How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors.

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Part I: Making Good Online Choices
Privacy: Facebook, Twitter
DIGITAL FOOTPRINTS What are we really sharing online? Dan Heath - Grwp Llandrillo-Menai.
Click Below to Begin the Quiz
This week is anti-bullying week.
Digital Footprints Where have you been? Where are you going?
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
Social Networking and YOU A presentation for the SDC Carey Larson Michael Moss.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
How To Protect Your Privacy and Avoid Identity Theft Online.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Awareness raising session for Parents and Carers.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
10 Privacy Settings Every Facebook User Should Know.
How Much Privacy Can We Really Expect? By: Terence Craig, CEO, PatternBuilders Mary Ludloff, VP, Marketing, PatternBuilders.
The market is more crowded than ever. Worse, people are more distracted than ever. To succeed, you need a platform. Source: Michael Hyatt.
Controlling Your Social Networking Privacy Settings Stay safe online!
 Facebook  Twitter  MySpace  Windows LiveSpace.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Do pictures always give truthful information? Can publishing it be hurtful??
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
SOCIAL MEDIA CLINICS POCKLINGTON SCHOOL. TWITTER You don’t have to put your age when you register! SHOULD BE 13! It is by no means private! Do you know.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Is Facebook worth it?  With 180,000,000 users, the U.S. ranks #1 in all countries.  That is just over 70% of the Online population.  In short………..
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Protecting Yourself on Social Media – Friend Requests And Messages.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
Chloe Hutton. Mobile phones are a very popular piece of technology and its main use is to contact people either through ringing people up or texting.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Social Networks are a website or other application which enables users to communicate with each other by posting information, comments, messages, images,
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Online Ad Management & Your New Marketing Secret Weapon.
This presentation deals with any kind of information you put online. It relates to e- mails, texts, social networking and the sharing of pictures and.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
ONLINE DATING SAFETY TIPS EVERY WOMAN SHOULD KNOW AND FOLLOW.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
SafeSurfing Module 5.
Google Apps for Education
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Privacy Online.
Appropriate Use of Technology
My Digital Footprint BY:CHRISTINA SATO.
Anti bullying Week VMG What does bullying mean to you?
SafeSurfing Module 5 September 2016.
Keep it Secret! Share with Care Lesson 1: Share with Care pgs
Helping your children to stay safe online
SOCIAL RESPONSIBILITY
MIND YOUR CLOTHES!.
One account for all your learning needs
Campbell County Middle School
Being Aware of What You Share
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Presentation transcript:

How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors

Before We Begin: A Disclaimer While the authors believe that privacy, as we used to know it, is dead, a funny thing happened as we worked on this session… There were some pieces of information we just were not comfortable with. Go figure!

Welcome to the Digital World! Where everybody knows your name (and then some)….

Meet Mary… You may know her from LinkedIn… Oh and she might be watching you watch her….

Here She Is On Vizify

Here’s What She Talks About On Twitter

When You Google Her, This Is What You’ll See Not many images of her—that’s because she does not allow family and friends to upload photos of her and insists on no tagging. Oh, and she doesn’t have a Facebook page—what a luddite!

Here’s What Spokeo Has to Say About Her Full disclosure: This is not Mary’s current address, but gender, age (redacted), and birthday (redacted) are all correct.

Oh & Here are Some Demographics on Her Neighborhood And if you wanted, you could drill down on these addresses and pull up “similar” information on anyone in the neighborhood.

Here’s What Intelius Had to Say There’s other stuff to see here, but note the redactions (done by us). And keep in mind this is all publicly available information.

Here’s Some of What Acxiom Knows About 190 Million of Us

Online or Offline, We Are All Being Tracked

Data Collectors are On the Rise  There are the “giants” like Google, Facebook, and Twitter…  There are organizations and agencies like the Florida DMV…  There are “Mom & Pop” operations that specialize … Our personal information is a commodity that supports thriving business models—from tens of billions down to hundreds and thousands of dollars.

And Its Uses Are Infinite Target knows when we’re pregnant. But is careful about it to prevent “creepiness factor.” Welcome to targeted advertising. Political campaigns are mining our information. Buying “information” from Acxiom, Experian, & Equifax. Asking supporters for access to their Facebook accounts & other social networks. Federal police can access our accounts in real-time. No warrants required. Same goes for our and cell phones.

Three things we know for sure.

1. If you want it kept private, keep it off the ‘Net and your devices.

2. At some point in your life, you will be the victim of a data security or privacy breach—most likely multiple times.

3. At some point in your company’s life, they will experience a data security or privacy breach—most likely multiple times.

Our Advice to Consumers Be mindful of what information you share and who you “choose” to share it with. Read data collection, usage, and retention policies. If you don’t like the policy don’t share. Regularly Google and Spokeo yourself to see what information is currently out there about you. Use privacy resources to monitor and manage exposure.

Our Advice to Business Players—The 4 B’s Know your regulatory environment: U.S.: more than 30 federal statutes, 100 state regulations for data security and privacy. EU and other countries: far more restrictive so think global. Pending legislation in all regions with more rigorous controls. Engage with a law firm that specializes in privacy, security, technology and IP. Share with your customers/consumers: Share what data you collect, how you use it, and whether you sell it to third parties. Be explicit about data retention. Be explicit about what you can protect and what you cannot (anti-terrorism laws). Breaches are inevitable: When things go wrong know how you are going to deal with them. Get a team and process in place and be ready to respond. Breaches are inevitable: When things go wrong know how you are going to deal with them. Get a team and process in place and be ready to respond.

Our question for you: How much privacy are you willing to give up for the many “conveniences” of the digital age?

Questions—We Might Have Some Answers! Contact Us Terence: Mary: Blog blog.patternbuilders.com Corporate Site Privacy & Big Data Resource Page