Phones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING

Size: px
Start display at page:

Download "Phones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING"

Transcription

1 Phones & Location Technology Summit 2016 San Francisco, CA Erica Olsen 2016 NNEDV How do abusers misuse phones and location devices? What are survivors telling you? 2016 NNEDV 2 CELL PHONES: SPYING & MONITORING 2016 NNEDV 3 National Network to End Domestic Violence 1

2 Simple Complex Monitoring or changing functions or features. Voic , Texts, Screen Readers, Settings, Bills Manipulating features Eavesdropping on calls Spying on activity 2016 NNEDV 4 Spyware/Monitoring Software Software requires physical access to the phone. Common features: Track GPS location. Monitor calls, texts, messages. Record/listen to calls. Records websites visited. Can view pictures taken. Access contents on phone. Difficult to detect NNEDV 5 How It Works 2016 NNEDV 6 National Network to End Domestic Violence 2

3 Stealth Genie Case 2014 Creator of Stealth Genie was convicted of selling and advertising an interception device. Was ordered to pay $500,000 fine and hand over the software s source code to the authorities. First criminal conviction of its kind NNEDV 7 Detecting Cell Phone Spyware Unusual battery drain or battery warm when not in use. Spikes in data usage. May take longer to shut down. Screen may light up when not using. May hear clicks or sounds when on calls. Additional incoming calls on bill that user didn t receive. Abuser knows things that s/he could only know if they have access to the phone. Perpetrator has or had physical access NNEDV NNEDV 9 National Network to End Domestic Violence 3

4 2016 NNEDV 10 Safety Tips Trust the survivor s instincts. Narrow down options to identify what could be happening. Strategically use other options for safety. If survivor suspects phone calls are being monitored or recorded, limit what is said and use a safer phone. Be careful transferring content to a new phone NNEDV 11 I am never ever ever gonna answer your calls. PHONES & CELL PHONES: IMPERSONATION 2016 NNEDV 12 National Network to End Domestic Violence 4

5 Text Messaging Ways to send a text message: From a phone to a phone (even to a landline). From your PC using the carrier s website. From E mail, by addressing the to the 10 digit mobile number like this: number@cellphonecompany.com Through text messaging apps: WhatsApp, imessage, BB Message 2016 NNEDV 13 Popular Messaging Applications WhatsApp Viber SnapChat Signal Most provide text, photos, voice, and short video messages 2016 NNEDV 14 Text Messaging Messages can be falsified, spoofed, or sent anonymously from the carrier s website or virtual text messaging services. Nearly all 50 states explicitly include electronic communication in stalking or harassment laws. Apps and services make evidence collection harder and messages creepier. Tiger Text SnapChat WhatsApp 2016 NNEDV 15 National Network to End Domestic Violence 5

6 Caller ID Spoofing Gives caller ability to change number shown on ID, change voice, and record call NNEDV 16 Caller ID Spoofing/Faker 2016 NNEDV NNEDV 18 National Network to End Domestic Violence 6

7 Fake Incoming Calls 2016 NNEDV 19 Truth in Caller ID Act of 2009 Signed into law Dec. 22, 2010, prohibits caller ID spoofing for the purposes of defrauding or otherwise causing harm. In June 2010, The Federal Communications Commission (FCC) adopted rules implementing the Truth in Caller ID Act. The FCC s rules: Prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value. Subject violators to a penalty of up to $10,000 for each violation of the rules. Exempt authorized activities by law enforcement agencies and situations where courts have authorized caller ID manipulation to occur NNEDV 20 Trap Call Shows both the name and number of the person. Can also record all calls without other person knowing NNEDV 21 National Network to End Domestic Violence 7

8 Phone Safety Tips Document threatening and harassing calls and messages. Pay as you go phones purchased with cash. Use virtual phone numbers. Examples: Google Voice, Burner App, Be strategic when creating accounts. Linking them to current accounts or accounts that the abuser knows about may connect identity with new phone number NNEDV 22 LOCATION 2016 NNEDV 23 Modern Family 2016 NNEDV 24 National Network to End Domestic Violence 8

