Your SlideShare is downloading. ×
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Privacy issues and internet privacy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy issues and internet privacy

4,012

Published on

Published in: Technology, News & Politics
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,012
On Slideshare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
195
Comments
0
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • 1.Accessing individuals’ private e-mail conversations, computer records and sharing this information2. Knowing or tracking where a person is tracking his mobile or paging devices3. Using the customer info from many sources to market additional business services4. Collecting cell no’s, e-mail add, credit no to build fake profiles
  • Transcript

    • 1. Privacy Issues and Internet Privacy
      By,
      Vinyas S
    • 2. Information technology
      -> Collects, stores, integrates and retrieves data and information
      Store and Retrieve information!!!
      -> a Negative impact on right to Privacy???
      Introduction
    • 3. The ability of an individual or group to secluded themselves or information about themselves and thereby reveal it selectively
      A personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be
      Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public
      What Is Privacy?
      6/9/2011
      3
    • 4. Violation of Privacy
      Computer Monitoring
      Computer Matching
      Unauthorized Personal Files
      Eg. for Privacy Issues
    • 5. How our Personal Information Gets Revealed
      6/9/2011
      5
    • 6.
    • 7. Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating
      ISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data
      They are usually prevented to do so due to social pressure and law.
      By ISP
      6/9/2011
      7
    • 8. May be inappropriately spread by the original receiver
      May be intercepted
      May be legally viewed or disclosed by service providers or authorities
      By Email
      6/9/2011
      8
    • 9. Any member of the list or group could collect and distribute your Email address and information you post
      By Discussion groups
      6/9/2011
      9
    • 10. Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password
      You may accidentally reveal such information when using a browser on a public computer or someone else's.
      By Internet Browsers
      6/9/2011
      10
    • 11. Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server
      Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts
      Cookies are only data, not programs nor viruses
      What are cookies?
      6/9/2011
      11
    • 12. A Sample of Cookie
      6/9/2011
      12
      -->If you type JavaScript:alert(document.cookie)into the address bar, when logged onto a site, it is possible to see the cookies which have been set from that domain.
    • 13. Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time)
      By Search Engine
      6/9/2011
      13
    • 14. “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site. Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.”
      What search engines did?
      6/9/2011
      14
    • 15. Web bugs:
      -> A graphic (in a Web site or a graphic- enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewer
      Third party cookies:
      -> Comes from web page may contain images or advertisements
      By indirect Marketing
      6/9/2011
      15
    • 16. Employers and school officials are increasingly sensitive to the messages you convey in social networks 
      By Social Networks, Blog & Personal Websites
      6/9/2011
      16
    • 17. Want to be a hacker?
      6/9/2011
      17
    • 18. By Cybercrime
      Spywaretakes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge 
      Phishingoccurs when a criminal lures the victim into providing financial or personal data
      Pharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites
      18
      6/9/2011
    • 19. Solutions to Protect Online Privacy
      19
      6/9/2011
    • 20. Cookie Controls
      20
      6/9/2011
    • 21. Other Technical Resorts
      Anti-virus software
      Firewalls
      Encryption tools
      21
      6/9/2011
    • 22. The Platform for Privacy Preferences (P3P)
      Developed by the World Wide Web Consortium (W3C)
      A protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences
      22
      6/9/2011
    • 23. The Only Two Absolute Choices
      Avoid yourself from the Internet
      1) Raise awareness of privacy
      2) Learn to safeguard your privacy with a minimum sacrifice of convenience
      23
      6/9/2011
    • 24. THANK YOU!!!!!

    ×