This flip book is about privacy and the internet. It brings to light some of the areas we need to be aware of and things we can do to protect ourselves online. I was inspired by a quote by Edward Snowden.
2. “ rguing that you don’t
care about the right
to because
you have nothing to hide is
no different than saying
you don’t care about free
speech because you have
nothing to say.”1
Edward Snowden, 2015
Image by Jared Rodriques, Truthout 1
3. The quote by Edward Snowden regarding
privacy highlights the fact that people seem
to be willing to on the internet
for more access and services without really
understanding the consequences and scope
of the privacy they are trading away.
4. Image by Ann Wuyts Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014 2
5.
6. “Whenever you sign up for a
Facebook account, Facebook
asks permission to look at your
e-mail contacts if you’re on a
computer , or your phone
contacts if you’re on a
smartphone. When you grant
the site permission, it searches
your contacts for users already
on the network, and it searches
other users’ uploaded contacts
for you.” (Caitlin Dewey)4
Image by P T. Privacy 3
7. Do you think before
you
“…dismissed the
suggestion that
some passengers
might find the
practice overly
intrusive,
arguing that
social media was
by definition a
public
medium.”15
“Qantas had seen
and “liked” the
image
(passengers),
sharing it with
the airline’s more
than 26,000
Instagram
followers.”
Image by KC
8. “As children develop greater
independence, they need privacy in
order to have genuine relationships
with their parents.”
(Kay Mathiesen 2013) 3
Image by Summer Skyes 11. OMG lkr Lol 4
9. “If you are using Shopkick at
a store with iBeacon, it also
knows where you are in a
store, where you linger, and
what products you are
interested in. Are the perks
Shopkick offers worth the
privacy trade-off?” 17
Image by Fouquier The Big Yellow 5
10. “The combination of,
“non-personal information” that Shopkick and many
other services collect—is unique for about 87 percent
of U.S. residents. That means if an app has this data, it
usually has that you can be 17
”
17
11. Large
organizations
have not done a
great job
the public
when gathering
personal data.
Issues like identity
theft,
compromised
data and
government
spying is a cause
for concern. 18
Image by KC
12. “Sir John Sawers is the incoming head
of MI6, essentially the British
equivalent of the CIA. His wife posted
sensitive personal information to her
Facebook page, including the address
of the couple's London apartment
and the locations of their children and
Sir John's parents. Her Facebook
profile was left open to anyone in the
London network.”7
Image by Jim Linwood. The MI6 Building,
Vauxhall, London 6
13. Is your Internet of things vulnerable to Cyber
Attacks?
“Security experts are sounding the alarm. "There is a big
difference between the internet of things and other security
issues," says Joshua Corman of I Am The Cavalry, a group of
security specialists trying to promote greater awareness of
emerging risks to public safety. "If my PC is hit by a cyber-
attack, it is a nuisance; if my car is attacked, it could kill me.“16
