7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.

Slides:



Advertisements
Similar presentations
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Advertisements

The Data Protection (Jersey) Law 2005.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Data Protection.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
INTERNET and CODE OF CONDUCT
EFFECTS & USES OF ICT.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Anglican Province of Canada Privacy Policy. Commitment to Privacy The Privacy Policy, including the Web Privacy Statement, is the Anglican Province of.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
The Data Protection Act
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
Sears Privacy Policy & Security information Shaina Lacher.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
The Protection of Personal Information Bill 13 February
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
Personal data protection in research projects
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Data protection—training materials [Name and details of speaker]
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Privacy principles Individual written policies
Data Protection Legislation
G.D.P.R General Data Protection Regulations
The new data protection rules
General Data Protection Regulations
Privacy Policy the Law….
Presentation transcript:

7-Oct-15 Threat on personal data Let the user be aware Privacy and protection

What is privacy Privacy is the interest that individuals have in sustaining a 'personal space', free from interference by other people and organizations The ability to control access to personal information

Dimensions of privacy privacy of the person privacy of personal behaviour privacy of personal communications privacy of personal data

You can decide What information you share Whom you share information with How you share the information

You cannot decide Criminal attempts at obtaining private information Conclusions that are drawn from observations of you or your actions A third party, trusted or not, passing the information on to another Key information imposed on you that is ultimately controlled by some other organization, such as a government ID number or a credit card

How we can keep privacy Keeping secrets Use discretion Establishing trust Law

How we can keep data privacy Use encryption in digital communication Use anonymizer services

What is personal data Data concerning you Personal information Financial data Patient records Your interests and hobbies Your buying behaviour Your political inclination

Personal Information collected (eCommerce purpose) Name Age address Identity reference Credit card number and expiry date Address Telephone or fax or pager number

Other Information IP address Cookies ……..

Breach of privacy Junk mail Spyware Identity theft Phishing

Privacy Protection Privacy Protection is a process of finding appropriate balances between privacy and multiple competing interests. It is expected by the public that organizations, both public and private should be subjected to privacy regulations

Privacy Protection Management of an organization is responsible to adhere and comply with privacy in accordance with its privacy policy or applicable privacy laws and regulations For some countries, laws and guidelines are set up specifically for government, business and health organizations

Personal Data (Privacy) Ordinance of HK Purpose and manner of collection Accuracy and duration of retention Use of personal data Security of personal data Information to be generally available Access to personal data

Right under the Personal Data (Privacy) Ordinance of HK To check whether a company hold data about you and to access such data; To require the company to correct any inaccurate data relating to you; and To be told the company’s policies and practices in relation to personal data and the kind of personal data held by the company.

What organizations should do To promote consumer protection in the cyberspace To establish a privacy policy and make it easy to access and understand

Privacy Policy What kind of personal data are collected How are the information used How long are the information retained How would the data be destroyed Would the information be shared with third party? Under what circumstances would the information be disclosed?

Privacy Policy In what form are the information kept in the computer What is the policy on employee access

What you can do Disclose your personal information with care Keep your identity from getting trashed Control your personal financial information Beware of phishing Be careful in downloading free programs Click with caution Stop pre-approved credit offers

What you can do Buy from refuted company Buy from company with stated privacy policy Check whether security device/procedure is being used