Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 2- Privacy and Cyberspace Kaizen 2006 - 2007 MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.

Similar presentations


Presentation on theme: "Unit 2- Privacy and Cyberspace Kaizen 2006 - 2007 MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online."— Presentation transcript:

1 Unit 2- Privacy and Cyberspace Kaizen 2006 - 2007 MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online Privacy at Work Five Fair Information Practices Important Federal Privacy Laws

2 Objectives Privacy and Cyberspace Kaizen 2006 - 2007 1.Explain terms used in privacy and cyberspace. 2.Identify hidden information technologies used in the Internet. 3.Explain issues regarding privacy at work and things to remember at work. 4.Identify existing legislation and laws regarding privacy.

3 COMPUTERS IN YOUR FUTURE 2004 COMPUTERS IN YOUR FUTURE 2004 by Bryan Pfaffenberger and Bill Daley TThe threat of privacy due to the sale of sensitive personal information on the Internet DDefinition of anonymity and how it is abused by users TTechnological developments and how they are eroding privacy and anonymity RReasons why employers are monitoring employees’ computer usage HHow public-key encryption threatens U.S. security, both foreign and domestic TThe U.S. government’s proposed key recovery plan and how it threatens the growth of Internet commerce Kaizen 2006 - 2007 Privacy and Cyberspace

4 Identity Theft Identity theft is one of the fastest growing crimes in the United States and Canada. Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account. Examples of information needed are name, address, social security number, and other personal information. Laws limit liability to $50 for each fraudulent charge. An individual’s credit report is affected by identity theft. Kaizen 2006 - 2007 Privacy and Cyberspace

5 Privacy in Cyberspace Privacy refers to an individual’s ability to restrict the collection, use, and sale of confidential personal information. The Internet is eroding privacy through the selling of information collected through registration forms on Web sites. Few laws regulate selling personal information. Technology is not only making it easier to invade someone’s privacy, but it is also providing a means to protect against privacy invasion. Kaizen 2006 - 2007 Privacy and Cyberspace

6 Encryption Encryption refers to the coding of information so that it is only readable by the intended recipient. It is used in electronic commerce transactions and e-mail. Encryption provides a way to use the Internet in a safe, secure way. It could be used misused by criminals and terrorists. Kaizen 2006 - 2007 Privacy and Cyberspace

7 Anonymity Anonymity is the ability to convey a message without disclosing one’s identity. It can be abused because it frees people from accountability. Defamation is the act of injuring someone’s reputation by making false statements. Libel occurs when malicious statements are made in writing. Kaizen 2006 - 2007 Privacy and Cyberspace

8 How Is Technology Eroding Privacy and Anonymity? Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view. Hidden information technologies used on the Internet are: – Cookies – Global Unique Identifiers (GUIDs) Kaizen 2006 - 2007 Privacy and Cyberspace

9 Cookies Cookies are small files that are written to an individual’s hard drive whenever a Web site is visited. Legitimate purposes of cookies include recording information for future use. Example: retail sites using “shopping carts.” Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on Web sites based on those actions. Kaizen 2006 - 2007 Privacy and Cyberspace

10 Example of Cookies Kaizen 2006 - 2007 Privacy and Cyberspace

11 Global Unique Identifiers (GUIDs) Kaizen 2006 - 2007 A GUID is a unique identification number generated by hardware or a program. It is used to send user information back to the site that created it. Privacy and Cyberspace

12 Protecting Your Privacy Online Kaizen 2006 - 2007 1.Browse anonymously– Use Web sites such as www.anonymizer.com or www.the-cloak.com.www.anonymizer.com www.the-cloak.com 2.Disable cookies on your Web browser. 3.Use free e-mail addresses for information placed on Web sites. 4.Don’t divulge personal information to online strangers. 5.Make sure registration forms have a privacy policy statement. Privacy and Cyberspace

13 Privacy at Work Kaizen 2006 - 2007 Employees are given e-mail and Internet access at work. Companies are concerned about employees’ wasting time surfing the net and sending personal e-mail. Three-quarters of large corporations monitor employees’ phone calls, e-mail, Web browsing habits, and computer files. Laws do not protect employees from being monitored. Privacy and Cyberspace

14 Things to Remember at Work Kaizen 2006 - 2007 1.Do not use the employer’s phone for personal calls. 2.Do not use the employer’s e- mail for personal messages. 3.Assume everything you do at work is being monitored. Privacy and Cyberspace

