1. An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
2. Course Goal Section: Overview To provide a Best Practices overview for safe computing within the UNC-Chapel Hill workplace.
3. State why University information stored on computers is considered sensitive and its confidentiality must be protected. Learn how to identify and manage situations in which sensitive University information may be at risk for unauthorized disclosure; State the potential employment consequences of mishandled sensitive information. List key federal and state laws that guide how employees work with electronic data. List some practical ways to protect your computer from unauthorized access. Learning Objectives Section: Overview Studying the content in this module will enable you to…
4. From the headlines… Section: Overview In 2007, Citigroup was investigating a data breach involving the names, Social Security numbers and credit information of more than 5,000 customers.Because an employee had installed a file-sharing program on a company computer, more than 5,000 customers were put at risk of identity theft. Source: http://www.eweek.com/c/a/Security/Citigroup-Customer-Data-Leaked-on-LimeWire
5. An employee of Cal State L. A. University had a purse stolen.A memory stick in that purse contained personal information, including Social Security numbers for more than 2500 individuals. Because of the stolen purse, 2500 individuals were put at risk of identity theft. From the headlines… Section: Overview Source: http://www.eweek.com/c/a/Security/Citigroup-Customer-Data-Leaked-on-LimeWire