Privacy and The Internet
Privacy and The Internet
Naomi Peterson
Types of Privacy Invasions
• Junk E-mails
• Minors viewing pornography
• Fraud Accounts
• Illegal Downloading
• Hacking Cyber chat
• illegal sharing of computer
software.
• Cyber Stalking
• Cyber Harassment
• Cyber Fraud
• Cyber defamation
• Spam
• Hacking
• Trafficking
• Distribution
• Posting and dissemination
of obscene material
• Indecent exposure and
pornography
Myth 1
Hackers like publicity
Myth 2
Firewalls do everything
Myth 3
We have new security
now; we are good and
secure
WHAT IS THE
4TH
AMMENDMENT
• The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not
be violated, and no warrants shall issue, but
upon probable cause, supported by oath or
affirmation, and particularly describing the
place to be searched, and the persons or
things to be seized.
Recommendations for a consumer
• Bluetooth technology
• Transport technologies such as electronic tolls, GPS navigation systems and
automatic number plate recognition systems
• Smart cards (credit cards with a chip)
• Radio-frequency identification (RFIDs) tags on goods you purchase
• Biometrics (facial recognition e.g. new passports).
Under the FTC Act, by enforcing companies' privacy promises about how
they collect, use and secure consumers' personal information.
With the
Gramm-Leach-Bliley Act,
Fair Credit Reporting Act
Children's Online Privacy Protection Act.
http://tucsoncitizen.com/bbbconsum
eralert/tag/internet/
97 million adults use the internet at least
once per day in the U.S.
Savvy business
and organizations
need to be AAA
Be Aware, Be adaptive, and
Assess Again
Thanks
Its now time for Q and A
??