The document discusses privacy and its aspects. It defines privacy as the right to be left alone and free from public attention or disturbance from others. It notes that privacy involves aspects like secrecy, limiting access to personal information, personhood and autonomy. The document outlines different types of private information and how privacy can be violated through surveillance, hacking, blackmail and identity theft. It discusses privacy concerns related to search engines, social media, Google Maps and Street View. Finally, it provides tips on preserving privacy and regulations around privacy like the EU Data Protection Directive and laws in the UK and US.
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Current Privacy and Data Issues (for people who care about open data!)EmilyDShaw
Open data and privacy law often conflict. What issues are people discussing in the realm of privacy and government-held data? What can open data advocates do to increase access to government data when privacy is a concern?
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
Solicitor Brian Miller and barrister Vicki Bowles explore the legal and security aspects of data protection and putting your data in the cloud. This is part one (basic) of a two part course on data protection and cloud computing.
What is the GDPR & What does it mean for YOUR business?Nexsen Pruet
The European Union’s General Data Protection Regulation, which became effective on May 25, began a new era in data privacy. Among other changes, the GDPR imposes new limits on the collection of personal information of EU residents and expands individuals’ rights with respect to companies’ use of such information, including the “right to be forgotten.” These requirements are backed up by substantial penalties—up to 4% of a company’s global revenue. But, does a U.S. company need to worry about the GDPR if it has no business operations in the EU? In a surprising number of cases, the answer is “yes.”
#NPLaw's Kirsten Small, CIPP/US, provides an overview of the GDPR and explores its implications for US businesses in this presentation.
The Privacy Law Landscape: Issues for the research communityARDC
Presentation by Anna Johnston of Salinger Privacy to ARDC's 'GDPR and NDB scheme: Intersection with the Australian research sector' webinar on 13 September 2018
GDPR clinic - A strategic approach for compliance with the European General Data Protection regulation
Paolo Balboni Ph.D. - Founding Partner at ICT Legal Consulting & President of the European Privacy Association
Nicola Franchetto LL.M. - Associate at ICT Legal Consulting &
Fellow of the European Privacy Association
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEDK PAGEANT
Amruthaa Uttam Jagdhane, a stunning woman from Pune, has won the esteemed title of Mrs. India 2024, which is given out by the Dk Exhibition. Her journey to this prestigious accomplishment is a confirmation of her faithful assurance, extraordinary gifts, and profound commitment to enabling women.
Is your favorite ring slipping and sliding on your finger? You're not alone. Must Read this Guide on What To Do If Your Ring Is Too Big as shared by the experts of Andrews Jewelers.
Care Instructions for Activewear & Swim Suits.pdfsundazesurf80
SunDaze Surf offers top swimwear tips: choose high-quality, UV-protective fabrics to shield your skin. Opt for secure fits that withstand waves and active movement. Bright colors enhance visibility, while adjustable straps ensure comfort. Prioritize styles with good support, like racerbacks or underwire tops, for active beach days. Always rinse swimwear after use to maintain fabric integrity.
Johnny Depp Long Hair: A Signature Look Through the Yearsgreendigital
Johnny Depp, synonymous with eclectic roles and unparalleled acting prowess. has also been a significant figure in fashion and style. Johnny Depp long hair is a distinctive trademark among the various elements that define his unique persona. This article delves into the evolution, impact. and cultural significance of Johnny Depp long hair. exploring how it has contributed to his iconic status.
Follow us on: Pinterest
Introduction
Johnny Depp is an actor known for his chameleon-like ability to transform into a wide range of characters. from the eccentric Captain Jack Sparrow in "Pirates of the Caribbean" to the introspective Edward Scissorhands. His long hair is one constant throughout his evolving roles and public appearances. Johnny Depp long hair is not a style choice but a significant aspect of his identity. contributing to his allure and mystique. This article explores the journey and significance of Johnny Depp long hair. highlighting how it has become integral to his brand.
The Early Years: A Budding Star with Signature Locks
1980s: The Rise of a Young Heartthrob
Johnny Depp's journey in Hollywood began in the 1980s. with his breakout role in the television series "21 Jump Street." During this time, his hair was short, but it was already clear that Depp had a penchant for unique and edgy styles. By the decade's end, Depp started experimenting with longer hair. setting the stage for a lifelong signature.
