1 / 15

PRIVACY IN COMPUTING

PRIVACY IN COMPUTING. BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) Xxx-rated sites make your modem call some places that will cost you They can steal your job related information from your computer (industrial espionage)

leoma
Télécharger la présentation

PRIVACY IN COMPUTING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PRIVACY IN COMPUTING BY: Engin and Will

  2. WHY IS PRIVACY IMPORTANT? • They can use your computer to attack others (money, revenge) • Xxx-rated sites make your modem call some places that will cost you • They can steal your job related information from your computer (industrial espionage) • They can steal your information, use your money, use your good name (identity theft), in some cases that can be used just to terrorize you

  3. IDENTITY THEFT • It is so hard to keep a good credit line • What happens if some criminal or psycho steals your information by stealing or hacking into your computer?

  4. TYPES OF ID THEFT Estimated 10 million people in US found out that they were victims of ID Fraud in previous year. • Financial Fraud • Criminal Activities • Computer and Cyber Crimes • Organized Crimes • Drug Trafficking • Alien Smuggling • Money Laundering

  5. STEALING IDENTITY • Credit Card Fraud • Paying at a restaurant or a market • On the phone • Via internet

  6. When you throw away a paper, look at; • Your full name • Complete address • SSN, date of birth • Complete bank account number • Employer’s name and address • Rate of pay

  7. ACCESSING YOUR PERSONAL INFORMATION • Dumpster diving • Sales clerks, waitresses (memorizing or copying) • Mailbox (financial statements, bills) • Employer’s file (secretly or with inside help) • Hospital records • Purchased online databases • Collected from “clone” web sites • Stolen through hacking computers (personal, work or any merchants PCs)

  8. PROTECTION • Don’t give away your SSN • Destroy any unwanted credit card offers • Don’t put any information on your check other than your name and your address • Shred any sensitive document • Don’t carry SSN card, passport, or birth certificate • Review your credit report at least once every year • Never give away important personal information on the phone unless it’s really necessary Identity Theft Insurance ?

  9. INTERNET TRANSACTIONS • Use the latest internet browser • Look for digital certificates • Read the privacy policies • Only use one credit card • Never give personal information unless you know for sure why they need it • Keep records for internet transactions • After you made a purchase, check your emails

  10. IF IT HAPPENS TO YOU • Immediately contact your credit card issuers • Close any account that thief has opened • Call the fraud units of the three credit reporting bureaus • If SSN used, notify Social Security Administrator’s Office of Inspector General

  11. Who to contact • The Credit Bureaus Equifax Credit Information Services - Consumer Fraud Div.P.O. Box 105496Atlanta, Georgia 30348-5496Tel: (800) 997-2493www.equifax.com • ExperianP.O. Box 2104Allen, Texas 75013-2104Tel: (888) EXPERIAN (397-3742)www.experian.com • TransUnion Fraud Victim Assistance Dept.P.O. Box 390Springfield, PA 19064-0390Tel: (800) 680-7289www.transunion.com

  12. References • http://computer.howstuffworks.com/identity-theft.htm • http://www.microsoft.com/mscorp/twc/privacy/default.mspx

More Related