Presentation on theme: "M ANAGING Y OUR P ERSONAL D ATA Keeping Personal Data Private."— Presentation transcript:
M ANAGING Y OUR P ERSONAL D ATA Keeping Personal Data Private
TOPICS Do I Still Have Any Personal Privacy? Data Brokers Your Car is Spying On You! Medical Identity Theft Don’t Bury You Digital Assets Grifters and Giving The People Who Know Everything (NSA) What Can You Do?
W HAT D ATA C AN B E C OMPROMISED ? Private Data Sources Car Data Credit Cards Phones Marketing Data Identities Charitable Contributions Medical Records Digital Assets After Death Bank Records NSA Personal Surveillance Social Media
P ERSONAL P RIVACY Some Startling Facts Lawyers use social media to weed out jurors that could potentially decide against their clients Combines are feeding farming data such as soil conditions & crop yields to commodity speculators Schools routinely transfer student’s data including lunchroom purchases, medical information, essays and transcripts to data aggregators for marketing The amount of sensitive data available in public records is staggering
Criminal Records Marriage Licenses Death Notices Court Dockets Business Licenses Real Estate Appraisals Voter Registrations Sex Offender List Military Records Delinquent Parents Reverse Phone Numbers Genealogical Records Obituaries Property Deeds Professional Licenses Reverse Addresses Divorce Records Data Available in Public Records Motor Vehicle Records Census Records Change of Address
W HAT IS A D ATA B ROKER ? Data Brokers collect (steal) information about individuals from public records and private sources including user-contributed material on social networking sites such as Facebook, Twitter and LinkedIn, consumer purchase histories, credit & debit card transactions, health care records, phone apps and web browsing histories and then sell the information to marketing & advertising firms
W HAT DO B ROKER ’ S S ELL ? Individual profiles, such as a person's age, race, gender, height, weight, marital status, religious & political affiliations, occupation, income, net worth, home ownership, investment habits, product preferences, hobbies, travel habits and health-related interests.
1. Visit a website and tracking files record your online activities 2. Tracking companies record your searches and build a profile of your interests 3. Tracking Co. sells your information to Data Broker 4 Your profile is linked to other sources of your personal data 5. Your profile is put on data exchange for purchase 6. Profile sold to Advertisers looking for consumers with your interests
DEPARTMENT STORE Stop to browse and a digital coupon appears on your phone GROCERY STORE An app reminds you of grocery items on sale and on your shopping list SPORTS STADIUM App directs you to concession stand for your favorite take out WINDOW SHOPPING Based on how long you linger a “special offer” for the item is sent to your phone ELECTRONICS STORE Product Info immediately available TICKET SALES Send you to the shortest line Real-Time Apps
YOU ARE THE PRODUCT! “ You are what is being bought and sold. Facebook’s users are paying with their personal information instead of cash.” “It’s like World War Z(uckerberg)….There are still people here on God’s green earth that can conduct their social lives without being marketed to. Can’t we leave them alone?” Article about Mark Zuckerberg in Time Magazine
SUNDAY TRIBUNE 12/7/14 “A lot of tech companies are geniuses at getting people to give them enormously personal information by clicking through a contract nobody reads and doing with it pretty much what they will.”
