M ANAGING Y OUR P ERSONAL D ATA Keeping Personal Data Private.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Vital Records and Documents Everyone Should Have in Order A Public Service Presentation provided by the Society of Certified Senior Advisors.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
How To Protect Your Privacy and Avoid Identity Theft Online.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Presented By: Stephanie R. Taylor ESTATE PLANNING FOR DIGITAL ASSETS R ANDALL |D ANSKIN A Professional Service Corporation.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
Cyber Crimes.
Family Financial Management Annie’s Project January 23, 2007 Coweta Oklahoma.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Society & Computers PowerPoint
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Protecting Your Assets By Preventing Identity Theft
Facebook privacy policy
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

M ANAGING Y OUR P ERSONAL D ATA Keeping Personal Data Private

TOPICS Do I Still Have Any Personal Privacy? Data Brokers Your Car is Spying On You! Medical Identity Theft Don’t Bury You Digital Assets Grifters and Giving The People Who Know Everything (NSA) What Can You Do?

W HAT D ATA C AN B E C OMPROMISED ? Private Data Sources Car Data Credit Cards Phones Marketing Data Identities Charitable Contributions Medical Records Digital Assets After Death Bank Records NSA Personal Surveillance Social Media

P ERSONAL P RIVACY Some Startling Facts Lawyers use social media to weed out jurors that could potentially decide against their clients Combines are feeding farming data such as soil conditions & crop yields to commodity speculators Schools routinely transfer student’s data including lunchroom purchases, medical information, essays and transcripts to data aggregators for marketing The amount of sensitive data available in public records is staggering

Criminal Records Marriage Licenses Death Notices Court Dockets Business Licenses Real Estate Appraisals Voter Registrations Sex Offender List Military Records Delinquent Parents Reverse Phone Numbers Genealogical Records Obituaries Property Deeds Professional Licenses Reverse Addresses Divorce Records Data Available in Public Records Motor Vehicle Records Census Records Change of Address

W HAT IS A D ATA B ROKER ? Data Brokers collect (steal) information about individuals from public records and private sources including user-contributed material on social networking sites such as Facebook, Twitter and LinkedIn, consumer purchase histories, credit & debit card transactions, health care records, phone apps and web browsing histories and then sell the information to marketing & advertising firms

W HAT DO B ROKER ’ S S ELL ? Individual profiles, such as a person's age, race, gender, height, weight, marital status, religious & political affiliations, occupation, income, net worth, home ownership, investment habits, product preferences, hobbies, travel habits and health-related interests.

1. Visit a website and tracking files record your online activities 2. Tracking companies record your searches and build a profile of your interests 3. Tracking Co. sells your information to Data Broker 4 Your profile is linked to other sources of your personal data 5. Your profile is put on data exchange for purchase 6. Profile sold to Advertisers looking for consumers with your interests

DEPARTMENT STORE Stop to browse and a digital coupon appears on your phone GROCERY STORE An app reminds you of grocery items on sale and on your shopping list SPORTS STADIUM App directs you to concession stand for your favorite take out WINDOW SHOPPING Based on how long you linger a “special offer” for the item is sent to your phone ELECTRONICS STORE Product Info immediately available TICKET SALES Send you to the shortest line Real-Time Apps

YOU ARE THE PRODUCT! “ You are what is being bought and sold. Facebook’s users are paying with their personal information instead of cash.” “It’s like World War Z(uckerberg)….There are still people here on God’s green earth that can conduct their social lives without being marketed to. Can’t we leave them alone?”  Article about Mark Zuckerberg in Time Magazine

SUNDAY TRIBUNE 12/7/14 “A lot of tech companies are geniuses at getting people to give them enormously personal information by clicking through a contract nobody reads and doing with it pretty much what they will.”

P HONE D ATA Real-time bidding for your phone data Crowd sourced through apps Grouped into profiles Many apps access your calendar and GPS location Don’t make your phone your ‘Best Friend” Sharing confidences with – Phone’s Manufacturer Phone’s Operating System Wireless Carrier App Developers Mobile Advertisers

W HAT S HOULD YOU D O ? Use Privacy Mgr. with a Caller Id Choose Apps from a reliable source Don’t click on pop-up links Could download malicious software Disable location tracking except when needed Driving directions Finding a location Set a strong password in case of theft Set your smartphone to delete all data Don’t store sensitive data like pins or passwords Buy a phone security app (some are free)

How Your Car Spies On You

License Plate Scans GPS Location Data Vehicle Telematics Cell Phone Tracking Traffic Cameras How Your Car Spies On You Electronic Data Recorder

