Test Your Tech The dangers of phishing include A. Sharp hooks and nightcrawlers. B. Credit-card fraud at a look-alike Web site that mimics your bank. C.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Chapters 17 & 18 Credit Records and Laws & Responsibilities and Costs of Credit.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Privacy and Digital Security Shhh, It’s a Secret lawrence snyder c h a p.
Chapter 17 (Lecture 14) Shhh, It's a Secret: Privacy and Digital Security.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
“Electronic Payment System”
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Internet safety By Lydia Snowden.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Learning Objectives Explain the meaning of privacy; discuss the issues surrounding privacy of information List and explain the meaning of the OECD Fair.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Shhh, It's a Secret: Privacy and Digital Security
Chapter 17 Shhh, It's a Secret: Privacy and Digital Security.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Spring Term 2011 Washington College Professor Suydam Week 13 Final Project Preparation & Privacy.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Security, Social and Legal Issues Regarding Software and Internet.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Understanding Business and Personal Law Consumer Protection Section 15.1 Consumer Protection and Product Liability Years ago, caveat emptor, which means.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
PayPal and Other Third Party Payment Options Presented by Meg Monsen, Eric Zeng, and Michael Leonard.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Privacy and Digital Security Shhh, It’s a Secret lawrence snyder c h a p.
Digital Privacy and Intellectual Property Dr. Nazli Hardy Partially adapted from Fluency with Information Technology, Lawrence SnyderMillersville University:
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Walter Fletcher, Jeff Noles, Tiffany Russell, Shalonda Witcher
Chapter 13: Shhh, It's a Secret: Privacy and Digital Security
Protecting Your Credit Identity
Being Aware of What You Share
INFS 452 – Computer Ethics & Society
Presentation transcript:

Test Your Tech The dangers of phishing include A. Sharp hooks and nightcrawlers. B. Credit-card fraud at a look-alike Web site that mimics your bank. C. High mercury content in fish from polluted oceans. 1 D.A. Clements, UW Information School

Test Your Tech Identity theft is: A. Your sister borrowing your makeup, your shoes, and your boyfriend. B. Someone using your name, address, social security number, driver's license number, and credit card number at your expense. C. Retiring from your job or your kids leaving home. 2 D.A. Clements, UW Information School

Announcements Lab 10 is due by 10pm tonight Read ch 13 (first half) by today D.A. Clements, UW Information School 3

Announcements Project 2B deadline tonight WebQ is re-opened for rule Lab 10 due tonight D.A. Clements, UW Information School 4

Announcements New survey opens (5 extra-credit points) Vote for the Best GoPosters Who posted the best questions Who posted the best answers Winners in each category First (40 points) Second (25 points) Third (15 points) Fourth (10 points) Fifth (5 points) Due 12/11/2009 D.A. Clements, UW Information School 5

Video Relational databases and tables 6 D.A. Clements, UW Information School

Shhh, It's a Secret Digital Privacy FIT 100–Fluency with Information Technology D.A. Clements 7 D.A. Clements, UW Information School

Privacy What’s different about digital privacy? So many databases So easy to link them up 8 D.A. Clements, UW Information School

Video Pizza Palace 9 D.A. Clements, UW Information School

13-10 Privacy: Whose Information Is It? What is privacy? Examine a transaction of buying Dating for Total Dummies Information linking the purchase with the customer How can the information be used? Book merchant collecting information is ordinary business practice Book merchant sending advertisements to customer is ordinary business practice What about merchant selling information to other businesses? D.A. Clements, UW Information School

13-11 Modern Devices and Privacy Modern devices make it possible to violate people's privacy without their knowledge In 1890, Brandeis wrote that individuals deserve "sufficient safeguards against improper circulation" of their images D.A. Clements, UW Information School Albert Waters, Nez Perce 1906

13-12 Controlling the Use of Information Spectrum of control spans four main possibilities: 1. No uses. Information should be deleted when the store is finished with it 2. Approval or Opt-in. Store can use it for other purposes with customer's approval 3. Objection or Opt-out. Store can use it for other purposes if customer does not object 4. No limits. Information can be used any way the store chooses 5. Fifth possibility is internal use—store can use information to continue conducting business with you D.A. Clements, UW Information School

13-13 A Privacy Definition Privacy: The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others Threats to Privacy: Government and business Voluntary Disclosure: We choose to reveal information in return for real benefits (doctor, credit card company) D.A. Clements, UW Information School

13-14 Fair Information Practices OECD (Organization of Economic Cooperation and Development) in 1980 developed the standard eight-point list of privacy principles. 1. Limited Collection Principle 2. Quality Principle 3. Purpose Principle 4. Use Limitation Principle 5. Security Principle 6. Openness Principle 7. Participation Principle 8. Accountability Principle D.A. Clements, UW Information School

13-15 Comparing Privacy Across the Atlantic U.S. has not adopted OECD principles China does not protect privacy European Union has European Data Protection Directive (OECD principles) EU Directive requires data on EU citizens to be protected at same standard even after it leaves their country D.A. Clements, UW Information School

13-16 US Laws Protecting Privacy Privacy Act of 1974 covers interaction with government Interactions with business: Electronic Communication Privacy Act of 1986 Video Privacy Protection Act of 1988 Telephone Consumer Protection Act of 1991 Driver's Privacy Protection Act of 1994 Health Insurance Privacy and Accountability Act of 1996 These all deal with specific business sectors—not an omnibus solution D.A. Clements, UW Information School

13-17 Privacy Principles : European Union Two points of disagreement between FTC (US) and OECD (Europe): Opt-in/Opt-out When can an organization use information it collects for one purpose, for a different purpose? Opt-out is US standard except for highly sensitive data; Opt-in is European standard Compliance/Enforcement US has "voluntary compliance," EU has offices to control data D.A. Clements, UW Information School

13-18 A Privacy Success Story Do-Not-Call List Telemarketing industry's "self-policing" mechanism required individuals to write a letter or pay an on-line fee to stop telemarketing calls US government set up Do-Not-Call List. Over 107,000,000 households are on the list and telemarketing industry has largely collapsed D.A. Clements, UW Information School

13-19 The Cookie Monster Cookie: Record containing seven fields of information that uniquely identify a customer's session on a website. Cookie is stored on customer's hard drive. Abuse: Third-party cookie Third party advertisers on web site enter client/server relationship with customer as page loads Advertiser can set cookies, and can access cookies when user views other websites that advertiser uses D.A. Clements, UW Information School

13-20 The Cookie Monster (Cont'd) Browser options: Turn off cookies Ask each time a server wants to set a cookie Accept all cookies D.A. Clements, UW Information School

13-21 D.A. Clements, UW Information School

13-22 Identity Theft Americans do not enjoy the Security Principle Those who hold private information are obliged to maintain its privacy against unauthorized access and other hazards Identity theft is the crime of posing as someone else for fraudulent purposes Using information about person like credit card numbers, social security numbers D.A. Clements, UW Information School

Video Avoid IDentity Theft Avoid IDentity Theft 23 D.A. Clements, UW Information School

13-24 Managing Your Privacy Purchase up-to-date anti-virus/anti-spyware software Adjust your cookie preferences to match your comfort level Read the privacy statement of any website you give information to Review protections against phishing scams D.A. Clements, UW Information School

13-25 Managing Your Privacy (cont'd) Patronize reputable companies for music, software, etc. Be skeptical Stay familiar with current assaults on privacy Lobby for US adoption of Fair Information Practices D.A. Clements, UW Information School