Online Privacy Lilyana Ruiz


Published on

Published in: Technology, News & Politics
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Online Privacy Lilyana Ruiz

    1. 1. Online Privacy Lilyana Ruiz
    2. 2. What is internet privacy <ul><li>Internet privacy consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. </li></ul>
    3. 3. Is online privacy possible Online privacy is possible if common sense is used when giving and receiving personal information.It is also possible if privacy laws and practice provide comprehensive protection.Instead of causing confusion that fuels a sense of distrust and skepticism,limiting realization of the internets potential.
    4. 4. What is Being Done To Protect On Line Privacy <ul><li>Top Priority objectives </li></ul><ul><li>Setting limitations on government </li></ul><ul><li>access to personal information. </li></ul><ul><li>Ensure that new information and communication technologies are designed. </li></ul><ul><li>Developing appropriate federal legislation to set </li></ul><ul><li>Online privacy Alliances </li></ul>
    5. 5. Protecting Your Privacy Online <ul><li>Look for privacy policies on the web. </li></ul><ul><li>2. Get a separate e-mail account for personal email. </li></ul><ul><li>3. Teach your kids that giving out personal information online means giving it to strangers. </li></ul><ul><li>4. Clear your memory cache browsing. </li></ul><ul><li>Make sure that online forms are secure. </li></ul><ul><li>Reject unnecessary cookies. </li></ul><ul><li>Use anonymous remailers. </li></ul><ul><li>Encrypt your e-mail. </li></ul><ul><li>Use anonymizers while browsing </li></ul><ul><li>Opt-out of the third party information sharing. </li></ul>
    6. 6. Risks of internet privacy <ul><li>Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which one may encounter through Internet use. These methods of compromise can range from statistics gathering on users, to acts that are interpreted as more malicious acts such as the spreading of spyware and various forms of bug exploitation. </li></ul><ul><li>Privacy measures are provided on several social networking sites to try to provide their users with protection of their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your &quot;friends,&quot; and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet. </li></ul>
    7. 7. Cookies <ul><li>Cookies enable Web sites to store information about your visit on your own hard drive. Cookies inform site operators if you have visited the site and, if you have obtained a username and password, cookies remember that information for you. Many of the &quot;personalized&quot; search engines use cookies to deliver news topics that users select; sites often use these cookies can be used to track you online and same preferences to target advertisement. Furthermore, enable a creation of a profile without you realizing it. You can search your hard drive for a file with the word &quot;cookie&quot; in it (i.e., cookies.txt or MagicCookie) to view the cookies that have been attached to your computer. Newer browsers allow you to recognize sites that send you cookies and reject them outright by accessing the &quot;Advanced&quot; screen of the &quot;Preferences&quot; menu. In Internet Explorer, delete cookies by clicking on the &quot;Delete Files&quot; button in the &quot;General&quot; icon of &quot;Tools&quot;' &quot;Internet Options&quot; menu. </li></ul>
    8. 8. Privacy spy software <ul><li> privacy page </li></ul><ul><li> privacy page </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> (freeware) security-privacy page </li></ul><ul><li>ZDNET </li></ul><ul><li> (freeware) security-privacy page </li></ul><ul><li>ZDNET </li></ul><ul><li>Ad-aware Standard Edition </li></ul><ul><li>Aluria Spyware Eliminator </li></ul>
    9. 9. What can happen when online privacy is invaded <ul><li>Your identity can be stolen. </li></ul><ul><li>You could face criminal charges. </li></ul><ul><li>Your personal information could get pulled up and used for anything </li></ul><ul><li>You can obtain a virus. </li></ul>
    10. 10. References <ul><li>CDT’s Guide to online privacy </li></ul><ul><li> </li></ul><ul><li> </li></ul>