Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Protect Our Students Protect Ourselves
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
ÉDUCALOI: Your starting point for legal education! Preparing the citizens of tomorrow! © These materials are the exclusive property of Éducaloi.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Data Protection.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Chapter 16 Applying for Jobs
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
Privacy & Personal Information -- Why do we care or do we?
Information Privacy Policy in Canada Presented By: Sue Wu.
Class 13 Internet Privacy Law European Privacy.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
The University of Kansas Medical Center Shadow Experience Training.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Application Forms.  Has anyone ever filled out an Employment Application Form?  Did you feel that you were fully prepared?  Were there any questions.
PAYCHECKS Personal Finance PAYING EMPLOYEES There are 3 methods employers may use to pay employees: Paycheck – payment given with a paper check.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
Web Awareness: Knowing the Issues Web Awareness: Knowing the Issues © Media Awareness Network 2000.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy & Personal Information Prepared by the CBC Law Department CONFIDENTIAL – FALL 2011.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Creating a Database Designing Structure, Capturing and Presenting Data.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
The Intersection between Public Records Act and State Human Resources Act Connecting the dots… Tina Dadio, University Public Records Officer/Paralegal.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
The Protection of Personal Information Bill 13 February
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Understanding Privacy An Overview of our Responsibilities.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Understanding Privacy An Overview of our Responsibilities.
Facebook privacy policy
Documenting Life in the UK
Data Protection GCSE ICT Mrs N Steventon-2005.
SETTING UP OF E-COMMERCE WEBSITE
2015 Orientation to HIPAA Privacy Rule Compliance
Privacy principles Individual written policies
Florida Information Protection Act of 2014 (FIPA)
IT Applications Theory Slideshows
Privacy principles Individual written policies
Data Protection The Current Regime
Florida Information Protection Act of 2014 (FIPA)
FIPPA and CASL Overview
D3 Confidentiality.
Good Spirit School Division
Communicating in the IT Industry
Presentation transcript:

Christian Vargas

Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information about yourself It also involve the concealing of information that you consider private and not should be exposed to everyone.

Personal information is information about an identifiable individual that is recorded or filed in any form whether it be on paper or electronically.

Home Address Home Telephone number Age, Date of birth, Gender Blood Type Ethnicity, nation of origin, color of skin Religious beliefs Health care/Medical history Opinions about a person from others Marital status Identifying number SIN, PRI Credit card number Criminal records, fingerprints Resume ( Curriculum vitae) Educational history Financial history Employment information Exact salary

Address at work Classification of job position Work-related correspondence Details of employment contract Fact that a person is or was employed by the government Name on government contract Opinion about job Responsibilities of job Salary range Telephone number at work (including business cell phone number) Fax number at work Job title Security level of position

This is important because its good to know the difference between what is consider personal information and what isn't. Because different persons have different views on what personal information is It is important to know about ways these information is used against you for other purposes

Information is also entered online and is stored online as well Social websites always asks for personal information and it willing given( Facebook, twitter, Instagram) This information is entered online and saved and used by other third party companies Because this information is online it is readily available anytime and anywhere

As we know: Information is used to give a general description about us on social networks to tell others about ourselves It is used for surveys and when you sign up to receive newsletters or any online site along this line This information is used to meet people and find friends

Under our noses This information is bough by third party sites and is used for their benefit and to promote their companies Its is also used by third party companies to build their online database This information is also used to promote a certain type of product to us or similar to what we link Companies used this information to blasts us with advertisements about products we might like

People who enter this information online is not aware of how this information is used The are under the impression that the information is used online for the site it is entered When told that the information is bought and used by other sites, they were unaware Users are unaware of what other companies are doing with their information and how they are using it

The major acts and policies that relate to privacy and personal information are: The Privacy Act The Access to Information Act Personal Information Protection and Electronic Documents Act

The Privacy Act protects the privacy of individuals by controlling personal information collected, used, retained or disposed of by federal government institutions. The Act also provides Canadian citizens and other individuals present in Canada with the right to access personal information about themselves held by a government institution.

The Personal Information Protection and Electronic Documents Act establishes rules to govern the collection, use and disclosure of personal information by all federally regulated private sector organizations in the course of commercial activity. The Act also provides for the use of electronic alternatives to record or communicate information or transactions, describes the characteristics of secure electronic signatures and the conditions under which electronic signatures can be used to authenticate business transactions and to provide evidence in legal proceedings.

The Access to Information Act is a Canadian act that provides the right of access to information under the control of a government institution. It declares that government information should be available to the public. This is in keeping with the principles that government information should be available to the public and that exceptions to this should be limited and specific.

Cons These information is used to narrow down the different advertisement the bombard us with The information we enter online is to build a database that we might not want to be in Information about ourselves is saved and kept online for long times such as criminal records and other incriminating information. Pros The information we enter can help our friends get in contact with us whether it be for school purposes or business purposes The information is used to give us a search that is more specific to what we might want This information is used for other people to find us

Personal information is information about an identifiable individual that is recorded in any form. There are information that can be consider personal and other information that may not be depending on what u see as personal information This information is bought and used for other purposes than what we most likely might know or be aware of The uses of these information can both benefit us or can be sued against us