SlideShare a Scribd company logo
Privacy Concerns Policy Discussion of INF 308K Internet Applications  1 2/20/2009
Outline Definitions & Contexts Ways in which Personal Information Gets Revealed (Consent, Controversy, & Violation) Solutions to Protect Online Privacy Discussion 2 2/20/2009
Definitions & Contexts 3 2/20/2009
What Is Privacy? Privacy -- the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.  -- a personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be.  4 2/20/2009
How our privacy is affected? Unsolicited Activities Physical Privacy Crime Done Online Informational Privacy Cybercrime Where your interests  MIGHT be compromised via the Internet  Where your interests  ARE immediately violated via the Internet 5 2/20/2009
Online Privacy The ability to control what information one reveals about oneself over the Internet, and to control who can access that information.  6 2/20/2009
How people are concerned? Concerns in dispute Internet Security Internet Privacy Where ordinary users are most concerned 7 2/20/2009
How they look at privacy? “Privacy is the future. Get used to it.”  -- Marc Rotenberg, Director, Electronic Privacy Information Centre - EPIC) (Fortune, 2001).  “You have zero privacy anyway. Get over it.”  -- Scott McNealy, CEO, Sun Microsystems, 1999  8 2/20/2009
How they look at privacy? "you have to realize that we're people and we just need privacy and we need our respect and these are just things you have to have as a human being."  -- Britney Spears    June15, 2006    NBC Dateline 9 2/20/2009
Sensitivity of Information (shared in online social networks) ,[object Object]
 Loss, misuse, modification or unauthorized access to sensitive information can adversely affect the privacy of an individual. 10 2/20/2009
How Your Personal Information Gets Revealed 11 2/20/2009
By ISP Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating. ISPs are capable of observing.   unencrypted data passing between you and the Internet, but not properly-encrypted data.    They are usually prevented to do so due to social pressure and law. 12 2/20/2009
By Email Emails May be inappropriately spread by the original receiver    May be intercepted May be legally viewed or disclosed by services providers or authorities. 13 2/20/2009
By Listserves & discussion groups There is no barrier for unsolicited messages or Emails within a mailing list or online discussion group. Any member of the list or group could collect and distribute your Email address and information you post. 14 2/20/2009
By Internet Browsers Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password.   You may accidentally reveal such information when using a browser on a public computer or someone’s. 15 2/20/2009
What cookie are? Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server.  Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts. Cookies are only data, not programs nor viruses 16 2/20/2009
Why some people dislike cookies?   Cookies can be hijacked and modified by attackers.  Cookies can be used to track browsing behavior so some think they are tagged.   17 2/20/2009
A Sample of Cookie ,[object Object],18 2/20/2009
By Search Engine Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time) 19 2/20/2009
What search engines did?    “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site.  Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.”     “In January 2006 the U.S. Department of Justice issued a subpoena asking popular search engines to provide a "random sampling" of 1 million IP addresses that used the search engine, and a random sampling of 1 million search queries submitted over a one-week period.  The government wanted the information to defend a child pornography law.  Microsoft, Yahoo, and AOL reportedly complied with the request, while Google fought the subpoena.” 20 2/20/2009
Privacy Policy Sample Clauses Yahoo:  “Yahoo! collects personal information when you register with Yahoo!, when you use Yahoo! products or services, when you visit Yahoo! pages or the pages of certain Yahoo! partners, and when you enter promotions or sweepstakes. Yahoo! may combine information about you that we have with information we obtain from business partners or other companies.” Google:  “Log information – When you access Google services, our servers automatically record information that your browser sends whenever you visit a website. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser. Also, in order to protect you from fraud, phishing, and other misconduct, we may collect information about your interaction with our services. Any such information we collect will only be used to detect and prevent fraud or other misconduct.” 21 2/20/2009
By indirect Marketing Web bugs:  a graphic (in a Web site or a graphic-enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewer. Third party cookies: a web page may contain images or other components stored on servers in other domains. Cookies that are set during retrieval of these components are called third-party cookies. 22 2/20/2009
By Direct Marketing Direct marketing is a sales pitch targeted to a person based on previous consumer choices.  It is ubiquitous these days. Many companies also sell or share your information to others. This Sharing with other businesses can be done rapidly and cheaply.  23 2/20/2009
By Instant Messaging Your IM conversation can be saved onto a computer even if only one person agrees.  Workplace IM can be monitored by your employer. Spim: Spam distributed in IM.  24 2/20/2009
By Social Networks, Blog & Personal Websites Employers and school officials are increasingly sensitive to the messages you convey in social networks.  25 2/20/2009
Too many cases to list “An October 2007 survey of employers found that 44% use social networking sites to obtain information about job applicants.  And 39% have searched such sites for information about current employees.” “In 2005 a Pennsylvania high school student was suspended for 10 days and transferred into an alternative education program after making an unflattering MySpace profile for his principal. The ACLU is currently representing the student in a lawsuit against the school district.” 26 2/20/2009
Want to a hacker? 27 2/20/2009
By Official Use Court records When you file a lawsuit for divorce or are a party to a civil lawsuit or criminal case, court records, are accessible to the public. Government  The government may want your personal information for law enforcement purposes as well as for foreign intelligence investigations.  Various laws govern these procedures.  28 2/20/2009
     According to a New York Times article (published February 4, 2006) AOL receives more than 1,000 subpoenas each month seeking information about AOL users.  Most of these subpoenas come from law enforcement and generally ask for the user’s name, address, records of when the individual signed on and off of the Internet, and the IP address.  29 2/20/2009
By Employers According to the 2005 Electronic Monitoring & Surveillance Survey from the American Management Association and The ePolicy Institute 76% of employers monitor employees' Web site connections; 65% use technology to block connections to banned Web sites; 55% monitor e-mail. 30 2/20/2009
By Cybercrime Spyware takes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge.  Phishing occurs when criminal lure the victim into providing financial data.  Pharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites. 31 2/20/2009
Solutions to Protect Online Privacy  32 2/20/2009
Cookie Controls 33 2/20/2009
Other Technical Resorts Anti-virus software Firewalls & Proxies Encryption tools Anonymizer 34 2/20/2009
The Platform for Privacy Preferences (P3P) developed by the World Wide Web Consortium (W3C), is a protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences. 35 2/20/2009
Legal Authorities  The Supreme Court has taken a hands-off approach to regulating the Internet in favor of free speech.   The federal government is increasingly interested in regulating the Internet, for example through child pornography and gambling laws.   The White House appears to welcome the lack of restriction on data sharing and surveillance.   36 2/20/2009
The Only Two Absolute Choices Insulate yourself from the Internet ,[object Object]

