personal information how not to share information and what information can be shared by: joshua...

8
Personal Information Personal Information How Not to Share How Not to Share Information Information And And What Information Can be What Information Can be Shared Shared By: Joshua Polson By: Joshua Polson

Upload: mitchell-goodman

Post on 12-Jan-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

Personal InformationPersonal Information

How Not to Share InformationHow Not to Share Information

AndAnd

What Information Can be SharedWhat Information Can be Shared

By: Joshua PolsonBy: Joshua Polson

Page 2: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

Information Companies Information Companies Can ShareCan Share

1)1) Companies can share information to Companies can share information to authorized third parties:authorized third parties:

• A third party can be any outside individual, a A third party can be any outside individual, a business or an association that provides a business or an association that provides a service to, or acts of behalf of, an institution. service to, or acts of behalf of, an institution.

2) Companies can also release the age, sex, 2) Companies can also release the age, sex, religion, material status, other opinions about religion, material status, other opinions about an individual, and the name of a person.an individual, and the name of a person.

http://www.ipc.on.ca/scripts/index_.asp?action=31&N_ID=1&U_ID=0&P_ID=11075

Page 3: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

Shared Information RightsShared Information Rights

1.1. Both theBoth the Freedom of Information and Protection of Freedom of Information and Protection of Privacy Act and Municipal Freedom of Information Privacy Act and Municipal Freedom of Information and Protection of Privacy Actand Protection of Privacy Act require organizations require organizations to protect personal information in their safekeeping or to protect personal information in their safekeeping or jurisdiction.jurisdiction.

2.2. A business that gives out personal information has the A business that gives out personal information has the right to enter into a written agreement with the third right to enter into a written agreement with the third party supplying the service. party supplying the service.

3.3. Personal information considerations are included in Personal information considerations are included in businesses policies and procedures.businesses policies and procedures.

http://www.ipc.on.ca/scripts/index_.asp?action=31&N_ID=1&U_ID=0&P_ID=11075http://www.ipc.on.ca/scripts/index_.asp?action=31&N_ID=1&U_ID=0&P_ID=11075

Page 4: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

Abused InformationAbused Information

• Comes in forms of selling or Comes in forms of selling or giving another persons giving another persons information to a unauthorized information to a unauthorized third party.third party.

• An individual purposely not An individual purposely not using the correct information using the correct information on an application.on an application.

• Abused information may lead Abused information may lead to Identity Theft, that will to Identity Theft, that will result in serious result in serious repercussions. repercussions.

Page 5: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

Ways to Protect Ways to Protect Your InformationYour Information

1.1. Use Passwords on personal computers to Use Passwords on personal computers to limit unwanted access .limit unwanted access .

2.2. Use filters on computers to keep hackers out Use filters on computers to keep hackers out of personal information.of personal information.

3.3. Dispose of information correctly.Dispose of information correctly.

4.4. Verify and know who your information is Verify and know who your information is being sent to.being sent to.

5.5. Report any breaches to your personal Report any breaches to your personal information.information.

Page 6: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

How should Businesses Protect How should Businesses Protect Your InformationYour Information

1.1. Store information on company protected computers.Store information on company protected computers.

2.2. Secure all paper information in a secure place.Secure all paper information in a secure place.

3.3. Grant limited access to authorized personal only. Grant limited access to authorized personal only.

4.4. Audit computer information regularly. Audit computer information regularly.

5.5. Don’t give out information to anyone who's identity can’t Don’t give out information to anyone who's identity can’t be confirmed.be confirmed.

Page 7: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

What is Profiling?What is Profiling?

Profiling is defined as:Profiling is defined as:• -n : recording a person's behavior and analyzing -n : recording a person's behavior and analyzing

psychological characteristics in order to predict psychological characteristics in order to predict or assess their ability in a certain sphere or to or assess their ability in a certain sphere or to identify a particular group of people.identify a particular group of people.

Many interesting things can be discovered about a Many interesting things can be discovered about a person in profiling like: social security numbers, person in profiling like: social security numbers, material status, date of birth, age, occupation, material status, date of birth, age, occupation, and many other living habits.and many other living habits.

http://dictionary.reference.com/browse/Profiling

Page 8: Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson

The EndThe End

Remember protect yourRemember protect your

personal information!!!!!personal information!!!!!