9 Family Locator Plans Verizon Family Locator, AT&T Family Map, Sprint Safely Family Locator Locate a phone/person Receive updates about arrival/departure Info accessible online, through an app 2016 NNEDV 25 Family Locator Apps Life 360 Family Locator Family Tracker AirCover Family Locator 2016 NNEDV 26 Access, Notification & Removal Access Authorized user on the carrier account. Often requires physical access to the phone. Notification Some service sends text notification at the beginning, some sends notice periodically. May need to install an app and have location turned on. Removing the service Often need to be an authorized account holder. Sometimes you can simply delete the app NNEDV 27 National Network to End Domestic Violence 9

10 Social-Based Location Apps Allows you to connect with friends. Facebook, Foursquare Allows you to tell people where you are Twitter, Instagram Connect with other people Meetup Grindr Offers deals & discounts Foursquare 2016 NNEDV 28 Apps Collect Data Information Many apps collect location information. Some need location information to operate but not all. Assess whether a particular app needs your location information. Most apps should ask if you will allow it to access your location. If it doesn t allow you to opt out, consider not using that app NNEDV 29 Beware of Accidental Sharing Geotagging Location can be added to pictures taken with phones. Some phone apps that connect to social networks must have location access turned on. Photos uploaded to social media may include exif data NNEDV 30 National Network to End Domestic Violence 10

11 GPS Global Positioning System (GPS): tracks person/object using satellite technology. Active vs. Passive. Used in: Cell phones, tablets, laptops. Vehicle Navigation Systems (On Star, Garmin). Location devices for pets, elderly, children, assets NNEDV 31 Monitor Teen Drivers Know what time they left, what time they arrived and a map to show you the exact location that the car was parked. Alerts notify when teen leaves school early, is speeding, or visits friend. Can set speed limit, unlock doors, enable/disable starter, honk horn NNEDV 32 GPS Hidden In Cars 2016 NNEDV 33 National Network to End Domestic Violence 11

12 Safety Tips Use strong, unique passwords. Be aware of what information apps gather. Log out of accounts that are accessible without passwords. Be cautious about jailbreaking or rooting your device. Some security apps will allow remote autowipe, monitor battery usage, data usage, etc NNEDV 34 Resources Safety Net Project, NNEDV 2016 NNEDV 35 QUESTIONS? 2016 NNEDV 36 National Network to End Domestic Violence 12

Technology Safety Quick Tips

Technology Safety Quick Tips Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,

More information

Use of Technology to Stalk

Use of Technology to Stalk Use of Technology to Stalk Use of Technology to Stalk Sue Ryan, Program Attorney Phones calls, messages, texts, pics, video Cameras Global Positioning Systems (GPS) Computers Social networking sites Email

More information

Gathering Technology Abuse Evidence in Protection Order Cases

Gathering Technology Abuse Evidence in Protection Order Cases Gathering Technology Abuse Evidence in Protection Order Cases NCPOFFC webinar Sept 26, 2018, 12 1:30pm CDT Ian Harris, JD, MA, Technology Safety Legal Manager, National Network to End Domestic Violence

More information

Bob Gnapp Director Member Training & Network Analysis

Bob Gnapp Director Member Training & Network Analysis Robocalls and Spoofing Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 This presentation may be used by attendees for informational purposes only. No part of this presentation

More information

Robocalls and Rural Call Completion Issues

Robocalls and Rural Call Completion Issues Robocalls and Rural Call Completion Issues Bob Gnapp Director Member Training & Network Analysis rgnapp@neca.org 303-893-4415 Copyright 2018 National Exchange Association, Inc. All rights reserved. This

More information

Home Automation: Survivor Privacy Risks & Strategies

Home Automation: Survivor Privacy Risks & Strategies Home Automation: Survivor Privacy Risks & Strategies Our homes, workplaces, and vehicles are rapidly being filled with smart and connected devices that promise to increase convenience, improve energy savings

More information

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form The Minnesota Department of Corrections goal is to promote safety in the lives of victims and others who

More information

Safety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010

Safety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010 Safety and Security in a Digital Age South Carolina Bar Convention Family Law Section January 22, 2010 Melissa F. Brown Melissa F. Brown, LLC 145 King Street, Suite 405 Charleston, SC 29401 843.722.8900

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

WirelessED. Roaming the World with Your Phone

WirelessED. Roaming the World with Your Phone Roaming the World with Your Phone Browsing the Internet watching a video sending email on the go are just a few things you can do with a data-ready mobile device and a data service plan. Being connected

