Social Media Security Awareness for Business or Home Computing Users
|
|
- Ezra Douglas
- 8 years ago
- Views:
Transcription
1 Scial Media Security Awareness fr Business r Hme Cmputing Users The purpse f all scial media sites, whether fr business r persnal use, is cmmunicatin, sharing, and smetimes cllabratin. The benefits f the scial netwrking mdel is that yu can put ut infrmatin yu want thers t have access t withut having t direct that infrmatin t a specific individual at a specific time. Cnnecting yurself t thers thru scial media sites such as Facebk, Twitter, and Linkedin has advantages fr the user in terms f staying in tuch withut much effrt. Taking advantage f scial media t stay cnnected means that yu must knw the risks that cme with the nted ease f use, and hw t prtect yurself against bad actrs wh are interested in things ther than yur vacatin pictures! Besides yur friends, wh else is lking at yur infrmatin, and hw might they be intending t use it! The purpse f this shrt mdule is t set frth the basic risks and defenses necessary t have a safer experience with scial media netwrking. Defensive Cmputing Be Aware f What Infrmatin is Public Thru Scial Media Scial netwrking has grwn in ppularity since being adpted n a large scale in the late 1990 s. Internet users with a scial netwrk prfile quadrupled between 2004 and 2008 and Facebk claimed a Billin users in Many peple are interested in the infrmatin all f thse users pst. Many f thse interested parties are nt necessarily yur friends! Identity thieves, scam artists, debt cllectrs, stalkers, and crpratins lking fr a market advantage are using scial netwrks t gather infrmatin abut cnsumers and cmpetitrs. Cmpanies that perate scial netwrks are themselves cllecting a variety f data abut their users, bth t persnalize the services fr the users and t sell t advertisers. There are tw kinds f infrmatin that can be gathered abut a user frm a scial netwrk: infrmatin that is shared and infrmatin gathered thrugh electrnic tracking. Once that infrmatin is prvided and psted, it is ging t be there essentially in perpetuity, unless sme actin is taken by the wner f the infrmatin (the user) t take it dwn. Infrmatin a user shares may include : Phts, ther media, age and gender infrmatin, bigraphical infrmatin such as emplyment histry, hmetwn, and family histry infrmatin. Psted status updates such as travel, interests, activities. Embedded in this seemingly harmless infrmatin is a wealth f identity and activity infrmatin fr a bad actr t mine. Obvius prfile infrmatin n name, address, age. Relevant identity supprting infrmatin such as mther and father s names, mther s maiden name, pet s names, where yu like t vacatin, when yu like t vacatin, restaurants yu like t eat in, parks yur children play in, etc..
2 Sme f the user Prfile infrmatin is hidden frm the public unless the user des nt activate privacy settings crrectly, r when the privacy settings get reset after an update. Scial netwrks can, and d, change their privacy plicy withut the user s permissin, expsing infrmatin frmally hidden unless the user understands the change and resets their preferred privacy level. Many users are nt aware f hw t maintain their privacy settings r just chse nt t use them. Yur friends may cpy and pst infrmatin frm yur site, which they had access t, n their wn sites, withut yur permissin, bypassing yur privacy settings cmpletely. Yu may have third party applicatins which stre and expse sme f yur prfile infrmatin which yu thught was private. Scial netwrks d nt guarantee the privacy f their user data and have had numerus failures t prtect infrmatin: 2010 Facebk -expsure f persnal chat lgs f users Facebk -expsure f ld private messages n the walls f Eurpean users LinkedIn- 6.5 millin hashed passwrds fr the business fcused scial netwrk LinkedIn were published n hacker frums. Scial netwrks als benefit frm yur public infrmatin by which a prfile f yur interests may be made s as t direct custmized ads t yu. They encurage users t pst mre and mre infrmatin and are successful in this encuragement! Scial netwrks als gather infrmatin thru electrnic tracking using ckies t track infrmatin such as Websites visited and infrmatin assciated with websites (ex: shpping cart items) This infrmatin ges int a prfile f their users which is further useful in their directed advertising Knw the Ptential Risks f Scial Netwrk Expsure f Yur Infrmatin Identity Theft Identity thieves use an individual s persnal infrmatin t pretend t be yu. They use the infrmatin gathered frm public psts, and public infrmatin in yur prfile. They als use infrmatin gathered frm scial engineering, by friending a user and eliciting infrmatin thru messaging and chats ver suppsed cmmn interests r cmmn friends. Illegitimate third party Apps may gather infrmatin frm yur private prfile that yu are nt aware f thru cnfusing use statements which yu may cnsent t. This infrmatin is used t blster the false identity. Attacks may als appear in the frm f quizzes, questinnaires, r game links n friend sites that yu visit that reveal persnal infrmatin abut yu if yu play them. Phishing attempts, the ffering f a lure t hk yu int revealing persnal infrmatin, such as the fill ut the frm t qualify t win an Ipd are als a part f the identity theft fraud tlbx. If it seems t be t gd, it prbably is s dn t click the link!
3 Spear Phishing, highly directed Phishing aimed at a particular individual, where yu receive a legitimate lking message which asks yu t click a link and enter yur lgin and passwrd n a site usually knwn t yu, but spfed r falsified in this fraud, tries t elicit yur infrmatin by making yu think yu have an accunt prblem r a false billing. Always check by ther means directly with the accunt site. Dn t click the link! Using the infrmatin gathered, they then can use the synthetic identity t impersnate yu t an extent, the mre infrmatin they gather, the better the impersnatin. Intrductin f Malware Malware is malicius sftware that cvers a wide range f prgrams intended t gather infrmatin r damage yur cmputer s sftware r perating system. Malware can spread thru the scial netwrk frm cntact t cntact, as the malware appears t cme frm a trusted cntact, which induces peple t dwnlad it. Messages suppsedly frm a trusted cntact may include malware links when directed t suppsedly t view a file r vide, which result in infectin. Always be wary f unknwn links. A shrtened URL n a status update, newsfeed, r blg link may lead the user t dwnlad a virus r g t a website that will attempt t dwnlad a virus t the user s cmputer. may appear t be frm the scial netwrk itself asking fr infrmatin, with a link t click. This is anther frm f Phishing attack. Always check directly with the site by ther means t see if yu are being phished. Fake security alerts, with the virus psing as anti-virus, r anti-spyware sftware, ffering t help yu by clicking the link. Never accept an ffer t give yu free antivirus help! Scial Engineering Attacks Several f the scial engineering methds have been mentined previusly, as all f these fraud attempts have verlapping appraches. Scial engineering is the use f infrmatin knwn abut a user t elicit additinal infrmatin frm the user. All f the fraudulent methds are part f scial engineering. Phishing and Spear Fishing mentined previusly are scial engineering methds. They use a small amunt f knwn infrmatin t elicit additinal mre valuable infrmatin. Misleading Slicitatins is the attempt t make peple feel bligated t jin a cause r a grup because they receive frm a friend wh has jined. The intent is t slicit the registratin infrmatin frm anther user. If yu are interested, check with the friend by ther means, befre signing up. Hijacked Accunts is the use f cmprmised legitimate accunts after they are taken ver by malware r spyware t defraud ther users. The accunts are used t send ut spam, malware links, r slicitatins t the cntacts and friends f the riginal accunt. A classic example is the slicitatin letter frm yur friend, stuck in Hnduras and needing a wire transfer t buy a ticket hme, after a rbbery. Aviding Fraudulent Usage f Yur Scial Netwrking Infrmatin
4 Use a strng passwrd different frm the passwrds yu use t access ther sites. Never recycle yur passwrds as yu change them peridically. Use infrmatin that thers d nt knw abut yu in yur security questins, and never pst this infrmatin n yur public infrmatin! It is best t nt prvide a wrk t a scial netwrk. Cnsider using a specific new accunt nly fr the scial netwrk. If the accunt is cmprmised, as in the case f the Linked In lss f millins f accunt registratins, yur wrk accunt will nt be cmprmised. Review the privacy plicy and hw t cnfigure it befre yu sign up fr the accunt. Make sure yu knw if there is a change in the privacy plicy r terms f service. Only prvide necessary infrmatin yu are cmfrtable with revealing. Leaning t the side f less, is better. Never grant access t yur cntacts r address bk. The netwrk may prmise t cnnect yu t peple yu knw wh are already n the netwrk, but this expses yur cntact list t the whle variety f frauds if it shuld be cmprmised. Sme netwrks als use yur list, if yu d nt prhibit them, t slicit yur cntacts t jin. Be careful abut clicking unknwn links in messages frm friends n scial sites, particularly less well knwn friends. Links may be fraudulent paths t malware r scial engineering attacks. Yur friend may nt be yur friend if they are a stranger. Examine links fr ddities, such as misspellings r dd phrasing in the message. If it seems dd, avid it r check with the friend by ther cntact means befre yu g there. Dn t assume that a message is frm wh it seems t be frm. Hackers break accunts and cmprmise cntacts lists cmmnly. If yu suspect a fraud, cntact yur friend by alternate means t see if they are cmprmised. Messages frm the scial netwrk site will nt be asking yu t cnfirm persnal infrmatin r passwrds. Such a message is highly likely t be fraud. D nt click any links and reprt it t the site. Knw what infrmatin yu have psted abut yurself. This infrmatin is the basis f fraud attacks and t help hackers access accunts thru the frgtten passwrd apprach. Pet names, Mther s maiden name, first schl, favrite hbby, are all cmmn security questins. Think befre yu pst. Dn t pst vacatin plans fr the wrld t knw when yu are nt ging t be hme! Physical rbbery ccurs t, nt just cyber theft! Turn ff ge tagging fr yur pictures s that the wrld des nt knw as much abut yur physical lcatin. Dn t share all the details f yur daily rutine. Again, bad actrs can be physical criminals, nt just cyber criminals. Make sure yur children understand what infrmatin nt t share as they participate in scial netwrking as well. Dn t make it easy fr scammers by psting t the public part f yur site yur birthdate, age, phne number, and address. This identity infrmatin is a gift t scammers. If this infrmatin is required fr registratin, restrict it with yur privacy settings. Type in the name f yur scial netwrk link r use a persnal bkmark when accessing thru the internet. Never click a link t yur scial netwrking site n smene else s site. Yu may be giving yur user ID and passwrd infrmatin t a hacker when yu d.
5 Be selective abut wh yu accept as friends. Identity thieves may create fake, but attractive prfiles, t slicit persnal infrmatin frm yu and yur site. There is n reward fr having the mst friends! The safest strategy is t reject strangers. If yu decide t accept a stranger, limit their access thru yur privacy settings. Understand yur scial netwrk s privacy settings in detail. They are yur best prtectin against scammers. Chse yur scial netwrk carefully. Knw the privacy plicy and hw t cnfigure it. Find ut and understand if the site mnitrs psted material, and what they d with it. Yu are prviding persnal infrmatin, s knw what they are ding with it. Assume that everything yu put up n the site is permanent and public. Cnsider if yu wuld want the infrmatin n a billbard? The best assumptin is that anything yu pst may becme public infrmatin. Be careful f installing third party apps that let yu d mre with yur site. They may be malware traps. Validate their authenticity and privacy plicies carefully befre yu decide t use them. The best practice is t nt use them at all. Discuss the risks f scial netwrking with yur children relating t hme cmputing. Review their prfiles, and pstings. Help them cnfigure their sites fr prper privacy and t maintain them. Make sure they understand what persnal infrmatin nt t pst. Make sure they understand what phts nt t pst, such as embarrassing shts r shts with identifiable lcatin infrmatin, such as their huse, and including sites away frm hme such as their schl r a favrite playgrund. Make sure they knw never t meet with smene they have met n line. If huse rules are nt fllwed, remve the child s scial site by cntacting the scial netwrk. In the event yu feel yur accunt has been cmprmised, ntify the scial netwrking site immediately and alert yur cntacts. Malware may have been installed n yur cmputer. While nt a guarantee f safety, scan yur cmputer immediately with up t date Anti-Virus sftware. Useful Links Micrsft.Cm Safety and Security Center Stay Safe Online.Org Windws Supprt-Security, Privacy, and Accunts
First Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationHome Computing Security Awareness
Hme Cmputing Security Awareness Hme cmputing carries the same srt f risks t yur persnal infrmatin and persnal financial infrmatin that industry cmputing des t sensitive Cmpany infrmatin. The purpse f bad
More informationAMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15
AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides
More informationCorporate Account Takeover & Information Security Awareness
Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online
More informationInternet and Social Media Solicitations: Wise Giving Tips
Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial
More informationPreventing Identity Theft
Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationAccess EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationIntel Hybrid Cloud Management Portal Update FAQ. Audience: Public
Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid
More informationInternet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
More informationColorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies
Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means
More informationPrivacy Plicy Welcme, Sensati & JHI
Privacy Plicy Welcme t www.framesdata.cm! This site (the Frames Data Online Site ) is wned by Frames Data Inc. ("FDI" r we ), a subsidiary f Jbsn Medical Infrmatin LLC ("JMI") and its parent, Jbsn Healthcare
More informationOften people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.
Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationCustomers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
More informationKIK s GUIDE FOR LAW ENFORCEMENT
Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins
More informationIdentity fraud and theft
Page 1 f 5 Identity theft is when yur persnal details are stlen and identity fraud is when thse details are used t cmmit fraud. Mre abut identity fraud and identity theft Identity fraud can happen when:
More informationFAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationWriting a Cell Phone Strategy
Writing a Cell Phne Strategy Just like TV, cmputers and vide games we need t learn hw t manage cell phnes fr ur children as the phnes dn't cme with a kid instructin bklet. Even thugh yur children think
More informationHand-out:do:Nothing (social media security settings with Facebook used in examples)
Hand-ut:d:Nthing (scial media security settings with Facebk used in examples) University f Oxfrd Infrmatin Security infsec@it.x.ac.uk: www.it.x.ac.uk/infsec/prtectyurself/scialmedia/ Scial engineering
More informationFor students to participate in BYOD please follow these two steps
www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
More informationProcess of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
More informationState Bank Virtual Card FAQs
State Bank Virtual Card FAQs 1) What is State Bank Virtual Card? State Bank Virtual Card is a limit Debit card, which can be created using the State Bank Internet Banking facility fr ecmmerce (nline) transactins.
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationBest Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer
January 2008 Best Practices n Mnitring Htel Review Sites By Max Starkv and Mariana Mechs Safer Hteliers ften ask HeBS hw they can mnitr the Internet chatter surrunding their htels and whether r nt they
More informationBusiness Marketing Self-Assessment Checklist. The fast and simple way to identify your most critical marketing needs.
Business Marketing Self-Assessment Checklist The fast and simple way t identify yur mst critical marketing needs. Business Marketing Self-Assessment Checklist Simply put, marketing is everything yu d t
More informationPENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers
PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4
More information990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.
990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General
More informationModule 3: Checklists, Forms, and Templates and Disaster Preparedness Planning
Self-Guided Curse Presented by Julie Perrine, CPS/CAP, MBTI Certified Funder and CEO, All Things Admin Mdule 3: Checklists, Frms, and Templates and Disaster Preparedness Planning Mdule 3 Overview: In tday
More informationPart I: Welcome to BoardEffect -- Overview & Online Tour
Part I: Welcme t BardEffect -- Overview & Online Tur BardEffect is the leading e-gvernance tl fr missin-based rganizatins. This secure website will allw the Shaping NJ Partnership members t cmmunicate,
More information5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy
Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:
More informationMontana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management
Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationPRIVACY POLICY Last revised: April 2015
PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin
More informationIM, Presence, and Contacts
Find smene Lync 2013 Quick Reference IM, Presence, and Cntacts The quickest way t find smene via Lync is t launch a search by typing the persn s name r IM address in the search bx n the Lync main windw.
More informationKentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT
Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are
More informationA. Your Privacy Issues Concerned with
Questinnaire Dear Respndent, Please take yur time t fill up the fllwing questinnaire, as it will help us t design a highly infrmative and effective platfrm fr the cncerned peple wh are in need f high quality
More informationSocial media guidelines
Scial media guidelines I. Overview This dcument will prvide yu with basic guidelines n using scial media channels such as Facebk, Twitter r YuTube t reach individuals and families abut hw t prepare fr
More informationTipsheet: Sending Out Mass Emails in ApplyYourself
GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationTreasury Gateway Getting Started Guide
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access
More informationCorporations Q&A. Shareholders. 2006 Edward R. Alexander, Jr.
Crpratins Q&A. What is a crpratin and why frm ne? A crpratin is a business entity that is separate and distinct frm its wners. It can enter cntracts, sue and be sued withut invlving its wners (the sharehlders).