Image by Pascal. Fridgenlight 7
14. “Even the most careful, conscientious sites cannot control
your resume after someone has downloaded it.” 8
Image by Flazingo Photos. Resume – Glasses www.flazingo.com per these terms www.flazingo.com/creativecommons 8
“ of hiring managers will
review a candidate’s social profile
before making a hiring decision. 10
have reconsidered a candidate
based on what they find.” 10
15. “The non-profit world naturally collects
a great deal of private donor
information and information that
explicitly explains how and why you
collect data and the specifics of its use
are highly recommended. The effective
and professional safeguarding of donor
information is not only an expectation of
the public but the ongoing provision of
your terms of service could well be the
difference between adding a new donor
and having them elect not to engage
with you.”10
Images by KC
16. “The bill’s move to broadly expand information sharing
between governments and give new powers to Canada’s intel
agencies will “undermine user trust, threaten the openness
of the Web, and reduce the security of the Internet and its
users,” Mozilla internet policy director Jochai Ben-Avie said in
a statement published on the Mozilla blog.”13
Image by Stephen Boisvert. Parliament. 9
17. “Massive privacy breach at a Toronto hospital has led to
19 more charges, including six criminal counts against a nurse accused
of selling the confidential records of new mothers as part of a scheme
to peddle RESP investments.” 19
“Alberta’s Health Minister Fred Horne revealed this week
that an unencrypted laptop containing the personal health information
of 620,000 Albertans was stolen in September.”21
Image by U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released)Official U.S. Navy Page. Fort Belvoir Community Hospital. 10
18. “More than PlayStation accounts worldwide were
compromised, 21
“ Target shoppers get hacked” 21
“TJX, the U.S. parent of Winners and HomeSense stores, revealed in
2007 that data from at least credit and debit
cards was stolen by hackers.” 21
19. “Before you post
anything online, think
about what a hacker,
stalker, employer, or
potential employer could
do with that data. Could
an ex, who's fighting for
custody, use the data
against you in court?”7
Image by Sean MacEntee. Privacy 11
“Don't give away specifics. Don't post
your address, date of birth, kids'
names, pets' names, phone numbers,
or any account numbers or financial
information of any kind.” 7
“Take advantage of
privacy settings and
lock down your
profile, so that only
those who you
approve can view
everything.”7
“Use a firewall.”9
“Read the Terms of Service.”9
Make clever strong passwords 9
“Beware sneaky check boxes.” 9
20. “This is a brand new medium, and we are just
now beginning to recognize its potential
consequences. Something as harmless as a
picture of a baby in a tub could be traded
online by pedophiles. The world is changing.
Be aware of your social media use, and be
smart about it.7”
Image by Smlp.co.uk. (2008, March 9). Locked in 19?? 10
21. Sources
