TIPS FOR INTERNET USERS

Size: px
Start display at page:

Download "TIPS FOR INTERNET USERS"

Transcription

1 TIPS FOR INTERNET USERS

2

3 @ TIPS FOR INTERNET USERS

4 TIPS FOR INTERNET USERS

5 INDEX I. Introducción Introduction II. Servicios Browsers de Navegación III. Correo Electronic Electrónico mail IV. Virus, Viruses, Gusanos Worms y and Ataques Social de Engineering Ingeniería Attacks Social V. Comercio E-banking y and Banca E-commerce Electrónica VI. Servicios Instant messaging de Mensajería and Chats Instantánea y Chats VII. Los Peer Servicios to Peer Services Peer to Peer VIII. IP La Telephony Telefonía IP IX. Video Las videocámaras cameras on en the Internet X. Search Los buscadores Engines XI. Web La Web XII. Responsibilities La responsabilidad of Internet de los internautas Users XIII. Use El uso of de the Internet por by menores Minors XIV. Competencies Competencias of de the la Agencia Spanish Española Data Protection de Protección Agencyde Datos Glosario de Términos GLOSSARY OF TERMS

6

7 I INTRODUCTION What has become known as the Information Society, understood as the definition of the extraordinary spreading of information technologies and communications and, especially, the Internet as a vehicle in the new Society of Knowledge, has become an essential tool for both the individuals and the population as a whole. Its incorporation into the individual s daily life already means, and this will only increase in the future, that whomever does not have access to the Internet will feel excluded from the economic and social environment. Access to information technologies is crucial in all areas of personal life, either at work or during leisure time, either in consumption or in relations with the Public Administration. We all know that the new telecommunication technologies offer numerous benefits, such as the ability to carry out a lot of transactions without the need to physically go to the actual places, or the possibility of improving the efficiency in the resources in the personal and in the professional scopes. In fact, an exponential growth is foreseen for the number of goods and services that Internet will offer, in areas such as inter-personal relationships and generation of communities social networks and web.2.0-, in the organization of our personal and professional lives online schedules, management of trips, recognition of the physical environment through photographs -, in social services, -distance education, distance-medicine-, in the control over goods and people geo-localization, radio frequency identification tags or RFID-, or in marketing and advertising. However, the Internet environment which, due to its undeniable advantages, was established as an instrument that had to be fostered by the different Governments, also became a means for the new technological delinquency to place a great deal of effort in trying to catch many users off guard, users that thought that the Net could only bring good things at all levels. This is why it is of vital importance to use all the means within our reach to create a trustful environment among all the actors that take part on the Internet, so that we can make a safe use of it. 5

8 There is a common element in a lot of the risks to which we are exposed in the Internet: they require a previous processing of information, of personal data. It is not possible to try to cheat or send advertising if, previously, electronic mail addresses have not been provided. Harassment of under aged kids through their own private chat requires having access to identification data in order to invite them". Problems linked to the use of a key data in our society, images, require for someone to have provided this data to the Internet community. On the other hand, many Internet services are based on the exchange or consumption of personal information. The user is offered services that seem free of charge but, in reality, they are rendered in exchange for the access to his/her personal data (his/her browsing profile, his/her list of friends, or the contents of the messages he/she receives or sends), for obtaining information directly required from the user with the aim of elaborating consumer or personality profiles, or of sending him/her certain information or advertising. In these cases the section on legal information and privacy policies usually reflects that it is not a service free of charge, since the user with pay for it with his/her personal information. From this point of view, the problem regarding protection of personal data on the Internet is a key element. It is absolutely necessary to create citizen awareness regarding a culture for the protection of his/her personal data within the new digital environment of the Information Society, since it will determine the ability for everyone to make a safe use of the Internet, not just to achieve a better quality of life but also to have full control over one s personal information. With the aim of contributing to create this data protection culture within the Information Society through the Internet, the Spanish Data Protection Agency has elaborated, on the occasion of the World Internet Day which was held on the 17th of May, the following recommendations. They include an analysis of the main risks faced by the Net today, as well as several instructions to try to prevent the possible consequences. 6

