10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Digital Citizenship Corbin Elementary.
PRIVACY CONSIDERATIONS Privacy for Children Under 13 1 February 2013.
Let’s learn to be CyberSmart! 2 nd -3 rd Grade Lesson 1 Internet Safety.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Security & Encryption Thomas Fenske & Joseph Minter.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
USA PATRIOT ACT USA PATRIOT ACT
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART C FOLLOW-UP MEASURES: REAPING INFORMATION Criminal Investigation: A Method for.
Patricia Section 06 For Children’s Online Privacy Protection Act (COPPA)
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Computer Programming I
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Internet regulation National limits of Internet Content.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Chapter 17 E-Commerce and Digital Law
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Internet Safety Child Guidance Mrs. Cason. Internet Benefits The internet can be a great resource of information for children -school projects -more updated.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Patriot Act Is Spying on US citizens Ethical?
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Beth Thomas Great Falls Public Schools. Describe and explain legalities and concerns of Internet Safety and “Terms of Use” Share possible solutions and.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Ruqayya Y Khan, Trinity University
Cyber and Internet Safety (Parents’ Night)
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Legal and Ethical Issues in E-Commerce
CHAPTER 33 Cyberlaw.
Teaching Internet Safety
Computer Programming I
Privacy Issues part 4 Information/data privacy
Online Safety: Rights and Responsibilities
Presentation transcript:

10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.

10 July 2003MIS 111 Basic Issues The Children's Online Privacy Protection Act (COPPA) Gender and Electronic Privacy USA PATRIOT Act Terrorist Information Awareness Cookies Spam

10 July 2003MIS 111 The Children's Online Privacy Protection Act (COPPA) The Children's Online Privacy Protection Act ("COPPA") specifically protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the users. Main requirements of the Act The Act was passed in response to a growing awareness of Internet marketing techniques that targeted children and collected their personal information from websites without any parental notification.

10 July 2003MIS 111 The Children's Online Privacy Protection Act (COPPA) In the 1990s, children began to access the Web more and more. Marketers would track information kids gave out in chat rooms or while playing games (such as addresses, full names, ages, etc.) and would retain this data in order to sell to third parties. It became very easy for anyone to simply send money to one of these companies and receive lists of childrens addresses and personal information.

10 July 2003MIS 111 The Children's Online Privacy Protection Act (COPPA) COPPA applies to any website directed specifically at children, any general site which has a childrens section, and any foreign websites aimed at U.S. children On each website, there must be an easily accessible privacy policy A web operator must obtain parental permission via credit card, digital signature, or a signed and faxed consent form. The operator must also make available any information collected about the child to the guardians of the child.

10 July 2003MIS 111 Gender and Electronic Privacy Pretexting and Cyberstalking: *Pretexting is the practice of collecting information about a person using false pretenses. *Cyberstalking--Coincidence Design, Amy BoyerCoincidence Design Video voyeurism and webcams

10 July 2003MIS 111 USA PATRIOT Act Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 Authorizes the installation of devices to record all computer routing, addressing, and signaling information. Governs government access to stored and other electronic communications. Creates a new exception, permitting government interception of the "communications of a computer trespasser" if the owner or operator of a "protected computer" authorizes the interception. The new exception has broad implications, given that a "protected computer" includes any "which is used in interstate or foreign commerce or communication" (which, with the Internet, includes effectively any computer). ?

10 July 2003MIS 111 Terrorist Information Awareness USA PATRIOT ACTTIA ObjectiveSurveillance of communications is an essential tool to pursue and stop terrorists. This new law will allow surveillance of all communications used by terrorists, including s, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. StrategyLaw enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect. Under this new law, warrants are valid across all districts and across all states. And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations. Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more. CriticismThe government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is "relevant" to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation. This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.

10 July 2003MIS 111 Cookies A cookie is a mechanism that allows a web site to record your comings and goings, usually without your knowledge or consent. Cookies do provide outside sources with personal information, but only information that you give while on the website. Yes, it does violate personal privacy to a degree, but cookies can be turned off or restricted to specific websites.

10 July 2003MIS 111 Cookies A server cannot set a cookie for a domain that it isn't a member of. How does a cookie work? Doubleclick This usage of cookies is the most controversial, and has led to the polarized opinions on cookies, privacy, and the Internet.

10 July 2003MIS 111 Spam Spam is unsolicited commercial . Spammers get addresses in three ways: *by scavenging, the practice of automatically collecting addresses listed or posted on webpages and electronic bulletin boards * by guessing, where the spammer uses dictionary terms or randomly-generated strings to develop addresses *and by purchasing addresses through list brokers. Currently, there is no federal legislation regulating the transmission of spam. "Remove me" options

10 July 2003MIS 111 Spam Case study: One person, six years

10 July 2003MIS 111 Protecting Your Privacy Online htmlhttp:// html