SlideShare a Scribd company logo
1 of 23
Privacy Issues and Emerging Technologies Photo: JonJon2k8 -Flickr
Some believe that new technologies such as cell phones and Facebook are bringing people closer together, but they are also creating privacy issues and concerns Photo: Rob Campbell -Flickr
The Growing Popularity of Facebook has caused several privacy concerns, which are often overlooked by its millions of users   Photo: Marco Paköeningrat – Flickr
In December 2009 Facebook changed its settings to make some data public by requirement and some by default  Photo: Mcdordor2001 - Flickr
This can be potentially problematic for people who may have nothing to hide but prefer that all of their information be kept private Photo: Jorge Ramírez - Flickr
In August 2009 five plaintiffs filed a civil lawsuit against Facebook claiming that the site violates consumer privacy laws in California. The complaint accused the site of violating the law by disclosing private information to third parties for commercial use (Musil).   Photo: Charlotte Road - Flickr
An Investigation by Canada’s privacy commissioner in July 2009 revealed that Facebook is unconcerned with its users privacy and should do more to protect their privacy.
A major concern expressed by the commissioner was that it is unclear how members can delete their accounts rather then deactivate them. This means that Facebook could keep user data for an unknown amount of time which violates Canadian privacy laws
Although there are several privacy concerns surrounding Facebook it has not stopped several million users from keeping their accounts active  Facebook continues to grow in popularity and constantly gains new users
Introducing newsfeed in 2006 led to major member backlash. However, in the last five years the majority of people have come to accept the newsfeed and the number of Facebook users continues to grow.  Image: cbhdesign -Flickr
41% of people aged 8-17 have their profile privacy settings set to the default setting  Photo –Megan Brown –Flickr
	        OPEN
This means that their profile is visible to anyone
“Get Safe Online Research” found that 25% of registered users on Social Networking Sites posted sensitive personal information on their profiles
This personal data included, phone number, home address or email address
It has been discovered that smartphones which run Google’s android system can track its users locations and store the data in the phone
The Cellebrite UFED is able to pull information from cell phones, smart phones, Android  devices, Iphones and Ipods Photo - http://www.popularmechanics.com/technology/gadgets/news/are-smartphone-searches-legal-5603061?src=rss
Police are able to use this device to scan the contents of your phone during a traffic stop
Your smartphone contains a lot of personal information including your emails, your contacts, where you have been and what you have done  Photo- freedomONE1 -Flicker
It is scary to think your phone contains information about who you know, what you have said to them, where you have been and with whom Photo- Globwon –Online -Flickr
The amount of information stored on your phone becomes a privacy concern when you consider the consequences if you lost it or it was stolen
It is scary to think how much one little device is able to reveal about your life to the police or a complete stranger and the damage that could be done if it were to fall into the wrong hands
Sources: Images: Flickr.com Text :http://www.popularmechanics.com/technology/gadgets/news/are-smartphone-searches-legal-5603061?src=rss http://www.readwriteweb.com/archives/Android_phones_track_your_location_too.php http://www.readwriteweb.com/archives/why_facebook_is_wrong_about_privacy.php http://socialmediastatistics.wikidot.com/privacy-and-safety http://news.cnet.com/8301-1023_3-10311625-93.html

More Related Content

What's hot

RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Analyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery StrategyAnalyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery StrategyHudsonLegal
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Social Media Recent Survey Psychology
Social Media  Recent Survey PsychologySocial Media  Recent Survey Psychology
Social Media Recent Survey PsychologyShow To Clients
 
(403666543) tc2
(403666543) tc2(403666543) tc2
(403666543) tc2Marcie22
 
Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet ageCliff Landis
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaTou Lee Yang
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect StormJoanne Jacobs
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010megan.fitzgibbons
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy PrimerBrett Elphick
 

What's hot (20)

RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Media Law
Media LawMedia Law
Media Law
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Analyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery StrategyAnalyzing the Impact and Influence of Social Networking on E-Discovery Strategy
Analyzing the Impact and Influence of Social Networking on E-Discovery Strategy
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Social Media Recent Survey Psychology
Social Media  Recent Survey PsychologySocial Media  Recent Survey Psychology
Social Media Recent Survey Psychology
 
(403666543) tc2
(403666543) tc2(403666543) tc2
(403666543) tc2
 
Privacy and education in the internet age
Privacy and education in the internet agePrivacy and education in the internet age
Privacy and education in the internet age
 
Show&tell
Show&tellShow&tell
Show&tell
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Converging Communications: The Perfect Storm
Converging Communications: The Perfect StormConverging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy Primer
 
Social Media&Business Case Terenure Nov13th1.1
Social Media&Business Case Terenure Nov13th1.1Social Media&Business Case Terenure Nov13th1.1
Social Media&Business Case Terenure Nov13th1.1
 

Viewers also liked

Cellebrite Sales Pitch
Cellebrite Sales PitchCellebrite Sales Pitch
Cellebrite Sales PitchModicum
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Cellebrite
 
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldCellebrite
 
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidenceCellebrite
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 

Viewers also liked (8)

6. Carlos Jaramillo - CELLEBRITE.
6. Carlos Jaramillo - CELLEBRITE.6. Carlos Jaramillo - CELLEBRITE.
6. Carlos Jaramillo - CELLEBRITE.
 
