You are on page 1of 14

Privacy Concerning the Internet

Naomi Peterson
Types of Privacy Invasions
• Junk E-mails
• Minors viewing pornography
• Fraud Accounts
• Illegal Downloading
• Hacking Cyber chat
• illegal sharing of computer
software.
• Cyber Stalking
• Cyber Harassment
• Cyber Fraud
• Cyber defamation
• Spam
• Hacking
• Trafficking
• Distribution
• Posting and dissemination
of obscene material
• Indecent exposure and
pornography
Myth 1
Hackers like publicity
Myth 2
Firewalls do everything
Myth 3
We have new security
now; we are good and
secure
WHAT IS THE
4TH
AMMENDMENT
• The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not
be violated, and no warrants shall issue, but
upon probable cause, supported by oath or
affirmation, and particularly describing the
place to be searched, and the persons or
things to be seized.
Recommendations for a consumer

• https://. The "s" that is displayed


• after "http" indicates that Web site
• is secure.
• closed padlock = secure site.
• secure site = unbroken key.
• look for encryption
• Read privacy policies
• Beware “cookies”
http://www.privacyrights.org/fs/fs23-s
hopping.htm
More personal recommendations
•Turn on cookie notices in your Web
browser
•Keep a "clean" e-mail address.

•Don't reveal personal details to strangers


or just-met "friends".

•Keep sensitive files on your home computer.


•Beware sites that offer some sort of
reward for your personal details.
• Do not reply to spammers, for any
reason.
• Be conscious of Web and home security
• Examine privacy policies and seals.
Recommendations for an Org.

•Attend identity and technological security Expos


•make clients feel secure
•keep up with new technologies
•share their knowledge
• Data retention enforced
•“opt in” and “opt out” options
•location tracking.
•mandatory icons

Organizations can better themselves


simply by keeping with the
technology progression.
New technologies
Many new technologies involve the handling of personal information and
therefore have the potential to impact on our privacy.

• Bluetooth technology
• Transport technologies such as electronic tolls, GPS navigation systems and
automatic number plate recognition systems
• Smart cards (credit cards with a chip)
• Radio-frequency identification (RFIDs) tags on goods you purchase
• Biometrics (facial recognition e.g. new passports).

Recommend: Advise organizations as to the potential privacy risks and


developing a Privacy Impact Assessment (PIA) This is an good way to
identify and minimize privacy impacts within your company.
The Federal Trade Commission is educating businesses about the
importance of personal information privacy and security

Under the FTC Act, by enforcing companies' privacy promises about how
they collect, use and secure consumers' personal information.

With the
Gramm-Leach-Bliley Act,
Fair Credit Reporting Act
Children's Online Privacy Protection Act.

http://tucsoncitizen.com/bbbconsum
eralert/tag/internet/
97 million adults use the internet at least
once per day in the U.S.

Savvy business
and organizations
need to be AAA
Be Aware, Be adaptive, and
Assess Again
Thanks
Its now time for Q and A
??

You might also like