PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Its more than a game, its your life…. What do you do online?
Internet Safety GPHS.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
Thank you for your cooperation. We will begin shortly.
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
The aim of the week: Young people recognise and challenge bullying behaviour wherever it happens - whether face to face or in cyberspace.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
The Internet is Forever
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
Internet Safety Review Are You A Safe User? Grades 4th - 6th
Do you know how to keep yourself safe?
How To Protect Your Privacy and Avoid Identity Theft Online.
Data Protection Act. Lesson Objectives To understand the data protection act.
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
ZSAMBEK MEETING (HUNGARY) NOVEMBER Words fly away, writings remain.
Stacy Snyder, Aspiring Teacher FIRED Stacy Snyder, “Drunken Pirate”
FlipFlop PD June 12, 2012 Stephanie Dixon, EBRPSS What’s in Your Digital Dossier?
E-safety and safeguarding Staying safe online. Introduction Being eSafe relies on selecting appropriate privacy levels knowing how to behave online understanding.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
PRIVACY BOOTCAMP YpJU.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Watch this! 0 – 5mins only
Broadcasting News Trivia "LESSON PLANS." BBC News. BBC, 30 Jan Web. 19 Nov
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Public law governs:  relationships between individuals and the state/government; and  the structure, administration and operation of the state/government.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Ethical Issues1 Ethics. Ethical Issues2 Modern Problems Change in cost of duplication of information –before xerox & computer disks vs. after Change in.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
Get Safe Online Expert advice for everyone In association with.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Marc and Ally.  Privacy Act 1988  It protected peoples personal information and handling  Privacy Act Amendments 2000  Was amended to protect the.
It’s more than a game, it’s your life… What do you do online?
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Privacy in the Workplace Roland Hassall, Partner Date: 12 November 2015.
Activity 2 Sharing Information Safely The Story of Amy & Emily.
Online Safety and Privacy Understanding online privacy and how your information is shared.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Most of them are years old (75%). A total of 154 students have been taken part in this survey. The number of boys and girls is very similar (78/76).
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
DIGITAL CITIZENSHIP TRAINING BEING A SAFE AND SUCCESSFUL USER OF ICT.
This presentation deals with any kind of information you put online. It relates to e- mails, texts, social networking and the sharing of pictures and.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
AP CSP: Identifying People with Data and The Cost of Free
By Laurel Bacon 12/1/16 8th grade Career Prep
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Freedom Independence Transition
Preparing for Your Internship in the Age of Transparency
INTERNET SAFETY Year 8 Assembly.
Multi Agency Staff Guidance on Sexting
Presentation transcript:

PRIVACY Britt, Beattie and Amy

What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes in issue on the internet is when you’re using Facebook, shopping or banking online or receiving unwanted calls from telemarketers. Individuals have little control over what search engines do with their information It is difficult to balance the right of privacy and control over personal information as usually it is put online voluntarily and nearly impossible to erase Personal information is easily accessible particularly In Australia, the two biggest concerns with the internet nominated by the public is identity theft and loss of financial data

Individual’s rights Sharing information such as your name or birthday can allow people to steal your identity. The right to be aware they being recorded by CCTV. There are guidelines to balance the use of camera recording for crime solving purposes and the individuals right to privacy.

Examples Ravshan “Ronnie” Usmanov put nude photos of his girlfriend up on Facebook after she ended their relationship – “I put the photos up because she hurt me and it was the only thing [I had] to hurt her.” The girlfriend asked him to take down the photos and when he didn’t, she called the police.

Teacher fired over a Facebook comment – She said that her 5 th graders “are the devil’s spawn” and that she “hated their guts” – The school had found the post and fired her – She challenged them through court, who agreed that getting fired was too harsh and that the teacher should reconsider that posting things on Facebook. Google breached the Privacy Act by collecting personal information from unsecured WiFi connections while photographing houses for its Street View service – Under the current Privacy Act, the Privacy Commissioner was unable to impose a sanction but Google still had to publish an apology

Court says you don’t need permission to tag a Facebook photo – There was a picture produced of a mother who wanted custody of her daughter, of her drinking which would have reversed her medication for bi- polar. – The mother argued that it was put up against her will and without agreement, so that it was a illegitimate piece of evidence. Also that she had not accepted the ‘tag’ pg herself on facebook. – The court said you did not need to accept the picture of yourself for it not to be you.

Current status and laws There is no statutory tort for breach of privacy – In the case, Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd [2001] HCA 63, the High Court ruled that there was nothing standing in the way of developing one The Privacy Act 1988 (Cth) – Relates to how personal information is handled NSW Crimes Act 1900 – The law on the use of cyberspace

Personal information collected in the online environment is subject to the same laws as any other personal information A report by a Australian Law Reform commission published For Your Information: Australian Privacy Law and Practice in which they recommended extensive changes to privacy laws and practices to take account of new technology.

Future decisions The Privacy Act is only 20 years old, but it was introduced before computers, the Internet, mobile phones, digital cameras, surveillance technology and social networking websites became common use. – Regulates the way that agencies and organisations collect, store, use and disclose personal information

Now the Privacy Act has had amendments made to it, and civil penalties would be imposed by the Federal or Magistrates Court for “serious breaches when other enforcements measures are not sufficient” Senator Joe Ludwig said that the Privacy Act must be modernized because it didn’t deal with privacy issues brought around by the internet, including e-commerce, social networking sites and search engines.