Unit 2- Privacy and Cyberspace Kaizen 2006 - 2007 MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.

Slides:



Advertisements
Similar presentations
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
Advertisements

1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Consumer Powers and Protections
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 9: Privacy, Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
PART THREE E-commerce in Action Norton University E-commerce in Action.
2015 ANNUAL TRAINING By: Denise Goff
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Internet Safety Internet Safety LPM
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Privacy, Security and Ethics
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
CSCI-235 Micro-Computers in Science Privacy & Security.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Data protection—training materials [Name and details of speaker]
Issues for Computer Users, Electronic Devices, Computer and Safety.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
CSCI-235 Micro-Computer Applications Privacy & Security I.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Surveillance around the world
Add video notes to lecture
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
Chapter 10 Cyberlaw, Social Media, and Privacy
Societal Issues in Computing (COMP466)
Privacy and Information
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online Privacy at Work Five Fair Information Practices Important Federal Privacy Laws

Objectives Privacy and Cyberspace Kaizen Explain terms used in privacy and cyberspace. 2.Identify hidden information technologies used in the Internet. 3.Explain issues regarding privacy at work and things to remember at work. 4.Identify existing legislation and laws regarding privacy.

COMPUTERS IN YOUR FUTURE 2004 COMPUTERS IN YOUR FUTURE 2004 by Bryan Pfaffenberger and Bill Daley TThe threat of privacy due to the sale of sensitive personal information on the Internet DDefinition of anonymity and how it is abused by users TTechnological developments and how they are eroding privacy and anonymity RReasons why employers are monitoring employees’ computer usage HHow public-key encryption threatens U.S. security, both foreign and domestic TThe U.S. government’s proposed key recovery plan and how it threatens the growth of Internet commerce Kaizen Privacy and Cyberspace

Identity Theft Identity theft is one of the fastest growing crimes in the United States and Canada. Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account. Examples of information needed are name, address, social security number, and other personal information. Laws limit liability to $50 for each fraudulent charge. An individual’s credit report is affected by identity theft. Kaizen Privacy and Cyberspace

Privacy in Cyberspace Privacy refers to an individual’s ability to restrict the collection, use, and sale of confidential personal information. The Internet is eroding privacy through the selling of information collected through registration forms on Web sites. Few laws regulate selling personal information. Technology is not only making it easier to invade someone’s privacy, but it is also providing a means to protect against privacy invasion. Kaizen Privacy and Cyberspace

Encryption Encryption refers to the coding of information so that it is only readable by the intended recipient. It is used in electronic commerce transactions and . Encryption provides a way to use the Internet in a safe, secure way. It could be used misused by criminals and terrorists. Kaizen Privacy and Cyberspace

Anonymity Anonymity is the ability to convey a message without disclosing one’s identity. It can be abused because it frees people from accountability. Defamation is the act of injuring someone’s reputation by making false statements. Libel occurs when malicious statements are made in writing. Kaizen Privacy and Cyberspace

How Is Technology Eroding Privacy and Anonymity? Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view. Hidden information technologies used on the Internet are: – Cookies – Global Unique Identifiers (GUIDs) Kaizen Privacy and Cyberspace

Cookies Cookies are small files that are written to an individual’s hard drive whenever a Web site is visited. Legitimate purposes of cookies include recording information for future use. Example: retail sites using “shopping carts.” Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on Web sites based on those actions. Kaizen Privacy and Cyberspace

Example of Cookies Kaizen Privacy and Cyberspace

Global Unique Identifiers (GUIDs) Kaizen A GUID is a unique identification number generated by hardware or a program. It is used to send user information back to the site that created it. Privacy and Cyberspace

Protecting Your Privacy Online Kaizen Browse anonymously– Use Web sites such as or Disable cookies on your Web browser. 3.Use free addresses for information placed on Web sites. 4.Don’t divulge personal information to online strangers. 5.Make sure registration forms have a privacy policy statement. Privacy and Cyberspace

Privacy at Work Kaizen Employees are given and Internet access at work. Companies are concerned about employees’ wasting time surfing the net and sending personal . Three-quarters of large corporations monitor employees’ phone calls, , Web browsing habits, and computer files. Laws do not protect employees from being monitored. Privacy and Cyberspace

Things to Remember at Work Kaizen Do not use the employer’s phone for personal calls. 2.Do not use the employer’s e- mail for personal messages. 3.Assume everything you do at work is being monitored. Privacy and Cyberspace

The Five Fair Information and Important Federal Privacy Laws Kaizen The Fair Information Practices were developed by the U.S. Department of Health, Education, and Welfare in the early 1970s. They have been adopted by many public and private organizations since Privacy and Cyberspace

Fair Information Practices Kaizen There must be no personal data record-keeping systems whose existence is a secret from the general public. 2.People have the right to access, inspect, review, and amend data about them that is kept in an information system. Privacy and Cyberspace

Fair Information Practices Kaizen There must be no use of personal information for purposes other than those for which it was gathered without prior consent. 4. Managers of systems are responsible and should be held accountable and liable for the reliability and security of the systems under their control, as well as for many damage done by those systems. Privacy and Cyberspace

Fair Information Practices Kaizen Governments have the right to intervene in the information relationships among private parties to protect the privacy of individuals. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Freedom of Information Act (1970): Gives you the right to look at data concerning you that is stored by the federal government. A drawback is that sometimes a lawsuit is necessary to pry it loose. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Fair Credit Reporting Act (1970): Bars credit agencies from sharing credit information with anyone but authorized customers. Gives you the right to review and correct your records and to be notified of credit investigations for insurance employment. A drawback is that credit agencies may share information with anyone that reasonably believe has a “legitimate business need.” Legitimate is not defined. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Privacy Act (1974): Prohibits federal information collected about you for one purpose from being used for a different purpose. Allows the right to inspect and correct records. A drawback is that exceptions written into the law allow federal agencies to share information anyway. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Family Educational Rights and Privacy Act (1978): Sets strict procedures that federal agencies must follow when seeking to examine customer records in bank; regulates financial industry’s use of personal financial records. A drawback is that the law does not cover state and local governments. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Privacy Protection Act (1980): Prohibits agents of federal government from making unannounced searches of press offices if no one there is suspected of a crime. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Cable Communication Policy Act (1984): Restricts cable companies in the collection and sharing of information about their customers. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Computer Fraud and Abuse Act (1986): Makes eavesdropping on private conversations illegal without a court order. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Computer Security Act (1987): Makes actions that affect the security of computer files and telecommunications illegal. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Computer Matching and Privacy Protection Act (1998): Regulates computer matching of federal data; allows individual a chance to respond before government takes adverse actions against them. A drawback is that many possible computer matches are not affected, such as those done for law-enforcement or tax reasons. Privacy and Cyberspace

Important Federal Privacy Laws Kaizen Video Privacy Protection Act (1988): Prevents retailers from disclosing video-rental records without the customer’s consent or a court order. Privacy and Cyberspace

Summary Kaizen Sensitive personal information is for sale on the Internet. 2.Web sites collect personal information without informing their visitors. 3.Anonymity is the ability to convey a message without disclosing one’s identity. 4.Cookies provide a way for Web sites to record one’s browsing activities. 5.GUIDs make anonymous usage of the Internet difficult. 6.Many employers monitor their employees phone calls, , Web browsing habits, and computer files. Privacy and Cyberspace

Evaluation What does Big Brother term mean? What are other pre-cautionary measures to keep one’s privacy? What can you say about Global Positioning System or the GPS? Case Analysis Kaizen Privacy and Cyberspace