Social Media Security Awareness for Business or Home Computing Users

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Social Media Security Awareness for Business or Home Computing Users"

Transcription

1 Scial Media Security Awareness fr Business r Hme Cmputing Users The purpse f all scial media sites, whether fr business r persnal use, is cmmunicatin, sharing, and smetimes cllabratin. The benefits f the scial netwrking mdel is that yu can put ut infrmatin yu want thers t have access t withut having t direct that infrmatin t a specific individual at a specific time. Cnnecting yurself t thers thru scial media sites such as Facebk, Twitter, and Linkedin has advantages fr the user in terms f staying in tuch withut much effrt. Taking advantage f scial media t stay cnnected means that yu must knw the risks that cme with the nted ease f use, and hw t prtect yurself against bad actrs wh are interested in things ther than yur vacatin pictures! Besides yur friends, wh else is lking at yur infrmatin, and hw might they be intending t use it! The purpse f this shrt mdule is t set frth the basic risks and defenses necessary t have a safer experience with scial media netwrking. Defensive Cmputing Be Aware f What Infrmatin is Public Thru Scial Media Scial netwrking has grwn in ppularity since being adpted n a large scale in the late 1990 s. Internet users with a scial netwrk prfile quadrupled between 2004 and 2008 and Facebk claimed a Billin users in Many peple are interested in the infrmatin all f thse users pst. Many f thse interested parties are nt necessarily yur friends! Identity thieves, scam artists, debt cllectrs, stalkers, and crpratins lking fr a market advantage are using scial netwrks t gather infrmatin abut cnsumers and cmpetitrs. Cmpanies that perate scial netwrks are themselves cllecting a variety f data abut their users, bth t persnalize the services fr the users and t sell t advertisers. There are tw kinds f infrmatin that can be gathered abut a user frm a scial netwrk: infrmatin that is shared and infrmatin gathered thrugh electrnic tracking. Once that infrmatin is prvided and psted, it is ging t be there essentially in perpetuity, unless sme actin is taken by the wner f the infrmatin (the user) t take it dwn. Infrmatin a user shares may include : Phts, ther media, age and gender infrmatin, bigraphical infrmatin such as emplyment histry, hmetwn, and family histry infrmatin. Psted status updates such as travel, interests, activities. Embedded in this seemingly harmless infrmatin is a wealth f identity and activity infrmatin fr a bad actr t mine. Obvius prfile infrmatin n name, address, age. Relevant identity supprting infrmatin such as mther and father s names, mther s maiden name, pet s names, where yu like t vacatin, when yu like t vacatin, restaurants yu like t eat in, parks yur children play in, etc..

2 Sme f the user Prfile infrmatin is hidden frm the public unless the user des nt activate privacy settings crrectly, r when the privacy settings get reset after an update. Scial netwrks can, and d, change their privacy plicy withut the user s permissin, expsing infrmatin frmally hidden unless the user understands the change and resets their preferred privacy level. Many users are nt aware f hw t maintain their privacy settings r just chse nt t use them. Yur friends may cpy and pst infrmatin frm yur site, which they had access t, n their wn sites, withut yur permissin, bypassing yur privacy settings cmpletely. Yu may have third party applicatins which stre and expse sme f yur prfile infrmatin which yu thught was private. Scial netwrks d nt guarantee the privacy f their user data and have had numerus failures t prtect infrmatin: 2010 Facebk -expsure f persnal chat lgs f users Facebk -expsure f ld private messages n the walls f Eurpean users LinkedIn- 6.5 millin hashed passwrds fr the business fcused scial netwrk LinkedIn were published n hacker frums. Scial netwrks als benefit frm yur public infrmatin by which a prfile f yur interests may be made s as t direct custmized ads t yu. They encurage users t pst mre and mre infrmatin and are successful in this encuragement! Scial netwrks als gather infrmatin thru electrnic tracking using ckies t track infrmatin such as Websites visited and infrmatin assciated with websites (ex: shpping cart items) This infrmatin ges int a prfile f their users which is further useful in their directed advertising Knw the Ptential Risks f Scial Netwrk Expsure f Yur Infrmatin Identity Theft Identity thieves use an individual s persnal infrmatin t pretend t be yu. They use the infrmatin gathered frm public psts, and public infrmatin in yur prfile. They als use infrmatin gathered frm scial engineering, by friending a user and eliciting infrmatin thru messaging and chats ver suppsed cmmn interests r cmmn friends. Illegitimate third party Apps may gather infrmatin frm yur private prfile that yu are nt aware f thru cnfusing use statements which yu may cnsent t. This infrmatin is used t blster the false identity. Attacks may als appear in the frm f quizzes, questinnaires, r game links n friend sites that yu visit that reveal persnal infrmatin abut yu if yu play them. Phishing attempts, the ffering f a lure t hk yu int revealing persnal infrmatin, such as the fill ut the frm t qualify t win an Ipd are als a part f the identity theft fraud tlbx. If it seems t be t gd, it prbably is s dn t click the link!

