(Information Assurance & Security 1) : Exercise

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

COLLEGE OF COMPUTER STUDIES AND MULTIMEDIA ARTS

IT0005L
(Information Assurance & Security 1)

EXERCISE

5
Service Policy
Student Name / DEL ROSARIO,ARTHURO T.
Group Name:
Name Role
Members (if Group):

Section:

Professor:
I. PROGRAM OUTCOME/S (PO) ADDRESSED BY THE LABORATORY EXERCISE
• Assist in the creation of an effective IT project plan. [PO: B]

II. COURSE LEARNING OUTCOME/S (CLO) ADDRESSED BY THE LABORATORY


EXERCISE
• Examine the relationship between threats, vulnerabilities, countermeasures, attacks,
compromises and remediation throughout the entire system life cycle.

III. INTENDED LEARNING OUTCOME/S (ILO) OF THE LABORATORY EXERCISE


At the end of this exercise, students must be able to:
• Know the different terms of service policy.

IV. BACKGROUND INFORMATION


Social media and online storage have become an integral part of many people’s lives. Files,
photos, and videos are shared between friends and family. Online collaboration and
meetings are conducted in the workplace with people who are many miles from each other.
The storage of data is no longer limited to just the devices you access locally. The
geographical location of storage devices is no longer a limiting factor for storing or backing
up data at remote locations.

In this lab, you will explore legal agreements required to use various online services. You will
also explore some of the ways you can protect your data.

V. GRADING SYSTEM / RUBRIC (please see separate sheet)

VI. LABORATORY ACTIVITY


Part 1: Explore the Terms of Service Policy
a. If you are using online services to store data or communicate with your friends or
family, you probably entered into an agreement with the provider. The Terms of
Service, also known as Terms of Use or Terms and Conditions, is a legally binding
contract that governs the rules of the relationship between you, your provider, and
others who use the service.

b. Navigate to the website of an online service that you use and search for the Terms of
Service agreement. Below is a list of many popular social media and online storage
services.

IT0005L-Information Assurance & Security 1 Page 2 of 5


Social Media
Facebook: https://www.facebook.com/policies
Instagram: http://instagram.com/legal/terms/
Twitter: https://twitter.com/tos
Pinterest: https://about.pinterest.com/en/terms-service
Online Storage
iCloud: https://www.apple.com/legal/internet-services/icloud/en/terms.html
Dropbox: https://www.dropbox.com/terms2014
OneDrive: http://windows.microsoft.com/en-us/windows/microsoft-services-agreement

Part 2: Do You Know What You Signed Up For?


After you have created an account and agreed to the Terms of Service, do you
really know what you have signed up for?
In Part 2, you will explore how the Terms of Service can be interpreted and used
by providers.
Use the Internet to search for information regarding how the Terms of Service are
interpreted. Below are a few samples articles to get you started.
Facebook:
http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-
and-conditions-whyyou-dont-own-your-online-life.html iCloud:
http://www.americanbar.org/publications/law_practice_today_home/
law_practice_today_archive/ap ril12/have-attorneys-read-the-icloud-terms-and-
conditions.html Dropbox:
http://www.legalgenealogist.com/blog/2014/02/24/terms -of-use-change-dropbox/

VII. QUESTION AND ANSWER

Briefly answer the questions below. Avoid erasures. For group activity, specify the
name of GROUP MEMBER/s who answered the question. Do not forget to include
the source for all NON-ORIGINAL IDEAS.

Part 1: Review the terms and answer the following questions.

a. Do you have an account with an online service provider? If so, have you read
the Terms of Service agreement?

Yes, I read the terms of service agreement every time I create/register an


account for myself in an online service provider and also in some software that I
always use.

b. What is the data use policy?

IT0005L-Information Assurance & Security 1 Page 3 of 5


The data use policy is a mandatory legal disclosure on how a website
operator collects, stores and shares personal data. In other words, it is
often a list of ways that your personal information is not private and is under
your control.

c. What are the privacy settings?

Privacy settings are "the part of a social networking website, Internet browser, software,
etc. that allows you to control who sees information about you." As social media services
become mainstream, so do the opportunities to compromise privacy. Privacy settings allow an
individual to control what information is shared on these platforms.

d. What is the security policy?

A security policy is a document written in a company that describes how to protect the
company from threats, including threats to computer security, and how to deal with situations if
they arise. A security policy should identify all of a company's assets and any potential threats
to those assets.

e. What are your rights regarding your data? Can you request a copy of your data?

You have the right to ask an organization if it uses or stores your personal information.
You can also ask them verbally or in writing for copies of your personal information. This is
known as the right of access and is commonly known as a subject access request or SAR.

f. What can the provider do with the data you upload?

ISPs can control which websites you visit and have the right to sell this data to
advertisers. Worse still, they are practically unavoidable. An ISP manages almost all of your
Internet connections, and depending on where you live, you have no choice as to which ISP to
use.

g. What happens to your data when you close your account?

For example, if you used an account from Google, you will lose all data and content on
this account, such as email, files, calendar, and photos. If you log in with this account, you will
not be able to use Google services such as Gmail, Drive, Calendar or Play.

Part 2: Review the articles and answer the following questions

IT0005L-Information Assurance & Security 1 Page 4 of 5


a. What can you do to protect yourself?

If you are using Facebook or other software that requires password and need your
personal information, the first thing to do is to secure your password and never share your
personal login information. Because if you share your information to someone you don’t know,
there is a huge risk that your account will be hacked and all your information may be use by
other people in bad ways.

b. What can you do to safeguard your account and protect your data?

First, you must create strong passwords to secure your account in every application you are
using. Next is using a free Wi-Fi when you are outside with caution. Third, don’t click some link
attachments you receive especially if you don’t know the sender. Lastly is checking of sites
you are entering if that website is secured or not. These preventions may help you to protect
your account and most especially your data.

VIII. REFERENCES
• http://www.slavasoft.com/download.htm.

IT0005L-Information Assurance & Security 1 Page 5 of 5

You might also like