LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Soft Law in China’s regulation of the Internet Professor of law Research Center for Cyber-law Beijing University of Posts & Telecommunications Deliang.
Breaking Trust On The Internet
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Internet Phishing Not the kind of Fishing you are used to.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
HIPAA Security Standards What’s happening in your office?
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Unit 28- Website Development Assignment 1- THEORY P3
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Marketing of Information Security Products. The business case for Information Security Management.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Internet Security for Small & Medium Business Week 6
Security and Privacy Strategic Global Partners, LLC.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Module 6 Planning and Deploying Messaging Security.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Protecting Students on the School Computer Network Enfield High School.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Squalicum High School Computer Network Student Use Guidelines.
Lesson 15 : Networks And The Internet
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Understand Internet Security LESSON Security Fundamentals.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Security and Ethics Safeguards and Codes of Conduct.
PUBLISHING & COLLABORATION. SOCIAL NETWORKING ▪ Web sites such as Facebook, Twitter and LinkedIn are generally the first names people associate with social.
WHAT IS INTERNET?.  Today the internet offers the opportunity to access to any information, to correspond with someone who has an account, or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Soft Law in China’s regulation of the Internet
2016 Cybersecurity Law If any one of these describes your company
Section 12.1 Section 12.2 Discuss the functions of a Web site
Chapter 17 Risks, Security and Disaster Recovery
Legal and Ethical Issues in E-Commerce
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
is not secure is not secure..
Mobile Registration App Training Guide for OPO Staffers
Presentation transcript:

LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA

Main Topics  What kind of personal information do internet activities reveal  Legal environment of privacy protection in Bulgaria  Problems  Good practices  Technological aspects

What kind of internet activities do personal information reveal  Registration forms / On-line application forms / On-line surveys / Interest lists / subscription forms  Signing up for internet service   Browsing the internet / Search engines  Interactive use (Instant Messengers; Internet social networking sites)  Cookies / Web beacons  Personal websites and Blogs  Managing financial accounts and on-line bill payments

Personal data protection as a part of the right to privacy Physical Inviolability Confidentiality of correspondence Privacy of the private property Inviolability of personal information

Legal Environment Of Privacy Protection The personal data shall be…. Processes lawfully and in good faith Collected for concrete, precisely defined and lawful purposes Proportional, related to and non-exceeding the purposes, which they are processed for Precise and in case of necessity to be updated Deleted or corrected where is found that they are incorrect or not proportional Maintained in a status, which allows identification of the respective natural persons for a period not longer for the purposes, for which these data is processed

Legal Environment Of Privacy Protection  The Rights, Guaranteed By The Law Right to access to personal data related to natural person Right at any time to require from the administrator of personal data confirmation The right at any time to require from the administrator to delete, correct or block his/her personal data The right to object before the administrator against the processing of his/her personal data

Problems  Legal and technical protection of internet users’ privacy is at present insufficient  Lack of overall responsibility on the Internet assigned to a certain entity  Industry self-regulation is not working

Good practices to follow  General Terms  “Privacy Policy” Section  Taking part in exchange programs  Requirements for log-in  Password protection sections  Opt-in/opt-out sections

Good Practices  Netiquette - goals: Protection of customer rights and establishment of prerequisites for strengthening the trust of users Establishment of rules that apply to all, safeguarding the use of personal data Establishment of working rules that meet the particular needs of the data controllers Filling the gaps in existing legislation thus reducing the costs of its application Elaboration of Codes of conduct

Good Practices  Elaboration of Codes of conduct: Might be part of the general rules of conduct adopted by a representative organizations applicable in the respective branch of industry or profession, or Could be adopted as a separate document Functional analysis of the work of the respective business entities Identification of typical cases of collection and processing of personal data

Technological Aspects  To develop technical means to improve the users privacy on the Net  To develop design principles for information and communications technology and multimedia hard- and software  Implementing of the Directive for electronic sign  Measures against unauthorized access to information, undertaken by the web service providers  For corporate security Domain Controller, DNS, Proxy Server (URL Filters, Content protection, Anti Virus, Anti Spam, Data Security), encryption technologies ("SSL" encryption certificate)