SlideShare a Scribd company logo
Privacy in simple
By
Aurora Computer Studies
(auoracs.lk)
1
What is privacy?
• “The right to be left alone"
• “The state or condition of being free
from being observed or disturbed by
other people.”
• “The state of being free from public
attention.”
Aurora Computer Studies
(www.auroracs.lk)
2
Aspects of privacy
• Secrecy, or the option to conceal any
information from others
• The option to limit the access others
have to one's personal information
• Personhood and autonomy
• protection of intimate relationships
Aurora Computer Studies
(www.auroracs.lk)
3
Privacy information
• Health related
• Personal finance related
• Political view (voting) related
• Intimate relationships
• Any other personal information
o Residential information
o Contact details
Aurora Computer Studies
(www.auroracs.lk)
4
Possible conflicting situations
• Financial privacy Vs. taxation laws
• Criminal investigation
• Contingency situations
• Freedom of expression vs. privacy of
individual
Aurora Computer Studies
(www.auroracs.lk)
5
Note: Strict statutory rules and/or ethical
norms must be followed.
Possible privacy violations
• Surveillance
o Surveillance without informing
o Excessive monitoring
• Hacking systems
o Hacking information systems and stealing personal data
• It is a obligation of the organization/individual who
collect privacy data to secure those.
• Blackmailing
o Publishing of intimacy related information with vicious
intents
Aurora Computer Studies
(www.auroracs.lk)
6
Possible privacy violations (Con.)
• Identity theft
o Social media/e-mail/banking account identity is hacked.
• Loosing one’s laptop/ notebook/
smartphone
o Possible loss of identities (username/passwords)
o Possible loss of privacy contents
• Privacy data collected by OS and other
internet related systems and apps like;
o Social media
o Search engines
o Geographical Information Systems like Google Map/Street views
Aurora Computer Studies
(www.auroracs.lk)
7
Search engine related privacy
concerns
• Most search engines gather
individual’s search history to provide
them with better search results
• At the same time it compromise
privacy
Aurora Computer Studies
(www.auroracs.lk)
8
Social media related privacy concerns
• Social media gather user’s behavioral
patterns to provide with better
contents and also targeted
advertising.
Aurora Computer Studies
(www.auroracs.lk)
9
Google map related privacy
concerns
• User’s traveling and movements are
tracked and traced through GPS
Aurora Computer Studies
(www.auroracs.lk)
10
Google street views related
privacy concerns
• Pictures of individuals houses are
captured and displayed which is raised
as a privacy concern by some people.
• Street view camera may capture some
privacy related incidents like;
o Picture exposing someone’s job or job place
o Someone visiting a particular sensitive place like
hospital/clinic
o Security concerns like burglary
Aurora Computer Studies
(www.auroracs.lk)
11
Actions taken for online privacy
concerns
• Well defined privacy policies
• Strict security measures to protect
collected data
• Strict employee regulations to prevent
access to individual data
• Mechanism to report privacy concerns or
inappropriate materials
• Remove certain contents from their
systems on request by individuals having
privacy concern
Aurora Computer Studies
(www.auroracs.lk)
12
How to preserve privacy?
• Frequently change password of
important user accounts
• Do not install suspicious software and
browser plugins that may collect your
privacy data
• Keep sensitive data encrypted
• Provide only the minimum required
data to third parties
Aurora Computer Studies
(www.auroracs.lk)
13
How to preserve privacy? (Con.)
• Protect your laptop/smart phone
• Backup and delete all sensitive data
before hand over your electronic
devices for repair
• Delete all the data before discard
your electronic devices
• Protest against unethical excessive
monitoring
Aurora Computer Studies
(www.auroracs.lk)
14
How to preserve privacy? (Con.)
• How Google street view address
privacy concerns
o Reporting mechanism
o Blurring facility for privacy concerns
o Quality filters on crowed sourced contents
• https://www.google.com/streetview/pri
vacy/
Aurora Computer Studies
(www.auroracs.lk)
15
Privacy Aspects for
Corporations Handling
Sensitive Data
Aurora Computer Studies (auroracs.lk) 16
Source of privacy data
• Employees data
• Customer’s data
• Any other third party data collected
Aurora Computer Studies
(www.auroracs.lk)
17
Aspects
• Legal aspects
o EU data protection directive
o UK data protection act
o USA acts on privacy
• Ethical aspects
Aurora Computer Studies
(www.auroracs.lk)
18
EU data protection directive
• The seven principles governing the
protection of personal data
1. Notice
• Data subjects should be given notice when their