L ICENSE P LATE S CANS A scanner can take 2,000 images per second Scanning is not targeted Original purpose was find stolen vehicle Same vehicles show up multiple times Locations can be plotted on a map Few standards or policies Police can track anyone (spouse, boss, rival, etc.) “Only limited by officer’s imagination” Data is stored indefinitely in most cases Shared with Federal authorities

T ELEMATICS In most cars since 2011 Maps speed, braking, geographic info Date & Time of incident Seat belt and air bag status Insurance companies encouraging the use Clever names such as Drivewise and Snapshot Expectation of lower rates by consumer Can be used against you in an accident Insurance companies legal access not standard Total Loss? – Insurance Co. owns car

C ELL P HONE T RACKING Apps & GPS track your driving habits Info sold to marketing people Government uses Stingray Technology Cellphone location & Call logs Can decrypt data Parent or Spouse can track you Sold as “security” feature “Teen-Safe”, “Mobile Spy”, “Spy Phone” Employers can track employee’s company cell Is your employee really in a traffic jam? Tracking devices as little as $27.00

Medical Identity Theft

MEDICAL IDENTITY THEFT Theft of health care goods or services Largest type of identity theft – 43% Hospital treatment Obtain Prescription drugs (Valium, OxyContin, etc.) Sell patient info Fraudulently bill insurance companies Used to obtain Medicare benefits Blackmail

H OW IS M EDICAL D ATA O BTAINED ? Equipment Theft Stolen laptops Improper Disposal Records not removed from obsolete computers Written files not shredded Hacking Set up fake provider identification Bill Medicare Use Social Security Numbers to obtain Credit Cards Unauthorized Access Insiders in Doctor or Hospital Offices

Y OUR B ODY O NLINE 24/7 The Federal Trade Commission is worried that sensitive data collected on Smart watches and Health trackers could be sold to marketers. The Apple Watch will be able to track a user's pulse and can potentially store health information. Wearable's will make your physical self visible to the virtual world in the form of information, it will be copied and circulated, it will be used to track you and market to you. It will be bought and sold and leaked.

M EDICAL I DENTITY T HEFT - $60 B ILLION P ROSECUTED T HEFT - $6 B ILLION Matthew Kolodesh submitted claims of $16.2 million for home hospice services - sold identities to other companies. 176 months prison Margarita Grishkoff found guilty of submitting $28.3 million fraudulent claims using patient recruiters and clinic owners to obtain patient information. 70 months prison Dr. Robert Glazer, signed prescriptions and documents for unnecessary home health services $33 million – sold info to other supply companies

C ONSEQUENCES OF M EDICAL T HEFT Called “the privacy crime that can kill” Incorrect records lead to incorrect treatment Insurance Benefits may be maxed out Fraudulent Billing Insured may not be aware Blackmail of Political or Celebrity Figures Depression, AIDS, Abortion, Venereal Disease Genetic Testing Revealed Life & Disability Insurance, Long-Term Care

Y OUR S ENSITIVE M EDICAL I NFORMATION Capture your “interests” in health conditions Track internet searches What you purchase Insurance Companies “share” data with others Insurance brokers Banks & Reinsurers Business Partners Government Agencies Law Enforcement Regulatory N.S.A.

Protecting Your Digital Assets

D ON ’ T B URY Y OUR A SSETS Digital Assets Intellectual Property & Digital Contracts PayPal Account Medical Files Financial Information Social Network Accounts Downloads of iTunes, Netflix Kindle Books Pictures & Digital Photo Albums Instructive Memos & Blogs Domain Registrations Recipes, Poems, School Essays Family Tree Points from Hotel Stays, Airline Miles, Store Credits Stocks and Commodity Trading Accounts

O BTAINING ACCESS TO AN ACCOUNT Facebook Family can request an account be “memorialized” Will allow download with prior consent of deceased Will not turn over account or password to family Yahoo s are private no matter what! Can ask accounts be deleted Twitter Provide info to have account “deactivated” Need signed statement from executor

O BTAINING ACCESS TO AN ACCOUNT Amazon (Kindle) Can will books (if not licensed) iTunes You don’t actually own the song Licensed to download during your lifetime Virtual Games (Farmville, World of Warcraft) Accounts cannot be transferred Avatars cannot be sold Google 2-step process for Inactive Account Manager Can designate up to 10 people Can ask to have content deleted

O BTAINING ACCESS TO AN ACCOUNT Federal Law May Prevent Access May violate Computer Fraud & Abuse Act Unauthorized access to computers Stored Communications Act 4 th Amendment Privacy Protection applies to information stored online ISPs forbidden to divulge the contents of any communication Intent of Act was to prevent hacking but used to prevent relatives from accessing accounts

P REPARE A WILL OR POWER OF ATTORNEY Give Specific Instructions “My spouse/parents can/cannot read my s” Designate which person(s) should take charge Who should manage your online accounts List accounts you want deleted Many accounts have value Laws Vary By State Consult An Attorney