3 Spear Phishing, highly directed Phishing aimed at a particular individual, where yu receive a legitimate lking message which asks yu t click a link and enter yur lgin and passwrd n a site usually knwn t yu, but spfed r falsified in this fraud, tries t elicit yur infrmatin by making yu think yu have an accunt prblem r a false billing. Always check by ther means directly with the accunt site. Dn t click the link! Using the infrmatin gathered, they then can use the synthetic identity t impersnate yu t an extent, the mre infrmatin they gather, the better the impersnatin. Intrductin f Malware Malware is malicius sftware that cvers a wide range f prgrams intended t gather infrmatin r damage yur cmputer s sftware r perating system. Malware can spread thru the scial netwrk frm cntact t cntact, as the malware appears t cme frm a trusted cntact, which induces peple t dwnlad it. Messages suppsedly frm a trusted cntact may include malware links when directed t suppsedly t view a file r vide, which result in infectin. Always be wary f unknwn links. A shrtened URL n a status update, newsfeed, r blg link may lead the user t dwnlad a virus r g t a website that will attempt t dwnlad a virus t the user s cmputer. may appear t be frm the scial netwrk itself asking fr infrmatin, with a link t click. This is anther frm f Phishing attack. Always check directly with the site by ther means t see if yu are being phished. Fake security alerts, with the virus psing as anti-virus, r anti-spyware sftware, ffering t help yu by clicking the link. Never accept an ffer t give yu free antivirus help! Scial Engineering Attacks Several f the scial engineering methds have been mentined previusly, as all f these fraud attempts have verlapping appraches. Scial engineering is the use f infrmatin knwn abut a user t elicit additinal infrmatin frm the user. All f the fraudulent methds are part f scial engineering. Phishing and Spear Fishing mentined previusly are scial engineering methds. They use a small amunt f knwn infrmatin t elicit additinal mre valuable infrmatin. Misleading Slicitatins is the attempt t make peple feel bligated t jin a cause r a grup because they receive frm a friend wh has jined. The intent is t slicit the registratin infrmatin frm anther user. If yu are interested, check with the friend by ther means, befre signing up. Hijacked Accunts is the use f cmprmised legitimate accunts after they are taken ver by malware r spyware t defraud ther users. The accunts are used t send ut spam, malware links, r slicitatins t the cntacts and friends f the riginal accunt. A classic example is the slicitatin letter frm yur friend, stuck in Hnduras and needing a wire transfer t buy a ticket hme, after a rbbery. Aviding Fraudulent Usage f Yur Scial Netwrking Infrmatin