data is being collected
2. Purpose
• data should only be used for the purpose stated
and not for any other purposes
3. Consent
• data should not be disclosed without the data
subject’s consent
Aurora Computer Studies
(www.auroracs.lk)
19
EU data protection directive (Con.)
4. Security
• Collected data should be kept secure from any
potential abuses
5. Disclosure
• data subjects should be informed as to who is
collecting their data
6. Access
• data subjects should be allowed to access their data
and make corrections to any inaccurate data
7. Accountability
• data subjects should have a method available to them
to hold data collectors accountable for not following
the above principles
Aurora Computer Studies
(www.auroracs.lk)
20
UK Data Protection Act
• Based on following principles (Also
known as Yong’s principles)
1. Personal data shall be processed fairly and lawfully.
2. Personal data shall be obtained only for one or more
specified and lawful purposes, and shall not be
further processed for any other purposes.
3. Personal data shall be adequate, relevant and not
excessive in relation to the purpose(s).
4. Personal data shall be accurate and, where
necessary, kept up to date
Aurora Computer Studies
(www.auroracs.lk)
21
UK Data Protection Act (Con.)
5. Personal data shall not be kept for longer than is
necessary for that purpose(s).
6. Personal data shall be processed in accordance with the
rights of data subjects (individuals).
7. Appropriate technical and organizational measures shall
be taken against unauthorized or unlawful processing of
personal data and against accidental loss or destruction
of, or damage to, personal data.
8. Personal data shall not be transferred to a country or
territory outside the European Economic Area unless that
country or territory ensures an adequate level of
protection for the rights and freedoms of data.
Aurora Computer Studies
(www.auroracs.lk)
22
USA acts on privacy
• Health Insurance Portability and
Accountability Act –1996 (HIPAA)
• Children’s Online Privacy Protection
Act -1998 (COPPA)
• Family Education Rights and Privacy
Act –1974 (FERPA)
• Gramm-Leach-Bliley Act -1999
Aurora Computer Studies
(www.auroracs.lk)
23
HIPAA - 1996
• Health Insurance Portability and
Accountability Act (HIPAA)
• Idea
o Established procedures for the exercise of individual
health information privacy rights.
o The use and disclosure of individual health
information should be authorized or required.
Aurora Computer Studies
(www.auroracs.lk)
24
COPPA - 1998
• The primary goal of COPPA is to
place parents in control (consent)
over what information is collected
from their young children online.
• The Rule was designed to protect
children under age 13 while
accounting for the dynamic nature of
the Internet.
Aurora Computer Studies
(www.auroracs.lk)
25
FERPA - 1974
• Family Education Rights and Privacy
Act
• Assigns rights to parents regarding
their children’s education records
• Rights transfer to student once
student becomes 18
Aurora Computer Studies
(www.auroracs.lk)
26
Gramm-Leach-Bliley Act -1999
• Also known as the Financial Modernization Act
of 1999
• A federal law enacted in the United States to
control the ways that financial institutions deal
with the private information of individuals.
• companies that offer consumers financial
products or services like loans, financial or
investment advice, or insurance requires to
explain their information-sharing practices to
their customers and to safeguard sensitive data.
Aurora Computer Studies
(www.auroracs.lk)
27
References
• https://en.wikipedia.org/wiki/Privacy
• https://en.wikipedia.org/wiki/Surveillance
• https://en.wikipedia.org/wiki/Data_Protection_Dir
ective
• https://en.wikipedia.org/wiki/Data_Protection_Act
_1998
• https://en.wikipedia.org/wiki/Information_privacy
_law#United_States
• https://www.google.com/streetview/privacy/
Aurora Computer Studies
(www.auroracs.lk)
28
Thank You !
Presented by
Aurora Computer Studies
(auoracs.lk)
Aurora Computer Studies
(www.auroracs.lk)
29
"We are what we repeatedly do.
Excellence, then, is not an act,
but a habit."
~ Aristotle.
Aurora Computer Studies
(www.auroracs.lk)
30
You may also interested in
“How to be a real professional”
http://www.slideshare.net/auroracslk/how-to-
be-a-real-professional
Aurora Computer Studies
(www.auroracs.lk)
31
Contact Information
Premier Study Center
Aurora Computer Studies,
Summerset College,
# 135, 3rd Floor,
DFCC Building,
High Level Road,
Maharagama.
0115 690 290
City Study Center
Aurora Computer Studies,
Summerset College,
# 88/2, 2nd Floor,
BOC Building,
High Level Road,
Kirulapone, Colombo 06
0703 001 010
For further details and enquiries :
Call - 0719 842030
E-mail – info@auroracs.lk
Web - www.auroracs.lk
Aurora Computer Studies www.auroracs.lk 32

