A (very incomplete) talk on digital security A couple of basics Your email Your phone Browsing.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

The IFLA Internet Manifesto Alex Byrne Chair Committee on Free Access to Information and Freedom of Expression International Federation of Library Associations.
Security, Privacy, and Ethics Marsha Woodbury, Ph.D. University of Illinois, Urbana-Champaign
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
Challenges of freedom of speech online Andrej Petrovski, SHARE Defence BalCCon 2k14.
DEFAMATION Torts protecting the reputation. Traditional role of the courts Protection of individuals from the damage that can be caused to the reputation.
Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON
The Price of Freedoms David DavenportDavid Grünberg Bilkent Computer Eng.METU Philosophy Ankara TurkeyAnkara Turkey
Denmark and Cartoons of the Prophet Mohammed: Freedom of speech or hate speech? Mandana Zarrehparvar Senior Advisor Danish Institute for Human Rights
1/06/2015Copyright, Dan Svantesson Law 105 Communication and the law.
Do you know how to keep yourself safe?
FREEDOM OF EXPRESSION Salanieta Tamanikaiwaimaro (Sala T) - FIJI Controversy Conflict Who determines the balance??? Ethics.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Discover the Internet together …safely!. Who am I? Emma Vard Working for Microsoft Ireland Microsoft has a key focus on privacy and internet safety Teaching.
Mainstream Media Environment in Asia Challenges and Opportunities for Freedom of Expression: An exploration of the networked communications environment.
1 When hate speech tangles privacy... When hate speech tangles privacy...
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
The Universal Declaration of Human Rights
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Freedom of speech. Freedom of speech is the freedom to speak freely without censorship. The term freedom of expression is sometimes used synonymously,
Security & Reputation protection or restriction?building or destroying? & Reputation helen goss
` International Standards of Broadcast Regulation Prepared by Michael Karanicolas Legal Officer Centre for Law and Democracy.
KEEPING YOUR FAMILY SAFE IN THE DIGITAL WORLD. THE BLESSINGS OF TECHNOLOGY “We live at a time when technology can be used to replicate reality, to augment.
CENSORSHIP. ICCPR Art. 19 Everyone shall have the right to hold opinions without interference. Everyone shall have the right to freedom of expression,
Freedom of speech Freedom of speech is the freedom to speak freely without censorship. The term freedom of expression is sometimes used synonymously, but.
Project 1: Creating Newsletters Module 1: Censoring Freedom of Expression.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Access to Information: What Stories Get Told? EDU5536F Jennifer Niven, Evan Loreto, Dan Roberts.
1 Freedom of expression and freedom of the media INFORMATION SOCIETY Federal Ministry for Foreign Affairs of Austria.
HUMR5140 Introduction to Human Rights Law Autumn 2015 Lecture 4: The Scope of Application of Human Rights Treaties.
Case Study: interception of torrent traffic and what should we do about it Jelena Jovanović.
內文 資料來源 FREEDOM OF SPEECH. From Wikipedia, the free encyclopedia Jump to: navigation, searchnavigationsearch For free Speech in specific jurisdictions,
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Julie Latham Digital Citizenship: An Informational Guide.
Prepare to set up you new Gmail Account. What are you using? Software Program Name Owned bySoftware Location Outlook ExpressMicrosoftOn Your Computer.
Project 1: Creating Newsletters Module 1: Censoring Freedom of Expression.
Article 1:  All human beings are born free and equal in dignity and rights. They should act towards one another in a spirit of brotherhood.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Freedom of Expression. Universal Declaration of Human Rights Adopted by the United Nations General Assembly on 10 December 1948 at Paris. The Declaration.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
The Impact of Human Trafficking
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Role of Media in a Democracy Dr Greg Simons Department of Eurasian Studies Uppsala University.
Malysheva Anastasiya 7 a Gaynanova Elizaveta Aleksandrovna.
In 2005, Prince Harry went to a fancy dress party with a swastika symbol on his arm. The story ended up on the front of all the newspapers, on the TV news,
THE HUMAN RIGHTS. THE RIGHT TO PRIVACY No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Rights and Freedoms. COPY DOWN THESE DEFINITIONS Right: a moral or legal entitlement to have or do something. Freedom: the power or right to act, speak,
Gail Davidson. Approved unanimously by the UN General Assembly on December 10,  Article 19 Everyone has the right to freedom of opinion and expression;
Human Rights Population. Population: Human Rights WHAT ARE HUMAN RIGHTS? Fundamental rights that belong to every person, simply by being a human being.
PUBLIC ACCESS TO E-GOVERNMENT INFORMATION RESOURCES – THE ROLE OF LIBRARY AND INFORMATION SPECIALISTS.
Choosing A Username and Password
DIGITAL CITIZENSHIP What You Should Know!.
Cybersecurity for Journalists (and Everyone!)
Internal government data and records:
IT Applications Theory Slideshows
Presented at the National Data Forum, Uganda November
Information Security Footprint.
Passwords.
What is the function of Media and Journalism?
Article 10 – Freedom of expression
CSCE 390 Fall 2016 Four Cases by Robert N. Barger
VCE IT Theory Slideshows
E SAFETY ASSEMBLY.
Regulation in the Contsitution of the Republic of Poland
Universal Declaration of Human Rights
Online privacy for staff & Users
Presentation transcript:

A (very incomplete) talk on digital security A couple of basics Your Your phone Browsing

Why? ‘Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.’ “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.” - Universal Declaration of Human Rights

Password At least 12 characters; use a mix of letters, numbers, and UPPER and lower case. Use different passwords for each site Trouble remembering? Use a secure password manager like Keepass 10 most common: password qwerty baseball 9.dragon 10.football

Two step authentication Something you know + Something you have

Encryption – PGP/GPG Gmail, Outlook.com, Yahoo – Mailvelope Riseup.org or tutanota.com

Your phone IOS Messaging: Signal Calling: Signal Android Messaging: Textsecure Calling: Redphone

Your browsing Anonymise yourself: TOR

What traces do you leave behind?

Resources Digital Security: Security in a box Tactical Tech Digital First Aid Kit Electronic Frontier Foundation Information security for journalists, Committee to Protect Journalists Physical safety: Front Line Defenders Global Investigative Journalism Network