9 II BROWSERS Risks faced when browsing the Net can be many. For example, pop-up windows, which are additional windows that open up when you visit a certain web page, and contain ads or introduce special offers which may hide the installation of malicious software. The downloading of files can also pose risks, since this procedure can be used to install in the computer malicious software for different purposes: erasing of data, slowing down the system, theft of passwords and personal data, tracing of websites visited, etc. When it comes to giving out personal data online one should be certain of the identity of whoever is collecting this data, and, in any case, give out only the data necessary for the purpose for which it is being requested. In light of the possible risks that may arise when browsing through the Internet, the following recommendations should be taken into account: The computer should be appropriately protected by specific antivirus and security software. The browsing software should be configured appropriately, activating the most restrictive and efficient security options. The software installed in the computer should be updated periodically with the aim of always having access to the latest version, paying especial attention to the operating system, antivirus software, the browser itself and the security options available. 7

10 The exchange and delivery of personal data should be done, exclusively, through those sites that have secure protocols. In any case, before giving out personal data one should ensure that the website has the appropriate privacy policy and that on the site itself one can consult, among other information, the identity and address of the site controllers and the purpose for which the data is being collected; the solicited data should be strictly necessary for the intended purpose. The computer should be protected through a password that restricts the access to starting the session and prevents a third party from gaining the said access. Passwords must be kept, needless to say, secret, and not be revealed to a third party nor written on easily accessible places. One should avoid accessing websites through links included in messages or third party websites. With the aim of avoiding a possible trace of visits to other websites, periodically temporary files and cookies should be erased from the computer, taking into account that, in the case of the latter, the user can configure the browser to prevent the installation of "cookies" in the computer. The appropriate precautions need to be taken before proceeding to the downloading of files, making sure, beforehand, of the reputation or licensing of the website from which the download is going to take place. In those computers that are not for personal use, the browser option that allows the saving of passwords or information related to the start of the session (user and password) should be disabled. Special attention should also be given to disabling the browser options that allow saving a history of websites, user names and passwords with the aim of using them to automatically fill in questionnaires. It is especially convenient to erase all temporary files, cookies and Internet history from the browser once the browsing session with those computers has been completed. At all times, the user has to be on the look out to detect possible signals from the computer indicating the installation of malicious software. Among the signs that could indicate that this software has been installed in the equipment we could find the following: the home page or other elements from the brower s configuration have changed, some web pages are not accessible, pop-up windows appear incessantly, new toolbars have been installed or the computer is very slow. 8

11 REMEMBER It is advisable to use specific antivirus and security software, as well as to configure the browser s software with the most restrictive security options. It is essential to update the computer software periodically with the aim of working with the latest versions available. The exchange and delivery of personal data must be done through websites that have safe protocols and privacy policies. The computer must be protected through a password, thus preventing non-authorized starts of sessions The reputation or licensing of the websites should be checked before proceeding to download files. 9

12 III ELECTRONIC MAIL Electronic mail (or ) is the communication service that has developed the most on the Internet, both at a personal communication level and at a professional and commercial level. In this sense, the very fact of its success and level of use turns it into one of the channels most widely used to spread malicious software and spam contents, allowing mass distribution with a very low cost for its authors. The user who wishes to use electronic mail services will need a client program installed in the device itself (a pc, mobile phone, or any other device that allows Internet access) configured for using one or more addresses held. On the other hand, that address is linked to a file that works as a mailbox, and which is managed by a server program installed at the premises of the Internet Service Provider with which the user has registered. Access to the mailbox must require the input of a user id and access key. In other cases, access to electronic mail may be achieved by connecting to the service provider through a browser, which allows its use independent of the ability to access our own personal computer at a given time. This access mode, which has been called web-mail, is widely spread nowadays, mainly due to its easy access, low cost and to most of the Service Providers providing several value added services (antivirus, spam filters, address books, etc.) which make it easier and provide a simpler experience for the user. Nonetheless, the use of web mail services implies the assumption of certain risks described in the section dedicated to these web-browsing services. Normally, in addition to corporate or business accounts, one can sign up for free services. In order to enjoy these, it will be necessary to provide certain personal information in the user registration form, accept the reception or sending of personalized or contextual advertising, subscribe to certain loyalty programs, etc. 10

13 Within electronic mail we can distinguish three types of risks related to personal data protection: COLLECTION OF ADDRESSES We have to keep in mind that the address is the most popular way of registering the identity of a person on the Internet and may serve as the base for accumulating information about this person. This address is used in many places on the Net and can be easily obtained without us even knowing, for example, by using instructions included in programs to transfer the client s address without him/her being aware, or security configurations in browsers that allow for a website to find out the s of its visitors. In this sense, the inclusion of data in directories of subscribers accessible to the public through the Internet, without the appropriate security measures, means exposing users to having their data collected without their knowledge and used for other purposes. There are programs specifically designed for this purpose, a practice known as harvesting addresses, which are subsequently used for mass spam mailings. Participation from users in chain messages can lead to exactly the same consequence if the right precautions are not adopted (such as erasing the recepient addresses that have been included in the successive re-sending of the message and which are usually recaptured by specific programs or by the user that started the chain). This practice, also known as hoax, allows the spreading of messages with contents that are usually misleading, with the hidden purpose of obtaining the addresses for their subsequent use or of serving the author s specific interests. In addition to the consequences described above, they usually have a high degree of impact in the service level of management systems. 11

