Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Keeping Your Child Safe on the Internet
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
How to keep your kids safe online
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
3 Ethics and Privacy.
Social Media Staying one step ahead of your children!!
 Definition: Building online communities of those that share interests and activities.  Examples:  Myspace  Facebook  Twitter “Online communication.
INTERNET SAFETY Elementary Age Children Catherine Horn, M.A., C.A.S. Cos Cob School Psychologist.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Live Streaming DANIEL SPRICK. Origins Justin.tv Justin Kan – lifestreaming in /7 video and audio feed from his hat.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Internet.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
FROM SOCIAL TO EDUCATION USES By: Elite Educators.
Introduction to Internet terms. Topics to Study What is Internet HTTP URL SMS MMS Wi-Fi Video Conferencing Social Webisites.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Globalization. Hmmm…. How do you think technology effects globalization?
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
STUDENTS AND THE INTERNET WHAT WE NEED TO KNOW. Issues  Internet Safety  Cyberbullying  Social Media  Digital Citizenship.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
CS2190 Discussion Topic: Governments, Companies, and User Privacy.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Social networking sites
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
Privacy and Data Mining What Do “They” Know About You?
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
By: Erin Peterson.  The most important technological innovation of our generation  A resource of unparalleled potential.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Should Schools Integrate Social Media into the Classroom?
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Current Privacy Policy Issues in.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Technology Tips and Safety for Teens. Social Networks Social Networks are internet applications which are used to facilitate communication between users.
Online Communications This is about different ways that people & businesses communicate online You will already be very familar with most ways.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
E-safety Presentation
Social Media from our point of view!
A Gift of Fire Third edition Sara Baase
PART III Ethical Issues in Business
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Introduction to Networks
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself. Citizens of free and democratic nations expect, at the least, privacy in their homes. Privacy U.S. Privacy-Protective Laws U.S. Privacy-Invasive Laws Electronic Surveillance Issues > Privacy In this section: Behavioral Targeting Traffic Shaping Transparency

U. S. privacy-protective laws refer to legislation designed to protect the private information of U.S. citizens. U.S. Privacy- Protective Laws Issues > Privacy > U.S. Privacy-Protective Laws President Gerald Ford made history when he signed the Privacy Act of 1974 into law. It sets out what kinds of information the government can keep about its citizens and the rights of citizens to know what’s kept about them.

Children’s Online Privacy Protection Act of gives parents control over what information is collected from their children online, and how such information may be used. U.S. Privacy- Protective Laws Issues > Privacy > U.S. Privacy-Protective Laws It is estimated that approximately 3.6 million users on the popular social media site Facebook are under the age of 12. Almost 50% of children under the age of 13 are using social media sites.

U.S. privacy-invasive laws refer to legislation that is invasive to individual privacy for a perceived greater good of the country. U.S. Privacy- Invasive Laws Issues > Privacy > U.S. Privacy-Invasive Laws

Surveillance is the close monitoring of behavior through electronic technologies such as wiretapping, data mining, remote video and audio monitoring, GPS, and RFID. Surveillance Issues > Privacy > Surveillance

Global positioning system (GPS) and radio frequency identification (RFID) technologies are very useful, but they lead to GPS tracking and RFID surveillance and can also be used to invade privacy. Surveillance Issues > Privacy > Surveillance

Wiretapping involves secretly listening in on conversations taking place over telecommunications networks including telephone, e- mail, instant messaging, VoIP, and other Internet communications. Data mining refers to the process of extracting information from large databases. Data mining can tell more about a person than all other kinds of electronic surveillance. Surveillance Issues > Privacy > Surveillance

Behavioral targeting uses information about a person’s behavior to inform businesses and marketers so that they can offer products that are likely to be of interest to that person. Network behavioral targeting is the most invasive form. Behavioral Targeting Issues > Privacy > Behavioral Targeting

Traffic shaping refers to controlling the flow of network traffic in order to optimize performance by delaying some data packets in favor of others. The privacy concern arises from the methods that ISPs use to decide which packets to throttle -using deep packet inspection to examine the contents of all data packets traveling over a network may be an issue. Traffic Shaping Issues > Privacy > Target Shaping FCC Chairman Julius Genachowski has fought to enforce policies to rein in traffic shaping.

Transparency is when a person keeps little or nothing secret from the world; a lifestyle that is supported by technologies such as lifestreaming, geo-location, and microblogging, eg, Twitter. Transparency Issues > Privacy > Transparency Justin Kan, founder of Justin.tv, streams his life over the Web from a video camera and microphone on his cap.