SlideShare a Scribd company logo
1
Submitted by:
 Nimra Khan Lodhi
 Hassan Iftikhar
 Hawa Arif Khan
 Mehreen Mehboob
 Moobariz Khan
Submitted to:
 Ma’am Sehrish Tabassum
2
Table of contents
3
1. Introduction to Information & Privacy
2. Introduction to Information privacy
3. Types of information
4. Types of privacy
5. Ways how to protect privacy
6. Laws of Privacy
7. Information privacy index
8. Future concerns about privacy
What is Information & privacy?
 Data that has been processed within a
context in order to give it a meaning is
referred to as Information.
For example:
Time table, merit list, report card, headed
tables etc.
 The ability of an individual or a group
seclude themselves or information about
themselves and express themselves
selectively is termed as Privacy. For
example: Online
privacy is an example of privacy which
includes all personal data that is given out
during online interactions.
4
What is Information Privacy?
 It is the relationship between collection and dissemination of
a) Technology
b) Data
c) Public expectation of privacy
 It is the right of individuals and companies to restrict collection and use of
information about them.
 It is difficult to maintain today because data is stored online.
 Employ monitoring is using computers to observe employee computer use.
5
What are the types of Information?
There is a large variety of Information that includes:
 Healthcare records
 Criminal records
 Justice investigations and proceeding
 Transactions
 Biological traits
 Residence and geographic records
 Data traits
 Credit card databases
 Phone company databases
 Relationship management databases
6
What are the types of Privacy?
Information privacy relates to different data types including:
 Internet privacy:
All personal data shared over the internet is subject to privacy issues.
 Financial privacy:
Financial information is particularly sensitive as it may easily be used to commit online or offline
fraud.
 Medical privacy:
All medical records are subject to strict laws that address user access privileges.
 Defensive privacy:
It protects from transient financial loss resulting from information or theft.
7
What are the laws of Privacy?
Privacy laws are classified into:
General Privacy law:
 Overall bearing of individuals personal information and affects policies that govern
many different areas of information.
 Bankers and accountants follow this law to maintain individual’s secrecy.
Specific Privacy law:
 Designed to regulate specific types of information.
Classifications of Privacy law:
 Communication privacy laws
 Financial privacy laws
 Information privacy laws
 Internet privacy laws (Online privacy)
8
How can we protect our Information?
1. Fill in only necessary information on rebate, warranty, and registration forms.
2. If Caller ID is available in your area, find out how to block your number from
displaying on the receiver’s system
3. Install a cookie manager to filter cookies.
4. Do not reply to spam for any reason.
5. Clear your history file when you are finished
browsing.
9
What are
cookies?
E-commerce and
other Web
applications often
rely on cookies to
identify users and
customize Web
pages. A cookie is a
small text file that a
Web server stores
on your computer.
What is spam?
Spam is an unsolicited
e-mail message or
newsgroup posting sent
to many recipients or
newsgroups at once.
Spam is Internet junk
mail
How can we protect our information?
 Install a personal firewall
 Turn off file and printer sharing on your Internet connection.
 Sign up for e-mail filtering through your Internet access provider or use an anti-
spam program such as Bright mail.
 Avoid shopping club and buyer cards.
 Purchase goods with cash, rather than credit or checks
10
What is
Firewall?
It is a system
designed to
prevent
unauthorized
access to or
from private
network.
What is bright
mail?
It was a San Francisco
based technology
company focused on
anti-spam filtering.
Information privacy index 2019
Countries with best Privacy laws
 Norway
 Australia
 Denmark
 Sweden
 Finland
Countries with worst Privacy laws
 China
 Uzbekistan
 Cambodia
 Vietnam
 Zimbabwe
11
What are the future concerns about
privacy?
What is considered private information?
Information that a user wishes to keep from public viewing. Credit card, social security and
financial account numbers along with passwords to websites and other venues are
commonly kept private.
How to make information more accessible?
 Accessibility is more important than the way a document looks like.
 Don’t procedure documents that look like you don’t care.
 Allow people enough time to give their feedback.
 Always put accessibility first but take time and care when making your information
accessible.
 Write clear content.
12
What is meant by
accessible?
It is the information that
people can understand.
It means different things
to different people.
What are future concerns about privacy?
How to evolve systems to prevent breaches?
 Close opened ports
 Run necessary updates
 Backup your files
 Secure your Wi-Fi
 Check your security rating
13
What is breach?
A breach is any incident
that results in
unauthorized access to
data.
14
THANK YOU FOR YOUR
ATTENTION!

More Related Content

What's hot

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 

What's hot (20)

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Information security
Information securityInformation security
Information security
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Information Security
Information SecurityInformation Security
Information Security
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data security
Data securityData security
Data security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 

Similar to Information Privacy

CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
Jamie Hutt
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Handling information Standard by Skills for Care
Handling information Standard by Skills for CareHandling information Standard by Skills for Care
Handling information Standard by Skills for Care
Atlantic Training, LLC.
 
