SlideShare a Scribd company logo
1 of 9
Privacy
What is Privacy ??
• Claim of individuals to be left alone,
• Free from surveillance or interference from other individuals, organizations,
or the state
• Ability to control Information about yourself
• Privacy is sometimes related to anonymity, the wish to remain unnoticed or
unidentified in the public
How our
Personal
Information
Gets Revealed ???
E.g. of Privacy Issues
• Violation of Privacy
• Computer Monitoring
• Computer Matching
• Unauthorized Personal Files
By ISP (Internet Service Provider)
• Internet Service Providers (ISP) always know your IP address and the IP
address to which you are communicating
• ISPs are capable of observing unencrypted data passing between you and
the Internet, but not properly-encrypted data
• They are usually prevented to do so due to social pressure and law.
Solutions to Protect Privacy Online
• Cookie Control
• EncryptionTools
• FireWalls
By Internet Browser
• Most web browsers can save some forms of personal data, such as browsing
history, cookies, web form entries and password
• You may accidentally reveal such information when using a browser on a
public computer or someone else's.
Protect
your
privacy
on the Web
When surfing the
internet, avoid “free”
offers and protect
your information!
Chatting – guard
your information
unless
You are 100%
Sure who you are
chatting with.
Cookies aren’t just
for eating, they may
be sending your
personal information
to others.
Protect your
passwords
like you would your
wallet or car keys.
Make it complicate!
E-mail is not
secure and should
never be though
of as private.
Don’t even
open Spam,
download
a spam buster!
Beware of phishing,
which are fake e-
mails
Sent to try to gain
your personal and
financial information.
Slides ByTalha Mudassar
Thank you very much for viewing ……… any question???

More Related Content

What's hot

Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
What is Web-scraping?
What is Web-scraping?What is Web-scraping?
What is Web-scraping?Yu-Chang Ho
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Web Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen ScrapingWeb Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen ScrapingCynthiaCruz55
 

What's hot (20)

Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Data protection
Data protectionData protection
Data protection
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Data security
Data securityData security
Data security
 
What is Web-scraping?
What is Web-scraping?What is Web-scraping?
What is Web-scraping?
 
Email investigation
Email investigationEmail investigation
Email investigation
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Web Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen ScrapingWeb Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen Scraping
 
Security policies
Security policiesSecurity policies
Security policies
 

Viewers also liked

Julie kelly resume[1]
Julie kelly resume[1]Julie kelly resume[1]
Julie kelly resume[1]Julie Kelly
 
Primer pleno constitucional y contencioso administrativo
Primer pleno constitucional y contencioso administrativoPrimer pleno constitucional y contencioso administrativo
Primer pleno constitucional y contencioso administrativoMassey Abogados (Oscar Massey)
 
Geothermal energy by babar and saad
Geothermal energy by babar and saadGeothermal energy by babar and saad
Geothermal energy by babar and saadfauzia samreen
 
Pediatric pulseless arrest
Pediatric pulseless arrestPediatric pulseless arrest
Pediatric pulseless arrestRunal Shah
 
Jorge y su papá, Marco, hablan de remo.
Jorge y su papá, Marco, hablan de remo.Jorge y su papá, Marco, hablan de remo.
Jorge y su papá, Marco, hablan de remo.anaburduliz
 
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...Amazon Web Services
 
Geothermal Energy and India's scenario
Geothermal Energy and India's scenarioGeothermal Energy and India's scenario
Geothermal Energy and India's scenarioPiyush Ikhar
 
Tracxn Research — IoT Infrastructure Landscape, September 2016
Tracxn Research —  IoT Infrastructure Landscape, September 2016Tracxn Research —  IoT Infrastructure Landscape, September 2016
Tracxn Research — IoT Infrastructure Landscape, September 2016Tracxn
 
Tracxn Insurance Tech Landscape June 2016 Report
Tracxn Insurance Tech Landscape June 2016 ReportTracxn Insurance Tech Landscape June 2016 Report
Tracxn Insurance Tech Landscape June 2016 ReportTracxn
 
Ocean Thermal energy conversion (OTEC)
Ocean Thermal energy conversion (OTEC)Ocean Thermal energy conversion (OTEC)
Ocean Thermal energy conversion (OTEC)Patnam Shruthi
 