1 WashingtonsBlog (2015, May 21). Arguing That You Don’t Care About The Right To Privacy Because You Have Nothing To Hide Is No Different Than Saying You Don’t
Care About Free Speech Because You Have Nothing To Say. Retrieved from http://www.washingtonsblog.com/2015/05/arguing-that-you-dont-care-about-the-right-to-
privacy-because-you-have-nothing-to-hide-is-no-different-than-saying-you-dont-care-about-free-speech-because-you-have-nothing-to-say.html
2 Acohido, B. ( 2013, Nov., 18) Author, A. A. (Year, Month Day). Snowden effect: Young people now care about privacy. USA Today. Retrieved from
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
3 Mathiesen, K. (2013, July, 31). The Internet, children, and privacy: the case against parental monitoring. Springer Science+Business Media Dordrecht 2013 retrieved
from http://link.springer.com/article/10.1007/s10676-013-9323-4/fulltext.html
4 Dewey, C. (April 2) How Facebook knows who all your friends are, even better than you do. Washington Post. Retrieved from
http://www.washingtonpost.com/news/the-intersect/wp/2015/04/02/how-facebook-knows-who-all-your-friends-are-even-better-than-you-do/
5 Chayka, K. (2015, March, 24). The New, Improved Online Friendship. New York Magazine. Retrieved from http://nymag.com/next/2015/03/new-improved-online-
friendship.html
6 Hydro One peaksaver Plus. (n.d.). Retrieved from http://www.hydroone.com/MyHome/SaveEnergy/Pages/Peaksaver.aspx
7 Siciliano, R. (2011,May,25) Social Media Privacy and Personal Security Issues. Huffington Post, The Blog. Retrieved from http://www.huffingtonpost.com/robert-
siciliano/social-media-privacy-and_b_245857.html
8 Dixon, P. (2009, February). Consumer Tips: Job Seekers’ Guide to Resumes – Twelve Resume Posting Truths. Posted to
https://www.worldprivacyforum.org/2009/02/consumer-tips-job-seekers-guide-to-resumes/
9 Editors Blog. (2011, Dec. 6 ). 15 tips for protecting your privacy online. CBC News. Retrieved from http://www.cbc.ca/news/canada/15-tips-for-protecting-your-
privacy-online-1.1043194
10 Davidson, J. (2014, Oct. 16). The 7 Social Media Mistakes Most Likely to Cost You a Job. Money. Retrieved from http://time.com/money/3510967/jobvite-social-
media-profiles-job-applicants/
22. Sources
11 Posted by Tim. (2014, Aug. 12) New study reveals much about online privacy concerns – important findings for non-profits. Message posted to
http://www.miratelinc.com/blog/nonprofit-fundraising-news-about-privacy-concerns-for-potential-donors/
12 Anti-terrorism Act, 2015 (n.d.) Retrieved 2015, June,9. http://en.wikipedia.org/wiki/Anti-terrorism_Act,_2015
13 Tencer, D. (2015, March 27). Bill C-51 A Threat To Safety Of Internet Users, Firefox Maker Mozilla Says. Retrieved from
http://www.huffingtonpost.ca/2015/03/26/mozilla-bill-c-51_n_6946602.html
14 Ingram, M. (2013, June 7). Through a PRISM darkly: Tracking the ongoing NSA surveillance story. Gigaom Research
https://gigaom.com/2013/06/07/through-a-prism-darkly-tracking-the-ongoing-nsa-surveillance-story/
15 Clark, N. (2014, March 17). Airlines Use Digital Technology to Get Even More Personal. New York Times. Retrieved from