More Related Content

What's hot

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
Fairfax County
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Malware ppt
Malware pptMalware ppt
Malware ppt
Faiz Khan
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 

What's hot (20)

Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Similar to Internet Privacy

Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
University of Dayton
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
Aparna Sharma
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
Asim Sourav Rath
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
shanikosh
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruizlilyanariz
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
Adzappier
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
devashishicai
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacyapazooki2
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunities
morganjbruce
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
Cybermaterial
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Dr. Donald Macfarlane
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
DaliahSaper
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 

Similar to Internet Privacy (20)

Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Web 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and OpportunitiesWeb 2.0: Legal Issues and Opportunities
Web 2.0: Legal Issues and Opportunities
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Internet Privacy

  • 1. Privacy Concerns Policy Discussion of INF 308K Internet Applications 1 2/20/2009
  • 2. Outline Definitions & Contexts Ways in which Personal Information Gets Revealed (Consent, Controversy, & Violation) Solutions to Protect Online Privacy Discussion 2 2/20/2009
  • 4. What Is Privacy? Privacy -- the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. -- a personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be. 4 2/20/2009
  • 5. How our privacy is affected? Unsolicited Activities Physical Privacy Crime Done Online Informational Privacy Cybercrime Where your interests MIGHT be compromised via the Internet Where your interests ARE immediately violated via the Internet 5 2/20/2009
  • 6. Online Privacy The ability to control what information one reveals about oneself over the Internet, and to control who can access that information. 6 2/20/2009
  • 7. How people are concerned? Concerns in dispute Internet Security Internet Privacy Where ordinary users are most concerned 7 2/20/2009
  • 8. How they look at privacy? “Privacy is the future. Get used to it.” -- Marc Rotenberg, Director, Electronic Privacy Information Centre - EPIC) (Fortune, 2001). “You have zero privacy anyway. Get over it.” -- Scott McNealy, CEO, Sun Microsystems, 1999 8 2/20/2009
  • 9. How they look at privacy? "you have to realize that we're people and we just need privacy and we need our respect and these are just things you have to have as a human being." -- Britney Spears    June15, 2006    NBC Dateline 9 2/20/2009
  • 10.
  • 11. Loss, misuse, modification or unauthorized access to sensitive information can adversely affect the privacy of an individual. 10 2/20/2009
  • 12. How Your Personal Information Gets Revealed 11 2/20/2009
  • 13. By ISP Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating. ISPs are capable of observing. unencrypted data passing between you and the Internet, but not properly-encrypted data. They are usually prevented to do so due to social pressure and law. 12 2/20/2009
  • 14. By Email Emails May be inappropriately spread by the original receiver May be intercepted May be legally viewed or disclosed by services providers or authorities. 13 2/20/2009
  • 15. By Listserves & discussion groups There is no barrier for unsolicited messages or Emails within a mailing list or online discussion group. Any member of the list or group could collect and distribute your Email address and information you post. 14 2/20/2009
  • 16. By Internet Browsers Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password. You may accidentally reveal such information when using a browser on a public computer or someone’s. 15 2/20/2009
  • 17. What cookie are? Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server. Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts. Cookies are only data, not programs nor viruses 16 2/20/2009
  • 18. Why some people dislike cookies? Cookies can be hijacked and modified by attackers. Cookies can be used to track browsing behavior so some think they are tagged. 17 2/20/2009
  • 19.
  • 20. By Search Engine Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time) 19 2/20/2009
  • 21. What search engines did? “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site. Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.” “In January 2006 the U.S. Department of Justice issued a subpoena asking popular search engines to provide a "random sampling" of 1 million IP addresses that used the search engine, and a random sampling of 1 million search queries submitted over a one-week period.  The government wanted the information to defend a child pornography law.  Microsoft, Yahoo, and AOL reportedly complied with the request, while Google fought the subpoena.” 20 2/20/2009
