Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Back to Table of Contents
Internet Privacy Policies Presented by: Paul Frenken President, COLAIP.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Direct and Online Marketing: The New Marketing Model
Computer Programming I
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Internet Security for Small & Medium Business Week 6
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Marketing Management Online marketing
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Optimal Database Marketing Drozdenko & Drake,
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy Policy Issues & Pages Amy Reese INF385E Information Architecture and Design 1 UT iSchool 21 September 2004.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Lesson 10A: The Three D’s of Identify Theft
The Acceptable Use of Technology
Privacy and the Law.
Chapter 9: Internet Law, Social Media, and Privacy
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
TECHNOLOGY GUIDE THREE
E-Commerce: Regulatory, Ethical, and Social Environments
Societal Issues in Computing (COMP466)
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Direct and Online Marketing: The New Marketing Model
A Gift of Fire Third edition Sara Baase
Knowledge is Power A Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
Direct and Online Marketing: The New Marketing Model
Chapter 9: Configuring Internet Explorer
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme

Topics Privacy Enablers of Privacy Invasion Methods of Protection Government Regulation

Privacy on the WEB Is there really any? “You’ve got mail”, but is it secure? Does a company have the right to profile your Internet use? Do you have the right to know if your are being “watched”? Do others have the right to gather personal data without your knowledge or permission?

Privacy – Intro. Invasion of privacy intentional intrusion upon the solitude or seclusion of another that is highly offensive to a reasonable person (Webster’s) Privacy on the WEB Refers to security and confidentiality of personal and/or financial information

Privacy – Intro. Forbes article –56% of Americans are “very concerned” –86% of computer user believe business should get explicit permission before collecting data –Expect federal and state regulatory agencies to take notice Forbes ASAP February 19,2001

Why the recent concern? Profiling – on-line retailers collect data to target individual preferences for direct solicitation Selling of marketing lists Data has always been available but not with the current easy of access

Privacy Personal –Anonymity is still widespread on the Internet but information is collected Workplace –66% of 500 firms conduct electronic surveillance –27% monitor Consumer Relationships –Collection of personal information for profiling

What has enabled the invasion? Wide spread use of the Internet & Cooperative Browsers Cookies –Track personal usage –Anonymous or customized –Persistent or Session

What has enabled the invasion? WEB Banners –Can use cookies –Setup on many sites to track patterns WEB Bugs –1-pixel gif file setup on the WEB page or sent via –Undetectable by ant-cookie filters –Can run executable code

What has enabled the invasion? Spyware – monitoring –WEB use monitoring –Data interception – interception Naïve Users –High-speed Internet access –Wireless Internet access –Free Internet access

What has enabled the invasion? Inadequate Business Practices –Outdated protocols –Trusted networks –Poor user maintenance on unused accounts –Instant messaging –Inadequate firewalls

What has enabled the invasion? Vendor – Back Doors Code written into programs to allow the developer of the software to circumvent security Examples –RealJukebox –Alexa –Cuecat –Microsoft –Barbie

Has your privacy been Compromised? 411 Locate, InfoUSA, –List phone numbers and addresses Bigfoot – addresses YBLost, Stalker Site –Links to just about anything

Methods of Protection Individual –Anonymity –Education –Protection software HW & SW –VPN (Virtual Private Network) –Encryption

Methods of Protection Businesses –Good security –Control –Monitor systems –Corporate Privacy Policies Cybersurance

Government Regulation Carnivore –FBI monitoring Federal Trade Commission –FTC Fair Information Practices Notice Choice Access Security

Government Regulation USA does not have a comprehensive e- commerce privacy bill Children's Online Privacy Protection Act –13 years and younger –Parental consent to collect information –Refrain from re-distribution of identifiable information –Best effort to discourage posting of contact information –No special offers

Government Regulation Privacy Bills Currently in Congress –Spyware Control and Privacy Protection Act –Electronic Privacy Protection Act –Consumer Online Privacy and Disclosure Act –Consumer Internet Privacy Enhancement Act

Government Regulation Non-Government Privacy Organizations –CERT Coordination Center –Online Privacy Alliance –Platform for Privacy Preferences Project (P3P)

Government Regulation International : European Union –1998 law requiring personal information on the Internet to be: Accurate Current Gathered fairly and lawfully Processed and used for a specified legitimate purpose Kept no longer than deemed necessary;y to fulfill the stated purpose

Conclusion Need for strong laws Consumers need to be fully informed and educated Privacy Policies Tenacious in fighting for privacy