Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Yourself and Your Information

Similar presentations


Presentation on theme: "Protecting Yourself and Your Information"— Presentation transcript:

1 Protecting Yourself and Your Information
Privacy Protecting Yourself and Your Information

2 Privacy and the Courts 4th Amendment “Reasonable Search and Seizure”
“Reasonable Expectation of Privacy” Examples?

3 Courts, Technology and Searches
City of Ontario v. Quon Supreme Court (2010) Narrow Decision City could look at messages sent from a pager owned by the city by a city employee Not reasonable expectation of privacy What might this mean when using school technology?

4 Courts, Technology and Searches
Riley v. California Supreme Court (2014) Search Incident to Arrest Need a warrant before searching your phone Contains so much of our personal information Not a dangerous implement

5 Courts, Technology and Searches
United States v. Davis 11th Circuit Court of Appeals (2014) Cell phone tower location data requires a warrant Based on reasonable expectation of privacy and lack of knowledge that data is shared What’s this mean for location data when shared with companies through apps?

6 Not Just The Government
What are some other entities that can violate our privacy? Companies Hackers Other people in public

7 Packet Collection WireShark
Allows people to collect packets on a network What’s this mean on public Wi-Fi? Demonstration

8 Break Into Groups

9 Protection On Public Wi-Fi
Make sure you’re at a site with HTTPS Use a VPN Service Make sure your computer isn’t automatically sharing information with other computers on network (like you might do at home) Turn Wi-Fi off when you’re not using it Use tethering from your phone

10 Protection When In Customs
Lower expectation of privacy Don’t use thumbprint or retinal scan to unlock phone or computer Have computer and phone in mode that requires a password They can still take your computer and image the hard drive

11 Protection From ISP Recent bill allowing your internet service provider to sell your browsing history RuinMyHistory Use a VPN Tor

12 Protection On Social Media
Be careful about what you post Don’t post items that are commonly used to recover passwords Change your privacy settings

13 Password Best Practices
Create different passwords for each account Use combinations of uppercase, lowercase, numbers, and symbols Don’t use common words Don’t use dates, SSN, names of pets, etc. Consider using a password storage program

14 What else do you want to talk about?

15 Thank You


Download ppt "Protecting Yourself and Your Information"

Similar presentations


Ads by Google