14 This practice has become even more frequent in social networks, either through the mass capture of friends or the promotion of false dates. Most of the techniques used for collecting and using addresses have been transferred to social networks in which the condition of the theoretical friend who requests them implies a certain degree of trust and increases the actual risks. STOLEN IDENTITIES One should consider that all the services described in this document do not usually supply a trustworthy way of established the identity of sender and recepient. Neither do we generally use mechanisms that guarantee confidentiality in the exchange of information. For these reasons, one must consider the risk of having his/her identity stolen or the breach of secrecy in communications when it comes to sending important or sensitive information by electronic mail. INSTALLATION OF MALICIOUS SOFTWARE It is common to see, quite often, notices regarding the emergence of a new virus or worm whose main distribution channel is the electronic mail service. One of the ways in which this type of software is included in messages is through modified annexes, with a structure that hides instructions to install new programs or modified version of an existing one. Hence, we have to be very careful with how we handle attachments and always verify that they originate from a reliable source and that we have the appropriate protection methods in place. Lastly, we have to mention as a risk associated to electronic mail the spreading of messages containing misleading or fraudulent information, which are used as a vehicle to obtain sensitive information from the users related to other Internet services, such as, for example, online banking. Although these types of phenomena have a specific section within this document, the following recommendations are also applicable: 12

15 In any case, the recommendations relating to the use of the electronic mail service are the following: To access your account, in addition to your user code, use a password. Choose a password that is not a word in the most common languages (a random combination of upper and lower case letters and symbols would be a good choice) and change it periodically. Do not select the option to Save password that is sometimes offered to avoid typing it again at each connection. If you do not want you address to become public, configure your browser so that it does not give it out to the web servers it accesses. It is worth taking into account, before giving them out, that our address as well as the rest of the data provided to be included in a directory or distribution list are subject to being used without our knowledge for purposes other than those for which they were provided. Be aware that when you send an message to several recipients, you are revealing the addresses of those included in the fields Recipient or Copy to all the recipients of the message. To avoid this, you may include message recipients in the Blind Carbon Copy (BCC) field, so that none of the recipients will be able to access the address of the rest of recipients. Configure your software with the maximum security level possible. If you use web mail, if possible, choose a service provider that offers content analysis of messages; in addition, configure your browser to the maximum security level possible. Keep you client program, browser and operating system updated. Do not open messages that pose doubts as far as their origin or possible contents without making sure, at least, that they have been analyzed by your antivirus software. 13

16 Activate spam filters in your software. Try not to use your work for personal use. Take into account that, sometimes, messages in those accounts can be monitored by the company responsible for them. In any case, ask to be informed of the limitations of use established as well as of the possibility of the associated mailbox being monitored. Avoid fowarding chain messages. If you have to send messages to a group of known users, use, if your software allows it, group addresses. Carefully read the conditions of service from your provider, taking special notice of everything related to the collection and use of your personal data, as well as the means available to guarantee the privacy of your messages. If you are going to send private documents through the Internet, it would be advisable to use systems that allow content encoding. 14

17 REMEMBER Use your address carefully. Keep your operating system, and antivirus software updated. Do not give out your address if you are not sure of the intentions of the person requesting it. Avoid revealing, whenever possible, other people s addresses that you may have stored for personal or professional reasons. Do not forward messages without previously checking that they do not represent a potencial risk for the recipients. Do not follow chain messages. Ask for information regarding the conditions for the rendering of your electronic mail service. Request information and follow the limitations of use of those accounts used for work or professional purposes. 15

18 IV VIRUS, WORMS AND SOCIAL ENGINEERING ATTACKS. We can find in the Internet a series of programs, which have become known as malware or malicious software, which are created with the main purpose of causing damage, taking advantage of the users resources or collecting useful information for their creators or users. On the other hand, Internet is also a practice area for those who apply social engineering techniques with the aim of collecting relevant information from users that can be employed to obtain some type of benefit, usually of a financial nature. Among these practices, those known as "phising" y "pharming" are very popular right now, and their attacks are becoming quite vicious, causing significant damage in sectors such as online banking. Viruses are software programs that, incorporated within executable files or files with a format commonly used by the typical operating systems, manage to access the system and execute themselves and, in many cases, they reproduce through a copy that installs itself in other files or systems. The viruses level of danger is established depending on the damage it is able to cause in the system, ranging from the popping up of messages to the total destruction of the information in the infected computers, and on its speed and easiness of propagation. Their development and creation has a lot to do with existing vulnerabilities in the software that is most commonly used; thus the first protection barrier will be to maintain our system updated, in addition to using detection and disinfecting tools. Furthermore, nowadays there are many public services where we will be able to find sufficient information on any virus, as well as information on how to prevent attacks. The term worm or Internet Worm is used to define those programs designed to be able to travel through computer networks with the aim of carrying out a specific task embedded in its code. Although their purpose does not need to be dangerous, these programs could install a virus or a program that 16

19 acts without the users consent or awareness, or merely use the system s broadband to perform actions such as sending mass mailings. With regards to trojans or trojan horses they are, as the name indicates, programs that perform a different function to the one for which they were designed and that enter the system disguised as useful software for the user. A variation of this type of malware is called logic bombs, programs that remain inactive in the system until they are activated by some event or just by the passage of time, and they remain hidden within the program s code. We can define phising as a process of social engineering whereby there is a fraudulent attempt to acquire sensitive information from the user by masquerading as a trustworthy entity. Up until now, the main objective was to obtain access information from online banking users or auction websites in which it is easy to have access to bank accounts and credit cards. The most common channel for spreading these attacks is through electronic mail. It is a frequent event to receive messages supossedly sent from the customer service department of a bank that request, for example, the introduction of a user code and password to validate them in a form that pretends to be part of the website of a financial entity. Another modality, recently emerged, is the one that uses the telephone channel, calling the user s home and pretending to be the Customer Service Department of an Internet Service Provider, and then proceeding to ask the user to fill his/her personal data in a form located on a website that is controlled by the attackers. With regards to pharming, whose development implies greater technical complexity, we could say that it intends to direct the user to a simulated website, either by altering the Internet domain names (DNS) in the system servers or by manipulating files in the users computer with the aim of re-directing their access requests to certain websites to other systems controlled by the attacker. 17

20 Although most of the attacks are detected and rejected by the prevention services included by the service providers and entities involved, there is always a time margin until the reactive protection measures are implemented, time at which we are vulnerable, and we therefore have to take the following recommendations into account: Do not install software if it has not been provided by a reliable source. Use the manufacturer s downloading services or those from manufacturer authorized sites for obtaining new versions and updates. Use antivirus software and, if available, install firewalls and software specialized in controlling spyware and its many varieties. Periodically consult websites with information on the emergence of new variations and ways to prevent attacks. Periodically back up your computer contents through security copies. Bear in mind that your financial entity or service provider is never going to request information regarding your user id or passwords. Reject messages that request this information, those that are not written in your usual language for communicating with your entity, or those that are not sent by the said entity. If your entity provides them, use additional systems for controlling access to websites with sensitive information, such as cards with coordinates or devices for the generation of access keys. The more security levels available for gaining access, the more difficult for an attacker to compromise your assets. Be wary of financial promotions that offer large profits in little time and effort. If you accept them, you may be involuntarily participating in criminal activities. When in doubt, ask the customer service department of the entity or service provider. If you have been the subject of an attack and have provided information, also inform the appropriate services of the Law Enforcement Agencies. 18

21 REMEMBER Be careful about the software you install. Keep your operating system and antivirus software updated. Add firewalls and spyware detection and elimination software. Do not give out information regarding your user id and, even more important, about your access keys. If in doubt, contact the customer service department of your entity or service provider. Adopt additional security measures to access your service accounts. Keep as informed as possible. 19

22 V E-BANKING AND E-COMMERCE E-commerce portals allow the acquisition and sale of products and services using Internet as the communication channel. The user must make an effort to find out the services and type of information that may be accessed. The existence of understandable privacy policies, the identification of the person controlling the service, including all the necessary data to contact him/her, and the use of electronic certificates provided by a third trustworthy party, the presence of information on the procedure to follow for purchasing or on how to use secure connections to provide data or manage payments, these are all questions that must be taken into account before using these types of services. To access these services you will have to prove your identity. Currently, the most widespread method is the use of user codes and passwords, although from a while back it has been possible to use digital certificates issued by the Fábrica Nacional de Moneda y Timbre (National Factory of Coins and Stamps) or other certificate service providers. The electronic DNI (National Identification Document), which is already being distributed and will be available to all Spanish citizens shortly, may be used to reliably prove a citizen identity of the Internet. Within this context, the following recommendation should be taken into account: Browse familiar portals. Whenever possible use digital certificates as a way to prove your identity. Make sure you carry out transactions from a computer free of malware. Check that the address on the browser is the same and as the one for the portal of the entity you are trying to access. 20

