Students and the internet
Download
1 / 53

Students and the Internet - PowerPoint PPT Presentation


  • 250 Views
  • Updated On :

Students and the Internet. Legal issues Privacy issues Personal safety Georgia Southern University Office of Legal Affairs ©2007. Preventing identity theft. Preventing identity theft. About one third of identity theft victims are between the ages of 18 and 29. How they do it:.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Students and the Internet' - LionelDale


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Students and the internet l.jpg

Students and the Internet

Legal issues

Privacy issues

Personal safety

Georgia Southern University Office of Legal Affairs ©2007



Preventing identity theft3 l.jpg
Preventing identity theft

  • About one third of identity theft victims are between the ages of 18 and 29.



How they do it5 l.jpg
How they do it:

  • Phishing


Phishing l.jpg
Phishing

  • Most legitimate e-businesses don’t send unsolicited e-mails to people who don’t have accounts.

  • In some cases, clicking on the URL in a phishing message will infect your computer with a virus.

  • It’s much safer to type a URL into your browser than it is to click on a link in an e-mail.


How they do it9 l.jpg
How they do it:

  • Phishing

  • Dumpster diving


How they do it10 l.jpg
How they do it:

  • Phishing

  • Dumpster diving

  • Mail diversion (change of address form)


How they do it11 l.jpg
How they do it:

  • Phishing

  • Dumpster diving

  • Mail diversion (change of address form)

  • Mailbox theft


How they do it12 l.jpg
How they do it:

  • Phishing

  • Dumpster diving

  • Mail diversion (change of address form)

  • Mailbox theft

  • Skimming



How can you protect yourself14 l.jpg
How can you protect yourself?

  • Don’t just discard it – Shred it!


How can you protect yourself15 l.jpg
How can you protect yourself?

  • Don’t just discard it – Shred it!

  • Protect your Social Security Number. Don’t carry it in your wallet. Don’t give it out over the phone or the Internet without being very sure who you are dealing with.


How can you protect yourself16 l.jpg
How can you protect yourself?

  • Don’t just discard it – Shred it!

  • Protect your Social Security Number. Don’t carry it in your wallet. Don’t give it out over the phone or the Internet without being very sure who you are dealing with.

  • Don’t click links in unsolicited e-mails


How can you protect yourself17 l.jpg
How can you protect yourself?

  • Monitor your accounts for suspicious or unexpected activity


How can you protect yourself18 l.jpg
How can you protect yourself?

  • Monitor your accounts for suspicious or unexpected activity

  • Be alert for late or missing credit card or utility bills.


How can you protect yourself19 l.jpg
How can you protect yourself?

  • Monitor your accounts for suspicious or unexpected activity

  • Be alert for late or missing credit card or utility bills.

  • Keep a copy of your credit cards, front and back, in a safe place.


How can you protect yourself20 l.jpg
How can you protect yourself?

  • Monitor your accounts for suspicious or unexpected activity

  • Be alert for late or missing credit card or utility bills.

  • Keep a copy of your credit cards, front and back, in a safe place.

  • Select strong passwords and PIN’s, and change them regularly.


Strong passwords l.jpg
Strong passwords

  • Weak:

    • Eagle1

    • Mother’s maiden name

    • Your birthday

  • Strong

    • Djw?jRkG9


How can you protect yourself22 l.jpg
How can you protect yourself?

  • Keep your computer up to date!

    • Use Norton or a similar antivirus product. Update virus definitions and scan the computer at least once a week.

    • Use Adaware or other free software to keep your computer free of spybots and tracking cookies.

    • If you use Windows, make sure all of the updates have been installed.


What if it happens anyway l.jpg
What if it happens anyway?

  • Contact your credit card company or bank immediately.


What if it happens anyway24 l.jpg
What if it happens anyway?

  • Contact your credit card company or bank immediately.

  • Check your credit report and issue a fraud alert. Find out how at www.ftc.gov.


What if it happens anyway25 l.jpg
What if it happens anyway?

  • Contact your credit card company or bank immediately.

  • Check your credit report and issue a fraud alert. Find out how at www.ftc.gov.

  • File a police report.




Facebook myspace and other social networking sites28 l.jpg
Facebook, Myspace, and other social networking sites

  • Make friends and have fun

  • Stay safe


Facebook myspace and other social networking sites29 l.jpg
Facebook, Myspace, and other social networking sites

  • Make friends and have fun

  • Stay safe

  • Don’t hurt your career!


Facebook myspace and other social networking sites30 l.jpg
Facebook, Myspace, and other social networking sites

  • Facebook and Myspace are PUBLIC places.


Facebook myspace and other social networking sites31 l.jpg
Facebook, Myspace, and other social networking sites

  • Facebook and Myspace are PUBLIC places.

  • Some people who have accounts on Facebook and Myspace are not the kind of people you really want to meet.




Facebook myspace and other social networking sites34 l.jpg
Facebook, Myspace, and other social networking sites

  • Potential employers

  • Other creepy people


Facebook myspace and other social networking sites35 l.jpg
Facebook, Myspace, and other social networking sites

  • Potential employers

  • Other creepy people


Let s find out l.jpg
Let’s find out . . .

. . . What some Georgia Southern students want prospective employers (and those other creepy people) to find out about them!



Meet k a38 l.jpg
Meet K.A.!

  • Posted 33 photos


Meet k a39 l.jpg
Meet K.A.!

  • Posted 33 photos

  • Posted name of residence hall and room number


Meet k a40 l.jpg
Meet K.A.!

  • Posted 33 photos

  • Posted name of residence hall and room number

  • Groups: Beer Drinking Girls, Whores Anonymous



Meet b p42 l.jpg
Meet B.P.!

  • Cell phone number: (678)XXX-XXXX


Meet b p43 l.jpg
Meet B.P.!

  • Cell phone number: (678)XXX-XXXX

  • Interests: Being a sexy bitch


Meet b p44 l.jpg
Meet B.P.!

  • Cell phone number: (678)XXX-XXXX

  • Interests: Being a sexy bitch

  • Groups: I Was Too Drunk to Walk, So I Drove



Meet d s46 l.jpg
Meet D.S.!

  • Posted residence hall and room number.


Meet d s47 l.jpg
Meet D.S.!

  • Posted residence hall and room number.

  • Interests: Smoking the Ganja, Drinking


Meet d s48 l.jpg
Meet D.S.!

  • Posted residence hall and room number.

  • Interests: Smoking the Ganja, Drinking

  • Groups: Marijuana Enthusiasts, Get Yo Smoke On


Facebook myspace and other social networking sites49 l.jpg
Facebook, Myspace, and other social networking sites

  • Don’t post your physical address, phone number, class schedule, your place of employment, or other information that could easily be used to find you



Facebook myspace and other social networking sites51 l.jpg
Facebook, Myspace, and other social networking sites

  • Remember that it is becoming increasingly common for prospective employers to search Facebook and Myspace, as well as Google and other search engines and social networking sites prior to making a hire.


Some useful url s l.jpg
Some useful URL’s

  • http://www.ftc.gov/bcp/edu/microsites/idtheft/

  • http://www.antiphishing.org/

  • http://www1.myspace.com/misc/safetyTips.html

  • http://www.microsoft.com/athome/security/default.mspx

  • http://www.facebook.com/help.php?tab=safety

  • http://www.ftc.gov/bcp/conline/edcams/freereports/index.html

  • http://www.usdoj.gov/criminal/fraud/idtheft.html


Georgia southern university l.jpg

Georgia Southern University

Office of Legal Affairs website

http://services.georgiasouthern.edu/legal/


ad