Internet Privacy and You

Slides:



Advertisements
Similar presentations
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Advertisements

Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
SECURITY CHECK Protecting Your System and Yourself Source:
Identity Theft.
Security at the Digital Cocktail Party Sławomir Górniak, ENISA.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
Internet safety By Lydia Snowden.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
1 When hate speech tangles privacy... When hate speech tangles privacy...
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Protecting Your Identity While Attending College.
How can you protect yourself from online identity theft?
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
On/Offline Countersurveillance By Collin Donaldson.
Understanding Privacy An Overview of our Responsibilities.
Protecting Your Assets By Preventing Identity Theft
The future of data protection: General Data Protection Regulation
Add video notes to lecture
Hotspot Shield Protect Your Online Identity
By Laurel Bacon 12/1/16 8th grade Career Prep
Big Data Considerations
Protecting What’s Yours: Your Identity
Data Protection: The Law
Data Protection and Confidentiality
Issues of personal data protection in scientific research
IT Applications Theory Slideshows
Virtual Private Networks
GDPR Overview Gydeline – October 2017
General Data Protection Regulation: Turning the black into white
Appropriate Use of Technology
GDPR Overview Gydeline – October 2017
When you get caught for Identity Theft
GENERAL DATA PROTECTION REGULATION (GDPR)
Big Data Considerations
The General Data Protection Regulation (GDPR)

Relocation CARNIVAL come one…come all
Protecting Yourself from Fraud including Identity Theft
GDPR Workshop MEU Symposium Prague 2018
Data Protection in a Tutorial Context
Protecting Yourself from Fraud including Identity Theft
Information Handling Research Student Induction Day
E SAFETY ASSEMBLY.
Being Aware of What You Share
Data Protection for SDS Employers Alison Johnston Lead Policy Officer (Scotland) Information Commissioner’s Office.
General Data Protection Regulation Q & A Session
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Legislative Response to Data Inferences
GDPR Session
Protecting Yourself from Fraud including Identity Theft
General Data Protection Regulation
Colorado “Protections For Consumer Data Privacy” Law
Information Governance
Presentation transcript:

Internet Privacy and You Your actions, Your choices February 13, 2018

What is Internet or Online Privacy? Online privacy involves the ability to control what information you reveal about yourself over the internet, and to control who could access that information. Protect your online privacy. Don’t ever put anything online that you wouldn’t want to show up on the front page of The New York Times, or that you wouldn’t want your grandmother to see. http://kwhs.wharton.upenn.edu/term/online-privacy/ Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet.[1][2] https://en.wikipedia.org/wiki/Internet_privacy

What is sensitive data? GDPR California Law Racial or ethnic origin Political opinions Religious or philosophical beliefs Trade union membership Genetic data Biometric data Data concerning health Sexual orientation California Law Social Security Number Driver’s license number Account, credit, or debit card number with PIN / password Medical Information Health Insurance Information Automated license plate readers Email address with password

Your password is your key to privacy If I have your password, then it isn’t yours anymore 3-ways I can get your password Crack it Steal it You give it to me Steps to protection Make a strong password One password for each site Don’t fall for phishing Enable 2-factor authentication

Are you anonymous online? Yes and No Your online persona Are you anonymous online? Yes and No Add networks exchange information that does not contain your personal information Some advertisers have the ability to tie an online identifier to your identity (deanonymize) your browsing history What can you do? Get educated Read privacy policies Think about what your giving away Private browsing (Incognito) Privacy Badger Opt-out http://www.aboutads.info/ https://www.networkadvertising.org https://www.eff.org/privacybadger

Internet Advertising Primer Advertising Broker Advertiser A Advertiser B Web Site 1 Web Site 2 Web Site 3

Resources https://www.networkadvertising.org/understanding-online-advertising/how-does-it-work http://www.aboutads.info/ https://www.eff.org/privacybadger https://twofactorauth.org/ https://haveibeenpwned.com/

Questions?