IS 312 Lecture Notes - Lecture 7: Federal Trade Commission, Business Travel, Mobile Security

70 views3 pages
Retyped Powerpoint – Plug IT In 7: Protecting Your Information Assets:
PI 07: Big Questions:
What can you do to protect your information assets?
What specific behavioral actions can you take?
What computer-based actions can you take?
PI 07: Learning Objectives:
Explain why it is critical that you protect your information assets
Identify the various behavioral actions you can take to protect your information assets
Identify the various computer-based actions you can take to protect your information assets
PI 7.1: How to Protect Your Assets: The Basics:
Business travel
Working from home
Various activities at our favorite hotspot
Industrial strength IS security from work
Attacks on a home network
Behavioral actions + Computer-Based actions = Protected Assets
PI 7.2: Behavioral Actions to Protect Your Information Assets:
General behavioral actions
What to do in the event of identity theft
General Behavioral Actions:
Never provide personal information to anyone (you don’t trust) in any format
Protect your Social Security number
Use credit cards with your picture on them
Write “Photo ID Required” on the back of credit cards
Use virtual credit cards
Pay very close attention to your credit card billing cycles
Receive your credit card bills electronically
Only use the last 4 digits of your credit card account when paying by check
Limit your use of debit cards
Use secure, private mailbox/PO Box
Use a cross-cut confetti shredder to dispose of old mail and records
Sign up for a protection service (ex:,,
What to Do in the Event of Identity Theft:
Review instructions from the Federal Trade Commission (FTC)
Immediately take the following actions:
oStep 1:
Place an Initial Fraud Alert by contacting all 3 credit reporting agencies
Equifax, Experian, Transunion
Keep an updated record of all communication
Phone calls, letters, e-mails
oStep 2:
Order credit reports from all 3 nationwide credit reporting companies
Keep detailed records of everything you requested and received.
oStep 3:
Create and identify theft report that includes an Identity Theft Affidavit and a police report.
oStep 4:
Regularly review your credit report
Pay particular attention to medical benefit explanations form your insurance company
Respond quickly to notices from the IRS
Obtain legal counsel
PI 7.3: Computer-Based Actions to Protect Your Information Assets:
find more resources at
find more resources at
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Get OneClass Notes+

Unlimited access to class notes and textbook notes.

YearlyBest Value
75% OFF
$8 USD/m
$30 USD/m
You will be charged $96 USD upfront and auto renewed at the end of each cycle. You may cancel anytime under Payment Settings. For more information, see our Terms and Privacy.
Payments are encrypted using 256-bit SSL. Powered by Stripe.