Privacy Understanding risks & problems is a 1st step toward protecting privacy.

Slides:



Advertisements
Similar presentations
INFORMATION TECHNOLOGY. HARDWARE 1.MAINFRAME COMPUTERS Large computers that process huge amounts of info for a firm quickly However, they are expensive.
Advertisements

1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Presented By Drexel and FMFCU.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
 Using someone else’s personal identifying information  Usually for a financial benefit  Can ruin your credit rating.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Protecting your money: Identity Theft
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Internet Safety Dr. Steve Broskoske Misericordia University.
A Gift of Fire Third edition Sara Baase
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
IDENTITY THEFT EPIDEMIC How We Can Protect Ourselves.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
By: Asfa Khan and Huda Mukhtar
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Computer Security By Duncan Hall.
CHAPTER 5 ETHICS & PRIVACY.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
The Database Application
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Preserving your privacy
Computers and Data Collection
Protecting Your Identity:
A Gift of Fire Third edition Sara Baase
Privacy and Information
A Gift of Fire Third edition Sara Baase
Chapter 10: Privacy, Security, and Ethics
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy Understanding risks & problems is a 1st step toward protecting privacy.

3 Key Aspects to Privacy (pg 45) Freedom from intrusion Control of info about oneself Freedom from surveillance

Privacy Threats (pg 46) International, institutional uses Unauthorized use or release by “insiders” Theft of info Inadvertent leakage of info through negligence or carelessness Our own actions (trade-offs or unaware)

New Technology = New Risks Speed, storage space, connectivity = collection, searching, analysis, storage, access & distribution of huge amounts of info & images much easier, cheaper & faster

Things We Do (pgs 47-48) Patients refill prescriptions and check results of medical tests on the Web Patients correspond with doctors by We store our photos & videos online We fill out our tax returns on the Web We store documents and financial spreadsheets on the Web Teenagers & college students put the facts of their lives on social networking sites

Did you know… (pgs 49-50) Anything you do online is recorded Huge amounts of data are saved Leaks happen A collection of many small items can give a fairly detailed picture of a person’s life Re-identification is easy The government can get personal data Information on public web sites will be seen Data on the Internet lasts forever Secondary uses Some info about ourselves we cannot always protect

Some Terminology Re-identification Invisible information gathering Cookies Secondary uses Data mining Computer matching Computer profiling Opt-out & opt-in

Government Databases Tax records Medical records Marriage and divorce records Property ownership Welfare records School records Motor vehicle records Voter registration records Books checked out of public libraries People with permits to carry firearms Applications for government grant and loan programs Professional and trade licenses Bankruptcy records Arrest records

Video Surveillance Super Bowl in Tampa, FL 2001 Neighborhood in Tampa, FL Great Britain

How Your Name Gets On the Lists When you buy something (supermarket loyalty cards) Enter a contest or sweepstakes Fill out a warranty or registration card Change of address form at the Post Office Phone books and reverse directories Public records Charities and non-profits Catalogues and mail orders Credit bureaus

Credit Records Experian, Equifax, Trans-Union And Innovis (if you own an home, or are selling or buying a home)

RFID Benefits & risks Veri-chip video:

Location Tracking Figure 2.4 page 83: Location based services

Prisoners Processing Personal Data Metromail - page 79

Lost & Stolen Data By: Hacking into computer systems Stealing computers & disks Pre-texting (example pg 89) Bribing employees of companies that store data Shady information brokers that sell data Spyware Figure 2.5 page 87 - long list of lost & stolen data - pretty scary how unprotected our data really is

Children Child molesters use the Web to find children; social networking sites popular MySpace transcript