1990s: From Heartthrob to Icon
The 1990s were transformative for Johnny Depp his career and personal style. Films like "Edward Scissorhands" (1990) and "Benny & Joon" (1993) saw Depp sporting various hair lengths and styles. But, his long, unkempt hair in "What's Eating Gilbert Grape" (1993) began to draw significant attention. This period marked the beginning of Johnny Depp long hair. which became a defining feature of his image.
The Iconic Roles: Hair as a Character Element
Edward Scissorhands (1990)
In "Edward Scissorhands," Johnny Depp's character had a wild and mane that complemented his ethereal and misunderstood persona. This role showcased how long hair Johnny Depp could enhance a character's depth and mystery.
Captain Jack Sparrow: The Pirate with Flowing Locks
One of Johnny Depp's iconic roles is Captain Jack Sparrow from the "Pirates of the Caribbean" series. Sparrow's long, dreadlocked hair symbolised his rebellious and unpredictable nature. The character's look, complete with beads and trinkets woven into his hair. was a collaboration between Depp and the film's costume designers. This style became iconic and influenced fashion trends and Halloween costumes worldwide.
Other Memorable Characters
Depp's long hair has also been featured in other roles, such as Ichabod Crane in "Sleepy Hollow" (1999). and Roux in "Chocolat" (2000). In these films, his hair added a layer of authenticity and depth to his characters. proving that Johnny Depp with long hair is more than a style—it's a storytelling tool.
Off-Screen Influenc
La transidentité, un sujet qui fractionne les FrançaisIpsos France
Ipsos, l’une des principales sociétés mondiales d’études de marché dévoile les résultats de son étude Ipsos Global Advisor “Pride 2024”. De ses débuts aux Etats-Unis et désormais dans de très nombreux pays, le mois de juin est traditionnellement consacré aux « Marches des Fiertés » et à des événements festifs autour du concept de Pride. A cette occasion, Ipsos a réalisé une enquête dans vingt-six pays dressant plusieurs constats. Les clivages des opinions entre générations s’accentuent tandis que le soutien à des mesures sociétales et d’inclusion en faveur des LGBT+ notamment transgenres continue de s’effriter.
From Stress to Success How Oakland's Corporate Wellness Programs are Cultivat...Kitchen on Fire
Discover how Oakland's innovative corporate wellness initiatives are transforming workplace culture, nurturing the well-being of employees, and fostering a thriving environment. From comprehensive mental health support to flexible work arrangements and holistic wellness workshops, these programs are empowering individuals to navigate stress effectively, leading to increased productivity, satisfaction, and overall success.
Have you ever wondered about the lost city of Atlantis and its profound connection to our modern world? Ruth Elisabeth Hancock’s podcast, “Visions of Atlantis,” delves deep into this intriguing topic in a captivating conversation with Michael Le Flem, author of the enlightening book titled “Visions of Atlantis.” This podcast episode offers a thought-provoking blend of historical inquiry, esoteric wisdom, and contemporary reflections. Let’s embark on a journey of discovery as we unpack the mysteries of ancient civilizations and their relevance to our present existence.
2. What is privacy?
• “The right to be left alone"
• “The state or condition of being free
from being observed or disturbed by
other people.”
• “The state of being free from public
attention.”
Aurora Computer Studies
(www.auroracs.lk)
2
3. Aspects of privacy
• Secrecy, or the option to conceal any
information from others
• The option to limit the access others
have to one's personal information
• Personhood and autonomy
• protection of intimate relationships
Aurora Computer Studies
(www.auroracs.lk)
3
4. Privacy information
• Health related
• Personal finance related
• Political view (voting) related
• Intimate relationships
• Any other personal information
o Residential information
o Contact details
Aurora Computer Studies
(www.auroracs.lk)
4
5. Possible conflicting situations
• Financial privacy Vs. taxation laws
• Criminal investigation
• Contingency situations
• Freedom of expression vs. privacy of
individual
Aurora Computer Studies
(www.auroracs.lk)
5
Note: Strict statutory rules and/or ethical
norms must be followed.
6. Possible privacy violations
• Surveillance
o Surveillance without informing
o Excessive monitoring
• Hacking systems
o Hacking information systems and stealing personal data
• It is a obligation of the organization/individual who
collect privacy data to secure those.
• Blackmailing
o Publishing of intimacy related information with vicious
intents
Aurora Computer Studies
(www.auroracs.lk)
6
7. Possible privacy violations (Con.)
• Identity theft
o Social media/e-mail/banking account identity is hacked.