4 Use a strng passwrd different frm the passwrds yu use t access ther sites. Never recycle yur passwrds as yu change them peridically. Use infrmatin that thers d nt knw abut yu in yur security questins, and never pst this infrmatin n yur public infrmatin! It is best t nt prvide a wrk t a scial netwrk. Cnsider using a specific new accunt nly fr the scial netwrk. If the accunt is cmprmised, as in the case f the Linked In lss f millins f accunt registratins, yur wrk accunt will nt be cmprmised. Review the privacy plicy and hw t cnfigure it befre yu sign up fr the accunt. Make sure yu knw if there is a change in the privacy plicy r terms f service. Only prvide necessary infrmatin yu are cmfrtable with revealing. Leaning t the side f less, is better. Never grant access t yur cntacts r address bk. The netwrk may prmise t cnnect yu t peple yu knw wh are already n the netwrk, but this expses yur cntact list t the whle variety f frauds if it shuld be cmprmised. Sme netwrks als use yur list, if yu d nt prhibit them, t slicit yur cntacts t jin. Be careful abut clicking unknwn links in messages frm friends n scial sites, particularly less well knwn friends. Links may be fraudulent paths t malware r scial engineering attacks. Yur friend may nt be yur friend if they are a stranger. Examine links fr ddities, such as misspellings r dd phrasing in the message. If it seems dd, avid it r check with the friend by ther cntact means befre yu g there. Dn t assume that a message is frm wh it seems t be frm. Hackers break accunts and cmprmise cntacts lists cmmnly. If yu suspect a fraud, cntact yur friend by alternate means t see if they are cmprmised. Messages frm the scial netwrk site will nt be asking yu t cnfirm persnal infrmatin r passwrds. Such a message is highly likely t be fraud. D nt click any links and reprt it t the site. Knw what infrmatin yu have psted abut yurself. This infrmatin is the basis f fraud attacks and t help hackers access accunts thru the frgtten passwrd apprach. Pet names, Mther s maiden name, first schl, favrite hbby, are all cmmn security questins. Think befre yu pst. Dn t pst vacatin plans fr the wrld t knw when yu are nt ging t be hme! Physical rbbery ccurs t, nt just cyber theft! Turn ff ge tagging fr yur pictures s that the wrld des nt knw as much abut yur physical lcatin. Dn t share all the details f yur daily rutine. Again, bad actrs can be physical criminals, nt just cyber criminals. Make sure yur children understand what infrmatin nt t share as they participate in scial netwrking as well. Dn t make it easy fr scammers by psting t the public part f yur site yur birthdate, age, phne number, and address. This identity infrmatin is a gift t scammers. If this infrmatin is required fr registratin, restrict it with yur privacy settings. Type in the name f yur scial netwrk link r use a persnal bkmark when accessing thru the internet. Never click a link t yur scial netwrking site n smene else s site. Yu may be giving yur user ID and passwrd infrmatin t a hacker when yu d.

5 Be selective abut wh yu accept as friends. Identity thieves may create fake, but attractive prfiles, t slicit persnal infrmatin frm yu and yur site. There is n reward fr having the mst friends! The safest strategy is t reject strangers. If yu decide t accept a stranger, limit their access thru yur privacy settings. Understand yur scial netwrk s privacy settings in detail. They are yur best prtectin against scammers. Chse yur scial netwrk carefully. Knw the privacy plicy and hw t cnfigure it. Find ut and understand if the site mnitrs psted material, and what they d with it. Yu are prviding persnal infrmatin, s knw what they are ding with it. Assume that everything yu put up n the site is permanent and public. Cnsider if yu wuld want the infrmatin n a billbard? The best assumptin is that anything yu pst may becme public infrmatin. Be careful f installing third party apps that let yu d mre with yur site. They may be malware traps. Validate their authenticity and privacy plicies carefully befre yu decide t use them. The best practice is t nt use them at all. Discuss the risks f scial netwrking with yur children relating t hme cmputing. Review their prfiles, and pstings. Help them cnfigure their sites fr prper privacy and t maintain them. Make sure they understand what persnal infrmatin nt t pst. Make sure they understand what phts nt t pst, such as embarrassing shts r shts with identifiable lcatin infrmatin, such as their huse, and including sites away frm hme such as their schl r a favrite playgrund. Make sure they knw never t meet with smene they have met n line. If huse rules are nt fllwed, remve the child s scial site by cntacting the scial netwrk. In the event yu feel yur accunt has been cmprmised, ntify the scial netwrking site immediately and alert yur cntacts. Malware may have been installed n yur cmputer. While nt a guarantee f safety, scan yur cmputer immediately with up t date Anti-Virus sftware. Useful Links Micrsft.Cm Safety and Security Center Stay Safe Online.Org Windws Supprt-Security, Privacy, and Accunts

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Home Computing Security Awareness

Home Computing Security Awareness Hme Cmputing Security Awareness Hme cmputing carries the same srt f risks t yur persnal infrmatin and persnal financial infrmatin that industry cmputing des t sensitive Cmpany infrmatin. The purpse f bad

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15 AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid

More information

Privacy Policy. What personally identifying information is collected on or through the Frames Data Online Site?

