy Beck, RHIA, CMT, FAAMT.
State of Texas NOTARY PUBLIC REGULATIONS “TEST YOUR NOTARY SKILLS- WHAT YOU KNOW FACT OR FICTION” Brought to you by TERESA FROST Texas Agency Manager.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Vital Records and Documents Everyone Should Have in Order A Public Service Presentation provided by the Society of Certified Senior Advisors.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
An Equity Perspective Paul Malan Global Markets 21 January 2004.
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Copyright © 2009 The Hartford, All Rights Reserved Drowsy Driving Fleet Conference.
Chapter 20 Patient Interview. 2 3 Learning Objectives  Define and spell key terms  Define the purpose and the key components of the patient interview.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Dealing with the Rising Tide of Systemic Cyber Risk April 29, 2014.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
One stop shop: e-VEM E- extension of the car registration Teja Batagelj Ministry of Public Administration.
Go to Click Check your browser If your browser is not compatible, then use another.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Florida Information Protection Act of 2014 (FIPA).
OHSA Occupational Health & Safety Act
Online banking security best practices Access via ‘transaction devices’
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Climate Products Developing Insurance Products to Facilitate Adaptation and Mitigation to Climate Change Risks September 14, 2009 RIMS Canada The Importance.
Copyright © 2009 The Hartford, All Rights Reserved Backing Collisions Fleet Conference.
Risk Engineering Be prepared for OSHA! Patric E. McCon, CSP, CFPS, CHMM Sr. Risk Engineering Consultant Zurich Services Corporation.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
Jonathan McCoy Regional Property Underwriting Manager Zurich Energy Supply chain insurance and risk assessment Protecting profitability.
Idaho Poll Worker Training Election Day Registration.
Copyright © 2009 The Hartford, All Rights Reserved Preventability Fleet Conference.
® HHM Clean Desk Policy. 2 ® Clean Desk Policy : What Will You Learn Importance of Privacy and Security The kinds of information we protect Privacy Requirements.
1 Activities ACTIVITY 1: Why Do You Need a Bank? ACTIVITY 2:The Many Services of a Bank ACTIVITY 3: The ABCs of a Checking Account ACTIVITY 4: Opening.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Registering for MasteringMicrobiology™
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Dealing with the Regulators Fairy Tales and War Stories Georgia Credit Union Executive Association Spring Meeting March 10 – 12, 2016 Presented by: Palmer.
U.S. Immigration Center.  Green card also refers to an immigration process of becoming a permanent resident.  The green card serves as proof that its.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Tough Mudder UK 2015 Gold Bond application form To apply for a guaranteed place, please complete and sign this form and return with your entry fee of £40.
Updating Address Records. The Preferred method for updating Address information is for the Person to login to WebAdvisor, access the User Account Menu…
Get Exclusive Deals and Coupons on Online Recharge.
Facebook privacy policy
Yintran User Manual English Version Updated
Documenting Life in the UK
Paytm App is your one-stop destination for all your needs
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Digital Citizenship Middle School
Tough Mudder UK 2015 Gold Bond application form
Florida Information Protection Act of 2014 (FIPA)
GDPR – What’s it all about???
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
Florida Information Protection Act of 2014 (FIPA)
The three-point system
Disclaimer: Please note that clinical guidelines change frequently and this document is meant to serve as an example only. This content is provided for.
The Issues with Technology in education
HIPAA Overview.
Optimize Recruitment and Retention through Resilience
Colorado “Protections For Consumer Data Privacy” Law
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Privacy-in-a-Suitcase Presentation

Introduction – Learning Objectives At the end of this Program, you will: Have a better awareness of privacy issues Take away some basic privacy concepts Understand that privacy is regulated in certain areas, certain circumstances Understand that regulation may give you both rights and responsibilities

Privacy Exercise What’s in YOUR wallet? Scene: Left the wallet at Starbucks Reaction: Are you worried about anyone going through your wallet?

Private/Not Private ItemPrivate Not Private Driver’s License Social Security Card US Passport (or reference to that number) Credit Card “I will love you forever note” signed by high school sweetheart Prescription Medication order Receipt from a lingerie store ($384.21) Photos of small children, names shown on the back Filled out employment application; for weekend work, at a local shop Macy’s credit card bill Consolidated monthly bank statement Print-out from Outlook address book from your siblings; describing parents’ health, including diagnosis

5 Private/Not Private Electronic Version ItemPrivate Not Private Last four digits of SSN for on-line confirmation (bill-pay) College application Shopping habits Friends, acquaintances, classmates, work colleagues Business contacts

6 Disclaimer Look here! The information in this presentation was compiled from sources believed to be reliable for informational purposes only. All sample policies and procedures herein should serve as a guideline, which you can use to create your own policies and procedures. We trust that you will customize these samples to reflect your own operations and believe that these samples may serve as a helpful platform for this endeavor. Any and all information contained herein is not intended to constitute legal advice and accordingly, you should consult with your own attorneys when developing programs and policies. You should not take, or refrain from taking action based on its content. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication and sample policies and procedures, including any information, methods or safety suggestions contained herein. Moreover, this presentation cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances.