0% found this document useful (0 votes)
7K views

Privacy and The Internet

After I researched the topic on privacy concerning internet and organizations, I was asked to give a presentation and speech concerning the issue. I tracked this issue for a month with articles up to a year old. These are the slides that go along with my privacy presentation. In it, I make recommendations for both personal and business usage concerning privacy and the internet. I ended my presentation with a silly but catchy thought to always be aware, assess and adapt.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7K views

Privacy and The Internet

After I researched the topic on privacy concerning internet and organizations, I was asked to give a presentation and speech concerning the issue. I tracked this issue for a month with articles up to a year old. These are the slides that go along with my privacy presentation. In it, I make recommendations for both personal and business usage concerning privacy and the internet. I ended my presentation with a silly but catchy thought to always be aware, assess and adapt.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Privacy Concerning the Internet

Naomi Peterson
Types of Privacy Invasions
• Junk E-mails
• Minors viewing pornography
• Fraud Accounts
• Illegal Downloading
• Hacking Cyber chat
• illegal sharing of computer
software.
• Cyber Stalking
• Cyber Harassment
• Cyber Fraud
• Cyber defamation
• Spam
• Hacking
• Trafficking
• Distribution
• Posting and dissemination
of obscene material
• Indecent exposure and
pornography
Myth 1
Hackers like publicity
Myth 2
Firewalls do everything
Myth 3
We have new security
now; we are good and
secure
WHAT IS THE
4TH
AMMENDMENT
• The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not
be violated, and no warrants shall issue, but
upon probable cause, supported by oath or
affirmation, and particularly describing the
place to be searched, and the persons or
things to be seized.
Recommendations for a consumer

• https://. The "s" that is displayed


• after "http" indicates that Web site
• is secure.
• closed padlock = secure site.
• secure site = unbroken key.
• look for encryption
• Read privacy policies
• Beware “cookies”
http://www.privacyrights.org/fs/fs23-s
hopping.htm
More personal recommendations
•Turn on cookie notices in your Web
browser
•Keep a "clean" e-mail address.

•Don't reveal personal details to strangers


or just-met "friends".

•Keep sensitive files on your home computer.


•Beware sites that offer some sort of
reward for your personal details.
• Do not reply to spammers, for any
reason.
• Be conscious of Web and home security
• Examine privacy policies and seals.
Recommendations for an Org.

•Attend identity and technological security Expos


•make clients feel secure
•keep up with new technologies
•share their knowledge
• Data retention enforced
•“opt in” and “opt out” options
•location tracking.
•mandatory icons

Organizations can better themselves


simply by keeping with the
technology progression.
New technologies
Many new technologies involve the handling of personal information and
therefore have the potential to impact on our privacy.

• Bluetooth technology
• Transport technologies such as electronic tolls, GPS navigation systems and
automatic number plate recognition systems
• Smart cards (credit cards with a chip)
• Radio-frequency identification (RFIDs) tags on goods you purchase
• Biometrics (facial recognition e.g. new passports).

Recommend: Advise organizations as to the potential privacy risks and


developing a Privacy Impact Assessment (PIA) This is an good way to
identify and minimize privacy impacts within your company.
The Federal Trade Commission is educating businesses about the
importance of personal information privacy and security

Under the FTC Act, by enforcing companies' privacy promises about how
they collect, use and secure consumers' personal information.

With the
Gramm-Leach-Bliley Act,
Fair Credit Reporting Act
Children's Online Privacy Protection Act.

http://tucsoncitizen.com/bbbconsum
eralert/tag/internet/
97 million adults use the internet at least
once per day in the U.S.

Savvy business
and organizations
need to be AAA
Be Aware, Be adaptive, and
Assess Again
Thanks
Its now time for Q and A
??

You might also like