Privacy Policy. What personally identifying information is collected on or through the Frames Data Online Site? Privacy Plicy Welcme t www.framesdata.cm! This site (the Frames Data Online Site ) is wned by Frames Data Inc. ("FDI" r we ), a subsidiary f Jbsn Medical Infrmatin LLC ("JMI") and its parent, Jbsn Healthcare

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies

Colorado Rapids Youth Soccer Club Social Media and Electronic Communication Policies Clrad Rapids Yuth Sccer Club Scial Media and Electrnic Cmmunicatin Plicies OVERVIEW Online, scial media and ther electrnic cmmunicatin tls such as text messaging have becme a prevalent and effective means

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Identity fraud and theft

Identity fraud and theft Page 1 f 5 Identity theft is when yur persnal details are stlen and identity fraud is when thse details are used t cmmit fraud. Mre abut identity fraud and identity theft Identity fraud can happen when:

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

FREQUENTLY ASKED QUESTIONS ABOUT MOBILE WEB BANKING

FREQUENTLY ASKED QUESTIONS ABOUT MOBILE WEB BANKING FREQUENTLY ASKED QUESTIONS ABOUT MOBILE WEB BANKING What is Mbile Banking? A service that enables yu t access yur accunt infrmatin, cnduct transfers, and pay and manage yur bill payments frm any mbile

More information

Hand-out:do:Nothing (social media security settings with Facebook used in examples)

Hand-out:do:Nothing (social media security settings with Facebook used in examples) Hand-ut:d:Nthing (scial media security settings with Facebk used in examples) University f Oxfrd Infrmatin Security infsec@it.x.ac.uk: www.it.x.ac.uk/infsec/prtectyurself/scialmedia/ Scial engineering

More information

Business Marketing Self-Assessment Checklist. The fast and simple way to identify your most critical marketing needs.

Business Marketing Self-Assessment Checklist. The fast and simple way to identify your most critical marketing needs. Business Marketing Self-Assessment Checklist The fast and simple way t identify yur mst critical marketing needs. Business Marketing Self-Assessment Checklist Simply put, marketing is everything yu d t

More information

Writing a Cell Phone Strategy

Writing a Cell Phone Strategy Writing a Cell Phne Strategy Just like TV, cmputers and vide games we need t learn hw t manage cell phnes fr ur children as the phnes dn't cme with a kid instructin bklet. Even thugh yur children think

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

State Bank Virtual Card FAQs

State Bank Virtual Card FAQs State Bank Virtual Card FAQs 1) What is State Bank Virtual Card? State Bank Virtual Card is a limit Debit card, which can be created using the State Bank Internet Banking facility fr ecmmerce (nline) transactins.

More information

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the

More information

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:

More information

Best Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer

Best Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer January 2008 Best Practices n Mnitring Htel Review Sites By Max Starkv and Mariana Mechs Safer Hteliers ften ask HeBS hw they can mnitr the Internet chatter surrunding their htels and whether r nt they

More information

PRIVACY POLICY Last revised: April 2015

PRIVACY POLICY Last revised: April 2015 PRIVACY POLICY Last revised: April 2015 ACD, LLC, and its affiliates (cllectively, we, us, ur ) understand that privacy is imprtant t ur cnsumers and want yu t make knwledgeable decisins abut the infrmatin

More information

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4

More information

Module 3: Checklists, Forms, and Templates and Disaster Preparedness Planning

Module 3: Checklists, Forms, and Templates and Disaster Preparedness Planning Self-Guided Curse Presented by Julie Perrine, CPS/CAP, MBTI Certified Funder and CEO, All Things Admin Mdule 3: Checklists, Frms, and Templates and Disaster Preparedness Planning Mdule 3 Overview: In tday

