Programs that help individuals and organizations protect their Internet connection or mobile phones and other telecommunications devices from vulnerability to hacking, phishing, spamming or other offences, such as their identity or tools being used by others to commit a crime. Security measures include use of strong passwords; activating the computer's firewall; installing and updating anti-virus/malware and spyware detection software; avoiding unsolicited emails and suspicious text messages; avoiding public Wi-Fi; protecting personal information on social media; shutting down computers when they aren't being used; locking mobile devices; and encrypting confidential data to keep it secure. Bank and credit card statements should be promptly reviewed for suspicious activity. Organizations may also face malicious (or unintentional) threats from current or former employees, vendors, contractors, visitors or others trusted by the organization with access to their facilities, equipment or systems. This may negatively impact the integrity, confidentiality, and availability of the organization, its data, personnel, facilities and associated resources. Effective insider threat mitigation programs are prevention-focused and can detect improper or illegal actions, assess threats to determine levels of risk, and implement solutions to mitigate potential consequences.
Programs that provide a hotline or other mechanisms that the public can use to report instances in which an individual or group of individuals is involved in the possession, manufacture and/or distribution of child pornography; online enticement of children for sexual acts; child prostitution; child sex tourism; non-familial child sexual molestation; sending unsolicited obscene material to a child or other acts that constitute child sexual exploitation.
Programs that provide a hotline or other mechanisms that people can use to anonymously report cases in which computers, laptops, tablets, mobile phones or other personal devices have been or are being used to commit a crime such as distribution of child pornography; cyberstalking or harassment; unauthorized interception of communications; intellectual property violations; or illegally accessing other computer systems to alter, destroy or steal data; intercept and disclose confidential information; plant spyware, ransomware or other forms of malware; launch denial of service attacks; or engage in phishing or smshing, financial theft or other activities that are illegal.
Programs that permit individuals using personal computers equipped with modems and communications software to access information and services that reside on or are available through remote computers. Included are programs that maintain Internet websites which provide information and/or services for users as well as those that offer on-line connection services which help users identify and locate the information and services they need.
The above terms and definitions are part of the Taxonomy of Human Services, used here by permission of INFO LINE of Los Angeles.