Presentation is loading. Please wait.

Presentation is loading. Please wait.

Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Similar presentations


Presentation on theme: "Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor."— Presentation transcript:

1 Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor

2 Privacy Rights Includes: –Internet Hoaxes –SPAM –Identity theft –computer viruses –etc.

3 All include elements which deal with perils and problems –associated with the Internet

4 Many experienced hoaxes continue to resurface the net –taking advantage of new users. Usually take the general form of proportion –to be a warning about –some dangerous email message, –piece of software, etc.

5 SPAM Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. -E-mail spam -Instant messaging spam -Web search engine spam -Spam in blogs -Mobile phone messaging spam

6

7 Viruses A computer virus is a program that is hidden within the code of another program. –Viruses can be destructive or benign. –The virus is set up to replicate itself and spread to other programs on a person’s computer.

8 Spoofing E-mail sent from someone pretending to be someone else is known as spoofing. –Spoofing is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message. –It is often associated with website spoofing which mimics an actual, well-known website but are run by another party either with fraudulent intentions or as a means of criticism of the organization's activities.

9 Identity Theft Is a term used to refer to a fraud that involves stealing money or getting other benefits by pretending to be someone else. –The term is relatively new and actually is a misnomer. –Since it’s not inherently possible to steal an identity, only to use it.

10 –The stolen identity victim is held responsible for the perpetrator’s actions. –In many countries, it is a crime to use another person’s identity for personal gain.

11 – It is estimated 40 million credit card numbers have been compromised by well coordinated attacks. –Some of the methods include wireless surveillance technology –And computer break-ins owned by retailers.

12

13 Two key privacy principles are implicated by the incidents: –Securing of personal information held by third parties –And not discarding information once payment is received and the benefit or service is provided.

14 Now you have the basic understanding of the risks and dangers on the internet today. The internet does, however, create new possibilities for organizations and individuals to escape the strictures of geographically-based legal jurisdictions.

15 The End


Download ppt "Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor."

Similar presentations


Ads by Google