What Google Privacy issues?. Concerns with Google & Privacy Google Street View It turns out that Google was obtaining a large amount of data from Wi-Fi.

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Social Media Pros & Cons for Parish Councils. What we’ll be covering… ➔ What is ‘social media’? ➔ Tuning in – what are the channels? ➔ Risk factors –
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Google’s Privacy Infringements Kurt Ladendorf. Google’s Mantra “Don’t be evil”
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
How to keep your kids safe online
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
What Google Privacy issues?. Concerns with Google & Privacy atch?v=YncVKgpTd6E&featu re=player_embedded.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
E-safety Parental Guide “You wouldn't let your child wander around the streets of London alone, yet millions of children are surfing the internet on their.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Data Protection Act. Lesson Objectives To understand the data protection act.
Tang Hall Primary School E - Safety Support for parents.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
Protecting Your Information Assets
Class 6 Internet Privacy Law Social Media Privacy.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Presented for: Local Businesses. About Fargo Local Wi-Fi Why is free Wi-Fi important? What is Social HotSpot™ marketing? How does it work ? What are the.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Using A presentation of the Elmhurst Public Library.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
The Internet The Cloud Gmail in the Cloud.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
HIPAA Vs. Family Educational Rights and Privacy Act (FERPA) How do these laws impact Educational Settings?
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Discover SEO Melbourne.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Take Charge of your Finances
Tips to help keep children safe on the internet and social networks
Mobile Operating Systems
Cabarrus County schools SECURITY, Social Media POLICY AND BYOT
Accessing the Internet
Take Charge of your Finances
IbVPN: Ensures Your Online Safety and Access Blocked Websites
Tips to help keep children safe on the internet and social networks
Move this to online module slides 11-56
Chapter 6 Networks Communicating and Sharing Resources
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Accessing the Internet
Accessing the Internet
It’s in the Clouds? An Overview of Cloud Services
IGraphic Social impacts of IT
How to Set up Privacy Functions
Take Charge of your Finances
Accessing the Internet
Presentation transcript:

What Google Privacy issues?

Concerns with Google & Privacy Google Street View It turns out that Google was obtaining a large amount of data from Wi-Fi receivers that were concealed in the Street View vehicles. It gathered MAC addresses (the unique device ID for Wi-Fi hotspots) and network SSIDs (the user-assigned network ID name) tied to location information for private wireless networks. Google had also intercepted and stored Wi- Fi transmission data, which includes passwords and content. Google Buzz Buzz is a Facebook like add-on for Gmail which automatically selected up to 50 of your Gmail contacts and designated them as your followers then it made them available Internet-wide. Users how moved quickly through the setup risked disclosure of the people who they exchanged s privately with. Which made it easy for people to know your most private things like s from doctors, friends, and lovers.

Google Street view Streisand effect: is when someone tries to hide something from media and instead off hiding it people go online and try to see for themselves.

What other countries think about Google Street view British officials announced that Google violated UK data protection laws when the company's Street View cars collected wi-fi data from private wireless networks. In lieu of a fine, Google UK will undergo an audit and must sign a commitment to ensure that data protection breaches do not happen again. UK Information Commissioner stated that "the collection of this information was not fair or lawful and constitutes a significant breach of the first principle of the Data Protection Act.". UK Canada's Privacy Commissioner has determined that Google violated Canadian privacy law when the company's street view cars collected user information from wireless networks. The personal information Google captured included s and the names, addresses, and home phone numbers of people suffering from a certain medical condition. The Commissioner called on Google to strengthen its controls and designate an individual to be responsible for privacy issues. Canada

Google Buzz Google reached a settlement that states that Google will establish an $8.5 million "Common Fund" to "fund organizations focused on Internet privacy policy or privacy education," as well as to cover the plaintiff's lawyers' fees and other expenses. Google also promises to "do more to educate users about the privacy aspects of Google Buzz”