SlideShare ist ein Scribd-Unternehmen logo
1 von 12
PERSONAL
INFORMATIO
N
WHAT IS PERSONAL
     INFORMATION?


•Any factual or subjective information, whether
recorded or not, about an identifiable
individual.
• Information that can be used to uniquely
identify, contact, or locate a single person or
can be used with other sources to uniquely
identify a single individual.
EXAMPLE OF PERSONAL INFORMATION
     Personal Descriptors     Name, age, place of birth,
                              date of birth, gender, weight,
                              height, eye color, hair color,
                              fingerprint.
     Identification Numbers   Health IDs, Social Insurance
                              Numbers (SIN), Social
                              Security Numbers (SSN),
                              PIN numbers, debit and
                              credit card numbers.
     Ethnicity                Race, colour, national or
                              ethnic origin.
     Health                   Physical or mental
                              disabilities, family or
                              individual health history,
                              health records, blood type,
                              DNA code, prescriptions.
EXAMPLE OF PERSONAL INFORMATION
         Financial   Income, loan records,
                     transactions, purchases and
                     spending habits.
        Employment   Employee files, employment
                     history, evaluations,
                     reference interviews,
                     disciplinary actions.
           Life      Character, general
                     reputation, personal
                     characteristics, social status,
                     marital status, religion,
                     political affiliations and
                     beliefs, opinions, comments,
                     intentions.
         Education   Education history.
How to Prevent Identity Theft
• Beware of Employment Schemes.
Employment schemes have increased to the point that it's
  hard, now, to know what's safe and what's not when
  people looking for employment online. Scams can be
  targeted at anyone looking for a job, and some of them
  are pretty sneaky.
• Monitor Credit Regularly.
The fastest way to find out if your identity has been stolen
  is to check the credit report. Often, identity thieves will hit
  people in pocketbook first, and sometimes their
  fraudulent activity will alert people that there's a problem.
Cont’
• Guard Your Bank and Credit Accounts.
Learn how to protect your vulnerable points bank and
  credit accounts of your identity to reduce your threat of
  being victimized by identity thieves.
• Protect Your Virtual Identity.
The Internet is increasing your risk for identity theft
  dramatically. If people don't keep their virtual identity
  safe online, then it's almost guaranteed they will becom
  the victim of identity theft.
Cont’
• Take care when creating passwords.
Don’t use something like birth date, last name, and
  possible for someone to guess. Have a few different
  passwords for different sites, and change them regularly.
• Only keep the essentials in your wallet or purse.
 One of the biggest mistakes people make is carrying more
  sensitive information than need in their wallet or purse
  than needed.
WHY PERSONAL INFORMATION IS
            IMPORTANT?
•   Our personal information is valuable, people should treat it as their would
    any other valuable item. With crimes such as identity theft, it is even more
    important to safeguard our personal information. Criminals can use our
    personal details to open bank accounts, apply for credit cards and get state
    benefits in our name.

•    If personal information is incorrect, inadequate or out of date, it could lead
    to people being unfairly refused jobs, housing, benefits, credit or a place at
    college.

•   Always think carefully before supplying personal information. Always ask
    why an organization is requesting it, as you may not need to supply it.
HOW TO MANAGE PERSONAL
         INFORMATION?
• Store documents carrying any personal details in a safe
  place.
• Shed or destroy all documents containing any personal
  details before throwing them away.
• Check your bank and credit card statements carefully for
  unfamiliar transactions.
• Be careful when using public computers to access your
  personal information. Remove personal details on
  screen and uncheck the ‘remember password’ box.
HOW TO MANAGE PERSONAL
         INFORMATION?
• Check your credit file regularly for any suspicious
  applications.
• Always think about who you are giving information to and
  why they would need it. Don’t be afraid to ask.
• Protect your home computer with anti-virus, firewall and
  anti-spam software before going online.
• When you move house, redirect all your mail and inform
  your bank, utilities companies and other organizations of
  your new address.
How to Correct Your Personal
          Information
• If your personal data is inaccurate, you should write to
  the organization to tell them what you believe is wrong
  with your information and what should be done to correct
  it.
• There is no particular form of words that you need to
  use, provided that you make clear the following:
who you are and what personal information is wrong, and
      what should be done to correct it.
• If you are sending a letter, you should consider sending
  it by recorded delivery. You can also email your letter if
  the organization can identify you and the personal
  information you are referring to from your email.
THANK YOU 

Weitere ähnliche Inhalte

Andere mochten auch (8)

uso de internet
uso de internetuso de internet
uso de internet
 
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
บทที่ 1 ความหมายและประเภทของคอมพิวเตอร์
 
Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012Journey of Transformation - Retail Imaging Show 2012
Journey of Transformation - Retail Imaging Show 2012
 
