security awareness 9-10-09 v5 overview
DESCRIPTION
OverviewTRANSCRIPT
its.unc.edu 1
Version Oct 2009 v3
An ITS Security Training Module
CLICK “FULL” TO VIEW SLIDE IN FULL
SCREEN.
its.unc.edu 2
Course GoalCourse Goal
To provide a
Best Practices
overview for safe
computing within
the
UNC-Chapel Hill
workplace.
Section: Overview
its.unc.edu 3
1.State why University information stored on computers is considered sensitive and its confidentiality must be protected.
2.Learn how to identify and manage situations in which sensitive University information may be at risk for unauthorized disclosure;
3.State the potential employment consequences of mishandled sensitive information.
4.List key federal and state laws that guide how employees work with electronic data.
5.List some practical ways to protect your computer from unauthorized access.
Learning ObjectivesLearning Objectives
Studying the content in this module will enable you to…
Section: Overview
its.unc.edu 4
From the headlines… From the headlines…
In 2007, Citigroup was
investigating a data breach
involving the names, Social
Security numbers and credit
information of more than
5,000 customers.
Because an employee had
installed a file-sharing program
on a company computer, more
than 5,000 customers were put
at risk of identity theft.
Source: http://www.eweek.com/c/a/Security/Citigroup-Customer-Data-Leaked-on-LimeWire
Section: Overview
its.unc.edu 5
An employee of Cal State L.
A. University had a purse
stolen.
A memory stick in that purse
contained personal
information, including Social
Security numbers for more
than 2500 individuals.
Because of the stolen purse,
2500 individuals were put at
risk of identity theft.
From the headlines…From the headlines…
Source: http://www.eweek.com/c/a/Security/Citigroup-Customer-Data-Leaked-on-LimeWire
Section: Overview