Pak china economic corridor
Pak china economic corridorPak china economic corridor
Pak china economic corridorAbdul Haseeb
 
AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...
AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...
AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...Amazon Web Services
 

Viewers also liked (17)

Engargolado
EngargoladoEngargolado
Engargolado
 
Julie kelly resume[1]
Julie kelly resume[1]Julie kelly resume[1]
Julie kelly resume[1]
 
Primer pleno constitucional y contencioso administrativo
Primer pleno constitucional y contencioso administrativoPrimer pleno constitucional y contencioso administrativo
Primer pleno constitucional y contencioso administrativo
 
Geothermal energy by babar and saad
Geothermal energy by babar and saadGeothermal energy by babar and saad
Geothermal energy by babar and saad
 
Sentencia absolutoria caso diarios chicha
Sentencia absolutoria caso diarios chichaSentencia absolutoria caso diarios chicha
Sentencia absolutoria caso diarios chicha
 
Pediatric pulseless arrest
Pediatric pulseless arrestPediatric pulseless arrest
Pediatric pulseless arrest
 
Location plans page 1
Location plans  page 1 Location plans  page 1
Location plans page 1
 
Jorge y su papá, Marco, hablan de remo.
Jorge y su papá, Marco, hablan de remo.Jorge y su papá, Marco, hablan de remo.
Jorge y su papá, Marco, hablan de remo.
 
Solicito prescripcion vehicular via notarial
Solicito prescripcion vehicular via notarialSolicito prescripcion vehicular via notarial
Solicito prescripcion vehicular via notarial
 
Ocean energy
Ocean energyOcean energy
Ocean energy
 
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
AWS re:Invent 2016: Microservices, Macro Security Needs: How Nike Uses a Mult...
 
Geothermal Energy and India's scenario
Geothermal Energy and India's scenarioGeothermal Energy and India's scenario
Geothermal Energy and India's scenario
 
Tracxn Research — IoT Infrastructure Landscape, September 2016
Tracxn Research —  IoT Infrastructure Landscape, September 2016Tracxn Research —  IoT Infrastructure Landscape, September 2016
Tracxn Research — IoT Infrastructure Landscape, September 2016
 
Tracxn Insurance Tech Landscape June 2016 Report
Tracxn Insurance Tech Landscape June 2016 ReportTracxn Insurance Tech Landscape June 2016 Report
Tracxn Insurance Tech Landscape June 2016 Report
 
Ocean Thermal energy conversion (OTEC)
Ocean Thermal energy conversion (OTEC)Ocean Thermal energy conversion (OTEC)
Ocean Thermal energy conversion (OTEC)
 
Pak china economic corridor
Pak china economic corridorPak china economic corridor
Pak china economic corridor
 
AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...
AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...
AWS re:Invent 2016: Visualizing Big Data Insights with Amazon QuickSight (BDM...
 

Similar to Privacy

How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxLimeJuice5
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftMary Lou Roberts
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxTimBee1
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxTimBee1
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 

Similar to Privacy (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptx
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptx
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Privacy

  • 2. What is Privacy ?? • Claim of individuals to be left alone, • Free from surveillance or interference from other individuals, organizations, or the state • Ability to control Information about yourself • Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public
  • 4. E.g. of Privacy Issues • Violation of Privacy • Computer Monitoring • Computer Matching • Unauthorized Personal Files
  • 5. By ISP (Internet Service Provider) • Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating • ISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data • They are usually prevented to do so due to social pressure and law.
  • 6. Solutions to Protect Privacy Online • Cookie Control • EncryptionTools • FireWalls
  • 7. By Internet Browser • Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password • You may accidentally reveal such information when using a browser on a public computer or someone else's.
  • 8. Protect your privacy on the Web When surfing the internet, avoid “free” offers and protect your information! Chatting – guard your information unless You are 100% Sure who you are chatting with. Cookies aren’t just for eating, they may be sending your personal information to others. Protect your passwords like you would your wallet or car keys. Make it complicate! E-mail is not secure and should never be though of as private. Don’t even open Spam, download a spam buster! Beware of phishing, which are fake e- mails Sent to try to gain your personal and financial information.
  • 9. Slides ByTalha Mudassar Thank you very much for viewing ……… any question???