SlideShare a Scribd company logo
1 of 25
What is Data Privacy?
Quick HealTechnologies Private Limited
Topics of Discussion:
• What is Data Privacy?
• Types Of Information Under Privacy Concerns
• Common Sources Of Data Information
• The Most Brutal Data Breaches Of 2014
• Indian Scenario
• The InformationTechnology Amendment Act, 2008
• The Do's and Don’ts To ProtectYour Data Privacy
• How can Quick Heal help?
What is Data Privacy?
• The relationship between collection and dissemination of data
technology, the public expectation of privacy.
• Privacy concerns exist wherever personally identifiable information
or other sensitive information is collected and stored – in digital
form or otherwise.
http://en.wikipedia.org/wiki/Information_security
POLL 1
http://en.wikipedia.org/wiki/Information_security
Information Under Privacy Concerns
• Internet Data - e-mail id's, passwords, browsing history
• Medical Records - Insurance Policies, PsychologicalConditions, Medical History
• Financial Data -Transactions,Credit Card Numbers, Stocks Held,Total Assets, Debts, etc.
• Locational Data - salesforce movements, travel locations, banks visited
• CableTelevision, Educational & Political Data
Common Sources Of Data Information
• Healthcare & Hospital Records
• Financial Institutions &Transactions
• Residence & Geographic Records
• Location Based Services
• Mobile & Desktop Applications, Browsers
• TelevisionViewing Records
http://en.wikipedia.org/wiki/Information_security
POLL 2
The Most Brutal
Data Breaches Of
2014
Quick HealTechnologies Private Limited
http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html
Sony Pictures - November 2014
• Over 1000 GB of data stolen
• DVD Screeners of movies yet to be released - leaked
• Contact details of Hollywood stars - compromised
• Other sensitive information such as employee salaries, internal communications were also
amongst the data stolen
• This attack could cost Sony studio an amount of around $100 million
http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html
JP Morgan Chase - July 2014
• The biggest bank in the US, JP Morgan Chase’s systems were breached by hackers in July.
• JPMorgan apparently neglected to upgrade one of its network servers with the dual password
scheme
• Hackers stole the login credentials for a JPMorgan employee
• Financial information of over 76 million households and 7 million small businesses
compromised.
• Information included physical addresses and email addresses.
http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html
eBay - May 2014
• One of the biggest data breaches of all time
• Information including e-mail addresses and encrypted passwords, affecting 145 million users
stolen
• Stolen information included physical addresses and email addresses
• Only non-financial data was compromised
• eBay urged customers to set new passwords after the breach was revealed.
http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html
Other Major Data Breaches in 2014
• Snapchat - 98,000 files (13gb of photos and videos) stolen and posted on file sharing channels.
• Home Depot - 53 million email addresses and 56 million credit card accounts were
compromised from the retailers data
• iCloud - Over 500 images of Hollywood celebrities were stolen from Apple's data sync service
and later made their way on popular social networks
• NVIDIACorporation: NVIDIACorporation suffered a data breach when hackers infiltrated their
network and stole employee usernames and passwords.
https://www.privacyrights.org/data-breach/new
Other Major Data Breaches in 2014
• Emcor Services Mesa Energy Systems - Emcor Services Mesa Energy Systems notified
individuals of a data breach when a company laptop was stolen that contained customers
