IS 312 Lecture Notes - Lecture 7: Federal Trade Commission, Business Travel, Mobile Security

120 views3 pages

Document Summary

Retyped powerpoint plug it in 7: protecting your information assets: Explain why it is critical that you protect your information assets. Identify the various behavioral actions you can take to protect your information assets. Identify the various computer-based actions you can take to protect your information assets. Pi 7. 1: how to protect your assets: the basics: Behavioral actions + computer-based actions = protected assets. Pi 7. 2: behavioral actions to protect your information assets: What to do in the event of identity theft. Never provide personal information to anyone (you don"t trust) in any format. Use credit cards with your picture on them. Write photo id required on the back of credit cards. Pay very close attention to your credit card billing cycles. Only use the last 4 digits of your credit card account when paying by check. Use a cross-cut confetti shredder to dispose of old mail and records. Sign up for a protection service (ex: lifelock. com, trustedid. com, cardcops. com)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents