The ABC's of Data Security: Is YOUR School Failing?
5/5
()
About this ebook
Many people are unaware schools are ranked in the top 3 areas for all ID Theft crimes. However, very little is being done regarding ID Theft at the school level. Most people think identity theft only involves credit cards or credit monitoring; however, it involves so much more!
Schools are one of the nation’s largest holding tanks of private information and data, and schools are at a high risk! Due to the ease of accessibility, drastic measures need to be implemented to secure students, parents and the school staff’s information and data.
Some Administrators are still unwilling to accept that identity theft exists in the schools while others are passive in the acceptance of the dangers and risks associated with identity theft.
The preservation of our school children’s information and data as well as their family’s information needs protection. School Administrators, PTA members as well as other school related groups need to become active in protecting and securing our children’s confidential information. The lax or lack of security measures puts our children’s information at risk. It is the job of our Educators to keep student’s information and data safe and secure.
Jane Meadows, M.S.
Lecturer for Identity Theft, and Consultant for Medical, School and Business ID Theft. Author- The ABC's of Data Security: Is YOUR School Failing. Author- ID Theft: First Line of Defense (dvd). Author- Bullying: The Play. Certified Identity Theft Risk Management Specialist Registered Private Investigator Certified School Counselor/Teacher Education: M.S. Old Dominion University-Norfolk, VA B.S. Auburn University-Auburn, AL + Post Graduate Studies University of West Alabama Mississippi State University Background includes School Counselor, Teacher, Medical Business Owner and Sales.
Related to The ABC's of Data Security
Related ebooks
Crash Course Data Security Rating: 0 out of 5 stars0 ratingsCloud-Based Security Services Standard Requirements Rating: 0 out of 5 stars0 ratingsGeneral Data Protection Regulation A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsFrom Corporate Security to Commercial Force: A Business Leader’s Guide to Security Economics Rating: 0 out of 5 stars0 ratingsCyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecurity And Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybercrime and Business: Strategies for Global Corporate Security Rating: 0 out of 5 stars0 ratingsInternational Association of Auto Theft Investigators Rating: 0 out of 5 stars0 ratingsCode Co-op Third Edition Rating: 0 out of 5 stars0 ratingsThe Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsNetwork Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsDigital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data Rating: 0 out of 5 stars0 ratingsJourney to becoming an Information Technology Leader Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsPrivacy, Regulations, and Cybersecurity: The Essential Business Guide Rating: 0 out of 5 stars0 ratingsAnti-spam and Email Security A Complete Guide Rating: 0 out of 5 stars0 ratingsPrivacy A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsTechnology That Every CIO Needs To Know About: How CIOs Can Stay On Top Of the Changes in the Technology That Powers the Company Rating: 0 out of 5 stars0 ratingsCyber security standards Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsThe Checklist Book: Twitter Edition Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsEmail Security Architecture A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsManaged Security Service Provider MSSP Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsIT Service Root Cause Analysis Tools The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsiPhone Games Exposed: 50 classic games reviewed for the iphone ipad. Rating: 0 out of 5 stars0 ratingsRussian Cyber Activity Rating: 0 out of 5 stars0 ratingsDomestic and International Traveler's Survival Guide: How To Interact With TSA, Customs, Immigration and Other Federal Officers Rating: 0 out of 5 stars0 ratingsData Protection Officer A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 0 out of 5 stars0 ratingsPortal to the Cryptoverse - Epic Crypto Guide Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
Better Grammar in 30 Minutes a Day Rating: 3 out of 5 stars3/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5How to Think Like a Lawyer--and Why: A Common-Sense Guide to Everyday Dilemmas Rating: 3 out of 5 stars3/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5The Three Bears Rating: 5 out of 5 stars5/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5The 5 Love Languages of Teenagers: The Secret to Loving Teens Effectively Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5Dumbing Us Down - 25th Anniversary Edition: The Hidden Curriculum of Compulsory Schooling Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Inside American Education Rating: 4 out of 5 stars4/5Why Are You Still Sending Your Kids to School? Rating: 5 out of 5 stars5/5The Success Principles(TM) - 10th Anniversary Edition: How to Get from Where You Are to Where You Want to Be Rating: 4 out of 5 stars4/5A Study Guide for S.E. Hinton's The Outsiders Rating: 0 out of 5 stars0 ratingsFrom 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5
Reviews for The ABC's of Data Security
1 rating0 reviews
Book preview
The ABC's of Data Security - Jane Meadows, M.S.
The ABC’s of Data Security, Is YOUR School Failing?
Jane Meadows, M.S
-
Smashwords Edition
Copyright, 2012, Jane Meadows, M.S
License Notes: This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this ebook with another person, please purchase an additional copy for each person you share it with. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then you should return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.
Dedication:
This book is dedicated to my mentor and best friend, Gene Poole. You have been my inspiration and have saved me through some of the most difficult times in my life! My heart is full of gratitude, love and appreciation for all that you have done and taught me. You taught a person with dyslexia how to write and overcome adversity!
TABLE OF CONTENTS
Introduction
Chapter One: Schools Rank in the Top 3 Areas for Identity (ID) Theft.
Chapter Two: What is ID or Identity Theft?
Chapter Three: Why Would Someone Want to Steal Permanent Record Files, Temporary Student Records & Computer Data?
Chapter Four: School Records & Data: Types of Information & Storage.
Chapter Five: Old & New School Permanent Records: Are they monitored?
Chapter Six: Security Concerns for Students’ Permanent Records: Temporary Student Records & Computer Data.
Chapter Seven: Records & Data Security Breaches: Lax Measures & Polices in the Schools.
Chapter Eight: The Unauthorized Access to Records.
Chapter Nine: Computers & Data Security.
Chapter Ten: Cell Phones & Recording Devices in the Schools.
Chapter Eleven: Superintendents-Principals- Counselors- on Alert!
Chapter Twelve: School Data Checklist: The Security of Your Child’s Information.
Chapter Thirteen: Social Networking: School Students need an education.
Chapter Fourteen: Bullying: Stop That!
Chapter Fifteen: Final Comments.
About the Author
Introduction:
As a Certified Identity Theft Risk Management