personal information that included names, Social Security numbers, date of birth, date of hire,
addresses, salaries, gender and ethnicity.
• Morgan Stanley : An employee stole customer information on 350,000 clients including
account numbers.
• Lokai informed customers of a data breach to their system from July 18, 2014 to October 28,
2014 by hackers who gained access to their server that hosts their website.
POLL 3
India Scenario
• India is a key threat frontier, ranking as the third highest source of overall malicious activity.
• 69 percent of targeted attacks in India focus on large enterprises
• Nearly four in 10 attacks in India were carried out on non-traditional services industries like
hospitality, business and personal services
• India is the spam capital of the world with 9.8 percent of spam zombie
• 96,383 security incidents including phishing, scanning, spam, malicious code, website
intrusions etc. were reported to the Indian Computer Emergency ResponseTeam (CERT-In) in the year
2014 (Till September)
http://www.informationweek.in/informationweek/news-analysis/295599/69-percent-targeted-attacks-india-focus-enterprises-s
The InformationTechnologyAmendment
Act, 2008
• The InformationTechnology Amendment Act, 2008 addresses the intricacies of data protection in the
country
• Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a
computer resource which it owns, shall be liable to compensate the person so affected via privacy
breaches.
• The data protection provisions do not extend beyond the territories of India.
• The data outsourced to India is under the protection provisions under the act.
http://www.gala-marketlaw.com/77-gala-gazette/gala-gazette/261-india-data-protection-and-the-it-act-india
http://www.ponemon.org/local/upload/file/2011_IN_CODB_FINAL_5.pdf
Cost of Data Breach
POLL 4
The Do's and Don’tsTo ProtectYour Data
Privacy
The Do's and Don’ts In-depth
• Be thoughtful about what you post online about yourself or your friends
• Share your full name, date of birth, phone number, address, etc., only if necessary
• Passwords must have a mix of uppercase and lowercase letters, numbers, & special
characters.
• Always ignore any unknown or unexpected communication (email, call, SMS, etc.) that
requires you to act immediately and asks for your personal information
• Always use 2-step verification for your online accounts
The Do's and Don’ts In-depth
• Banking or shopping online using free, publicWiFi networks can allow hackers to steal your
personal and financial information
• Before installing any mobile app, review its permissions carefully.
• Always password protect your mobile device, tablet, and laptop
• Protect your important data by taking regular backups.
• Always log out/sign out of websites once you are done
How can Quick Heal help?
How can Quick Heal help?
Thank YouCorporateCommunications@quickheal.co.in
Follow us on:
Facebook - www.facebook.com/quickhealav
Twitter - www.twitter.com/quickheal
YouTube - www.youtube.com/quickheal
SlideShare - http://www.slideshare.net/QuickHealPPTs
Website - www.quickheal.com
Official Blog - www.blogs.quickheal.com
2015/2/11
References
• http://en.wikipedia.org/wiki/Information_privacy
• http://www.ibtimes.co.in/sony-pictures-hack-may-cost-studio-around-100-million-more-data-leaked-616704
• http://www.f4feeds.co.in/2014-the-most-worst-cyber-attacks-and-data-breaches/
• http://www.ponemon.org/local/upload/file/2011_IN_CODB_FINAL_5.pdf
• http://www.ndtv.com/india-news/indian-cyber-security-violations-similar-to-global-trends-says-ravi-shankar-prasad-
705525
• http://www.gala-marketlaw.com/77-gala-gazette/gala-gazette/261-india-data-protection-and-the-it-act-india
• http://www.informationweek.in/informationweek/news-analysis/295599/69-percent-targeted-attacks-india-focus-
enterprises-symantec-report