More Related Content

What's hot

Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
Jisc Scotland
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
Mark Jhon Oxillo
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Upekha Vandebona
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 

What's hot (20)

Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data protection
Data protectionData protection
Data protection
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Privacy in simple

4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
SherifElGohary7
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
Endcode_org
 
Gary Davis
Gary DavisGary Davis
Gary Davis
dri_ireland
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)
EmilyDShaw
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
Brian Miller, Solicitor
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 
What is the GDPR & What does it mean for YOUR business?
What is the GDPR & What does it mean for YOUR business?What is the GDPR & What does it mean for YOUR business?
What is the GDPR & What does it mean for YOUR business?
Nexsen Pruet
 
Data protection-training
Data protection-trainingData protection-training
Data protection-trainingJames Wright
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
ARDC
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislationjonbarclay
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
schermerbw
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Kimberly Verska
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
CILIPScotland
 
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson LLP
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
CloudWATCH Consortium
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 

Similar to Privacy in simple (20)

4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Gary Davis
Gary DavisGary Davis
Gary Davis
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 
What is the GDPR & What does it mean for YOUR business?
What is the GDPR & What does it mean for YOUR business?What is the GDPR & What does it mean for YOUR business?
What is the GDPR & What does it mean for YOUR business?
 
Data protection-training
Data protection-trainingData protection-training
Data protection-training
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Guernsey Data Protection Legislation
Guernsey Data Protection LegislationGuernsey Data Protection Legislation
Guernsey Data Protection Legislation
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
 
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017
 
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017GDPR clinic - CloudWATCH at Cloud Security Expo 2017
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 

More from Aurora Computer Studies

Learning English as a Second Language
Learning English as a Second LanguageLearning English as a Second Language
Learning English as a Second Language
Aurora Computer Studies
 
Characteristics of laders
Characteristics of laders Characteristics of laders
Characteristics of laders
Aurora Computer Studies
 
නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග
Aurora Computer Studies
 
How to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfullyHow to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfully
Aurora Computer Studies
 
Study BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer StudiesStudy BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer Studies
Aurora Computer Studies
 
විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම
Aurora Computer Studies
 
How to face exams effectively?
How to face exams effectively?How to face exams effectively?
How to face exams effectively?
Aurora Computer Studies
 
How to act like busy in three steps?
How to act like busy in three steps?How to act like busy in three steps?
How to act like busy in three steps?
Aurora Computer Studies
 
Classification of human languages
Classification of human languagesClassification of human languages
Classification of human languages
Aurora Computer Studies
 
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
Aurora Computer Studies
 
Quotes for life
Quotes for lifeQuotes for life
Quotes for life
Aurora Computer Studies
 
මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?
Aurora Computer Studies
 
Why do people believe in religions?
Why do people believe in religions?Why do people believe in religions?
Why do people believe in religions?
Aurora Computer Studies
 