More information

Privacy Information - Privacy and Cookies Policy In Full

Privacy Information - Privacy and Cookies Policy In Full Privacy Information - Privacy and Cookies Policy In Full Contents 1. Introduction & General Terms 2. Who are we? 3. What information will Gaucho collect about me? 4. How will Gaucho use the information

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for ios User Guide Version 1.0 26 June 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

It s a Smart Phone World

It s a Smart Phone World It s a Smart Phone World Like most of us, you probably own and extensively use a smart phone. It is the access point that manages your calls, texts, email, business and social world. You take it everywhere

More information

37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS

37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS 37 FAQs ABOUT CELLCONTROL ASKED BY PARENTS OF NEW DRIVERS TABLE OF CONTENTS INTRODUCTION 3 QUESTIONS BEFORE YOU BUY 4 USING CELLCONTROL 9 iphone-specific QUESTIONS 14 ANDROID AND WINDOWS PHONE-SPECIFIC

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Social Media Reputation Management

Social Media Reputation Management Social Media Reputation Management If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if

More information

Tolbert Family SPADE Foundation Privacy Policy

Tolbert Family SPADE Foundation Privacy Policy Tolbert Family SPADE Foundation Privacy Policy We collect the following types of information about you: Information you provide us directly: We ask for certain information such as your username, real name,

More information

(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania

(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania (Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,

More information

LOCATION DATA. Location information from mobile devices is typically obtained using the following:

LOCATION DATA. Location information from mobile devices is typically obtained using the following: LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.

More information

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only. Copyright 2017 Leah Nieman www.leahnieman.com All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical,

More information

Odyssey Entertainment Marketing, LLC Privacy Policy

Odyssey Entertainment Marketing, LLC Privacy Policy Odyssey Entertainment Marketing, LLC Privacy Policy We collect the following types of information about you: Information you provide us directly: We ask for certain information such as your username, real

More information

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C COMMENTS

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C COMMENTS Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of Rules and Regulations Implementing the Truth in Caller ID Act of 2009 ) ) ) WC Docket No. 11-39 ) COMMENTS The Alliance

More information

Parks Industries LLC Privacy Policy

Parks Industries LLC Privacy Policy Parks Industries LLC Privacy Policy We collect the following types of information about you: Information you provide us directly: We ask for certain information such as your username, real name, birthdate,

More information

Cracked Spyphone - 1 Month free software sites full-version ]

Cracked Spyphone - 1 Month free software sites full-version ] Cracked Spyphone - 1 Month free software sites full-version ] Description: A ton of advanced technology in a single spy application. Spyera is powerful than ever! Live Call Listening Listen in to live

More information

Contents. Learn how to use the app. Basic use... pg 3. App settings: Main Menu... pg 6. App settings: Profile Sub-menu... pg 7

Contents. Learn how to use the app. Basic use... pg 3. App settings: Main Menu... pg 6. App settings: Profile Sub-menu... pg 7 USER GUIDE PanicGuard 2017 2 Contents Basic use... pg 3 How and when to use PanicGuard App settings: Main Menu... pg 6 A brief guide to contacts, wallpapers and other customisable settings App settings:

More information

TERMS & CONDITIONS FOR CALIFORNIA LIFELINE SERVICE

TERMS & CONDITIONS FOR CALIFORNIA LIFELINE SERVICE TERMS & CONDITIONS FOR CALIFORNIA LIFELINE SERVICE The following are Global Connection Inc. of America d/b/a StandUP Wireless ( StandUP Wireless or the Company ) California LifeLine Terms & Conditions

More information

Emergency safety apps: which one is right for me?

