Online privacy for staff & Users

Slides:



Advertisements
Similar presentations
Security, Privacy, and Ethics Marsha Woodbury, Ph.D. University of Illinois, Urbana-Champaign
Advertisements

The aim of the week: Young people recognise and challenge bullying behaviour wherever it happens - whether face to face or in cyberspace.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Wireless networking Roger Treweek Oxford University Computing Services.
Working group discussion 1 Cyber Risk Security, Privacy ?
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Saul Stevens I.T. Director- Family Mosaic Digital by Default !
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Information Security. Survey Results Question What do you think Information Security is?
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
A (very incomplete) talk on digital security A couple of basics Your Your phone Browsing.
“It’s More Than a Game, It’s Your Life” How to protect your digital footprint.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Digital Citizenship Laura Assem, Director of Technology.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Jo Lembo Puget Sound Regional Growth Strategies Manager.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Digital Citizenship How to use the internet to learn and have fun How to stay in control How to report Karen Bentall, LibrarianAnne Terwilliger, Counselor.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
The Human Rights Act. Stephen Lawrence Lesson Objectives To describe what a right is. To identify the main contents of the Human Rights Act, To.
PUBLIC COMPUTER SAFETY
Surf smart training.
Debra Mann Reference Librarian Innisfil Public Library
Introduction to Privacy
Why is this called “the ostrich effect”?
Creating your online identity
One account for all your learning needs
Children’s developing digital literacy: dilemmas in linking evidence and policy Sonia
FIVE EASY AND INEXPENSIVE WAYS TO PROMOTE YOUR BUSINESS
Measuring results - Experiences from Vietnam
Cut Mid shot Lapel mic Hi! My name is Ty Stokes and I’m a junior at Indiana University of Pennsylvania Music file Replace Replace.
Google Apps for Education
name of trainer associate trainer | sparqs
Information Security.
How to use the internet safely and How to protect my personal data?
globallab Where curiosity rules!
Marketing Then and Now.
Online Safety.
Unit 11 Communication & Collaboration
UNIT 4 – THE COST OF FREE LESSON 4.
Safe Online Dating – Tips Every Women Should Know
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Importance Of Digital Marketing For Law Firms BYV Digital.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Internet Privacy and You
Digital Citizenship and Social Media
WorldSkills UK LIVE Where am I now?
Introduce as appropriate, and explain this assembly will help us to understand what’s happening when we feel worried.
Keeping your data, money & reputation safe
Laura Getting started with Laura
Use of social media and other communication tools
One account for all your learning needs
Hi, lovely to meet you all…….. Etc……..
Coordinating Medical Care VNA Community Healthcare
E SAFETY ASSEMBLY.
name of trainer associate trainer | sparqs
Company Name | Phone Number | Website | Address
Why Digital Marketing Career Is Important? Presented By:- Abhinav Shashtri.
Building Strong School-Family Partnerships with the Right Question School-Family Partnership Strategy Luz
Watching two billion people
It matters By: Nina Fehrenbach
Facebook Basics Patricia Edie 20 June 2019.
Presentation transcript:

Online privacy for staff & Users Presented by: Laura Solomon Library services Manager, OPLIN @laurasolomon

On today’s agenda Privacy: NBD, or is it? Risks What’s Happening on the Library Front? Tools & Strategies The Big Take-Aways

https://www. geeksaresexy https://www.geeksaresexy.net/2017/05/31/tracking-every-move-online-comic/

“PUBLIC is the new default.” Erick Schonfeld

You walk every day in a crowd, sure, but you're online even more You walk every day in a crowd, sure, but you're online even more. Understanding how to protect yourself in both realms is important. Amira Dhalla, head of the women and web literacy programs at Mozilla

Why Care about privacy? Ideological reasons Practical reasons https://medium.com/@FabioAEsteves/i-have-nothing-to-hide-why-should-i-care-about-my-privacy-f488281b8f1d

The Idealogical REASONS

Privacy is a right you haven’t always had Image from https://sites.google.com/site/typesofgovernmentrham/home/dictatorship

Article 12 of the universal declaration of human rights  “No one must be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation.”

I know what you do in the bathroom, but you still close the door, RIGHT?

The Practical REASONS

Info in the wrong hands becomes dangerous

YOU can’t predict the future

YOUR private life out of context=weapon

Your information has value

What are the risks?

What is it possible to see? Your political views Where you bank Your sexual orientation Where you shop Where you go to school Health information Listening & Viewing History

https://www.wired.com/2017/05/welcome-next-phase-facebook-backlash/ …a leaked confidential document prepared by Facebook that revealed the company had offered advertisers the opportunity to target 6.4 million younger users, some only 14 years old, during moments of psychological vulnerability, such as when they felt “worthless,” “insecure,” “stressed,” “defeated,” “anxious,” and like a “failure.”

http://mashable.com/2017/06/19/china-webcam-hacking

https://xkcd.com/1807/

https://twitter.com/zeynep/status/857295243703615489

https://www.eff.org/wp/school-issued-devices-and-student-privacy Valued at over $8 billion,7 the educational technology sector in the U.S. has been described as “the world’s most data-mineable industry by far.”

What ‘s Happening in libraries?

Library Privacy Guidelines for Public Access Computers and Networks http://www.ala.org/advocacy/privacy/guidelines/public-access-computer

What about public wifi?

https://libraryfreedomproject.org/ Library Freedom Project is a partnership among librarians, technologists, attorneys, and privacy advocates which aims to address the problems of surveillance by making real the promise of intellectual freedom in libraries. https://libraryfreedomproject.org/

https://www.torproject.org

What can we do?

ENCRYPT

https://www.eff.org/https-everywhere

2-factor authentication

https://www.eff.org/privacybadger

https://haveibeenpwned.com/

What did we learn?

TODay’s big take-aways We have to care about privacy The risks are many There are freely-available tools that can help, a lot. Don’t be afraid, take action

I don't expect anyone in this room to set up a VPN I don't expect anyone in this room to set up a VPN. But I do want you to know that there are options, and I do want you to know that something as small as covering your webcam is the first step to you being empowered in your digital life. Amira Dhalla, head of the women and web literacy programs at Mozilla

Thank you for listening! Laura Solomon @laurasolomon laura@designforthelittleguy.com www.meanlaura.com