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
Aurora Computer Studies
 
Agile philosophy for life
Agile philosophy for lifeAgile philosophy for life
Agile philosophy for life
Aurora Computer Studies
 
Career paths in ICT
Career paths in ICTCareer paths in ICT
Career paths in ICT
Aurora Computer Studies
 
How to build a successfull software
How to build a successfull softwareHow to build a successfull software
How to build a successfull software
Aurora Computer Studies
 
Attributes of great programmer
Attributes of great programmerAttributes of great programmer
Attributes of great programmer
Aurora Computer Studies
 
මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)
Aurora Computer Studies
 
Brainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventingBrainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventing
Aurora Computer Studies
 

More from Aurora Computer Studies (20)

Learning English as a Second Language
Learning English as a Second LanguageLearning English as a Second Language
Learning English as a Second Language
 
Characteristics of laders
Characteristics of laders Characteristics of laders
Characteristics of laders
 
නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග නායකයකුගේ ගුණාංග
නායකයකුගේ ගුණාංග
 
How to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfullyHow to do your Advanced Level (AL) studies successfully
How to do your Advanced Level (AL) studies successfully
 
Study BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer StudiesStudy BIT-UCSC @ Aurora Computer Studies
Study BIT-UCSC @ Aurora Computer Studies
 
විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම විභාගයට සාර්ථකව මුහුණ දීම
විභාගයට සාර්ථකව මුහුණ දීම
 
How to face exams effectively?
How to face exams effectively?How to face exams effectively?
How to face exams effectively?
 
How to act like busy in three steps?
How to act like busy in three steps?How to act like busy in three steps?
How to act like busy in three steps?
 
Classification of human languages
Classification of human languagesClassification of human languages
Classification of human languages
 
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
බුද්ධිමත් අයකු ගේ චරිත ලක්ෂණ
 
Quotes for life
Quotes for lifeQuotes for life
Quotes for life
 
මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?මිනිස්සු ආගම් අදහන්නේ ඇයි?
මිනිස්සු ආගම් අදහන්නේ ඇයි?
 
Why do people believe in religions?
Why do people believe in religions?Why do people believe in religions?
Why do people believe in religions?
 
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
සිරි ලංකාවේ ව්‍යාජ බයිස්කෝප් සමාජය
 
Agile philosophy for life
Agile philosophy for lifeAgile philosophy for life
Agile philosophy for life
 
Career paths in ICT
Career paths in ICTCareer paths in ICT
Career paths in ICT
 
How to build a successfull software
How to build a successfull softwareHow to build a successfull software
How to build a successfull software
 
Attributes of great programmer
Attributes of great programmerAttributes of great programmer
Attributes of great programmer
 
මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)මනස සේදීම (Brain washing)
මනස සේදීම (Brain washing)
 
Brainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventingBrainwashing - What, why, how and preventing
Brainwashing - What, why, how and preventing
 

Recently uploaded

MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEMRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
DK PAGEANT
 
What To Do If Your Ring Is Too Big? Must Read
What To Do If Your Ring Is Too Big? Must ReadWhat To Do If Your Ring Is Too Big? Must Read
What To Do If Your Ring Is Too Big? Must Read
Andrews Jewelers
 
Care Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdfCare Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdf
sundazesurf80
 
Johnny Depp Long Hair: A Signature Look Through the Years
Johnny Depp Long Hair: A Signature Look Through the YearsJohnny Depp Long Hair: A Signature Look Through the Years
Johnny Depp Long Hair: A Signature Look Through the Years
greendigital
 
La transidentité, un sujet qui fractionne les Français
La transidentité, un sujet qui fractionne les FrançaisLa transidentité, un sujet qui fractionne les Français
La transidentité, un sujet qui fractionne les Français
Ipsos France
 
erevna-influencers-social-media-stin-ellada
erevna-influencers-social-media-stin-elladaerevna-influencers-social-media-stin-ellada
erevna-influencers-social-media-stin-ellada
rvlassopoulou
 