THINGS TO CONSIDER Keep An Inventory of What You Have Update Inventory Periodically Commercial Online Sites Research Your State’s Laws Identify Person in Charge Someone You Trust Identify Things to be Deleted Keep List of Usernames & Passwords Separate Keep in Safe Place Average Person has 25 Password-Protected Accounts Review Terms of Service Agreements Every Vendor Has Own Policies

N O W ILL ? You Won’t Outlive Your Digital Life Come to Grips with Who Will Inherit Delete Old or Unwanted Files/Bills/Tax Returns Not Everything Has Value More in Cyberspace, More for Family to Sort Thru Download Online Account Info Create Own Backup Offsite Have a Central Repository Commercial Companies will Download For You Legacy Locker, Keeper, Sourceforge, My Webwill

CHARITIES

T HE J OY OF G IVING Don’t let “grifters” spoil your holiday giving 50 worst charities give less than 4% to programs Cyber-hustlers create bogus charities Scammers follow disasters –and the money Be skeptical of solicitations Most legitimate charities do not use Links within s may lead to viruses Often pictures of animals used to “soften” you up

M AKE THE MOST OF YOUR DONATION $45 Billion donated each year in America 2 million registered non-profits Give locally National donations under $25 barely break-even Information is then sold to other charities Send your donation directly to the charity Ask if your contribution is tax deductible Legitimate charities give financial info Don’t give out any personal information

National Security Agency

C.I.A. VS N.S.A. (L INES HAVE BLURRED ) CIA gathers intelligence involving people (HUMINT) Gather’s information about foreign governments, corporations, and individuals Counter-terrorism Covert paramilitary operation NSA specializes in signals intelligence (SIGINT) Largest employer of Mathematicians in the world Decoding, translation & analysis of data Counter-intelligence & cyber-terrorism

C OLLECT IT ALL – N. S. A. “ SLOGAN ” NSA has infiltrated video games, cell phone apps, social media, encrypted material, s Challenges basic assumptions about what is private Is this the appropriate strategy? Technology allows very detailed data Will become more powerful and pervasive Is this right in a democratic society? Are we “sleepwalking” into abandoning our privacy?

P UBLIC ’ S ATTITUDE ON N.S.A. S PYING Group 1 – Don’t Care Group 2 – Encourage the N.S.A. Group 3 – Actively fighting to reverse NSA ability to collect, analyze & store data about citizens and other governments

NSA – E XPLOITING V ULNERABILITIES Thousands of Vulnerabilities Large-scale graph analysis Too much trust in developers Heartbleed Other known “bugs” Attacks encryption Create weaknesses Open “back doors”

T HE “N EW ” NSA Transfer storage of phone data Now phone companies will hold info Only to placate us? Must obtain judge’s approval to access phone records FISA Court (Federal Intelligence Surveillance) Authorizes government requests for wiretapping Only meant for “foreign intelligence purposes” Never refuses a request from the NSA Broad authority to intercept s undiminished

D O W E N EED N EW L AWS ?? Signals are everywhere and the NSA believes the public has no right to keep them private Collects hundreds of millions address books daily 5 billion records per day on whereabouts of cell phones & their users Need government to control invasion of privacy Hodge-podge of laws by state legislatures No uniform enforcement ACLU fighting to stop unauthorized data collection

WHAT CAN YOU DO?

THINGS YOU SHOULD DO Monitor your credit on all 3 credit bureaus Never subscribe to unsolicited credit cards Close out any old accounts not in use Check your online statements regularly Limit your use of debit cards Can’t be reimbursed as easily as credit cards Easier to hack Use a Strong Password Most common password is admin Second is 1234 Limit the info posted on social networks Don’t disclose family names

M ORE T HINGS T O D O Never open an from an unknown source Make a list of your digital assets Do you need them in a will? Can your heirs find your passwords? Access your medical records Make sure they are correct Sign up for Do-Not-Call List Use Lockout feature on your SmartPhone Only donate to charities you know And check these out at Charity Navigator

THINGS YOU SHOULD (N OT ) DO Don’t give your Zip Code at stores Can be combined with Credit Card to identify you Don’t give your Credit Card info to “Take Out Restaurants” Do you want some 17 year old kid to have it? Don’t carry your Social Security Card And don’t give it over the phone or to a business except a financial institution

C ONCLUSION Our Personal Privacy has been invaded We can’t stop everything but can limit the amount of data available to criminals and data brokers Don’t worry so much about the N.S.A. worry about the data brokers and tracking software We need to write our legislators demanding stronger laws against selling our data

Cathy Nolan Ashley Wilson