Checkpointsept10th2010

Checkpointsept10th2010 - Checkpoint Internet Privacy 1...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Checkpoint: Internet Privacy 1 Checkpoint: Internet Privacy Gus Arrieta BIS/219 September 10, 2010 Shawn Rieder DM/IST, MBA, MIS
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Checkpoint: Internet Privacy 2 Internet Privacy In our lives we are susceptible to privacy invasion through the electronic retrieval of our personal data and information, which may be duplicated and maliciously misused. Home computer usage relies on the dependency that personal information is safeguarded. Through safeguarded systems like firewalls, anti-virus software, and through the use of passwords and ID's for access, most personal information ensures protection. This expectation should carry out to further environments like the social workplace. Considering employee information, particular caution should be used when handling company information. Simple as this, Web access should not be accessed during work for any purpose other than outside of work requirements. Sadly this does not follow through. Personal information is constantly at risk in both environments due to hacking and information
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Checkpointsept10th2010 - Checkpoint Internet Privacy 1...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online