More information

Part I: Welcome to BoardEffect -- Overview & Online Tour

Part I: Welcome to BoardEffect -- Overview & Online Tour Part I: Welcme t BardEffect -- Overview & Online Tur BardEffect is the leading e-gvernance tl fr missin-based rganizatins. This secure website will allw the Shaping NJ Partnership members t cmmunicate,

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

Social media guidelines

Social media guidelines Scial media guidelines I. Overview This dcument will prvide yu with basic guidelines n using scial media channels such as Facebk, Twitter r YuTube t reach individuals and families abut hw t prepare fr

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

IM, Presence, and Contacts

IM, Presence, and Contacts Find smene Lync 2013 Quick Reference IM, Presence, and Cntacts The quickest way t find smene via Lync is t launch a search by typing the persn s name r IM address in the search bx n the Lync main windw.

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

A. Your Privacy Issues Concerned with

A. Your Privacy Issues Concerned with Questinnaire Dear Respndent, Please take yur time t fill up the fllwing questinnaire, as it will help us t design a highly infrmative and effective platfrm fr the cncerned peple wh are in need f high quality

More information

Tipsheet: Sending Out Mass Emails in ApplyYourself

Tipsheet: Sending Out Mass Emails in ApplyYourself GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Annuities and Senior Citizens

Annuities and Senior Citizens Illinis Insurance Facts Illinis Department f Insurance January 2010 Annuities and Senir Citizens Nte: This infrmatin was develped t prvide cnsumers with general infrmatin and guidance abut insurance cverages

More information

Girl Scouts of the Missouri Heartland, Inc. Guidelines for Girl Scout Troop & Service Unit Websites

Girl Scouts of the Missouri Heartland, Inc. Guidelines for Girl Scout Troop & Service Unit Websites Girl Scuts f the Missuri Heartland, Inc. Guidelines fr Girl Scut Trp & Service Unit Websites Nearly all Girl Scut members surf the web regularly and many Girl Scut Trps and Girl Scut Service Units are

More information

CREATING A DONOR ACCOUNT

CREATING A DONOR ACCOUNT CREATING A DONOR ACCOUNT An Online Giving Accunt shuld be created t have the ability t set-up recurring dnatins, pledges and be able t view and print histry. Setting up an accunt will als allw yu t set-up

More information

Corporations Q&A. Shareholders. 2006 Edward R. Alexander, Jr.

Corporations Q&A. Shareholders. 2006 Edward R. Alexander, Jr. Crpratins Q&A. What is a crpratin and why frm ne? A crpratin is a business entity that is separate and distinct frm its wners. It can enter cntracts, sue and be sued withut invlving its wners (the sharehlders).

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

FAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup

FAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup FAQ Frequently Asked Questins & Answers fr using the nline assessment platfrm f ΜanpwerGrup Versin 1.0 Athens, July 2014 1 Frequently Asked Questins & Answers regarding the use f the nline assessment platfrm

More information

Small Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman

Small Business Fraud Custom Study among Small Business Owners Conducted for SunTrust Banks/National Small Business Association/Edelman Small Business Fraud Custm Study amng Small Business Owners Cnducted fr SunTrust Banks/Natinal Small Business Assciatin/Edelman Octber 17, 2007 Objective & Methdlgy Objective In cllabratin with SunTrust

More information

Retirement Planning Options Annuities

Retirement Planning Options Annuities Retirement Planning Optins Annuities Everyne wants a glden retirement. But saving fr retirement is n easy task. The baby bmer generatin is graying. Mre and mre peple are appraching retirement age. With

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

LOGOS Purchase Agreement How will you acquire this valuable digital tool?

LOGOS Purchase Agreement How will you acquire this valuable digital tool? LOGOS FAQs LOGOS 6 at Bb Jnes University Seminary In the last tw decades, Bible study sftware has prliferated and advanced t the pint that any serius student f Scripture seeks familiarity with these tls.