P HONE D ATA Real-time bidding for your phone data Crowd sourced through apps Grouped into profiles Many apps access your calendar and GPS location Don’t make your phone your ‘Best Friend” Sharing confidences with – Phone’s Manufacturer Phone’s Operating System Wireless Carrier App Developers Mobile Advertisers
W HAT S HOULD YOU D O ? Use Privacy Mgr. with a Caller Id Choose Apps from a reliable source Don’t click on pop-up links Could download malicious software Disable location tracking except when needed Driving directions Finding a location Set a strong password in case of theft Set your smartphone to delete all data Don’t store sensitive data like pins or passwords Buy a phone security app (some are free)
How Your Car Spies On You
License Plate Scans GPS Location Data Vehicle Telematics Cell Phone Tracking Traffic Cameras How Your Car Spies On You Electronic Data Recorder
L ICENSE P LATE S CANS A scanner can take 2,000 images per second Scanning is not targeted Original purpose was find stolen vehicle Same vehicles show up multiple times Locations can be plotted on a map Few standards or policies Police can track anyone (spouse, boss, rival, etc.) “Only limited by officer’s imagination” Data is stored indefinitely in most cases Shared with Federal authorities
T ELEMATICS In most cars since 2011 Maps speed, braking, geographic info Date & Time of incident Seat belt and air bag status Insurance companies encouraging the use Clever names such as Drivewise and Snapshot Expectation of lower rates by consumer Can be used against you in an accident Insurance companies legal access not standard Total Loss? – Insurance Co. owns car
C ELL P HONE T RACKING Apps & GPS track your driving habits Info sold to marketing people Government uses Stingray Technology Cellphone location & Call logs Can decrypt data Parent or Spouse can track you Sold as “security” feature “Teen-Safe”, “Mobile Spy”, “Spy Phone” Employers can track employee’s company cell Is your employee really in a traffic jam? Tracking devices as little as $27.00
Medical Identity Theft
MEDICAL IDENTITY THEFT Theft of health care goods or services Largest type of identity theft – 43% Hospital treatment Obtain Prescription drugs (Valium, OxyContin, etc.) Sell patient info Fraudulently bill insurance companies Used to obtain Medicare benefits Blackmail
H OW IS M EDICAL D ATA O BTAINED ? Equipment Theft Stolen laptops Improper Disposal Records not removed from obsolete computers Written files not shredded Hacking Set up fake provider identification Bill Medicare Use Social Security Numbers to obtain Credit Cards Unauthorized Access Insiders in Doctor or Hospital Offices
Y OUR B ODY O NLINE 24/7 The Federal Trade Commission is worried that sensitive data collected on Smart watches and Health trackers could be sold to marketers. The Apple Watch will be able to track a user's pulse and can potentially store health information. Wearable's will make your physical self visible to the virtual world in the form of information, it will be copied and circulated, it will be used to track you and market to you. It will be bought and sold and leaked.
M EDICAL I DENTITY T HEFT - $60 B ILLION P ROSECUTED T HEFT - $6 B ILLION Matthew Kolodesh submitted claims of $16.2 million for home hospice services - sold identities to other companies. 176 months prison Margarita Grishkoff found guilty of submitting $28.3 million fraudulent claims using patient recruiters and clinic owners to obtain patient information. 70 months prison Dr. Robert Glazer, signed prescriptions and documents for unnecessary home health services $33 million – sold info to other supply companies
C ONSEQUENCES OF M EDICAL T HEFT Called “the privacy crime that can kill” Incorrect records lead to incorrect treatment Insurance Benefits may be maxed out Fraudulent Billing Insured may not be aware Blackmail of Political or Celebrity Figures Depression, AIDS, Abortion, Venereal Disease Genetic Testing Revealed Life & Disability Insurance, Long-Term Care
Y OUR S ENSITIVE M EDICAL I NFORMATION Capture your “interests” in health conditions Track internet searches What you purchase Insurance Companies “share” data with others Insurance brokers Banks & Reinsurers Business Partners Government Agencies Law Enforcement Regulatory N.S.A.
Protecting Your Digital Assets
D ON ’ T B URY Y OUR A SSETS Digital Assets Intellectual Property & Digital Contracts PayPal Account Medical Files Financial Information Social Network Accounts Downloads of iTunes, Netflix Kindle Books Pictures & Digital Photo Albums Instructive Memos & Blogs Domain Registrations Recipes, Poems, School Essays Family Tree Points from Hotel Stays, Airline Miles, Store Credits Stocks and Commodity Trading Accounts
O BTAINING ACCESS TO AN ACCOUNT Facebook Family can request an account be “memorialized” Will allow download with prior consent of deceased Will not turn over account or password to family Yahoo Emails are private no matter what! Can ask accounts be deleted Twitter Provide info to have account “deactivated” Need signed statement from executor
O BTAINING ACCESS TO AN ACCOUNT Amazon (Kindle) Can will books (if not licensed) iTunes You don’t actually own the song Licensed to download during your lifetime Virtual Games (Farmville, World of Warcraft) Accounts cannot be transferred Avatars cannot be sold Google 2-step process for Inactive Account Manager Can designate up to 10 people Can ask to have content deleted
