Technology_Guide_3_Protecting_Information_Assets

Technology_Guide_3_Protecting_Information_Assets -...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style TECHNOLOGY GUIDE THREE Protecting Your Information Assets
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Behavioral Actions n Do not provide personal information to strangers in any format. n Protect your social security number. n Use credit cards with your picture on them. n Use virtual credit cards. n Know your credit card billing cycles.
Background image of page 2
Behavioral Actions (continued) n Limit use of debit cards. n Do not use a personal mailbox at home or at an apartment. n Use a cross-cut (confetti) shredder. n Sign up with a company that provides proactive protection of your personal information.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer-Based Actions n Never open unrequested attachments to e- mail files, even those from people you know and trust. n Never open attachments or Web links in e- mails from people you do not know. n Never accept files transferred to you during Internet chat or instant messaging sessions. n Never download any files or software over the Internet from a Web site that you do not know.
Background image of page 4
Computer-Based Actions (continued)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/08/2011 for the course BUS 311 taught by Professor Reardon,j during the Spring '08 term at University of Hawaii, Manoa.

Page1 / 9

Technology_Guide_3_Protecting_Information_Assets -...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online