Emergency safety apps: which one is right for me? WESNET The Women s Services Network Emergency safety apps: which one is right for me? There are many emergency safety apps for smartphones and wearable devices (sometimes also called personal safety alarms)

More information

& Online Evidence Collection

& Online Evidence Collection Email & Online Evidence Collection Domestic violence offenders frequently misuse email and online spaces to stalk, abuse, terrorize, and monitor victims. Abusers may send messages from random email addresses

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Tech Tips and Services

Tech Tips and Services Privacy Checklist Introduction Welcome to ManyVids, and thanks for checking out our Privacy Checklist. While camming is some of the safest sex work around, every occupation has its hazards. We ve compiled

More information

Topic Course Activities

Topic Course Activities The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks for checking out our law enforcement guide. We take the safety of our users very seriously, and we hope this guide will be a useful tool for you. It includes information about our app; the features

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1 Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents

More information

View or download your phone's user manual. Get to know your phone. Learn how to use your sweet new phone with our interactive phone guides and

View or download your phone's user manual. Get to know your phone. Learn how to use your sweet new phone with our interactive phone guides and Instructions For Virgin Mobile Phone 2012 Usa Getting New Update 2/11: Boost Mobile's updated unlocking instructions have been posted and Virgin Mobile is saying that the only phones it can currently unlock

More information

Anti-Cyber Bullying Policy.

Anti-Cyber Bullying Policy. Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.

More information

Instructions on. Using Frontier Calling Features User Guide

Instructions on. Using Frontier Calling Features User Guide Instructions on Using Frontier Calling Features User Guide Table of Contents Before You Begin....3 *69...4-5 Additional Lines...5 Anonymous Call Rejection/Anonymous Call Block... 5-6 Busy Redial...6-7

More information

Manual Nokia 2690 Mobile Phone Software And

Manual Nokia 2690 Mobile Phone Software And Manual Nokia 2690 Mobile Phone Software And Install Do not switch the device on when wireless phone use is prohibited or when it may cause interference QUALIFIED SERVICE. Only qualified personnel may install

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Social Media Apps/Sites Middle School Students May Be Using Facebook Twitter Instagram Ask.fm Kik Messenger SnapChat Tumblr Web-based games Group Chats Facebook and Twitter

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Michael Phelps Foundation: Privacy Policy

Michael Phelps Foundation: Privacy Policy Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects

More information

Preparing for Canada s Anti-Spam Legislation (CASL) Miyo Yamashita, Partner Sylvia Kingsmill, Senior Manager

Preparing for Canada s Anti-Spam Legislation (CASL) Miyo Yamashita, Partner Sylvia Kingsmill, Senior Manager Preparing for Canada s Anti-Spam Legislation (CASL) Miyo Yamashita, Partner Sylvia Kingsmill, Senior Manager vember 2012 Discussion items CASL background Regulatory oversight Fines and penalties New anti-spam

More information

Intro. So, let s start your first SMS marketing legalese class!

Intro. So, let s start your first SMS marketing legalese class! Disclaimer This guide was created for educational purposes only. It should not be taken as legal advice. The laws and national regulations are complicated and applied to businesses and individuals in different

More information

Using Technology In Your Investigations. PATRICIA ZDZIARSKI, JOHN REESMAN,

Using Technology In Your Investigations. PATRICIA ZDZIARSKI, JOHN REESMAN, Using Technology In Your Investigations PATRICIA ZDZIARSKI, zdziarskip@opd.wi.gov JOHN REESMAN, reesmanj@opd.wi.gov Using Technology Downloading Videos from YouTube Enhancing Videos using YouTube Walgreens

More information

6 Best MacBook Apps to. Back to Gazelle. SIGN IN / REGISTER Facebook Twitter RSS Youtube

6 Best MacBook Apps to. Back to Gazelle. SIGN IN / REGISTER Facebook Twitter RSS Youtube Back to Gazelle SIGN IN / REGISTER Facebook Twitter RSS Youtube Apple News How-To s Sell Your iphone Sell Your Android Sell Other Gadgets Take Care of Your Devices Fix Common Problems Product Reviews Mobile

More information

How To Setup Bluetooth Iphone 4s Ringtone To Songs As Your >>>CLICK HERE<<<

How To Setup Bluetooth Iphone 4s Ringtone To Songs As Your >>>CLICK HERE<<< How To Setup Bluetooth Iphone 4s Ringtone To Songs As Your In itunes, if you buy a ringtone, you can set it automatically to your settings in a single I use ring.tones and it effortlessly makes any song

More information

Iphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<<

Iphone Setting Privacy Microphone Viber Set To On >>>CLICK HERE<<< Iphone Setting Privacy Microphone Viber Set To On In privacy setting i don't find facetime accessing microphone. iphone 4S Again while using viber, if I set it to loud speaker, rare end doesn't hear my

More information

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance. Cell Phone Policy 1. Purpose: Establish a policy for cell phone use and compensation allowance. 2. Authority: The Clinton County Board of Commissioners. 3. Application: This Cell Phone Policy (the Policy)

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

Distracted Work. Kentucky Crushed Stone Association - Annual Safety & Education Seminar February Robert Jameson, Central Mine Services, Inc.

