SlideShare a Scribd company logo
1 of 3
Download to read offline
Is it personal?
How is it used?

Today's world is fueled by data. Almost everything
we encounter - from smart cars and voting booths to
fitness trackers and music players - they all collect
data in an effort to better understand how and why
we do the things we do. This data can be used for
many purposes, from the outright nefarious in the
case of criminal hackers to the (we think) virtuous
use of supporting Ghostery. We created this breakdown so you can be more informed about who wants
your data and how they might use it. After all,
Knowledge + Control = Privacy.

Sadly, yes.

To steal. Your identity, your money,
your passwords, whatever.

What can you
do about it?

PRESENTED BY GHOSTERY

Who wants it?

PRIVAC Y
DA Y

Criminals,
Hackers,
Bad Guys,
Ne'er do wells

This is a security issue, plain and
simple. Be careful what information
you give to sites you don't expressly
trust. Install a good antivirus and a
password manager that lets you
create secure, unique passwords.
Is it personal?

To create a profile of what you
like (and specifically, what you
might want to buy) based on
the sites you visit.

Write your representatives. Seriously. Technically, this is tough
to stop. Governments can employ very deep-dive methods of
collection, and compel private companies to cooperate. You can
afford some protection by using services like Tor and Ghostery,
but even these won't stop information gathered via subpeonas
served to ISPs, email services, etc. So seriously, write your
government officials and express your displeasure.

What can you
do about it?

To create detailed profiles in
order to prevent crimes.

How is it used?

Who wants it?

Is it personal?

Maybe. Most of this data
doesn't involve your specfic
information, but a lot can be
inferred from robust profiles.

How is it used?

3rd party, datadriven marketers.

You bet.

What can you
do about it?

Who wants it?

Governments. Notably the US NSA,
but it happens all over the world, by
just about every government, to one
degree or another.

Lots of these guys provide opt-outs via AdChoices
icons or some other program. You can also limit
collection by deleting cookies and browsing in
incognito or private mode. But your best bet is to
use Ghostery, which can block communication
with any companies you don't trust.
Not really. Usually non-specific
location and activity info is as
deep as it gets.

Is it personal?

Nope. We take lots of steps to
anonymize what we collect.

To create an overview of
a site's audience.

How is it used?

Who wants it?

Ghostery, via Ghostrank™

We use Ghostrank to better understand how
and where data is collected across the web. We
support Ghostery by selling information about
that tracking activity to companies to help them
better understand themselves and each other.

Though this stuff is mostly harmless
and can probably help the sites you like
get better, if it bugs you, block and/or
opt-out. Ghostery helps a lot here.

What can you
do about it?

Is it personal?
How is it used?
What can you
do about it?

Who wants it?

The sites you visit and
the apps you use

We won't take any data you don't
tell us we can take - so just don't
opt-in. (But please opt-in)

More Related Content

Similar to Ghostery Data Privacy Day 2014

Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Privacy in Analytics
Privacy in AnalyticsPrivacy in Analytics
Privacy in AnalyticsDerek Hosty
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
AI for humans - the future of your digital self
AI for humans - the future of your digital selfAI for humans - the future of your digital self
AI for humans - the future of your digital selfSpeck&Tech
 
Behavioral tracking
Behavioral trackingBehavioral tracking
Behavioral trackingKanu Priya
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendKanu Priya
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott mooreScott Moore
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...Dana Gardner
 
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityUnveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityShubhamGupta410081
 

Similar to Ghostery Data Privacy Day 2014 (20)

Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Privacy in Analytics
Privacy in AnalyticsPrivacy in Analytics
Privacy in Analytics
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
AI for humans - the future of your digital self
AI for humans - the future of your digital selfAI for humans - the future of your digital self
AI for humans - the future of your digital self
 
Behavioral tracking
Behavioral trackingBehavioral tracking
Behavioral tracking
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trend
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Social profiling scott moore
Social profiling scott mooreSocial profiling scott moore
Social profiling scott moore
 
Data breach
Data breachData breach
Data breach
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
 
Users guide
Users guideUsers guide
Users guide
 
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityUnveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
 
spyware
spywarespyware
spyware
 

Ghostery Data Privacy Day 2014

  • 1. Is it personal? How is it used? Today's world is fueled by data. Almost everything we encounter - from smart cars and voting booths to fitness trackers and music players - they all collect data in an effort to better understand how and why we do the things we do. This data can be used for many purposes, from the outright nefarious in the case of criminal hackers to the (we think) virtuous use of supporting Ghostery. We created this breakdown so you can be more informed about who wants your data and how they might use it. After all, Knowledge + Control = Privacy. Sadly, yes. To steal. Your identity, your money, your passwords, whatever. What can you do about it? PRESENTED BY GHOSTERY Who wants it? PRIVAC Y DA Y Criminals, Hackers, Bad Guys, Ne'er do wells This is a security issue, plain and simple. Be careful what information you give to sites you don't expressly trust. Install a good antivirus and a password manager that lets you create secure, unique passwords.
  • 2. Is it personal? To create a profile of what you like (and specifically, what you might want to buy) based on the sites you visit. Write your representatives. Seriously. Technically, this is tough to stop. Governments can employ very deep-dive methods of collection, and compel private companies to cooperate. You can afford some protection by using services like Tor and Ghostery, but even these won't stop information gathered via subpeonas served to ISPs, email services, etc. So seriously, write your government officials and express your displeasure. What can you do about it? To create detailed profiles in order to prevent crimes. How is it used? Who wants it? Is it personal? Maybe. Most of this data doesn't involve your specfic information, but a lot can be inferred from robust profiles. How is it used? 3rd party, datadriven marketers. You bet. What can you do about it? Who wants it? Governments. Notably the US NSA, but it happens all over the world, by just about every government, to one degree or another. Lots of these guys provide opt-outs via AdChoices icons or some other program. You can also limit collection by deleting cookies and browsing in incognito or private mode. But your best bet is to use Ghostery, which can block communication with any companies you don't trust.
  • 3. Not really. Usually non-specific location and activity info is as deep as it gets. Is it personal? Nope. We take lots of steps to anonymize what we collect. To create an overview of a site's audience. How is it used? Who wants it? Ghostery, via Ghostrank™ We use Ghostrank to better understand how and where data is collected across the web. We support Ghostery by selling information about that tracking activity to companies to help them better understand themselves and each other. Though this stuff is mostly harmless and can probably help the sites you like get better, if it bugs you, block and/or opt-out. Ghostery helps a lot here. What can you do about it? Is it personal? How is it used? What can you do about it? Who wants it? The sites you visit and the apps you use We won't take any data you don't tell us we can take - so just don't opt-in. (But please opt-in)