Cellebrite Sales Pitch
Cellebrite Sales PitchCellebrite Sales Pitch
Cellebrite Sales Pitch
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
 
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device Evidence
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 

Similar to Presentation3

Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption disputeHaniAbdallah4
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementWilliamjohnesUK123
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Aleque Juneau
 
Fostering Community With Social Media - Midwest Newspaper Summit 2010
Fostering Community With Social Media - Midwest Newspaper Summit 2010Fostering Community With Social Media - Midwest Newspaper Summit 2010
Fostering Community With Social Media - Midwest Newspaper Summit 2010Nathan Wright
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook ControversiesInternet Law Center
 
ArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docxArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docxdavezstarr61655
 
Digital Technology for a Digitized Culture
Digital Technology for a Digitized CultureDigital Technology for a Digitized Culture
Digital Technology for a Digitized Culturesamanthawymes
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docxgekas1
 
Slides
SlidesSlides
Slidesrkc20
 
Rethinking Bubbles
Rethinking BubblesRethinking Bubbles
Rethinking Bubbleshblowers
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter AppsSara Dow
 

Similar to Presentation3 (20)

Film 315 slides
Film 315 slidesFilm 315 slides
Film 315 slides
 
Film 315 Presentation
Film 315 PresentationFilm 315 Presentation
Film 315 Presentation
 
Film 315 presentation
Film 315 presentationFilm 315 presentation
Film 315 presentation
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcement
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Fostering Community With Social Media - Midwest Newspaper Summit 2010
Fostering Community With Social Media - Midwest Newspaper Summit 2010Fostering Community With Social Media - Midwest Newspaper Summit 2010
Fostering Community With Social Media - Midwest Newspaper Summit 2010
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook Controversies
 
ArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docxArticleFacebook Ignites Debate Over Third-Party Access to User.docx
ArticleFacebook Ignites Debate Over Third-Party Access to User.docx
 
Darkside
DarksideDarkside
Darkside
 
Digital Technology for a Digitized Culture
Digital Technology for a Digitized CultureDigital Technology for a Digitized Culture
Digital Technology for a Digitized Culture
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docx
 
Slides
SlidesSlides
Slides
 
Rethinking Bubbles
Rethinking BubblesRethinking Bubbles
Rethinking Bubbles
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 

Presentation3

  • 1. Privacy Issues and Emerging Technologies Photo: JonJon2k8 -Flickr
  • 2. Some believe that new technologies such as cell phones and Facebook are bringing people closer together, but they are also creating privacy issues and concerns Photo: Rob Campbell -Flickr
  • 3. The Growing Popularity of Facebook has caused several privacy concerns, which are often overlooked by its millions of users Photo: Marco Paköeningrat – Flickr
  • 4. In December 2009 Facebook changed its settings to make some data public by requirement and some by default Photo: Mcdordor2001 - Flickr
  • 5. This can be potentially problematic for people who may have nothing to hide but prefer that all of their information be kept private Photo: Jorge Ramírez - Flickr
  • 6. In August 2009 five plaintiffs filed a civil lawsuit against Facebook claiming that the site violates consumer privacy laws in California. The complaint accused the site of violating the law by disclosing private information to third parties for commercial use (Musil). Photo: Charlotte Road - Flickr
  • 7. An Investigation by Canada’s privacy commissioner in July 2009 revealed that Facebook is unconcerned with its users privacy and should do more to protect their privacy.
  • 8. A major concern expressed by the commissioner was that it is unclear how members can delete their accounts rather then deactivate them. This means that Facebook could keep user data for an unknown amount of time which violates Canadian privacy laws
  • 9. Although there are several privacy concerns surrounding Facebook it has not stopped several million users from keeping their accounts active Facebook continues to grow in popularity and constantly gains new users
  • 10. Introducing newsfeed in 2006 led to major member backlash. However, in the last five years the majority of people have come to accept the newsfeed and the number of Facebook users continues to grow. Image: cbhdesign -Flickr
  • 11. 41% of people aged 8-17 have their profile privacy settings set to the default setting Photo –Megan Brown –Flickr
  • 12. OPEN
  • 13. This means that their profile is visible to anyone
  • 14. “Get Safe Online Research” found that 25% of registered users on Social Networking Sites posted sensitive personal information on their profiles
  • 15. This personal data included, phone number, home address or email address
  • 16. It has been discovered that smartphones which run Google’s android system can track its users locations and store the data in the phone
  • 17. The Cellebrite UFED is able to pull information from cell phones, smart phones, Android devices, Iphones and Ipods Photo - http://www.popularmechanics.com/technology/gadgets/news/are-smartphone-searches-legal-5603061?src=rss
  • 18. Police are able to use this device to scan the contents of your phone during a traffic stop
  • 19. Your smartphone contains a lot of personal information including your emails, your contacts, where you have been and what you have done Photo- freedomONE1 -Flicker
  • 20. It is scary to think your phone contains information about who you know, what you have said to them, where you have been and with whom Photo- Globwon –Online -Flickr
  • 21. The amount of information stored on your phone becomes a privacy concern when you consider the consequences if you lost it or it was stolen
  • 22. It is scary to think how much one little device is able to reveal about your life to the police or a complete stranger and the damage that could be done if it were to fall into the wrong hands
  • 23. Sources: Images: Flickr.com Text :http://www.popularmechanics.com/technology/gadgets/news/are-smartphone-searches-legal-5603061?src=rss http://www.readwriteweb.com/archives/Android_phones_track_your_location_too.php http://www.readwriteweb.com/archives/why_facebook_is_wrong_about_privacy.php http://socialmediastatistics.wikidot.com/privacy-and-safety http://news.cnet.com/8301-1023_3-10311625-93.html