Distracted Work. Kentucky Crushed Stone Association - Annual Safety & Education Seminar February Robert Jameson, Central Mine Services, Inc. Distracted Work Kentucky Crushed Stone Association - Annual Safety & Education Seminar February 2018 Robert Jameson, Central Mine Services, Inc. Has anyone else seen people like this lately? Seems like

More information

Short Codes - Social and Public Services. Web Portal. Please visit our website at

Short Codes - Social and Public Services. Web Portal. Please visit our website at Service Electric Cable TV and Communications Telephone Guide Service Electric offers a variety of features with their state of the art telephone service. This brochure will guide you through the basic

More information

How To Setup Bluetooth Iphone 4s Ringtone To Song As Your >>>CLICK HERE<<<

How To Setup Bluetooth Iphone 4s Ringtone To Song As Your >>>CLICK HERE<<< How To Setup Bluetooth Iphone 4s Ringtone To Song As Your In itunes, if you buy a ringtone, you can set it automatically to your settings in a single I use ring.tones and it effortlessly makes any song

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for ios User Guide Version 1.2.2 12 December 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

INSTALLATION & SETUP GUIDE

INSTALLATION & SETUP GUIDE CELLSPY ANDROID Oct 2013 FOR HELP CONTACT support@ intertel.co.za 2 CELLSPY ANDROID Contents Preparation... 3 Installation... 5 Configuration... 9 First Settings Screen... 9 Enable/Disable Tracking...

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",

More information

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we

More information

Social Media E-Safety Guide. For more help and advice visit:

Social Media E-Safety Guide. For more help and advice visit: Social Media E-Safety Guide For more help and advice visit: https://www.net-aware.org.uk/ https://www.thinkuknow.co.uk/ https://www.ceop.police.uk/ Twitter https://www.net-aware.org.uk/networks/twitter/

More information

ICADV LEGAL SERVICES REFERRAL FORM

ICADV LEGAL SERVICES REFERRAL FORM ICADV LEGAL SERVICES REFERRAL FORM REV. 10/01/16 Referred by: Organization: Phone Number: Email: Circle appropriate title: IMPD Coordinator / Family Advocate / Extended Support Advocate / Other DATE: Updated

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

Dumas ISD. Acceptable Use Policy

Dumas ISD. Acceptable Use Policy Dumas ISD Acceptable Use Policy Introduction Dumas ISD is excited to offer our staff and students access to modern technologies and mobile devices in conjunction with access to the Internet. Use of the

More information

PART 7 - Central Office Optional Features Original Sheet 1 SECTION 2 - Advanced Custom Calling Features

PART 7 - Central Office Optional Features Original Sheet 1 SECTION 2 - Advanced Custom Calling Features PART 7 - Central Office Optional Features Original Sheet 1 ADVANCED CUSTOM CALLING SERVICES A. General Advanced Custom Calling Services are classified as competitive telecommunications services for all

More information

CPNI. Eileen Bodamer

CPNI. Eileen Bodamer CPNI Compliance Training Eileen Bodamer 770-649-1886 Eileen@Bodamer.com CPNI Defined Customer Proprietary Network Information ( CPNI ) is broadly defined as the data collected by telecommunications providers

More information

Making a Family Emergency Communications Plan

Making a Family Emergency Communications Plan Making a Family Emergency Communications Plan OEM Open House 9/9/17 Arline Stith, presenter Content mostly based on MEMA Massachusetts Emergency Management Agency mass.gov/eopss/agencies/mema/ Cell/Mobile

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

CD STRENGTH LLC. A MASSACHUSETTS, USA BASED COMPANY

CD STRENGTH LLC. A MASSACHUSETTS, USA BASED COMPANY CD STRENGTH LLC. A MASSACHUSETTS, USA BASED COMPANY PRIVACY POLICY This Privacy Policy will be effective as of May 23, 2018 for all new users and users in EU and EEA member countries. For all other users,

