students and the internet
Download
Skip this Video
Download Presentation
Students and the Internet

Loading in 2 Seconds...

play fullscreen
1 / 53

Students and the Internet - PowerPoint PPT Presentation


  • 250 Views
  • Uploaded on

Students and the Internet. Legal issues Privacy issues Personal safety Georgia Southern University Office of Legal Affairs ©2007. Preventing identity theft. Preventing identity theft. About one third of identity theft victims are between the ages of 18 and 29. How they do it:.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Students and the Internet' - LionelDale


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
students and the internet

Students and the Internet

Legal issues

Privacy issues

Personal safety

Georgia Southern University Office of Legal Affairs ©2007

preventing identity theft3
Preventing identity theft
  • About one third of identity theft victims are between the ages of 18 and 29.
phishing
Phishing
  • Most legitimate e-businesses don’t send unsolicited e-mails to people who don’t have accounts.
  • In some cases, clicking on the URL in a phishing message will infect your computer with a virus.
  • It’s much safer to type a URL into your browser than it is to click on a link in an e-mail.
how they do it9
How they do it:
  • Phishing
  • Dumpster diving
how they do it10
How they do it:
  • Phishing
  • Dumpster diving
  • Mail diversion (change of address form)
how they do it11
How they do it:
  • Phishing
  • Dumpster diving
  • Mail diversion (change of address form)
  • Mailbox theft
how they do it12
How they do it:
  • Phishing
  • Dumpster diving
  • Mail diversion (change of address form)
  • Mailbox theft
  • Skimming
how can you protect yourself14
How can you protect yourself?
  • Don’t just discard it – Shred it!
how can you protect yourself15
How can you protect yourself?
  • Don’t just discard it – Shred it!
  • Protect your Social Security Number. Don’t carry it in your wallet. Don’t give it out over the phone or the Internet without being very sure who you are dealing with.
how can you protect yourself16
How can you protect yourself?
  • Don’t just discard it – Shred it!
  • Protect your Social Security Number. Don’t carry it in your wallet. Don’t give it out over the phone or the Internet without being very sure who you are dealing with.
  • Don’t click links in unsolicited e-mails
how can you protect yourself17
How can you protect yourself?
  • Monitor your accounts for suspicious or unexpected activity
how can you protect yourself18
How can you protect yourself?
  • Monitor your accounts for suspicious or unexpected activity
  • Be alert for late or missing credit card or utility bills.
how can you protect yourself19
How can you protect yourself?
  • Monitor your accounts for suspicious or unexpected activity
  • Be alert for late or missing credit card or utility bills.
  • Keep a copy of your credit cards, front and back, in a safe place.
how can you protect yourself20
How can you protect yourself?
  • Monitor your accounts for suspicious or unexpected activity
  • Be alert for late or missing credit card or utility bills.
  • Keep a copy of your credit cards, front and back, in a safe place.
  • Select strong passwords and PIN’s, and change them regularly.
strong passwords
Strong passwords
  • Weak:
    • Eagle1
    • Mother’s maiden name
    • Your birthday
  • Strong
    • Djw?jRkG9
how can you protect yourself22
How can you protect yourself?
  • Keep your computer up to date!
    • Use Norton or a similar antivirus product. Update virus definitions and scan the computer at least once a week.
    • Use Adaware or other free software to keep your computer free of spybots and tracking cookies.
    • If you use Windows, make sure all of the updates have been installed.
what if it happens anyway
What if it happens anyway?
  • Contact your credit card company or bank immediately.
what if it happens anyway24
What if it happens anyway?
  • Contact your credit card company or bank immediately.
  • Check your credit report and issue a fraud alert. Find out how at www.ftc.gov.
what if it happens anyway25
What if it happens anyway?
  • Contact your credit card company or bank immediately.
  • Check your credit report and issue a fraud alert. Find out how at www.ftc.gov.
  • File a police report.
facebook myspace and other social networking sites29
Facebook, Myspace, and other social networking sites
  • Make friends and have fun
  • Stay safe
  • Don’t hurt your career!
facebook myspace and other social networking sites30
Facebook, Myspace, and other social networking sites
  • Facebook and Myspace are PUBLIC places.
facebook myspace and other social networking sites31
Facebook, Myspace, and other social networking sites
  • Facebook and Myspace are PUBLIC places.
  • Some people who have accounts on Facebook and Myspace are not the kind of people you really want to meet.
facebook myspace and other social networking sites34
Facebook, Myspace, and other social networking sites
  • Potential employers
  • Other creepy people
facebook myspace and other social networking sites35
Facebook, Myspace, and other social networking sites
  • Potential employers
  • Other creepy people
let s find out
Let’s find out . . .

. . . What some Georgia Southern students want prospective employers (and those other creepy people) to find out about them!

meet k a38
Meet K.A.!
  • Posted 33 photos
meet k a39
Meet K.A.!
  • Posted 33 photos
  • Posted name of residence hall and room number
meet k a40
Meet K.A.!
  • Posted 33 photos
  • Posted name of residence hall and room number
  • Groups: Beer Drinking Girls, Whores Anonymous
meet b p42
Meet B.P.!
  • Cell phone number: (678)XXX-XXXX
meet b p43
Meet B.P.!
  • Cell phone number: (678)XXX-XXXX
  • Interests: Being a sexy bitch
meet b p44
Meet B.P.!
  • Cell phone number: (678)XXX-XXXX
  • Interests: Being a sexy bitch
  • Groups: I Was Too Drunk to Walk, So I Drove
meet d s46
Meet D.S.!
  • Posted residence hall and room number.
meet d s47
Meet D.S.!
  • Posted residence hall and room number.
  • Interests: Smoking the Ganja, Drinking
meet d s48
Meet D.S.!
  • Posted residence hall and room number.
  • Interests: Smoking the Ganja, Drinking
  • Groups: Marijuana Enthusiasts, Get Yo Smoke On
facebook myspace and other social networking sites49
Facebook, Myspace, and other social networking sites
  • Don’t post your physical address, phone number, class schedule, your place of employment, or other information that could easily be used to find you
facebook myspace and other social networking sites51
Facebook, Myspace, and other social networking sites
  • Remember that it is becoming increasingly common for prospective employers to search Facebook and Myspace, as well as Google and other search engines and social networking sites prior to making a hire.
some useful url s
Some useful URL’s
  • http://www.ftc.gov/bcp/edu/microsites/idtheft/
  • http://www.antiphishing.org/
  • http://www1.myspace.com/misc/safetyTips.html
  • http://www.microsoft.com/athome/security/default.mspx
  • http://www.facebook.com/help.php?tab=safety
  • http://www.ftc.gov/bcp/conline/edcams/freereports/index.html
  • http://www.usdoj.gov/criminal/fraud/idtheft.html
georgia southern university

Georgia Southern University

Office of Legal Affairs website

http://services.georgiasouthern.edu/legal/

ad