Emergency Plan Manual

AHCA Form 3110-1022, Rev March 2013 Rule 59A-8.027, Florida Administrative Code http://ahca.myflorida.com/MCHQ/Health_Facility_Regulation/Home_Care/HHA/index.shtml#other . Page 44 of 54 Cyber Safety: The internet has given so many people the ability to access a wealth of information, connect with others and get answers to just about any question. But it can also be dangerous. As soon as you log on, you can become the target of a cyber criminal. The following guidelines are designed to keep you safe while surfing the net. Keeping Your Kids Safe Online - Do’s and Don’ts Keeping Your Kids Safe Online - Do’s and Don’ts Explain to your children, only establish and maintain connections with people you know and trust. Review the connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don’t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Social Network (Facebook, Google+, Tweeter, Instagram, etc) - Do’s and Don’ts Social Network (Facebook, G Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any information about your activities, personal life, or professional life that you post and share. Ensure that your family takes similar precautions with their accounts; their privacy and sharing settings can expose your personal data. Avoid posting or tagging images of you or your family that clearly show your face. Select pictures taken at a distance, at an angle, or otherwise concealed. Never post Smartphone photos and don’t use your face as a profile photo, instead, use cartoons or avatars. Use secure browser settings when possible and monitor your browsing history to ensure that you recognize all access points. Identity Theft Prevention Create unique passwords for each of your accounts to limit the chances of having multiple accounts compromised. Keep your computer up-to-date with the latest versions of operating system and anti-virus software protection. Never share sensitive information such as credit card or Social Security numbers through text, email, or chats. Never use public networks to conduct online financial transactions. Remember to log out of personal accounts opened on public devices. Ensure that all communications involving online financial transactions are sent through an SSL encrypted connection (“https://”). Smartphone Malicious individuals may gain physical access to your smartphone. Protect your device with a password and run apps such as Android Lost and Find My iPhone to help you recover lost or stolen smartphones. Malicious emails and text messages can infect your smartphone with malware. Run anti-virus software periodically on your device. The camera and microphone can be remotely activated. Do not take a smartphone near classified information, and remove the battery before discussing any sensitive information. Wireless networks may be insecure and subject to monitoring. Use VPN when accessing wireless networks, and do not access sensitive information over wireless networks. Turn off Bluetooth when you are not using it to prevent hackers from exploiting your device. Apps that you download may gain access to the data stored on your smartphone. Check to see if the app will access your personal data and read user reviews of the app to see if other users experienced trouble after downloading. Apps can track your location. Turn off location services to avoid unwanted location tracking. Securing Your Home Wireless Network When creating passwords for your networks devices, ensure that they are sufficiently long and complex by using uppercase letters, lowercase letters, numbers, and symbols. Consider a multi-password phrase that does not consist of dictionary-based words. An example of a satisfactorily long and complex password would be ILuvF00tb@77 from the phrase “I love football.” Use a cable to directly access the internet for any computers that remain stationary. Turn off your wireless network when you will not be using it for an extended period of time. If you have guest access set up for your network, ensure that it is password protected. If possible, turn on automatic updates for your network device’s firmware. If automatic updates are not offered, periodically check for firmware updates on the network devices’ websites and manually download and install them. If your router is compromised or if you cannot remember the password, you can restore it to the default factory settings by pressing the reset button located on the back of the router. Position the router away from windows and further into the interior of your house to decrease the reach of the signal. Angel Home Care Services, Inc.

RkJQdWJsaXNoZXIy NTc3Njg2