More information

CSAT Account Management

CSAT Account Management CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update

More information

Search Engine Optimisation and Web Analytics

Search Engine Optimisation and Web Analytics E-Cmmerce Applicatins Prmting yur Site: Search Engine Optimisatin and Web Analytics Sessin 6 1 Next steps Prmting yur Business Having develped website/e-shp shp next step is t prmte the business Marketing

More information

GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0

GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0 GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS Versin 1.0 Published Octber 2015 Dcument Cntrl Versin: 1.0 Authr: Cyber Security Divisin - ictqatar Classificatin: Public Date f Issue: Octber 2015 2 Page

More information

Remote Desktop Tutorial. By: Virginia Ginny Morris

Remote Desktop Tutorial. By: Virginia Ginny Morris Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm

More information

WHAT SHOULD I LOOK FOR WHEN I BUY HEALTH INSURANCE?

WHAT SHOULD I LOOK FOR WHEN I BUY HEALTH INSURANCE? WHAT SHOULD I LOOK FOR WHEN I BUY HEALTH INSURANCE? The Maine Bureau f Insurance 34 State Huse Statin Augusta, Maine 04333 207-624-8475 r 1-800-300-5000 (in Maine) http://www.maine.gv/pfr/insurance Paul

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

How Checking Accounts Work

How Checking Accounts Work Hw Checking Accunts Wrk LESSON PREPARATION AND TEACHER INFORMATION Lessn Summary: This lessn is intended fr high schl students during a frty minute time perid. The lessn teaches students the purpse f a

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

Important 2015 Date!!! Our home swim meet The Ukiah Dolphins Soroptimist Swim Meet is the weekend of July 24 th.

Important 2015 Date!!! Our home swim meet The Ukiah Dolphins Soroptimist Swim Meet is the weekend of July 24 th. Thank yu fr yur interest in jining the Ukiah Dlphins! Here is ur registratin packet. Please read and fllw these imprtant guidelines as yu cmplete yur packet: Fill ut and turn in every part f the packet

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Sergeant Rob Choquette Economic Crimes Unit

Sergeant Rob Choquette Economic Crimes Unit Sergeant Rb Chquette Ecnmic Crimes Unit Wrngful r criminal deceptin intended t result in financial r persnal gain. Cmmn Fraud Schemes Credit Card (CC) Fraud CC numbers are btained by varius means such

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

DIGITAL MARKETING STRATEGY CHECKLIST

DIGITAL MARKETING STRATEGY CHECKLIST DIGITAL MARKETING STRATEGY CHECKLIST [CAMPAIGN NAME HERE] 1. SET CAMPAIGN GOALS What is yur mtivatin fr running this campaign? (e.g. sell 20,000 wrth f gift vuchers in x number f mnths) Are yur gals SMART?

More information

QBT - Making business travel simple

QBT - Making business travel simple QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need

More information

Calling 9-1-1 from a Cell Phone

Calling 9-1-1 from a Cell Phone Calling 9-1-1 frm a Cell Phne When calling 9-1-1 frm a cell phne, yur lcatin may nt autmatically display t the 9-1-1 center as it des when calling frm mst hmes r businesses. Be Prepared t tell the 9-1-1

More information

To discuss Chapter 13 bankruptcy questions with our bankruptcy attorney, please call us or fill out a Free Evaluation form on our website.

To discuss Chapter 13 bankruptcy questions with our bankruptcy attorney, please call us or fill out a Free Evaluation form on our website. Intrductin This Ebk fcuses n Chapter 13 bankruptcy, hw it wrks, and hw it helps yu eliminate debt and keep yur assets (such as yur hme). We hpe yu find this infrmatin t be helpful. T discuss Chapter 13

More information

Amazon Marketing Services Content Policies and Standards

Amazon Marketing Services Content Policies and Standards Amazn Marketing Services Cntent Plicies and Standards Cntents Intrductin... 2 Acceptance f Creative Assets... 2 General Creative Plicies... 3 Reprting Abuse... 3 Cnsequences fr Vilatins... 3 Image Guidelines...

More information

Security in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade

Security in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small

More information

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions.

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions. This dcument is intended t prvide NCAA member institutins with an infrmatinal guide regarding the ptential implicatins f the Patient Prtectin and Affrdable Care Act f 2010 (PPACA) when fully implemented

More information

ARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM?

ARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM? ARE YOU INTERESTED IN THE PRIOR LEARNING ASSESSMENT (PLA) PROGRAM? City University f Seattle recgnizes that learning ccurs in many different ways and under varied circumstances. As a result, the University

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SETTING UP AN IT NETWORK M/601/3274 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SETTING UP AN IT NETWORK

More information

Merchant Management System. New User Guide CARDSAVE

Merchant Management System. New User Guide CARDSAVE Merchant Management System New User Guide CARDSAVE Table f Cntents Lgging-In... 2 Saving the MMS website link... 2 Lgging-in and changing yur passwrd... 3 Prcessing Transactins... 4 Security Settings...

More information

Aeroplan 2013 Star Challenge Promotion

Aeroplan 2013 Star Challenge Promotion Aerplan 2013 Star Challenge Prmtin Q1. What is the Star Challenge Prmtin? The Star Challenge prmtin is a bnus miles event that is designed t reward members fr earning miles acrss Aerplan s participating

More information

Net Conferencing User Guide: Advanced and Customized Net Conference with Microsoft Office Live Meeting Event Registration

Net Conferencing User Guide: Advanced and Customized Net Conference with Microsoft Office Live Meeting Event Registration Net Cnferencing User Guide: Advanced and Custmized Net Cnference with Micrsft Office Live Meeting Event Registratin Event Registratin User Guide Event Registratin is a feature f Advanced and Custmized

More information

GETTING STARTED With the Control Panel Table of Contents

GETTING STARTED With the Control Panel Table of Contents With the Cntrl Panel Table f Cntents Cntrl Panel Desktp... 2 Left Menu... 3 Infrmatin... 3 Plan Change... 3 Dmains... 3 Statistics... 4 Ttal Traffic... 4 Disk Quta... 4 Quick Access Desktp... 4 MAIN...

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

EVENT PLANNING GUIDE

EVENT PLANNING GUIDE EVENT PLANNING GUIDE Office f Student Activities 176 Murphy Campus Blvd Wac, GA 30182 770.537.5722 phne 770.537.7995 fax tmazhani@westgatech.edu Event Planning 101 at West Gergia Tech! ~Registered Student

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

HP Connected Backup Online Help. Version 8.7.1 04 October 2012

HP Connected Backup Online Help. Version 8.7.1 04 October 2012 HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts

More information

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357

More information

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income:

What Happens To My Benefits If I Get a Bunch of Money? TANF Here is what happens if you are on the TANF program when you get lump-sum income: 126 Sewall Street Augusta, Maine 04330-6822 TTY/Vice: (207) 626-7058 Fax: (207) 621-8148 www.mejp.rg What Happens T My Benefits If I Get a Bunch f Mney? Each prgram, (TANF, SSI, MaineCare, etc.) has its

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

efusion Table of Contents

efusion Table of Contents efusin Cst Centers, Partner Funding, VAT/GST and ERP Link Table f Cntents Cst Centers... 2 Admin Setup... 2 Cst Center Step in Create Prgram... 2 Allcatin Types... 3 Assciate Payments with Cst Centers...

More information

Kronos Workforce Timekeeper Frequently Asked Questions

Kronos Workforce Timekeeper Frequently Asked Questions Krns Wrkfrce Timekeeper Frequently Asked Questins 1. I d nt have the Emplyee Time Reprting ptin listed in my Agra menu. What d I d? If yu are a new emplyee and can t see yur emplyee timecard, cnfirm with

More information

BUPA DENTAL PLAN A P P L I C AT I O N F O R M

BUPA DENTAL PLAN A P P L I C AT I O N F O R M BUPA DENTAL PLAN A P P L I C AT I O N F O R M Please cmplete all relevant sectins f the frm in BLOCK CAPITALS and BLACK INK and return it t: Cnsumer Partnerships, FPS Dental, Bupa, Willw Huse, Chertsey

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

How to put together a Workforce Development Fund (WDF) claim 2015/16

How to put together a Workforce Development Fund (WDF) claim 2015/16 Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF

More information