23 Never give out personal data, user ids or passwords if you have not established a secure connection between the browser and the server you are accessing. Verify that the certificate from the website with which you have established a secure connection has been issued for the entity with which you are connecting and by a trustworthy Certification Agency. Be wary of any that requests your user Id, password or electronic signature. Inform the managers portal controllers of this event. For user authentication systems based on passwords, do not use the same passwords for high security systems than for low security systems. If you use digital certificates, bear in mind that the holder of the same is responsible for its safekeeping. Under no circumstance shall you reveal to a third party the password that allows the activation of the signature s private key. Immediately request the Certification Agency to revoke a certificate in the event of knowing or suspecting a compromised private key. It is extremely advisable to be informed about the document on the Declaration of Certification Practices issued by the Certification Agency. Never leave the computer unattended while connected and having established a secure connection, use screen savers with a password or activate the blocking functions of the terminal. In the event of using digital certificates stored in a cryptographic card, never leave this card connected to the computer card reader. Whenever certificates have to be used, eject the card even while continuing to use the portal s services. Introduce financial data only through secure websites. In addition, access to these pages must be gained by directly typing the electronic bank s address in the browser s address line. For your purchases, use a credit card specific for these purposes, with a reduced expense limit. 21

24 REMEMBER Before giving out any personal data you must make sure you have established a secure connection with the portal. The best procedure to prove our identity to an e-management, e-commerce or e-banking site is through digital certificates. The electronic DNI (National Identification Document), which is already being distributed and will be available to all Spanish citizens shortly, may be used to reliably prove our identity on the Internet. Be wary of s that inform of changes in security policies and request personal data and access keys. You should never leave a computer unattended if connected and having established a secure connection. It is advisable to remain anonymous in forms requesting data on websites, except when providing personal data is absolutely necessary to obtain a service. 22

25 VI INSTANT MESSAGING AND CHATS IRC Instant messaging, or private chat, is a method for communicating online similar to ing, although it is usually quicker. Communication through an instant messaging software poses similar risks to electronic mails, although there are other additional specific dangers in this method for exchanging messages. On the other hand, chat rooms where conversations take place are virtual places on the Internet, where participants write messages that show up on the computers of the other participants almost immediately. Conversations through instant messaging and chat are not exactly the same, since the first one refers to a conversation between two people and the latter is a conversation among a group. The following recommendations Be careful when creating a nick. Any instant messaging software will ask you to create a nick, equivalent to an address. This nick should not provide any personal information, neither directly nor indirectly. Create a barrier against unsolicited instant messaging. Avoid for your nick or address to appear in public areas (such as large Internet directories or online community profiles) and do not give them out to strangers. Some instant messaging services link the nick to the address at 23

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Acceptable Usage Policy

Acceptable Usage Policy Acceptable Usage Policy Anittel Document Version 1.0 27 March 2015 anittel.com.au 1300 10 11 12 IT Support Services Telecommunications Internet & Data Cloud Services Hardware & Software Contents INTRODUCTION...

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

The Armstrong Chamberlin Web Hosting Acceptable Use Policy (AUP) The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP") Your services may be suspended or terminated for violation of this AUP in accordance with Armstrong Chamberlin s Web Hosting Terms of

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

F-Secure Anti-Virus for Mac. User's Guide

F-Secure Anti-Virus for Mac. User's Guide F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224 COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet

Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet Be Aware, Secure, and Vigilant Information Security Use the Internet with Confidence Be vigilant about information security and enjoy using the internet https://www.gosafeonline.sg/ The Smartphone Security

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Rules of the Road for Users of Smithsonian Computers and Networks

Rules of the Road for Users of Smithsonian Computers and Networks Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing

More information

PBX Fraud Educational Information for PBX Customers

PBX Fraud Educational Information for PBX Customers PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and

More information

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Guidelines for E-mail Account Management and Effective E-mail Usage

Guidelines for E-mail Account Management and Effective E-mail Usage Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Instant Messaging and Security

Instant Messaging and Security Strategic Guide Instant Messaging and Security Businesses recognise that instant messaging can help to improve employee productivity, but are often reluctant to sanction its use due to concerns about security.

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information