O BTAINING ACCESS TO AN ACCOUNT Federal Law May Prevent Access May violate Computer Fraud & Abuse Act Unauthorized access to computers Stored Communications Act 4 th Amendment Privacy Protection applies to information stored online ISPs forbidden to divulge the contents of any communication Intent of Act was to prevent hacking but used to prevent relatives from accessing accounts
P REPARE A WILL OR POWER OF ATTORNEY Give Specific Instructions “My spouse/parents can/cannot read my emails” Designate which person(s) should take charge Who should manage your online accounts List accounts you want deleted Many accounts have value Laws Vary By State Consult An Attorney
THINGS TO CONSIDER Keep An Inventory of What You Have Update Inventory Periodically Commercial Online Sites Research Your State’s Laws Identify Person in Charge Someone You Trust Identify Things to be Deleted Keep List of Usernames & Passwords Separate Keep in Safe Place Average Person has 25 Password-Protected Accounts Review Terms of Service Agreements Every Vendor Has Own Policies
N O W ILL ? You Won’t Outlive Your Digital Life Come to Grips with Who Will Inherit Delete Old or Unwanted Files/Bills/Tax Returns Not Everything Has Value More in Cyberspace, More for Family to Sort Thru Download Online Account Info Create Own Backup Offsite Have a Central Repository Commercial Companies will Download For You Legacy Locker, Keeper, Sourceforge, My Webwill
T HE J OY OF G IVING Don’t let “grifters” spoil your holiday giving 50 worst charities give less than 4% to programs Cyber-hustlers create bogus charities Scammers follow disasters –and the money Be skeptical of email solicitations Most legitimate charities do not use email Links within emails may lead to viruses Often pictures of animals used to “soften” you up
M AKE THE MOST OF YOUR DONATION $45 Billion donated each year in America 2 million registered non-profits Give locally National donations under $25 barely break-even Information is then sold to other charities Send your donation directly to the charity Ask if your contribution is tax deductible Legitimate charities give financial info Don’t give out any personal information
National Security Agency
C.I.A. VS N.S.A. (L INES HAVE BLURRED ) CIA gathers intelligence involving people (HUMINT) Gather’s information about foreign governments, corporations, and individuals Counter-terrorism Covert paramilitary operation NSA specializes in signals intelligence (SIGINT) Largest employer of Mathematicians in the world Decoding, translation & analysis of data Counter-intelligence & cyber-terrorism
C OLLECT IT ALL – N. S. A. “ SLOGAN ” NSA has infiltrated video games, cell phone apps, social media, encrypted material, emails Challenges basic assumptions about what is private Is this the appropriate strategy? Technology allows very detailed data Will become more powerful and pervasive Is this right in a democratic society? Are we “sleepwalking” into abandoning our privacy?
P UBLIC ’ S ATTITUDE ON N.S.A. S PYING Group 1 – Don’t Care Group 2 – Encourage the N.S.A. Group 3 – Actively fighting to reverse NSA ability to collect, analyze & store data about citizens and other governments
NSA – E XPLOITING V ULNERABILITIES Thousands of Vulnerabilities Large-scale graph analysis Too much trust in developers Heartbleed Other known “bugs” Attacks encryption Create weaknesses Open “back doors”
T HE “N EW ” NSA Transfer storage of phone data Now phone companies will hold info Only to placate us? Must obtain judge’s approval to access phone records FISA Court (Federal Intelligence Surveillance) Authorizes government requests for wiretapping Only meant for “foreign intelligence purposes” Never refuses a request from the NSA Broad authority to intercept emails undiminished
D O W E N EED N EW L AWS ?? Signals are everywhere and the NSA believes the public has no right to keep them private Collects hundreds of millions address books daily 5 billion records per day on whereabouts of cell phones & their users Need government to control invasion of privacy Hodge-podge of laws by state legislatures No uniform enforcement ACLU fighting to stop unauthorized data collection
WHAT CAN YOU DO?
THINGS YOU SHOULD DO Monitor your credit on all 3 credit bureaus Never subscribe to unsolicited credit cards Close out any old accounts not in use Check your online statements regularly Limit your use of debit cards Can’t be reimbursed as easily as credit cards Easier to hack Use a Strong Password Most common password is admin Second is 1234 Limit the info posted on social networks Don’t disclose family names
M ORE T HINGS T O D O Never open an email from an unknown source Make a list of your digital assets Do you need them in a will? Can your heirs find your passwords? Access your medical records Make sure they are correct Sign up for Do-Not-Call List Use Lockout feature on your SmartPhone Only donate to charities you know And check these out at Charity Navigator
THINGS YOU SHOULD (N OT ) DO Don’t give your Zip Code at stores Can be combined with Credit Card to identify you Don’t give your Credit Card info to “Take Out Restaurants” Do you want some 17 year old kid to have it? Don’t carry your Social Security Card And don’t give it over the phone or to a business except a financial institution
C ONCLUSION Our Personal Privacy has been invaded We can’t stop everything but can limit the amount of data available to criminals and data brokers Don’t worry so much about the N.S.A. worry about the data brokers and tracking software We need to write our legislators demanding stronger laws against selling our data
Cathy Nolan Ashley Wilson email@example.com Wilsonsport17@gmail.com