http://www.nytimes.com/2014/03/18/business/airlines-use-digital-technology-to-get-even-more-personal.html?_r=0
16 No byline (2014, July 12). Home, hacked home. The Economist. Retrieved from http://www.economist.com/news/special-report/21606420-perils-
connected-devices-home-hacked-home
17 Golbeck. J. (n.d.). Track Star: this app follows you while you shop—and it needs a clearer privacy policy. Slate.com. Retrieved from
http://www.slate.com/articles/technology/future_tense/2014/01/ibeacon_shopkick_privacy_policies_for_location_tracking_apps_aren_t_clear.html
18 Madden, S. (2014, March 10). Tech that tracks your every move can be convenient, not creepy. Wired. Retrieved from
http://www.wired.com/2014/03/designers-tracking-tradeoffs/
19 No Byline. (2015, June 2) Rouge Valley Health System privacy breaches lead to 19 chargesCBC News. https://ca.news.yahoo.com/scarborough-
hospital-privacy-breaches-lead-192439254.html
20 No byline (2014, Jan 28). Personal data online: 5 of the biggest security breaches. CBC News. http://www.cbc.ca/news/world/personal-data-online-
5-of-the-biggest-security-breaches-1.2514287
23. Images
1 Rodriguez, J. (u.d.). Edward Snowden. Truthout. Paired with the article: Noam Chomsky | Edward Snowden, the World's "Most Wanted Criminal" .
Retrieved from flickr https://www.flickr.com/photos/truthout/14348649238/in/faves-59362381@N00/
2 Wuyts, Ann. (2014, Nov. 27 Five Data Privacy Principles from Mozilla (Put on a museum wall) 2014. Retrieved from Flickr
https://www.flickr.com/photos/vintagedept/15704560667/in/faves-59362381@N00/
3 P T. (2010, June 16). Privacy Retrieved from flickr https://www.flickr.com/photos/propagandatimes/4707679041/in/faves-59362381@N00/
4 Summer Skyes 11 (2012,Feb. 11). OMG lkr lol … txting . Retrieved from flickr
https://www.flickr.com/photos/summerskyephotography/6981290631/in/photolist-bCUWtR-6bRRaE-eY6HhR-6bRR8b-3Z12zo-6G1YTc-8MfBV9-euYoS-
4gFmE3-5NZCNd-pW1qPw-pVZ5x9-pW8XUF-qdy6eK-qdnRqi-pgNeDa-qduHWC-pVZ5Dm-pW17Pd-d1hVRS-btbcvV-mULqL6-bvsNfb-aoUiXx-qDFBt3-
dU8Sg2-4tPGZg-7LAVpL-9wExNK-5BYs7X-9wExRp-bGZ6yn-egurtP-7wfano-4zhY2v-87VPcZ-4UszxB-aJmY2-qmcFYA-dZWTcp-5spQR4-7UrzMr-7Urz3n-
7UrzVD-7UuQ8q-7UuQbC-7UuQkb-7UuQoq-7UrzYF-ndvhbK
5 Fouquier (2015, April 21). The Big Yellow. Retrieved from Flickr https://www.flickr.com/photos/fouquier/17077640499/in/photolist-s26nxz-byGJAh-
pMxhJ6-aWfjJB-aWeNTz-e3huhi-ba4NaZ-4jyQ7E-bByERN-oKEwYY-oU8gRz-aWeLFK-p93oJB-pQVogC-8xz2Ed-aWeKZX-k4FGqr-of2i9K-owtqgC-owvdti-
8aj9xy-oxYsg6-ounKEf-outnmf-8ahZ8H-owbQ27-ocsCZL-oddzf5-ocsx9i-ow1VFq-ow1RqG-ovYjNo-ocMmGX-owf1mT-ovFcxT-oeNsPd-oeEZuj-oemFxx-
oy8Cy2-owtQ7U-ow1VXN-ow6X45-owqKJG-owjBXV-ouiw5x-5HogZC-oeTzHH-oehWct-oeZ5cQ-oeJCwD/
6 Linwood, J. (2008, Feb. 19). The MI6 Building, Vauxhall, London. Retrieved from Flickr
https://www.flickr.com/photos/brighton/2279813534/in/photolist-4tsD8U-4rar69-jjLgrV-7y5Hww-6MWis-kmvNDz-ppNBij-hXWMg-hCNVr-8yiX5u-
bsRric-cbFSc1-nV16F2-khLw4M-bTuxmM-ryW4gS-5t1utD-e4ABM5-jnRY2N-5t1SWK-5t1LSp-5t69oL-5t68B7-5t661A-5t5TSL-5t5MXQ-5t5Jrh-5t5HYY-
5t1hYK-5t5F5N-7cULj6-9TVK7j-ndEmsF-rCxQK3-4f5u44-j5c6hY-deG8DG-hVwfX-eBeMUd-eBbCVF-eBeK5w-eBbAS6-eBeHdC-eBbzi8-eBeFJW-eBeESQ-
eBbwD6-eBeCWE-eBeCoU-eBeBQE/