Unique Wedding Bands For Women Who Want To Stand Out.pptx
Unique Wedding Bands For Women Who Want To Stand Out.pptxUnique Wedding Bands For Women Who Want To Stand Out.pptx
Unique Wedding Bands For Women Who Want To Stand Out.pptx
Andrews Jewelers
 
30 Manipulation Techniques to be a smart person in society (1).pdf
30 Manipulation Techniques to be a smart person in society (1).pdf30 Manipulation Techniques to be a smart person in society (1).pdf
30 Manipulation Techniques to be a smart person in society (1).pdf
minaserver6679
 
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...
Kitchen on Fire
 
Exploring Ancient Mysteries Visions of Atlantis.pptx
Exploring Ancient Mysteries Visions of Atlantis.pptxExploring Ancient Mysteries Visions of Atlantis.pptx
Exploring Ancient Mysteries Visions of Atlantis.pptx
Ruth Elisabeth Hancock
 
EXPERIENCE MONSTER BITES STREETWEAR APPAREL
EXPERIENCE MONSTER BITES STREETWEAR APPARELEXPERIENCE MONSTER BITES STREETWEAR APPAREL
EXPERIENCE MONSTER BITES STREETWEAR APPAREL
6ctbkfpdxz
 
Gujarat Details in Hindi for children's for presentation in school
Gujarat Details in Hindi for children's for presentation in schoolGujarat Details in Hindi for children's for presentation in school
Gujarat Details in Hindi for children's for presentation in school
shouryajoshi5
 

Recently uploaded (12)

MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEMRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
 
What To Do If Your Ring Is Too Big? Must Read
What To Do If Your Ring Is Too Big? Must ReadWhat To Do If Your Ring Is Too Big? Must Read
What To Do If Your Ring Is Too Big? Must Read
 
Care Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdfCare Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdf
 
Johnny Depp Long Hair: A Signature Look Through the Years
Johnny Depp Long Hair: A Signature Look Through the YearsJohnny Depp Long Hair: A Signature Look Through the Years
Johnny Depp Long Hair: A Signature Look Through the Years
 
La transidentité, un sujet qui fractionne les Français
La transidentité, un sujet qui fractionne les FrançaisLa transidentité, un sujet qui fractionne les Français
La transidentité, un sujet qui fractionne les Français
 
erevna-influencers-social-media-stin-ellada
erevna-influencers-social-media-stin-elladaerevna-influencers-social-media-stin-ellada
erevna-influencers-social-media-stin-ellada
 
Unique Wedding Bands For Women Who Want To Stand Out.pptx
Unique Wedding Bands For Women Who Want To Stand Out.pptxUnique Wedding Bands For Women Who Want To Stand Out.pptx
Unique Wedding Bands For Women Who Want To Stand Out.pptx
 
30 Manipulation Techniques to be a smart person in society (1).pdf
30 Manipulation Techniques to be a smart person in society (1).pdf30 Manipulation Techniques to be a smart person in society (1).pdf
30 Manipulation Techniques to be a smart person in society (1).pdf
 
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...
 
Exploring Ancient Mysteries Visions of Atlantis.pptx
Exploring Ancient Mysteries Visions of Atlantis.pptxExploring Ancient Mysteries Visions of Atlantis.pptx
Exploring Ancient Mysteries Visions of Atlantis.pptx
 
EXPERIENCE MONSTER BITES STREETWEAR APPAREL
EXPERIENCE MONSTER BITES STREETWEAR APPARELEXPERIENCE MONSTER BITES STREETWEAR APPAREL
EXPERIENCE MONSTER BITES STREETWEAR APPAREL
 
Gujarat Details in Hindi for children's for presentation in school
Gujarat Details in Hindi for children's for presentation in schoolGujarat Details in Hindi for children's for presentation in school
Gujarat Details in Hindi for children's for presentation in school
 

