Download presentation
Presentation is loading. Please wait.
Published byBrendan Haworth Modified over 9 years ago
1
Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme
2
Topics Privacy Enablers of Privacy Invasion Methods of Protection Government Regulation
3
Privacy on the WEB Is there really any? “You’ve got mail”, but is it secure? Does a company have the right to profile your Internet use? Do you have the right to know if your are being “watched”? Do others have the right to gather personal data without your knowledge or permission?
4
Privacy – Intro. Invasion of privacy intentional intrusion upon the solitude or seclusion of another that is highly offensive to a reasonable person (Webster’s) Privacy on the WEB Refers to security and confidentiality of personal and/or financial information
5
Privacy – Intro. Forbes article –56% of Americans are “very concerned” –86% of computer user believe business should get explicit permission before collecting data –Expect federal and state regulatory agencies to take notice Forbes ASAP February 19,2001
6
Why the recent concern? Profiling – on-line retailers collect data to target individual preferences for direct solicitation Selling of marketing lists Data has always been available but not with the current easy of access
7
Privacy Personal –Anonymity is still widespread on the Internet but information is collected Workplace –66% of 500 firms conduct electronic surveillance –27% monitor email Consumer Relationships –Collection of personal information for profiling
8
What has enabled the invasion? Wide spread use of the Internet & E-mail Cooperative Browsers Cookies –Track personal usage –Anonymous or customized –Persistent or Session
9
What has enabled the invasion? WEB Banners –Can use cookies –Setup on many sites to track patterns WEB Bugs –1-pixel gif file setup on the WEB page or sent via email –Undetectable by ant-cookie filters –Can run executable code
10
What has enabled the invasion? Spyware –Email monitoring –WEB use monitoring –Data interception –Email interception Naïve Users –High-speed Internet access –Wireless Internet access –Free Internet access
11
What has enabled the invasion? Inadequate Business Practices –Outdated email protocols –Trusted networks –Poor user maintenance on unused accounts –Instant messaging –Inadequate firewalls
12
What has enabled the invasion? Vendor – Back Doors Code written into programs to allow the developer of the software to circumvent security Examples –RealJukebox –Alexa –Cuecat –Microsoft –Barbie
13
Has your privacy been Compromised? 411 Locate, InfoUSA, 555-1212 –List phone numbers and email addresses Bigfoot –Email addresses YBLost, Stalker Site –Links to just about anything
14
Methods of Protection Individual –Anonymity –Education –Protection software HW & SW –VPN (Virtual Private Network) –Encryption
15
Methods of Protection Businesses –Good security –Control email –Monitor systems –Corporate Privacy Policies Cybersurance
16
Government Regulation Carnivore –FBI email monitoring Federal Trade Commission –FTC Fair Information Practices Notice Choice Access Security
17
Government Regulation USA does not have a comprehensive e- commerce privacy bill Children's Online Privacy Protection Act –13 years and younger –Parental consent to collect information –Refrain from re-distribution of identifiable information –Best effort to discourage posting of contact information –No special offers
18
Government Regulation Privacy Bills Currently in Congress –Spyware Control and Privacy Protection Act –Electronic Privacy Protection Act –Consumer Online Privacy and Disclosure Act –Consumer Internet Privacy Enhancement Act
19
Government Regulation Non-Government Privacy Organizations –CERT Coordination Center –Online Privacy Alliance –Platform for Privacy Preferences Project (P3P)
20
Government Regulation International : European Union –1998 law requiring personal information on the Internet to be: Accurate Current Gathered fairly and lawfully Processed and used for a specified legitimate purpose Kept no longer than deemed necessary;y to fulfill the stated purpose
21
Conclusion Need for strong laws Consumers need to be fully informed and educated Privacy Policies Tenacious in fighting for privacy
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.