Kristen Lockhart COMPUTER PRIVACY & PERSONAL INFORMATION What types of information do companies have and share about YOU?

Slides:



Advertisements
Similar presentations
HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
Advertisements

UNIVERSITY CRIME WATCH 1 Reporting Suspicious Activities and Persons on Campus Faculty, Staff and Students Training Series.
Part I: Making Good Online Choices
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Chapter 7 Applying for a Job Chapter 7 Applying for a Job Lesson 7.2 Putting Your Best Foot Forward Lesson 7.2 Putting Your Best Foot Forward.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
INTERNET SAFETY FOR STUDENTS
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Ethical and Social Issues in Information Systems
Statistical Analysis of Match.com By Caitlin Rosica.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Code Adam Alert Program. Background On April 30, 2003 “Code Adam Act of 2003” became law. It requires that the designated authority for a public building.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Data Protection Act. Lesson Objectives To understand the data protection act.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Campus Safety The Sullivan University System There were no hate crimes reported that fit any reportable crime bias categories. In accordance with the Crime.
The World of Business and Accounting You and the World of Accounting
Decisions Consumer: a person who buys a product or service. You have the right to buy or reject products and services but you have a responsibility in.
How can you protect yourself from online identity theft?
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Sunshine Center of the N.C. Open Government Coalition Feb. 27, 2015 NORTH CAROLINA SUNSHINE LAWS & GIS.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
The Microprocessor Intro to Information Technology.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Chapter 1. ◦ Is the business earning enough profit? ◦ Is the selling process appropriate? ◦ How much does the business owe to debtors? ◦ Are clients paying.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Social Networking. Freewrite #1 What is Social Networking?
Society & Computers PowerPoint
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Chapter © 2010 South-Western, Cengage Learning Federal Income Tax Our Tax System Filing Tax Returns 7.
Social Impacts of Data Mining 2004/12/30. Outline Is data mining a hype or a persistent growing business? Is data mining merely managers’ business or.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
1Copyright © 2007 by Saunders, an imprint of Elsevier Inc. All rights reserved. Bank Deposits Prepared at the end of each day Prepared at the end of each.
Identity Theft It’s a crime!
Role of the Legal System
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
– Communication Technology in a Changing World
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Introduction to Health Privacy
Privacy Protection for Social Network Services
Presentation transcript:

Kristen Lockhart COMPUTER PRIVACY & PERSONAL INFORMATION What types of information do companies have and share about YOU?

Why this presentation is important to YOU.  The more you know how your personal information is collected, maintained, and used, the better prepared you will be in protecting your personal information. OBJECTIVE:  This presentation will help you understand the extent and risks associated with databases that contain personal information about you

Who knows what about YOU?  The IRS keeps records of your earnings, taxes, deductions and employment. Your IRS data must be available to certain government agencies.  Education data is what you’ve accomplished during your years in school—grades, roommate preferences and disciplinary actions

Who knows what about YOU?  Driver and Crime data includes very personal descriptive data, such as sex, age, height, weight, color of eyes and hair, arrests, fines and traffic offenses. Your information is available to law enforcement personnel.  Lifestyle data: Whenever you pay bills on-line, respond to opinion polls and shop; a Profile can be created on you

Profiling  Profiling is a process where companies examine and evaluate on-line activities and interests to create a comprehensive personal profile. Example: A prediction of how you dress can be determined by knowing the type of clothing stores you shop at. 291

How might your information be abused?  Many companies have been formed strictly to sell information about people—including addresses.  In numerous situations, people aren’t suspicious that their personal information is being used or sold.  Personal information for profit is growing so rapidly that the government is having a difficult time keeping up with cases of abuse. 292

How can you protect yourself? BAD NEWS:  At present, the federal laws give individuals little protection.  You are not allowed to choose who sees your information.  In most cases you are not allowed to view, remove, or change information on some databases. GOOD NEWS:  Laws are being put in place that will provide better protection of personal information. Example: In the future companies must get your permission before they can sell any of your personal information (name, address, telephone number and social security number)

“SO…NOW YOU KNOW”  ALWAYS BE AWARE OF WHAT YOU DO ON-LINE, BECAUSE THERE IS ALWAYS EYES ON YOUR EVERY MOVES!

References  Computers Information Technology in Perspective by Long and Long  The Anonymizer Protecting User Privacy on the Web by Justin Boyan