Privacy in simple

  • 1. Privacy in simple By Aurora Computer Studies (auoracs.lk) 1
  • 2. What is privacy? • “The right to be left alone" • “The state or condition of being free from being observed or disturbed by other people.” • “The state of being free from public attention.” Aurora Computer Studies (www.auroracs.lk) 2
  • 3. Aspects of privacy • Secrecy, or the option to conceal any information from others • The option to limit the access others have to one's personal information • Personhood and autonomy • protection of intimate relationships Aurora Computer Studies (www.auroracs.lk) 3
  • 4. Privacy information • Health related • Personal finance related • Political view (voting) related • Intimate relationships • Any other personal information o Residential information o Contact details Aurora Computer Studies (www.auroracs.lk) 4
  • 5. Possible conflicting situations • Financial privacy Vs. taxation laws • Criminal investigation • Contingency situations • Freedom of expression vs. privacy of individual Aurora Computer Studies (www.auroracs.lk) 5 Note: Strict statutory rules and/or ethical norms must be followed.
  • 6. Possible privacy violations • Surveillance o Surveillance without informing o Excessive monitoring • Hacking systems o Hacking information systems and stealing personal data • It is a obligation of the organization/individual who collect privacy data to secure those. • Blackmailing o Publishing of intimacy related information with vicious intents Aurora Computer Studies (www.auroracs.lk) 6
  • 7. Possible privacy violations (Con.) • Identity theft o Social media/e-mail/banking account identity is hacked. • Loosing one’s laptop/ notebook/ smartphone o Possible loss of identities (username/passwords) o Possible loss of privacy contents • Privacy data collected by OS and other internet related systems and apps like; o Social media o Search engines o Geographical Information Systems like Google Map/Street views Aurora Computer Studies (www.auroracs.lk) 7
  • 8. Search engine related privacy concerns • Most search engines gather individual’s search history to provide them with better search results • At the same time it compromise privacy Aurora Computer Studies (www.auroracs.lk) 8
  • 9. Social media related privacy concerns • Social media gather user’s behavioral patterns to provide with better contents and also targeted advertising. Aurora Computer Studies (www.auroracs.lk) 9
  • 10. Google map related privacy concerns • User’s traveling and movements are tracked and traced through GPS Aurora Computer Studies (www.auroracs.lk) 10
  • 11. Google street views related privacy concerns • Pictures of individuals houses are captured and displayed which is raised as a privacy concern by some people. • Street view camera may capture some privacy related incidents like; o Picture exposing someone’s job or job place o Someone visiting a particular sensitive place like hospital/clinic o Security concerns like burglary Aurora Computer Studies (www.auroracs.lk) 11
  • 12. Actions taken for online privacy concerns • Well defined privacy policies • Strict security measures to protect collected data • Strict employee regulations to prevent access to individual data • Mechanism to report privacy concerns or inappropriate materials • Remove certain contents from their systems on request by individuals having privacy concern Aurora Computer Studies (www.auroracs.lk) 12
  • 13. How to preserve privacy? • Frequently change password of important user accounts • Do not install suspicious software and browser plugins that may collect your privacy data • Keep sensitive data encrypted • Provide only the minimum required data to third parties Aurora Computer Studies (www.auroracs.lk) 13
  • 14. How to preserve privacy? (Con.) • Protect your laptop/smart phone • Backup and delete all sensitive data before hand over your electronic devices for repair • Delete all the data before discard your electronic devices • Protest against unethical excessive monitoring Aurora Computer Studies (www.auroracs.lk) 14
  • 15. How to preserve privacy? (Con.) • How Google street view address privacy concerns o Reporting mechanism o Blurring facility for privacy concerns o Quality filters on crowed sourced contents • https://www.google.com/streetview/pri vacy/ Aurora Computer Studies (www.auroracs.lk) 15
  • 16. Privacy Aspects for Corporations Handling Sensitive Data Aurora Computer Studies (auroracs.lk) 16
  • 17. Source of privacy data • Employees data • Customer’s data • Any other third party data collected Aurora Computer Studies (www.auroracs.lk) 17