  • 22. Privacy Policy Sample Clauses Yahoo: “Yahoo! collects personal information when you register with Yahoo!, when you use Yahoo! products or services, when you visit Yahoo! pages or the pages of certain Yahoo! partners, and when you enter promotions or sweepstakes. Yahoo! may combine information about you that we have with information we obtain from business partners or other companies.” Google: “Log information – When you access Google services, our servers automatically record information that your browser sends whenever you visit a website. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser. Also, in order to protect you from fraud, phishing, and other misconduct, we may collect information about your interaction with our services. Any such information we collect will only be used to detect and prevent fraud or other misconduct.” 21 2/20/2009
  • 23. By indirect Marketing Web bugs: a graphic (in a Web site or a graphic-enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewer. Third party cookies: a web page may contain images or other components stored on servers in other domains. Cookies that are set during retrieval of these components are called third-party cookies. 22 2/20/2009
  • 24. By Direct Marketing Direct marketing is a sales pitch targeted to a person based on previous consumer choices. It is ubiquitous these days. Many companies also sell or share your information to others. This Sharing with other businesses can be done rapidly and cheaply.  23 2/20/2009
  • 25. By Instant Messaging Your IM conversation can be saved onto a computer even if only one person agrees. Workplace IM can be monitored by your employer. Spim: Spam distributed in IM. 24 2/20/2009
  • 26. By Social Networks, Blog & Personal Websites Employers and school officials are increasingly sensitive to the messages you convey in social networks.  25 2/20/2009
  • 27. Too many cases to list “An October 2007 survey of employers found that 44% use social networking sites to obtain information about job applicants. And 39% have searched such sites for information about current employees.” “In 2005 a Pennsylvania high school student was suspended for 10 days and transferred into an alternative education program after making an unflattering MySpace profile for his principal. The ACLU is currently representing the student in a lawsuit against the school district.” 26 2/20/2009
  • 28. Want to a hacker? 27 2/20/2009
  • 29. By Official Use Court records When you file a lawsuit for divorce or are a party to a civil lawsuit or criminal case, court records, are accessible to the public. Government  The government may want your personal information for law enforcement purposes as well as for foreign intelligence investigations.  Various laws govern these procedures.  28 2/20/2009
  • 30. According to a New York Times article (published February 4, 2006) AOL receives more than 1,000 subpoenas each month seeking information about AOL users.  Most of these subpoenas come from law enforcement and generally ask for the user’s name, address, records of when the individual signed on and off of the Internet, and the IP address.  29 2/20/2009
  • 31. By Employers According to the 2005 Electronic Monitoring & Surveillance Survey from the American Management Association and The ePolicy Institute 76% of employers monitor employees' Web site connections; 65% use technology to block connections to banned Web sites; 55% monitor e-mail. 30 2/20/2009
  • 32. By Cybercrime Spyware takes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge.  Phishing occurs when criminal lure the victim into providing financial data. Pharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites. 31 2/20/2009
  • 33. Solutions to Protect Online Privacy 32 2/20/2009
  • 34. Cookie Controls 33 2/20/2009
  • 35. Other Technical Resorts Anti-virus software Firewalls & Proxies Encryption tools Anonymizer 34 2/20/2009
  • 36. The Platform for Privacy Preferences (P3P) developed by the World Wide Web Consortium (W3C), is a protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences. 35 2/20/2009
  • 37. Legal Authorities The Supreme Court has taken a hands-off approach to regulating the Internet in favor of free speech.   The federal government is increasingly interested in regulating the Internet, for example through child pornography and gambling laws.   The White House appears to welcome the lack of restriction on data sharing and surveillance.   36 2/20/2009
  • 38.
  • 39. learn to safeguard your privacy with a minimum sacrifice of convenience 37 2/20/2009
  • 40. Discussion How do you draw the line on online Privacy? Have you had or heard any bad experience in which one’s privacy was invaded over the internet? You might want to put forth such a real-life example to alert us. What do you think of P3P? Any suggestions on how to improve it? Any conceptual solutions to the general public’s anxiety over online privacy invasion? 38 2/20/2009