7 Pascal. (2010, Oct. 10). Fridgenlight. Retrieved from flickr https://www.flickr.com/photos/pasukaru76/5067295473/in/photolist-a26j1E-
tsBDuq-5kdmhv-79ZUM9-jhvyDo-jhvvMm-uocL6Q-8HMdpk-feiniv-iGH-iGG-iGF-iGE-oeCrEk-owr5Vs-ouQ7eL-oeYoAJ-owaKRN-jhvvcy-jhvztu-
8HMa6V-rYonmx-iGJ-ow8bpc-owfae9-obTYp5-odncL3-oezoho-ovDmsJ-odmw9Q-ou62cM-otHE65-odkBGc-ow87FP-obSeRD-oenz6R-oxHezp-
ovgH2G-oe6723-tCMRpG-r8dEzu-t4n6cq-oektfs-oeJHod-oeJWFK-ouJDiU-rpBd16-ovKkTW-rptYWj-sFUPZ5
24. Images
8 Flazingo Photos. (2014, April 27). Resume-Glasses. www.flazingo.com per these terms: www.flazingo.com/creativecommons. Retrieved from Flickr
https://www.flickr.com/photos/124247024@N07/13903383190/in/photolist-nbAtrh-k8FtG-7ZuYoC-aGVn3H-axtL89-6UwsBM-7aJuB7-9o1iCk-6gMAEm-
6pLznz-4kSTMx-6F2oWU-78W2Go-9y6J4c-6fzJbw-83AHaV-59LL6M-9bFTK7-4zxGN3-8ydvDs-4zxGN7-6pLA6Z-9FVEXv-5G58GN-85oPQ8-6dhcm4-
dQVkWu-53WNkL-5GoACZ-86dXtu-9usg3j-5t2W32-2TUU4y-6pQHZd-7xbhG7-7Z9fs4-nLzw57-7vHmpF-7LtPew-5y1i36-dgdDKj-7vYGuo-6CxxCs-4sKWZb-
pwEZZX-dVN969-4LqJyF-6j7tJi-6NyQMr-87Mfd6
9 Stephen Boisvert. (2013, Sept. 12). Parliament. Retrieved from Flicker https://www.flickr.com/photos/srboisvert/154148968/in/photolist-eC47Q-
qX1RyH-bsqoDk-bsqnXv-afzyQy-5WUcnW-5WPXqa-5WPXPR-5WUcvS-5WPXEX-5WUccu-5WPXL2-afwMDk-afwMzT-5WUczU-5WUcjY-5WUcfW-5WPXSx-
5WPXUa-5WPXrt-5WPXJr-5WPXtF-5WUcdW-5WPXBt-5WPXvk-5WU9KC-afzyZ1-afwMqK-afwMyK-afwMsx-afzzbu-afzz6W-afzz47-afzyP7-afzz1j-afwMHv-
afwMj8-7T47XR-c2Y9s-afzz4Y-afzyXL-afzyS9-afwMGa-8aSTxU-bFY5qM-4QvFVx-7T7e4U-6kMQ8n-6dx7Qr-5WPXic
10 U.S. Navy photo by Mass Communication Specialist 2nd Class Todd Frantom/Released). (2011, June 22). Official U.S. Navy Page. Fort Belvoir
Community Hospital. Retrieved from Flickr https://www.flickr.com/photos/usnavy/5913486058/in/photolist-a1yaob-4wULmG-4SQoUf-ijUKnZ-7xhBng-
4oRFy4-8eweiE-hfwSgV-o9mMRT-5NTvFA-dAs6qD-e8Bmjb-e8Bm93-7Wqhei-h8oMGw-ecP4An-8bnTDJ-a4nkyu-5npEuv-a5tAA1-5H1G3c-e6g75r-
71aYsm-dnbUv1-bn5ohY-4ptDiZ-r4cZb-2ywEDH-nqFX6d-4SFz6v-dAxAp7-a3VHN3-autfjD-6vBPft-pQwHww-87awi2-cWJGjL-ajPSps-cQVnbw-aaWgvM-
tjaizy-7g7J4f-dnbKop-dnbPgU-e71Utc-cw2MPj-9ASSCn-dnbS4e-e71Zrc-hH7xAq
10 Smlp.co.uk. (2008, March 9). Locked in 19??. Retrieved from flickr https://www.flickr.com/photos/biscuitsmlp/2324706925/in/photolist-4xqJnT-
pNfQ2V-4w9csh-dG6neS-9uKVDe-bAUx5j-e6k5Ak-fEQbRx-dFVZx5-SoX26-ak2q9v-8r2CVR-9oNPZn-mgjU2U-4jh6xz-azPbgb-oFMMB2-72xiQ7-6aRr8S-
X54YR-9yZsf4-mvZV7g-8H3hcn-9MD5JS-rbCTk1-bn1aZv-bD1SrM-cEPn4G-rHGUvU-4XpCsF-dfJH2y-9TL2A2-kDM3G2-55Gdmp-892XCK-e3qsFM-9PhLeX-
8xdNPk-9h1Zgc-9LKJvt-rL8wjY-9h1bLJ-3ipg6L-2vmN8u-rgm2Me-anuzJo-8pqb2e-bSXtGM-pdHFcc-2JZJSr
11 MacEntee, S. (2010, May 9) Privacy. Retrieved from Flickr https://www.flickr.com/photos/smemon/4592915995/in/photolist-7ZRTUP-dZ2y6b-82djZx-
84VZAr-hQTx1c-7fNVzm-8b15Y2-azTdMo-4EvWY9-gyXnY-pDmshR-edvyKx-822bu2-8i9dVE-eARcff-aHKoc-5UYfNP-axwagd-o3MtjS-9qR8HQ-9i7ZK2-
4WrJkA-pVKYKn-Em1Z9-7qxzPp-48ybNM-66r3T6-dRuMzt-ddpg14-7H1j1A-eTrqcD-pgokPc-iCz9t-6wCshe-ahk6nh-9Mcwzt-46PRKe-5V3xR3-7nzT7w-
qmKn1-9t8qco-kCRTxX-raUSiK-qF6Pw5-mXs67q-7XSHP1-t1pSZ3-skYusG-t1pRGd-8hZ2Es
Note: Images by K C were taken by myself.