  • 18. Aspects • Legal aspects o EU data protection directive o UK data protection act o USA acts on privacy • Ethical aspects Aurora Computer Studies (www.auroracs.lk) 18
  • 19. EU data protection directive • The seven principles governing the protection of personal data 1. Notice • Data subjects should be given notice when their data is being collected 2. Purpose • data should only be used for the purpose stated and not for any other purposes 3. Consent • data should not be disclosed without the data subject’s consent Aurora Computer Studies (www.auroracs.lk) 19
  • 20. EU data protection directive (Con.) 4. Security • Collected data should be kept secure from any potential abuses 5. Disclosure • data subjects should be informed as to who is collecting their data 6. Access • data subjects should be allowed to access their data and make corrections to any inaccurate data 7. Accountability • data subjects should have a method available to them to hold data collectors accountable for not following the above principles Aurora Computer Studies (www.auroracs.lk) 20
  • 21. UK Data Protection Act • Based on following principles (Also known as Yong’s principles) 1. Personal data shall be processed fairly and lawfully. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed for any other purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose(s). 4. Personal data shall be accurate and, where necessary, kept up to date Aurora Computer Studies (www.auroracs.lk) 21
  • 22. UK Data Protection Act (Con.) 5. Personal data shall not be kept for longer than is necessary for that purpose(s). 6. Personal data shall be processed in accordance with the rights of data subjects (individuals). 7. Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data. Aurora Computer Studies (www.auroracs.lk) 22
  • 23. USA acts on privacy • Health Insurance Portability and Accountability Act –1996 (HIPAA) • Children’s Online Privacy Protection Act -1998 (COPPA) • Family Education Rights and Privacy Act –1974 (FERPA) • Gramm-Leach-Bliley Act -1999 Aurora Computer Studies (www.auroracs.lk) 23
  • 24. HIPAA - 1996 • Health Insurance Portability and Accountability Act (HIPAA) • Idea o Established procedures for the exercise of individual health information privacy rights. o The use and disclosure of individual health information should be authorized or required. Aurora Computer Studies (www.auroracs.lk) 24
  • 25. COPPA - 1998 • The primary goal of COPPA is to place parents in control (consent) over what information is collected from their young children online. • The Rule was designed to protect children under age 13 while accounting for the dynamic nature of the Internet. Aurora Computer Studies (www.auroracs.lk) 25
  • 26. FERPA - 1974 • Family Education Rights and Privacy Act • Assigns rights to parents regarding their children’s education records • Rights transfer to student once student becomes 18 Aurora Computer Studies (www.auroracs.lk) 26
  • 27. Gramm-Leach-Bliley Act -1999 • Also known as the Financial Modernization Act of 1999 • A federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals. • companies that offer consumers financial products or services like loans, financial or investment advice, or insurance requires to explain their information-sharing practices to their customers and to safeguard sensitive data. Aurora Computer Studies (www.auroracs.lk) 27
  • 28. References • https://en.wikipedia.org/wiki/Privacy • https://en.wikipedia.org/wiki/Surveillance • https://en.wikipedia.org/wiki/Data_Protection_Dir ective • https://en.wikipedia.org/wiki/Data_Protection_Act _1998 • https://en.wikipedia.org/wiki/Information_privacy _law#United_States • https://www.google.com/streetview/privacy/ Aurora Computer Studies (www.auroracs.lk) 28
  • 29. Thank You ! Presented by Aurora Computer Studies (auoracs.lk) Aurora Computer Studies (www.auroracs.lk) 29
  • 30. "We are what we repeatedly do. Excellence, then, is not an act, but a habit." ~ Aristotle. Aurora Computer Studies (www.auroracs.lk) 30
  • 31. You may also interested in “How to be a real professional” http://www.slideshare.net/auroracslk/how-to- be-a-real-professional Aurora Computer Studies (www.auroracs.lk) 31
  • 32. Contact Information Premier Study Center Aurora Computer Studies, Summerset College, # 135, 3rd Floor, DFCC Building, High Level Road, Maharagama. 0115 690 290 City Study Center Aurora Computer Studies, Summerset College, # 88/2, 2nd Floor, BOC Building, High Level Road, Kirulapone, Colombo 06 0703 001 010 For further details and enquiries : Call - 0719 842030 E-mail – info@auroracs.lk Web - www.auroracs.lk Aurora Computer Studies www.auroracs.lk 32