Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
PRIVACY CONSIDERATIONS Privacy for Children Under 13 1 February 2013.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Copyright 2008 The Prinz Law Office. 1 Employee Blogs and Websites: How to Protect Your Company from the Legal Risk of Workers Going Online By Kristie.
What if I told you that a random stranger has access to…
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Social Networking Facebook Linkedin Twitter Julie Thompson Property & Casualty Insurance Agent
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Policies and Tech VAW 15 August 2015 Mary Kiio.
Current Best Practices and Precedents Existing UAV Guidelines/Best Practices.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Welcome parents Please take time to complete the survey in the back of the room and sign up for a fall conference.
IRB Belmont Report Federally mandated Risks -> minimized & reasonable Informed consent rospective Approval Prospective Approval Monitoring for subject.
Internet Safety & Security Tips for Parents Dorothy Grant Elementary School, April 2015.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
Internet Safety. Let’s Take Questions First! ● On your notecard, please write down 1- 2 questions you have regarding internet safety.
The Law of Torts.
The Internet of Things and Consumer Protection
Class will start at the top of the hour! Please turn the volume up on your computer speakers to access the audio feature of this seminar. WELCOME TO CE101.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
The Law of Torts Chapter 4. Intentional Torts Crime: –Harm to specific individuals and also to the general welfare Tort: –Private wrong committed by one.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Your kids online – challenges and solutions. Fact or fiction? 1. How many hours a week do children aged between spend online on average? a)18 hours.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
FOR TROUBLESHOOTING TIPS, CALL MOZILLA FIREFOX HELPLINE NUMBER | | TOLL FREE USA Firefox Focus- A New Private Browser for Android & iOS.
Facebook privacy policy
Managing Windows Security
REPORT THE 2017 APPLICATION INTELLIGENCE
European app matters Charles Lowe
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Privacy and Confidentiality in Research
Awareness raising session for Digital Citizenship/E-Safety
New Faculty Orientation
A Parent Guide to creating a student (under 13) Apple ID
Teaching Internet Safety
E-safety and Social Media
Consumer Empowerment through Education
GDPR (General Data Protection Regulation)
Cybersecurity Am I concerned?
Ad Hoc Phase Structured Phase Enterprise Phase
Michael R Nelson Senior Researcher
Being Aware of What You Share
Move this to online module slides 11-56
October is National Cybersecurity Awareness Month
Presentation transcript:

Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security

Board Companies

Core Initiatives

Is it IoT? Or the Interne t of Me?

Privacy: By the Dictionary The state of being apart from other people or concealed from their view; solitude. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone. Freedom from damaging publicity, public scrutiny, secret surveillance, or unauthorized disclosure of one’s personal data or information, as by a government, corporation or individual. The state of being concealed; secrecy.

What is the difference between privacy and security? Traditionally, security and privacy have been seen as two different arenas: Security has referred to the ways we protect ourselves and our property. It is defense against unwanted intruders and measures to remain safe. Privacy is the freedom to lead our lives without others knowing what we do or think unless we agree to share it.

Security: We often know when something is lost or breached

Privacy: Can be subjective

What is the difference between privacy and security in the digital age? In the Internet age, privacy and security are very much linked. For example, we may agree that a device or service can collect things about our likes and behaviors with the understanding that doing so makes that service or device work better. We may also understand that the company providing that service has no intention of sharing it with others. However, if that company entrusted with our personal information loses our information we have suffered both a security risk since that information may be used to commit cybercrimes against us and and a privacy violation since information we thought would not be public becomes public.

Division on whether online privacy and online security are viewed as the same or different Pg. 22 Same 48% Tech late adopters: 60% Black: 59% Hispanic: 59% Spend 1-5 hours online per week: 59% Different 52% College grads: 58% Tech early adopters: 57% Spend hours online per week: 56% BASE: ALL QUALIFIED RESPONDENTS Q815. Thinking about both online privacy and online security, do you think those two things are: Do you think online privacy and online security are…?

Loss of personal or financial information and information shared without consent are top concerns Pg. 23 BASE: ALL QUALIFIED RESPONDENTS Q400. How concerned are you that the following might happen to you or those you care about? 89% 87% 78% 76% 75% 74% 71% 66% 60% 59% 54% Top 2 Box

Who has access to my information How my information is used What personal information is collected about me What current measures are in place to protect my data What options I have to delete or correct my personal information What controls are in place for me to limit how the company shares my information How and/or can I access the personal information collected about me What information does the company have about me, whether collected from me, third parties, or created by the company itself Where is my personal information is stored Does the company share my personal information to any other companies Notification about how the company shares my information with other companies Why my personal information is shared with other companies Under what circumstances will my information be shared with the government What information is optional vs. required What information is collected to track my history of usage of websites or apps What information is collected about me for a product or service to function correctly How to contact the company or app provider if I have concerns or questions What assumptions are made about me The amount of time a company or app provider keeps my personal information Who has access to info, how info is used, and what info is collected are most important to Americans to know Pg. 24 BASE: SPLIT SAMPLE (n=500) Q650a. Thinking about some of the things you might want to know about your personal information, please select which top 3 things from the list below are MOST important for you to know. Most Important to Know Note: Top items for Americans to know are consistent across age groups.

How do we create a culture of privacy?

Transparency

Who is it shared with and where and how Securely is it stored?

Educate users about what controls they do have and how to use them

We have to message in ways that make sense Own your online presence. Personal information is like money. Value it. Protect it. Privacy is good for business.

Raise our children in the digital age Share with care. Know what’s being collected and why and how it will be used. Post only about others as you have them post about you. Be aware of what’s being shared.

Resources @STOPTHNKCONNECT Facebook.com/staysafeonline