security and privacy

Download Security and Privacy

If you can't read please download the document

Upload: jenny-nixon

Post on 08-Jul-2015

176 views

Category:

Education


2 download

DESCRIPTION

Security and privacy options for small business.

TRANSCRIPT

PowerPoint Presentation

Security and Privacyfor Creating Confident CustomersJenny Nixon, Jay Jenkins, Connie HancockUNL Extension EducatorsKnow how. Know now.Know how. Know now.Reputation EconomyE-Commerce has moved from a big impersonal space to a personalized customer experience

Customers are looking for:Reasons to be confident of your business reputationTestimonials from previous customersEase of useCertificates of authenticityStated privacy and security policiesKnow how. Know now.In the past and sometimes now, the web seems like a big impersonal space. The trend in ecommerce is toward a personalization of the customer experience. We must now expect customers who have examined your business from many angles including the experiences of previous customers and your stated online policies. They will purchase when they are confident of their security and privacy with your business.

Even if you are not doing e-commerce consider your security with payments made at your store.

2What is Security and Privacy?Process of identifying and protecting your assetsBusiness dataCustomer dataHardwareSoftwareReputation

Restricting access to authorized peopleKnow how. Know now.Security - DefineA Security Plan is used to:identify, measure, monitor, and control risks arising from the electronic exchange of information

A Security Policy is a written statement that describes:What assets are to be protected, why, and who is responsible

Know how. Know now.4Privacy Policy - DefinedPrivacy policy: a statement that declares a business' policy on how it

Collects,Stores, Releases

Personal Information It informs what information is collected, whether it is kept confidential, shared with partners, or sold to others.

http://en.wikipedia.org/wiki/Privacy_policyKnow how. Know now.Data Security vs UseData NeedsConfidentialitySecure from unauthorized disclosureIntegrityUnchangedAuthenticSecure from destructionAvailable for use

Know how. Know now.What information do I need to collect?

Know what information you are collectingKnow why you collect each piece of information

Know how. Know now.What will I do with collected data?

Develop a policy for storing and accessing collected dataPublish this policy on your web siteFollow your policyRe-examine policy periodicallyKnow how. Know now.Do Your HomeworkHow much business do you expect to conduct electronically?

A few items?A moderate number of items?Large scale electronic sales?

Know how. Know now.Things to ConsiderWhat forms of payment do I want to accept?Credit cardsDebit cardsChecksGift cardsInternational paymentsWhat sort of processing features do I need?What reporting features do I need?

Know how. Know now.E-Commerce OptionsThird Party StoreeBayEtsyAmazonGrow NebraskaThird Party Payment ProcessorGoogle CheckoutPayPal Love Apple Farms

Know how. Know now.E-Commerce OptionsThird Party Payment GatewayAuthorize.netPayPalHarley Farms

Totally Integrated CMS

Know how. Know now.Pros and ConsThird Party StoreProMinimal setupFlexible fee schedulesPayment security is taken care ofConMinimal customizationNo Home PageMinimal SEO

Know how. Know now.Pros and ConsPayment ProcessorProNo integration into backendNo security needed for paymentsConCustomer goes to different site and may reconsider purchaseKnow how. Know now.Visit: 14Pros and ConsPayment GatewayProsCustomers stay on your sitePurchase process is integrated into your siteConsTakes more workHigher level of technology neededMust obtain SSL certificateKnow how. Know now.Features to Consider24/7 availability and supportReal time feedback for customersRedundancyAnti-fraud and security solutionsRates and fee structuresTrusted platformStocking and order trackingTax calculationsIntegration into current platformEase of use

Know how. Know now.Payment Processor QuestionsDataWhere is it?Who has access? Are they authorized?How is it protected?How is it shared or transmitted?Do I have insurance against a security breach?What happens in a disaster? Redundancy?How is data backed up and restored?Is it scanned for vulnerability?Know how. Know now.Local SecurityKnow what you haveDataHardwareNetworksSoftwareKnow where it is and how it is securedKnow who has accessUse policies, procedures, and reportingUnderstand legal compliance

Know how. Know now.Local SecuritySecure and limit access to digital as well as physical assetsKeys vs PasswordsHardwareSoftwareNetworkSafe or vault vs Redundant and offsite backupVisual vs Electronic identityUS Mail vs CryptographyKeep hardware and software up to dateKnow how. Know now.Use good passwords, test backup and restore process19Create Confident CustomersCreate and post Security and Privacy PoliciesStick to your policyBe vigilantUse visual clues

Know how. Know now.Visual Security Clues Third party certificates of authorityGreen Address Browser Bar

https://Padlock symbol

Know how. Know now.Mobile Payment PlatformsSquarePaypal HereGoPayment (Intuit)SalesVuProPay JakNorth American Bancard Pay AnywhereInner Fence

Know how. Know now.Features to ConsiderCost of reader and/or appTransaction costsEncrypted dataElectronic receiptsTipping systemCash register and POS functionsReporting optionsSignature requirementsAccess to funds speed

Know how. Know now.Optional FeaturesWork with Windows machineManage cash transactionsRefunds/CreditCustomized storeKnow how. Know now.ResourcesVISA e-Commerce Merchants Guide to Risk ManagementBBB Data Security FAQPayment Card Industry Data Security StandardGeoTrust: Creating an e-Commerce Web SiteAVG Small Business Security GuideE-commerce Security Best Practice GuidelinesFundamentals Guidelines of e-Commerce Checkout DesignBroadband YouTube VideosSecurity Squad

Know how. Know now.Upcoming EventsBuilding Your BrandWomen in Ag Kearney, Feb 21,22eXtension Webinars - https://learn.extension.org/Cool Tools Feb 14, 2013Pinterest March 14, 2013Broadband Webinars http://broadband.nebraska.govMaking Security a Priority Feb 20, 2013Going Mobile March 20, 2013

Know how. Know now.Contact InformationUNL Extension Educators

Jenny [email protected] [email protected] [email protected]

Know how. Know now.