Register for Webcast

Live On-Demand

Learn more about live on-demand here.

$125

Webcast
2
Intermediate
Information Technology
None

Course Description

With much of our personal information collected and stored by others - sometimes without us even knowing about it - what can we do to help protect our privacy?  Personal privacy is one of the biggest concerns of many individuals and organizations. Therefore, we should consider the implications of personal privacy at both levels. By taking part in this session, you will learn valuable techniques that can help you identify what elements of your personal information are at risk. Perhaps more importantly, you will learn what you can do to get back in control.

MAJOR TOPICS COVERED

  • Discovering what companies such as Amazon and Google know about you
  • How to 'cleanse” your public profiles
  • What to do if you believe your data is compromised



Instructor

K2 Enterprises (Thomas G. (Tommy) Stephens, Jr., CPA, CITP, CGMA)

Thomas G. Stephens, Jr., received a Bachelor of Science in Business Administration degree (Major in Accounting) from Auburn University in 1985. Upon graduation, Mr. Stephens began working for an Atlanta-based public accounting firm. After earning his designation as a Certified Public Accountant, Mr. Stephens worked for BellSouth Corporation in Atlanta as an Internal Auditor. After two years as an auditor, he was promoted to Staff Manager and then Operations Manager of the Internal Audit Group. In 1991, he transferred to the Comptrollers’ department of BellSouth and served as Manager of the Cost Accounting organization. While working full-time at BellSouth Corporation, Mr. Stephens also attended graduate school, earning a Masters of Science (Major in Finance) from Georgia State University in 1992. Mr. Stephens left BellSouth in 1994 and opened his public accounting practice in the metropolitan Atlanta area. In his practice, Mr. Stephens provides accounting, tax, and consulting services to individuals and a wide variety of small and emerging businesses. Additionally, in 1995 he began authoring and presenting continuing professional education courses to accounting and finance professionals. In 2003, Mr. Stephens affiliated with K2 Enterprises and in 2007 he joined the firm as a partner. To date, he has lectured nationally on subjects such as internal controls for small businesses, technology strategies, computer hardware and software applications, tax strategies and compliance, and financial accounting standards and applications. Over the past twenty-four years, Mr. Stephens has presented over 2,600 educational sessions to over 68,000 participants nationwide. Presently, Mr. Stephens resides in Woodstock, Georgia where, in addition to his association with K2 Enterprises, he provides consulting services to small businesses and CPA firms. In addition to an active professional career, Mr. Stephens enjoys an active personal life with his wife. His hobbies include snow skiing, fishing, and running. Additionally, Mr. Stephens maintains professional memberships with the American Institute of Certified Public Accountants and the Georgia Society of Certified Public Accountants and is a past member of the Institute of Internal Auditors.



Course Specifics

Information Technology
Mar 23, 2020
None
WC12206853
None


Compliance Information

103220
Qualifies for CA Fraud: No


Learning Objectives

Upon completing this session, you should be able to:

  • List examples of personal information that has already been exposed
  • Identify how cybercriminals exploit personal information
  • Create an action plan for getting in charge of your personal information



Back to top