More informationAnnuities and Senior Citizens
Illinis Insurance Facts Illinis Department f Insurance January 2010 Annuities and Senir Citizens Nte: This infrmatin was develped t prvide cnsumers with general infrmatin and guidance abut insurance cverages
More informationGirl Scouts of the Missouri Heartland, Inc. Guidelines for Girl Scout Troop & Service Unit Websites
Girl Scuts f the Missuri Heartland, Inc. Guidelines fr Girl Scut Trp & Service Unit Websites Nearly all Girl Scut members surf the web regularly and many Girl Scut Trps and Girl Scut Service Units are
More informationSmall Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman
Small Business Fraud Custm Study amng Small Business Owners Cnducted fr SunTrust Banks/Natinal Small Business Assciatin/Edelman Octber 17, 2007 Objective & Methdlgy Objective In cllabratin with SunTrust
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationRetirement Planning Options Annuities
Retirement Planning Optins Annuities Everyne wants a glden retirement. But saving fr retirement is n easy task. The baby bmer generatin is graying. Mre and mre peple are appraching retirement age. With
More informationNorwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16
Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected
More informationFAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup
FAQ Frequently Asked Questins & Answers fr using the nline assessment platfrm f ΜanpwerGrup Versin 1.0 Athens, July 2014 1 Frequently Asked Questins & Answers regarding the use f the nline assessment platfrm
More informationCSAT Account Management
CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationLOGOS Purchase Agreement How will you acquire this valuable digital tool?
LOGOS FAQs LOGOS 6 at Bb Jnes University Seminary In the last tw decades, Bible study sftware has prliferated and advanced t the pint that any serius student f Scripture seeks familiarity with these tls.
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationGUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0
GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS Versin 1.0 Published Octber 2015 Dcument Cntrl Versin: 1.0 Authr: Cyber Security Divisin - ictqatar Classificatin: Public Date f Issue: Octber 2015 2 Page
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationRemote Desktop Tutorial. By: Virginia Ginny Morris
Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm
More informationSearch Engine Optimisation and Web Analytics
E-Cmmerce Applicatins Prmting yur Site: Search Engine Optimisatin and Web Analytics Sessin 6 1 Next steps Prmting yur Business Having develped website/e-shp shp next step is t prmte the business Marketing
More informationA. Early Case Assessment
Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering
More informationHow Checking Accounts Work
Hw Checking Accunts Wrk LESSON PREPARATION AND TEACHER INFORMATION Lessn Summary: This lessn is intended fr high schl students during a frty minute time perid. The lessn teaches students the purpse f a
More informationMaryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions
Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr
More informationFundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs
Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths
More informationImportant 2015 Date!!! Our home swim meet The Ukiah Dolphins Soroptimist Swim Meet is the weekend of July 24 th.
Thank yu fr yur interest in jining the Ukiah Dlphins! Here is ur registratin packet. Please read and fllw these imprtant guidelines as yu cmplete yur packet: Fill ut and turn in every part f the packet
More informationSergeant Rob Choquette Economic Crimes Unit
Sergeant Rb Chquette Ecnmic Crimes Unit Wrngful r criminal deceptin intended t result in financial r persnal gain. Cmmn Fraud Schemes Credit Card (CC) Fraud CC numbers are btained by varius means such
More informationWHAT SHOULD I LOOK FOR WHEN I BUY HEALTH INSURANCE?
WHAT SHOULD I LOOK FOR WHEN I BUY HEALTH INSURANCE? The Maine Bureau f Insurance 34 State Huse Statin Augusta, Maine 04333 207-624-8475 r 1-800-300-5000 (in Maine) http://www.maine.gv/pfr/insurance Paul
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationCONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions.
This dcument is intended t prvide NCAA member institutins with an infrmatinal guide regarding the ptential implicatins f the Patient Prtectin and Affrdable Care Act f 2010 (PPACA) when fully implemented
More informationBRILL s Editorial Manager (EM) Manual for Authors Table of Contents
BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1
More informationCalling 9-1-1 from a Cell Phone
Calling 9-1-1 frm a Cell Phne When calling 9-1-1 frm a cell phne, yur lcatin may nt autmatically display t the 9-1-1 center as it des when calling frm mst hmes r businesses. Be Prepared t tell the 9-1-1
More informationGETTING STARTED With the Control Panel Table of Contents
With the Cntrl Panel Table f Cntents Cntrl Panel Desktp... 2 Left Menu... 3 Infrmatin... 3 Plan Change... 3 Dmains... 3 Statistics... 4 Ttal Traffic... 4 Disk Quta... 4 Quick Access Desktp... 4 MAIN...
