Professional Documents
Culture Documents
(Information Assurance & Security 1) : Exercise
(Information Assurance & Security 1) : Exercise
(Information Assurance & Security 1) : Exercise
IT0005L
(Information Assurance & Security 1)
EXERCISE
5
Service Policy
Student Name / DEL ROSARIO,ARTHURO T.
Group Name:
Name Role
Members (if Group):
Section:
Professor:
I. PROGRAM OUTCOME/S (PO) ADDRESSED BY THE LABORATORY EXERCISE
• Assist in the creation of an effective IT project plan. [PO: B]
In this lab, you will explore legal agreements required to use various online services. You will
also explore some of the ways you can protect your data.
b. Navigate to the website of an online service that you use and search for the Terms of
Service agreement. Below is a list of many popular social media and online storage
services.
Briefly answer the questions below. Avoid erasures. For group activity, specify the
name of GROUP MEMBER/s who answered the question. Do not forget to include
the source for all NON-ORIGINAL IDEAS.
a. Do you have an account with an online service provider? If so, have you read
the Terms of Service agreement?
Privacy settings are "the part of a social networking website, Internet browser, software,
etc. that allows you to control who sees information about you." As social media services
become mainstream, so do the opportunities to compromise privacy. Privacy settings allow an
individual to control what information is shared on these platforms.
A security policy is a document written in a company that describes how to protect the
company from threats, including threats to computer security, and how to deal with situations if
they arise. A security policy should identify all of a company's assets and any potential threats
to those assets.
e. What are your rights regarding your data? Can you request a copy of your data?
You have the right to ask an organization if it uses or stores your personal information.
You can also ask them verbally or in writing for copies of your personal information. This is
known as the right of access and is commonly known as a subject access request or SAR.
ISPs can control which websites you visit and have the right to sell this data to
advertisers. Worse still, they are practically unavoidable. An ISP manages almost all of your
Internet connections, and depending on where you live, you have no choice as to which ISP to
use.
For example, if you used an account from Google, you will lose all data and content on
this account, such as email, files, calendar, and photos. If you log in with this account, you will
not be able to use Google services such as Gmail, Drive, Calendar or Play.
If you are using Facebook or other software that requires password and need your
personal information, the first thing to do is to secure your password and never share your
personal login information. Because if you share your information to someone you don’t know,
there is a huge risk that your account will be hacked and all your information may be use by
other people in bad ways.
b. What can you do to safeguard your account and protect your data?
First, you must create strong passwords to secure your account in every application you are
using. Next is using a free Wi-Fi when you are outside with caution. Third, don’t click some link
attachments you receive especially if you don’t know the sender. Lastly is checking of sites
you are entering if that website is secured or not. These preventions may help you to protect
your account and most especially your data.
VIII. REFERENCES
• http://www.slavasoft.com/download.htm.