More Related Content

What's hot

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 

What's hot (20)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 

Similar to What is data privacy?

74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 

Similar to What is data privacy? (20)

74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Data security
Data securityData security
Data security
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
E commerce
E commerce E commerce
E commerce
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 

More from Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Recently uploaded

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 

Recently uploaded (20)

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 

What is data privacy?

  • 1. What is Data Privacy? Quick HealTechnologies Private Limited
  • 2. Topics of Discussion: • What is Data Privacy? • Types Of Information Under Privacy Concerns • Common Sources Of Data Information • The Most Brutal Data Breaches Of 2014 • Indian Scenario • The InformationTechnology Amendment Act, 2008 • The Do's and Don’ts To ProtectYour Data Privacy • How can Quick Heal help?
  • 3. What is Data Privacy? • The relationship between collection and dissemination of data technology, the public expectation of privacy. • Privacy concerns exist wherever personally identifiable information or other sensitive information is collected and stored – in digital form or otherwise. http://en.wikipedia.org/wiki/Information_security
  • 5. http://en.wikipedia.org/wiki/Information_security Information Under Privacy Concerns • Internet Data - e-mail id's, passwords, browsing history • Medical Records - Insurance Policies, PsychologicalConditions, Medical History • Financial Data -Transactions,Credit Card Numbers, Stocks Held,Total Assets, Debts, etc. • Locational Data - salesforce movements, travel locations, banks visited • CableTelevision, Educational & Political Data
  • 6. Common Sources Of Data Information • Healthcare & Hospital Records • Financial Institutions &Transactions • Residence & Geographic Records • Location Based Services • Mobile & Desktop Applications, Browsers • TelevisionViewing Records http://en.wikipedia.org/wiki/Information_security
  • 8. The Most Brutal Data Breaches Of 2014 Quick HealTechnologies Private Limited
  • 9. http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html Sony Pictures - November 2014 • Over 1000 GB of data stolen • DVD Screeners of movies yet to be released - leaked • Contact details of Hollywood stars - compromised • Other sensitive information such as employee salaries, internal communications were also amongst the data stolen • This attack could cost Sony studio an amount of around $100 million
  • 10. http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html JP Morgan Chase - July 2014 • The biggest bank in the US, JP Morgan Chase’s systems were breached by hackers in July. • JPMorgan apparently neglected to upgrade one of its network servers with the dual password scheme • Hackers stole the login credentials for a JPMorgan employee • Financial information of over 76 million households and 7 million small businesses compromised. • Information included physical addresses and email addresses.
  • 11. http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html eBay - May 2014 • One of the biggest data breaches of all time • Information including e-mail addresses and encrypted passwords, affecting 145 million users stolen • Stolen information included physical addresses and email addresses • Only non-financial data was compromised • eBay urged customers to set new passwords after the breach was revealed.
  • 12. http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html Other Major Data Breaches in 2014 • Snapchat - 98,000 files (13gb of photos and videos) stolen and posted on file sharing channels. • Home Depot - 53 million email addresses and 56 million credit card accounts were compromised from the retailers data • iCloud - Over 500 images of Hollywood celebrities were stolen from Apple's data sync service and later made their way on popular social networks • NVIDIACorporation: NVIDIACorporation suffered a data breach when hackers infiltrated their network and stole employee usernames and passwords.
  • 13. https://www.privacyrights.org/data-breach/new Other Major Data Breaches in 2014 • Emcor Services Mesa Energy Systems - Emcor Services Mesa Energy Systems notified individuals of a data breach when a company laptop was stolen that contained customers personal information that included names, Social Security numbers, date of birth, date of hire, addresses, salaries, gender and ethnicity. • Morgan Stanley : An employee stole customer information on 350,000 clients including account numbers. • Lokai informed customers of a data breach to their system from July 18, 2014 to October 28, 2014 by hackers who gained access to their server that hosts their website.
  • 15. India Scenario • India is a key threat frontier, ranking as the third highest source of overall malicious activity. • 69 percent of targeted attacks in India focus on large enterprises • Nearly four in 10 attacks in India were carried out on non-traditional services industries like hospitality, business and personal services • India is the spam capital of the world with 9.8 percent of spam zombie • 96,383 security incidents including phishing, scanning, spam, malicious code, website intrusions etc. were reported to the Indian Computer Emergency ResponseTeam (CERT-In) in the year 2014 (Till September) http://www.informationweek.in/informationweek/news-analysis/295599/69-percent-targeted-attacks-india-focus-enterprises-s
  • 16. The InformationTechnologyAmendment Act, 2008 • The InformationTechnology Amendment Act, 2008 addresses the intricacies of data protection in the country • Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, shall be liable to compensate the person so affected via privacy breaches. • The data protection provisions do not extend beyond the territories of India. • The data outsourced to India is under the protection provisions under the act. http://www.gala-marketlaw.com/77-gala-gazette/gala-gazette/261-india-data-protection-and-the-it-act-india
  • 19. The Do's and Don’tsTo ProtectYour Data Privacy
  • 20. The Do's and Don’ts In-depth • Be thoughtful about what you post online about yourself or your friends • Share your full name, date of birth, phone number, address, etc., only if necessary • Passwords must have a mix of uppercase and lowercase letters, numbers, & special characters. • Always ignore any unknown or unexpected communication (email, call, SMS, etc.) that requires you to act immediately and asks for your personal information • Always use 2-step verification for your online accounts
  • 21. The Do's and Don’ts In-depth • Banking or shopping online using free, publicWiFi networks can allow hackers to steal your personal and financial information • Before installing any mobile app, review its permissions carefully. • Always password protect your mobile device, tablet, and laptop • Protect your important data by taking regular backups. • Always log out/sign out of websites once you are done
  • 22. How can Quick Heal help?
  • 23. How can Quick Heal help?
  • 24. Thank YouCorporateCommunications@quickheal.co.in Follow us on: Facebook - www.facebook.com/quickhealav Twitter - www.twitter.com/quickheal YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Website - www.quickheal.com Official Blog - www.blogs.quickheal.com
  • 25. 2015/2/11 References • http://en.wikipedia.org/wiki/Information_privacy • http://www.ibtimes.co.in/sony-pictures-hack-may-cost-studio-around-100-million-more-data-leaked-616704 • http://www.f4feeds.co.in/2014-the-most-worst-cyber-attacks-and-data-breaches/ • http://www.ponemon.org/local/upload/file/2011_IN_CODB_FINAL_5.pdf • http://www.ndtv.com/india-news/indian-cyber-security-violations-similar-to-global-trends-says-ravi-shankar-prasad- 705525 • http://www.gala-marketlaw.com/77-gala-gazette/gala-gazette/261-india-data-protection-and-the-it-act-india • http://www.informationweek.in/informationweek/news-analysis/295599/69-percent-targeted-attacks-india-focus- enterprises-symantec-report