Computer Science 1032A/B Lecture Notes - Lecture 12: Phishing, Wireless Network, Telecommunications Network
salmonrabbit587 and 40047 others unlocked
28
COMPSCI 1032A/B Full Course Notes
Verified Note
28 documents
Document Summary
Understanding threats to your own privacy: help make you more sensitive to the importance of security and privacy for the organization. Stealing, misrepresenting or hijacking the identity of another person. Information on identity theft (www. publicsafety. gc. ca: vital information (name, date of birth, sin) is acquired to complete impersonation. With this information, the identity thief can: take over a victim"s financial accounts, open new bank accounts, transfer bank balances, apply for loans, credit cards, and other services. Pipeda: personal information protection and electronic documents act. Personal information is defined under this act o. Information about an identifiable individual: not including name, title, business address, or telephone number of an employee of an organization. Act gives individuals the right to know why an organization collects, uses, or discloses their personal information. Act requires organizations to identify anyone who is responsible for keeping personal information private and secure.