More information

Airplane mode Android app application Back key bandwidth

Airplane mode Android app application Back key bandwidth 1G First-generation analog wireless telephone technology. 2G Second-generation wireless technology, the first digital generation and the first to include data services. 3G Third-generation wireless telephone

More information

I Travel on mobile / FR

I Travel on mobile / FR I Travel on mobile / FR Exploring how people use their smartphones for travel activities Q3 2016 I About this study Background: Objective: Mobile apps and sites are a vital channel for advertisers to engage

More information

Sunday January Atlantic Shores Baptist Church

Sunday January Atlantic Shores Baptist Church Sunday January 31 2016 Atlantic Shores Baptist Church NOTES RAISING KIDS IN THE DIGITAL AGE Every generation of parents face new challenges that were never set before the previous generation. Our generation

More information

Instructions For Cell Phone Use While Driving In Illinois Law Prohibiting

Instructions For Cell Phone Use While Driving In Illinois Law Prohibiting Instructions For Cell Phone Use While Driving In Illinois Law Prohibiting Illinois law prohibits the use of cellphones while driving with the exception Surrender all Illinois or out-of-state licenses,

More information

SAN FRANCISCO MUNICIPAL TRANSPORTATION AGENCY BOARD OF DIRECTORS. RESOLUTION No

SAN FRANCISCO MUNICIPAL TRANSPORTATION AGENCY BOARD OF DIRECTORS. RESOLUTION No SAN FRANCISCO MUNICIPAL TRANSPORTATION AGENCY BOARD OF DIRECTORS RESOLUTION No. 16-021 WHEREAS, In Fiscal Year 2015, the San Francisco Juvenile Court adjudicated approximately 819 transit violation citations

More information

SPRING 2018 HERSHEYSMILL FRAUD PREVENTION NEWSLETTER

SPRING 2018 HERSHEYSMILL FRAUD PREVENTION NEWSLETTER SPRING 2018 HERSHEYSMILL FRAUD PREVENTION NEWSLETTER Spring is here, the grass is riz. I wonder where the flowers is? Full apologies to Ms. Ginny Newlan for this awful poem. Apologies for duplicate mailings

More information

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group Common Scams and Fraud Charlottesville/Albemarle County TRIAD Group What We ll Cover 3 parts of a scam or fraud Common scams What can you do? Common Scams Three Parts of Any Scam or Fraud 1. Victim has

More information

WEBSITE PRIVACY POLICY TEMPLATE Last updated March 2nd, 2018

WEBSITE PRIVACY POLICY TEMPLATE Last updated March 2nd, 2018 WEBSITE PRIVACY POLICY TEMPLATE Last updated March 2nd, 2018 INTRODUCTION Life At Home Senior Care, LLC. ( we or us or our ) respects the privacy of our users ( user or you ). This Privacy Policy explains

More information

June 2, If you have questions, please do not hesitate to contact me at (517) Sincerely,

June 2, If you have questions, please do not hesitate to contact me at (517) Sincerely, RICK SNYDER GOVERNOR STATE OF MICHIGAN DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION GREG R. WHITE JOHN D. QUACKENBUSH SALLY A. TALBERG COMMISSIONER CHAIRMAN COMMISSIONER MIKE

More information

CAN-SPAM ACT RULEMAKING

CAN-SPAM ACT RULEMAKING CAN-SPAM ACT RULEMAKING Rachel E. Matteo-Boehm Piper Rudnick LLP 333 Market Street, Suite 3200 San Francisco, California 94105 415.659.7044 rachel.matteo-boehm@piperrudnick.com 198164v1 CAN-SPAM Act Rulemaking

More information

RULES FOR DISTRICT CELL PHONE USE

RULES FOR DISTRICT CELL PHONE USE RULES FOR DISTRICT CELL PHONE USE All cellular telephone service for District use must be obtained by the Contracting & E-Rate Services Department from the District s awarded Service Provider. 1. District

More information

Gps tracker software crack. Gps tracker software crack.zip

Gps tracker software crack. Gps tracker software crack.zip Gps tracker software crack Gps tracker software crack.zip Feb 17, 2015 features and in some cases, removing unwanted software.400+ device models supported, web access, mobile apps, white label branding

More information

Lambton Primary School

Lambton Primary School Lambton Primary School Advice to pupils on Cyber Bullying For pupils If you re being bullied by phone or the internet Remember, bullying is never your fault. It can be stopped, and it can usually be traced.

