tg3 - TECHNOLOGYGUIDE THREE ProtectingYourInformation Assets

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
TECHNOLOGY GUIDE  THREE Protecting Your Information  Assets
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TECHNOLOGY GUIDE OUTLINE    TG3.1 Introduction    TG3.2 Behavioral Actions to Protect Your     Information Assets    TG3.3 Computer-based Actions to Protect  Your Information Assets
Background image of page 2
LEARNING OBJECTIVES Identify the various behavioral actions you  can take to protect your information  assets. Identify the various computer-based  actions you can take to protect your  information assets.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Behavioral Actions Do not provide personal information to  strangers in any format. Protect your social security number. Use credit cards with your picture on them. Use virtual credit cards. Know your credit card billing cycles.
Background image of page 4
(continued) Limit use of debit cards. Do not use a personal mailbox at home or  at an apartment. Use a cross-cut (confetti) shredder.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/11/2011 for the course CIT 219 taught by Professor Staff during the Summer '08 term at Miami University.

Page1 / 14

tg3 - TECHNOLOGYGUIDE THREE ProtectingYourInformation Assets

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online