More informationOnline Banking Agreement
Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet
More informationQBT - Making business travel simple
QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need
More informationSecurity in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade
Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small
More informationMerchant Management System. New User Guide CARDSAVE
Merchant Management System New User Guide CARDSAVE Table f Cntents Lgging-In... 2 Saving the MMS website link... 2 Lgging-in and changing yur passwrd... 3 Prcessing Transactins... 4 Security Settings...
More informationTo discuss Chapter 13 bankruptcy questions with our bankruptcy attorney, please call us or fill out a Free Evaluation form on our website.
Intrductin This Ebk fcuses n Chapter 13 bankruptcy, hw it wrks, and hw it helps yu eliminate debt and keep yur assets (such as yur hme). We hpe yu find this infrmatin t be helpful. T discuss Chapter 13
More informationARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM?
ARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM? City University f Seattle recgnizes that learning ccurs in many different ways and under varied circumstances. As a result, the University
More informationAmazon Marketing Services Content Policies and Standards
Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...
More informationIntegrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationNet Conferencing User Guide: Advanced and Customized Net Conference with Microsoft Office Live Meeting Event Registration
Net Cnferencing User Guide: Advanced and Custmized Net Cnference with Micrsft Office Live Meeting Event Registratin Event Registratin User Guide Event Registratin is a feature f Advanced and Custmized
More informationDIGITAL MARKETING STRATEGY CHECKLIST
DIGITAL MARKETING STRATEGY CHECKLIST [CAMPAIGN NAME HERE] 1. SET CAMPAIGN GOALS What is yur mtivatin fr running this campaign? (e.g. sell 20,000 wrth f gift vuchers in x number f mnths) Are yur gals SMART?
More informationAeroplan 2013 Star Challenge Promotion
Aerplan 2013 Star Challenge Prmtin Q1. What is the Star Challenge Prmtin? The Star Challenge prmtin is a bnus miles event that is designed t reward members fr earning miles acrss Aerplan s participating
More informationLISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division
LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357
More informationEVENT PLANNING GUIDE
EVENT PLANNING GUIDE Office f Student Activities 176 Murphy Campus Blvd Wac, GA 30182 770.537.5722 phne 770.537.7995 fax tmazhani@westgatech.edu Event Planning 101 at West Gergia Tech! ~Registered Student
More informationHP Connected Backup Online Help. Version 8.7.1 04 October 2012
HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts
More informationefusion Table of Contents
efusin Cst Centers, Partner Funding, VAT/GST and ERP Link Table f Cntents Cst Centers... 2 Admin Setup... 2 Cst Center Step in Create Prgram... 2 Allcatin Types... 3 Assciate Payments with Cst Centers...
More informationRemote Working (Policy & Procedure)
Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer
More informationKronos Workforce Timekeeper Frequently Asked Questions
Krns Wrkfrce Timekeeper Frequently Asked Questins 1. I d nt have the Emplyee Time Reprting ptin listed in my Agra menu. What d I d? If yu are a new emplyee and can t see yur emplyee timecard, cnfirm with
More informationWhat Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income:
126 Sewall Street Augusta, Maine 04330-6822 TTY/Vice: (207) 626-7058 Fax: (207) 621-8148 www.mejp.rg What Happens T My Benefits If I Get a Bunch f Mney? Each prgram, (TANF, SSI, MaineCare, etc.) has its
More informationExercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationProcess for Responding to Privacy Breaches
Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident
More informationExercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationBUPA DENTAL PLAN A P P L I C AT I O N F O R M
BUPA DENTAL PLAN A P P L I C AT I O N F O R M Please cmplete all relevant sectins f the frm in BLOCK CAPITALS and BLACK INK and return it t: Cnsumer Partnerships, FPS Dental, Bupa, Willw Huse, Chertsey
More informationOCR LEVEL 2 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SETTING UP AN IT NETWORK M/601/3274 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SETTING UP AN IT NETWORK
More informationHelpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
More informationSTIClassroom Win Rosters, Attendance, Lesson Plans and Textbooks
STIClassrm Win Rsters, Attendance, Lessn Plans and Textbks Student Class Rster T access the student class rster, click the icn in the Classrm desktp. Frm the Rster screen, teachers may access the items
More informationMaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
More information