Internet Privacy - PowerPoint PPT Presentation

About This Presentation
Title:

Internet Privacy

Description:

Ability to control what information one reveals about oneself over the Internet, and to control who can access that information – PowerPoint PPT presentation

Number of Views:876
Slides: 12
Provided by: Dooremon
Tags:

less

Transcript and Presenter's Notes

Title: Internet Privacy


1
  • Internet Privacy and
  • Other Security Issues

2
What Is Privacy?
  • Freedom from observation, intrusion, or attention
    of others
  • Societys needs sometimes trump individual
    privacy
  • Privacy rights are not absolute
  • Balance needed
  • Individual rights
  • Societys need
  • Privacy and due process

3
Privacy and the Law
  • No constitutional right to privacy
  • The word privacy is not in the Constitution
  • Congress has passed numerous laws
  • Not particularly effective
  • Issue is pace of change
  • Privacy is a function of culture
  • Privacy means different things in different
    countries and regions
  • Serious problem on global Internet

4
Figure 10.1 Some U.S. privacy laws.
   
 
 
5
Collecting Personal Information (e.g.,
your email address gt email spam)
  • Notice/awareness
  • You must be told when and why
  • Choice/consent
  • Opt-in or opt-out
  • Access/participation
  • You can access and suggest corrections
  • Integrity/security
  • Collecting party is responsible
  • Enforcement/redress
  • You can seek legal remedies

6
Collecting Personal Information
  • Often voluntary
  • Filling out a form
  • Registering for a prize
  • Supermarket Rewards cards
  • Legal, involuntary sources
  • Demographics
  • Change of address
  • Various directories
  • Government records

7
Surveillance and Monitoring
  • Surveillance
  • Continual observation
  • Tampa facial scanning at Super Bowl
  • Packet sniffing
  • Monitoring
  • The act of watching someone or something
  • E-mail Web bugs
  • Workplace monitoring is legal

8
Surveillance and Monitoring Tools
  • Spyware
  • Sends collected data over back channel
  • Snoopware
  • Records targets online activities
  • Retrieved later
  • Screen shots, logs, keystrokes
  • Other surveillance/monitoring sources
  • OnStar and GPS tracking
  • E-ZPass systems
  • Phone calls and credit card purchases

9
Spam
  • Electronic junk mail
  • Spammers use anonymous remailers
  • Mailing list sources
  • Online personal information services
  • Dictionary attack software
  • Do not respond in any way!

10
Fraud
  • The crime of obtaining money or some other
    benefit by deliberate deception.
  • Most common forms of IT fraud
  • Identity theft
  • Credit card fraud
  • Scammers and con artists
  • Financial swindles

11
Protecting Your Online Privacy
  • Implement appropriate security measures
  • Get a copy of your credit report
  • Use
  • Junk e-mail account
  • Anonymous remailer
  • Stealth surfing service
  • Common sense
  • Deal with recognized, trusted e-retailers
  • Keep important numbers and passwords secret
  • Use good passwords
  • If your computer acts strangely, find out why
Write a Comment
User Comments (0)
About PowerShow.com