More information

CANADA S ANTI-SPAM LEGISLATION: CHARITIES AND NOT-FOR-PROFITS

CANADA S ANTI-SPAM LEGISLATION: CHARITIES AND NOT-FOR-PROFITS CANADA S ANTI-SPAM LEGISLATION: CHARITIES AND NOT-FOR-PROFITS Association of Corporate Counsel's Nonprofit Organizations Committee May 20, 2014 Presented by Tricia Kuhl Overview I. General Obligations

More information

T11: Incident Response Clinic Kieran Norton, Deloitte & Touche

T11: Incident Response Clinic Kieran Norton, Deloitte & Touche T11: Incident Response Clinic Kieran Norton, Deloitte & Touche Incident Response Clinic Kieran Norton Senior Manager, Deloitte First Things First Who am I? Who are you? Together we will: Review the current

More information

Spree Privacy Policy

Spree Privacy Policy Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you

More information

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ). ACCEPTABLE USE POLICY (AUP) 1. SERVICE AGREEMENT 3W INFRA and CUSTOMER have executed a Service Agreement (the Agreement ). The Parties agree that the terms and conditions of the Agreement govern this document.

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

TIME SYSTEM SECURITY AWARENESS HANDOUT

TIME SYSTEM SECURITY AWARENESS HANDOUT WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

I Travel on mobile / UK

I Travel on mobile / UK I Travel on mobile / UK Exploring how people use their smartphones for travel activities Q3 2016 I About this study Background: Objective: Mobile apps and sites are a vital channel for advertisers to engage

More information

Discover (n.): This feature surfaces personalized content tailored to your interests.

Discover (n.): This feature surfaces personalized content tailored to your interests. Glossary: General Terms @: The @ sign is used to call out usernames in Tweets: "Hello @twitter!" People will use your @username to mention you in Tweets, send you a message or link to your profile. @username:

More information

+ Front Door Security + Smart Video Alarms + Indoor Cameras + Personal Trackers SOLUTIONS FOR SMART & SAFE HOMES

+ Front Door Security + Smart Video Alarms + Indoor Cameras + Personal Trackers SOLUTIONS FOR SMART & SAFE HOMES + Front Door Security + Smart Video Alarms + Indoor Cameras + Personal Trackers SOLUTIONS FOR SMART & SAFE HOMES SECURITY OF YOUR FAMILY SHOULD BE FAILSAFE Welcome to TigerTech Smart Homes TigerTech surrounds

More information

Thinkuknow Parents and Carers Guide to Periscope. Periscope

Thinkuknow Parents and Carers Guide to Periscope. Periscope Thinkuknow Parents and Carers Guide to Periscope Periscope Periscope is a live streaming app, developed by the creators of Twitter as a way to share live, realtime events and news stories from around the

More information

Home Phone Quick Start Guide. Review these helpful instructions to understand your Midco home phone service and its many convenient features.

Home Phone Quick Start Guide. Review these helpful instructions to understand your Midco home phone service and its many convenient features. Home Phone Quick Start Guide Review these helpful instructions to understand your Midco home phone service and its many convenient features. 1 Staying Connected Has Never Been Easier Thank you for choosing

More information

AMCTHEATRES.COM - PRIVACY POLICY

AMCTHEATRES.COM - PRIVACY POLICY Thank you for visiting AMCTheatres.com. AMC Entertainment Inc. values its relationship with guests, members and clients, and is committed to responsible information handling practices. This privacy policy

More information

DSRC Interchange Details

DSRC Interchange Details DSRC Interchange Details P. Roka, May 1, 2011 This document explains data exchange between DSRC modules. DSRC modules are herein referred to as hardware and software enabled with wireless connectivity

More information

Before You Lose Your iphone

Before You Lose Your iphone iphones are lost and stolen every day, but luckily Apple has robust tools built into ios that will keep your data safe and your device unusable if it's misplaced or snatched by a thief. With Find My iphone,

More information

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part

More information