15 The Five Fair Information and Important Federal Privacy Laws Kaizen 2006 - 2007 - The Fair Information Practices were developed by the U.S. Department of Health, Education, and Welfare in the early 1970s. They have been adopted by many public and private organizations since Privacy and Cyberspace

16 Fair Information Practices Kaizen 2006 - 2007 1.There must be no personal data record-keeping systems whose existence is a secret from the general public. 2.People have the right to access, inspect, review, and amend data about them that is kept in an information system. Privacy and Cyberspace

17 Fair Information Practices Kaizen 2006 - 2007 3. There must be no use of personal information for purposes other than those for which it was gathered without prior consent. 4. Managers of systems are responsible and should be held accountable and liable for the reliability and security of the systems under their control, as well as for many damage done by those systems. Privacy and Cyberspace

18 Fair Information Practices Kaizen 2006 - 2007 5. Governments have the right to intervene in the information relationships among private parties to protect the privacy of individuals. Privacy and Cyberspace

19 Important Federal Privacy Laws Kaizen 2006 - 2007 Freedom of Information Act (1970): Gives you the right to look at data concerning you that is stored by the federal government. A drawback is that sometimes a lawsuit is necessary to pry it loose. Privacy and Cyberspace

20 Important Federal Privacy Laws Kaizen 2006 - 2007 Fair Credit Reporting Act (1970): Bars credit agencies from sharing credit information with anyone but authorized customers. Gives you the right to review and correct your records and to be notified of credit investigations for insurance employment. A drawback is that credit agencies may share information with anyone that reasonably believe has a “legitimate business need.” Legitimate is not defined. Privacy and Cyberspace

21 Important Federal Privacy Laws Kaizen 2006 - 2007 Privacy Act (1974): Prohibits federal information collected about you for one purpose from being used for a different purpose. Allows the right to inspect and correct records. A drawback is that exceptions written into the law allow federal agencies to share information anyway. Privacy and Cyberspace

22 Important Federal Privacy Laws Kaizen 2006 - 2007 Family Educational Rights and Privacy Act (1978): Sets strict procedures that federal agencies must follow when seeking to examine customer records in bank; regulates financial industry’s use of personal financial records. A drawback is that the law does not cover state and local governments. Privacy and Cyberspace

23 Important Federal Privacy Laws Kaizen 2006 - 2007 Privacy Protection Act (1980): Prohibits agents of federal government from making unannounced searches of press offices if no one there is suspected of a crime. Privacy and Cyberspace

24 Important Federal Privacy Laws Kaizen 2006 - 2007 Cable Communication Policy Act (1984): Restricts cable companies in the collection and sharing of information about their customers. Privacy and Cyberspace

25 Important Federal Privacy Laws Kaizen 2006 - 2007 Computer Fraud and Abuse Act (1986): Makes eavesdropping on private conversations illegal without a court order. Privacy and Cyberspace

26 Important Federal Privacy Laws Kaizen 2006 - 2007 Computer Security Act (1987): Makes actions that affect the security of computer files and telecommunications illegal. Privacy and Cyberspace

27 Important Federal Privacy Laws Kaizen 2006 - 2007 Computer Matching and Privacy Protection Act (1998): Regulates computer matching of federal data; allows individual a chance to respond before government takes adverse actions against them. A drawback is that many possible computer matches are not affected, such as those done for law-enforcement or tax reasons. Privacy and Cyberspace

28 Important Federal Privacy Laws Kaizen 2006 - 2007 Video Privacy Protection Act (1988): Prevents retailers from disclosing video-rental records without the customer’s consent or a court order. Privacy and Cyberspace

29 Summary Kaizen 2006 - 2007 1.Sensitive personal information is for sale on the Internet. 2.Web sites collect personal information without informing their visitors. 3.Anonymity is the ability to convey a message without disclosing one’s identity. 4.Cookies provide a way for Web sites to record one’s browsing activities. 5.GUIDs make anonymous usage of the Internet difficult. 6.Many employers monitor their employees phone calls, e-mail, Web browsing habits, and computer files. Privacy and Cyberspace

30 Evaluation What does Big Brother term mean? What are other pre-cautionary measures to keep one’s privacy? What can you say about Global Positioning System or the GPS? Case Analysis Kaizen 2006 - 2007 Privacy and Cyberspace


Download ppt "Unit 2- Privacy and Cyberspace Kaizen 2006 - 2007 MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online."

Similar presentations


Ads by Google