บรู
บรูบรู
บรู
 
Final media evaluation
Final media evaluation Final media evaluation
Final media evaluation
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
 
01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ01 ข้อมูลและสารสนเทศ
01 ข้อมูลและสารสนเทศ
 
บทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความบทที่ 5 การจัดการข้อความ
บทที่ 5 การจัดการข้อความ
 

Ähnlich wie Ict personal info

Tips For Caring For Your Parents
Tips For Caring For Your ParentsTips For Caring For Your Parents
Tips For Caring For Your Parents
chriskwinn
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 

Ähnlich wie Ict personal info (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Is Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity TheftIs Your Kid Safe? How to Prevent Child Identity Theft
Is Your Kid Safe? How to Prevent Child Identity Theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Tips For Caring For Your Parents
Tips For Caring For Your ParentsTips For Caring For Your Parents
Tips For Caring For Your Parents
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Ict personal info

  • 2. WHAT IS PERSONAL INFORMATION? •Any factual or subjective information, whether recorded or not, about an identifiable individual. • Information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.
  • 3. EXAMPLE OF PERSONAL INFORMATION Personal Descriptors Name, age, place of birth, date of birth, gender, weight, height, eye color, hair color, fingerprint. Identification Numbers Health IDs, Social Insurance Numbers (SIN), Social Security Numbers (SSN), PIN numbers, debit and credit card numbers. Ethnicity Race, colour, national or ethnic origin. Health Physical or mental disabilities, family or individual health history, health records, blood type, DNA code, prescriptions.
  • 4. EXAMPLE OF PERSONAL INFORMATION Financial Income, loan records, transactions, purchases and spending habits. Employment Employee files, employment history, evaluations, reference interviews, disciplinary actions. Life Character, general reputation, personal characteristics, social status, marital status, religion, political affiliations and beliefs, opinions, comments, intentions. Education Education history.
  • 5. How to Prevent Identity Theft • Beware of Employment Schemes. Employment schemes have increased to the point that it's hard, now, to know what's safe and what's not when people looking for employment online. Scams can be targeted at anyone looking for a job, and some of them are pretty sneaky. • Monitor Credit Regularly. The fastest way to find out if your identity has been stolen is to check the credit report. Often, identity thieves will hit people in pocketbook first, and sometimes their fraudulent activity will alert people that there's a problem.
  • 6. Cont’ • Guard Your Bank and Credit Accounts. Learn how to protect your vulnerable points bank and credit accounts of your identity to reduce your threat of being victimized by identity thieves. • Protect Your Virtual Identity. The Internet is increasing your risk for identity theft dramatically. If people don't keep their virtual identity safe online, then it's almost guaranteed they will becom the victim of identity theft.
  • 7. Cont’ • Take care when creating passwords. Don’t use something like birth date, last name, and possible for someone to guess. Have a few different passwords for different sites, and change them regularly. • Only keep the essentials in your wallet or purse. One of the biggest mistakes people make is carrying more sensitive information than need in their wallet or purse than needed.
  • 8. WHY PERSONAL INFORMATION IS IMPORTANT? • Our personal information is valuable, people should treat it as their would any other valuable item. With crimes such as identity theft, it is even more important to safeguard our personal information. Criminals can use our personal details to open bank accounts, apply for credit cards and get state benefits in our name. • If personal information is incorrect, inadequate or out of date, it could lead to people being unfairly refused jobs, housing, benefits, credit or a place at college. • Always think carefully before supplying personal information. Always ask why an organization is requesting it, as you may not need to supply it.
  • 9. HOW TO MANAGE PERSONAL INFORMATION? • Store documents carrying any personal details in a safe place. • Shed or destroy all documents containing any personal details before throwing them away. • Check your bank and credit card statements carefully for unfamiliar transactions. • Be careful when using public computers to access your personal information. Remove personal details on screen and uncheck the ‘remember password’ box.
  • 10. HOW TO MANAGE PERSONAL INFORMATION? • Check your credit file regularly for any suspicious applications. • Always think about who you are giving information to and why they would need it. Don’t be afraid to ask. • Protect your home computer with anti-virus, firewall and anti-spam software before going online. • When you move house, redirect all your mail and inform your bank, utilities companies and other organizations of your new address.
  • 11. How to Correct Your Personal Information • If your personal data is inaccurate, you should write to the organization to tell them what you believe is wrong with your information and what should be done to correct it. • There is no particular form of words that you need to use, provided that you make clear the following: who you are and what personal information is wrong, and what should be done to correct it. • If you are sending a letter, you should consider sending it by recorded delivery. You can also email your letter if the organization can identify you and the personal information you are referring to from your email.