Standard 14
Standard 14Standard 14
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
Jamie Hutt
 
Ss
SsSs
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
DMI
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Abdah Munirah
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
Maher Alshammari
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11
mufalegend
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
czarviscayno
 
Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
AriantoMuditomo
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 

Similar to Information Privacy (20)

CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Handling information Standard by Skills for Care
Handling information Standard by Skills for CareHandling information Standard by Skills for Care
Handling information Standard by Skills for Care
 
Standard 14
Standard 14Standard 14
Standard 14
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
Ss
SsSs
Ss
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
Data protection act
Data protection act Data protection act
Data protection act
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 

Recently uploaded

ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens""Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
sameer shah
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 

Recently uploaded (20)

ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens""Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 

Information Privacy

  • 1. 1
  • 2. Submitted by:  Nimra Khan Lodhi  Hassan Iftikhar  Hawa Arif Khan  Mehreen Mehboob  Moobariz Khan Submitted to:  Ma’am Sehrish Tabassum 2
  • 3. Table of contents 3 1. Introduction to Information & Privacy 2. Introduction to Information privacy 3. Types of information 4. Types of privacy 5. Ways how to protect privacy 6. Laws of Privacy 7. Information privacy index 8. Future concerns about privacy
  • 4. What is Information & privacy?  Data that has been processed within a context in order to give it a meaning is referred to as Information. For example: Time table, merit list, report card, headed tables etc.  The ability of an individual or a group seclude themselves or information about themselves and express themselves selectively is termed as Privacy. For example: Online privacy is an example of privacy which includes all personal data that is given out during online interactions. 4
  • 5. What is Information Privacy?  It is the relationship between collection and dissemination of a) Technology b) Data c) Public expectation of privacy  It is the right of individuals and companies to restrict collection and use of information about them.  It is difficult to maintain today because data is stored online.  Employ monitoring is using computers to observe employee computer use. 5
  • 6. What are the types of Information? There is a large variety of Information that includes:  Healthcare records  Criminal records  Justice investigations and proceeding  Transactions  Biological traits  Residence and geographic records  Data traits  Credit card databases  Phone company databases  Relationship management databases 6
  • 7. What are the types of Privacy? Information privacy relates to different data types including:  Internet privacy: All personal data shared over the internet is subject to privacy issues.  Financial privacy: Financial information is particularly sensitive as it may easily be used to commit online or offline fraud.  Medical privacy: All medical records are subject to strict laws that address user access privileges.  Defensive privacy: It protects from transient financial loss resulting from information or theft. 7
  • 8. What are the laws of Privacy? Privacy laws are classified into: General Privacy law:  Overall bearing of individuals personal information and affects policies that govern many different areas of information.  Bankers and accountants follow this law to maintain individual’s secrecy. Specific Privacy law:  Designed to regulate specific types of information. Classifications of Privacy law:  Communication privacy laws  Financial privacy laws  Information privacy laws  Internet privacy laws (Online privacy) 8
  • 9. How can we protect our Information? 1. Fill in only necessary information on rebate, warranty, and registration forms. 2. If Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system 3. Install a cookie manager to filter cookies. 4. Do not reply to spam for any reason. 5. Clear your history file when you are finished browsing. 9 What are cookies? E-commerce and other Web applications often rely on cookies to identify users and customize Web pages. A cookie is a small text file that a Web server stores on your computer. What is spam? Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spam is Internet junk mail
  • 10. How can we protect our information?  Install a personal firewall  Turn off file and printer sharing on your Internet connection.  Sign up for e-mail filtering through your Internet access provider or use an anti- spam program such as Bright mail.  Avoid shopping club and buyer cards.  Purchase goods with cash, rather than credit or checks 10 What is Firewall? It is a system designed to prevent unauthorized access to or from private network. What is bright mail? It was a San Francisco based technology company focused on anti-spam filtering.
  • 11. Information privacy index 2019 Countries with best Privacy laws  Norway  Australia  Denmark  Sweden  Finland Countries with worst Privacy laws  China  Uzbekistan  Cambodia  Vietnam  Zimbabwe 11
  • 12. What are the future concerns about privacy? What is considered private information? Information that a user wishes to keep from public viewing. Credit card, social security and financial account numbers along with passwords to websites and other venues are commonly kept private. How to make information more accessible?  Accessibility is more important than the way a document looks like.  Don’t procedure documents that look like you don’t care.  Allow people enough time to give their feedback.  Always put accessibility first but take time and care when making your information accessible.  Write clear content. 12 What is meant by accessible? It is the information that people can understand. It means different things to different people.
  • 13. What are future concerns about privacy? How to evolve systems to prevent breaches?  Close opened ports  Run necessary updates  Backup your files  Secure your Wi-Fi  Check your security rating 13 What is breach? A breach is any incident that results in unauthorized access to data.
  • 14. 14 THANK YOU FOR YOUR ATTENTION!