The ABC's of Data Security: Is YOUR School Failing?
5/5
()
About this ebook
Many people are unaware schools are ranked in the top 3 areas for all ID Theft crimes. However, very little is being done regarding ID Theft at the school level. Most people think identity theft only involves credit cards or credit monitoring; however, it involves so much more!
Schools are one of the nation’s largest holding tanks of private information and data, and schools are at a high risk! Due to the ease of accessibility, drastic measures need to be implemented to secure students, parents and the school staff’s information and data.
Some Administrators are still unwilling to accept that identity theft exists in the schools while others are passive in the acceptance of the dangers and risks associated with identity theft.
The preservation of our school children’s information and data as well as their family’s information needs protection. School Administrators, PTA members as well as other school related groups need to become active in protecting and securing our children’s confidential information. The lax or lack of security measures puts our children’s information at risk. It is the job of our Educators to keep student’s information and data safe and secure.
Jane Meadows, M.S.
Lecturer for Identity Theft, and Consultant for Medical, School and Business ID Theft. Author- The ABC's of Data Security: Is YOUR School Failing. Author- ID Theft: First Line of Defense (dvd). Author- Bullying: The Play. Certified Identity Theft Risk Management Specialist Registered Private Investigator Certified School Counselor/Teacher Education: M.S. Old Dominion University-Norfolk, VA B.S. Auburn University-Auburn, AL + Post Graduate Studies University of West Alabama Mississippi State University Background includes School Counselor, Teacher, Medical Business Owner and Sales.
Related to The ABC's of Data Security
Related ebooks
Beginner’s Guide to Developing a High School Cybersecurity Program - For High School Teachers, Counselors, Principals, Homeschool Families, Parents and Cybersecurity Education Advocates - Developing a Cybersecurity Program for High School Students Rating: 0 out of 5 stars0 ratingsCrash Course Data Security Rating: 0 out of 5 stars0 ratingsCloud-Based Security Services Standard Requirements Rating: 0 out of 5 stars0 ratingsCyber Protect Your Business Rating: 0 out of 5 stars0 ratingsMobile Computing: Securing your workforce Rating: 0 out of 5 stars0 ratingsGeneral Data Protection Regulation A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsTechnology That Every CIO Needs To Know About: How CIOs Can Stay On Top Of the Changes in the Technology That Powers the Company Rating: 0 out of 5 stars0 ratingsPayment Processors A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCyber Security A Complete Guide Rating: 0 out of 5 stars0 ratingsCyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsFrom Corporate Security to Commercial Force: A Business Leader’s Guide to Security Economics Rating: 0 out of 5 stars0 ratingsDigital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data Rating: 0 out of 5 stars0 ratingsGdpr For Marketers And Online Businesses Rating: 0 out of 5 stars0 ratingsGIAC Certified Windows Security Administrator The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsManaging Online Risk: Apps, Mobile, and Social Media Security Rating: 0 out of 5 stars0 ratingsThe Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsPrivacy, Regulations, and Cybersecurity: The Essential Business Guide Rating: 0 out of 5 stars0 ratingsData Protection Standard Requirements Rating: 0 out of 5 stars0 ratingsManaged Security Service Provider MSSP Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsComputer Forensics JumpStart Rating: 3 out of 5 stars3/5Ian Talks Hacking A-Z Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 0 out of 5 stars0 ratingsOnline Security for the Business Traveler Rating: 0 out of 5 stars0 ratingsInternet of Things Complete Self-Assessment Guide Rating: 1 out of 5 stars1/5Cyber security standards Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsJourney to becoming an Information Technology Leader Rating: 0 out of 5 stars0 ratingsInformation Security Program Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Chartered Cyber Security Officer Rating: 5 out of 5 stars5/5Data Protection Officer A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5The Three Bears Rating: 5 out of 5 stars5/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5Master the GED Test, 28th Edition Rating: 5 out of 5 stars5/5Easy Spanish Stories For Beginners: 5 Spanish Short Stories For Beginners (With Audio) Rating: 3 out of 5 stars3/5How You Learn Is How You Live: Using Nine Ways of Learning to Transform Your Life Rating: 4 out of 5 stars4/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Principles: Life and Work Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5The Success Principles(TM) - 10th Anniversary Edition: How to Get from Where You Are to Where You Want to Be Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5From 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Conversational Spanish Dialogues: Over 100 Spanish Conversations and Short Stories Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5The Four-Hour School Day: How You and Your Kids Can Thrive in the Homeschool Life Rating: 5 out of 5 stars5/5Defining Moments in Black History: Reading Between the Lies Rating: 4 out of 5 stars4/5
Reviews for The ABC's of Data Security
1 rating0 reviews
Book preview
The ABC's of Data Security - Jane Meadows, M.S.
The ABC’s of Data Security, Is YOUR School Failing?
Jane Meadows, M.S
-
Smashwords Edition
Copyright, 2012, Jane Meadows, M.S
License Notes: This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this ebook with another person, please purchase an additional copy for each person you share it with. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then you should return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.
Dedication:
This book is dedicated to my mentor and best friend, Gene Poole. You have been my inspiration and have saved me through some of the most difficult times in my life! My heart is full of gratitude, love and appreciation for all that you have done and taught me. You taught a person with dyslexia how to write and overcome adversity!
TABLE OF CONTENTS
Introduction
Chapter One: Schools Rank in the Top 3 Areas for Identity (ID) Theft.
Chapter Two: What is ID or Identity Theft?
Chapter Three: Why Would Someone Want to Steal Permanent Record Files, Temporary Student Records & Computer Data?
Chapter Four: School Records & Data: Types of Information & Storage.
Chapter Five: Old & New School Permanent Records: Are they monitored?
Chapter Six: Security Concerns for Students’ Permanent Records: Temporary Student Records & Computer Data.
Chapter Seven: Records & Data Security Breaches: Lax Measures & Polices in the Schools.
Chapter Eight: The Unauthorized Access to Records.
Chapter Nine: Computers & Data Security.
Chapter Ten: Cell Phones & Recording Devices in the Schools.
Chapter Eleven: Superintendents-Principals- Counselors- on Alert!
Chapter Twelve: School Data Checklist: The Security of Your Child’s Information.
Chapter Thirteen: Social Networking: School Students need an education.
Chapter Fourteen: Bullying: Stop That!
Chapter Fifteen: Final Comments.
About the Author
Introduction:
As a Certified Identity Theft Risk Management