• Loosing one’s laptop/ notebook/
smartphone
o Possible loss of identities (username/passwords)
o Possible loss of privacy contents
• Privacy data collected by OS and other
internet related systems and apps like;
o Social media
o Search engines
o Geographical Information Systems like Google Map/Street views
Aurora Computer Studies
(www.auroracs.lk)
7
8. Search engine related privacy
concerns
• Most search engines gather
individual’s search history to provide
them with better search results
• At the same time it compromise
privacy
Aurora Computer Studies
(www.auroracs.lk)
8
9. Social media related privacy concerns
• Social media gather user’s behavioral
patterns to provide with better
contents and also targeted
advertising.
Aurora Computer Studies
(www.auroracs.lk)
9
10. Google map related privacy
concerns
• User’s traveling and movements are
tracked and traced through GPS
Aurora Computer Studies
(www.auroracs.lk)
10
11. Google street views related
privacy concerns
• Pictures of individuals houses are
captured and displayed which is raised
as a privacy concern by some people.
• Street view camera may capture some
privacy related incidents like;
o Picture exposing someone’s job or job place
o Someone visiting a particular sensitive place like
hospital/clinic
o Security concerns like burglary
Aurora Computer Studies
(www.auroracs.lk)
11
12. Actions taken for online privacy
concerns
• Well defined privacy policies
• Strict security measures to protect
collected data
• Strict employee regulations to prevent
access to individual data
• Mechanism to report privacy concerns or
inappropriate materials
• Remove certain contents from their
systems on request by individuals having
privacy concern
Aurora Computer Studies
(www.auroracs.lk)
12
13. How to preserve privacy?
• Frequently change password of
important user accounts
• Do not install suspicious software and
browser plugins that may collect your
privacy data
• Keep sensitive data encrypted
• Provide only the minimum required
data to third parties
Aurora Computer Studies
(www.auroracs.lk)
13
14. How to preserve privacy? (Con.)
• Protect your laptop/smart phone
• Backup and delete all sensitive data
before hand over your electronic
devices for repair
• Delete all the data before discard
your electronic devices
• Protest against unethical excessive
monitoring
Aurora Computer Studies
(www.auroracs.lk)
14
15. How to preserve privacy? (Con.)
• How Google street view address
privacy concerns
o Reporting mechanism
o Blurring facility for privacy concerns
o Quality filters on crowed sourced contents
• https://www.google.com/streetview/pri
vacy/
Aurora Computer Studies
(www.auroracs.lk)
15
17. Source of privacy data
• Employees data
• Customer’s data
• Any other third party data collected
Aurora Computer Studies
(www.auroracs.lk)
17
18. Aspects
• Legal aspects
o EU data protection directive
o UK data protection act
o USA acts on privacy
• Ethical aspects
Aurora Computer Studies
(www.auroracs.lk)
18
19. EU data protection directive
• The seven principles governing the
protection of personal data
1. Notice
• Data subjects should be given notice when their
data is being collected
2. Purpose
• data should only be used for the purpose stated
and not for any other purposes
3. Consent
• data should not be disclosed without the data
subject’s consent
Aurora Computer Studies
(www.auroracs.lk)
19
20. EU data protection directive (Con.)
4. Security
• Collected data should be kept secure from any
potential abuses
5. Disclosure
• data subjects should be informed as to who is
collecting their data
6. Access
• data subjects should be allowed to access their data
and make corrections to any inaccurate data
7. Accountability
• data subjects should have a method available to them
to hold data collectors accountable for not following
the above principles
Aurora Computer Studies
(www.auroracs.lk)
20
21. UK Data Protection Act
• Based on following principles (Also
known as Yong’s principles)
1. Personal data shall be processed fairly and lawfully.
2. Personal data shall be obtained only for one or more
specified and lawful purposes, and shall not be
further processed for any other purposes.
3. Personal data shall be adequate, relevant and not
excessive in relation to the purpose(s).
4. Personal data shall be accurate and, where
necessary, kept up to date
Aurora Computer Studies
(www.auroracs.lk)
21
22. UK Data Protection Act (Con.)
5. Personal data shall not be kept for longer than is
necessary for that purpose(s).
6. Personal data shall be processed in accordance with the
rights of data subjects (individuals).
7. Appropriate technical and organizational measures shall
be taken against unauthorized or unlawful processing of
personal data and against accidental loss or destruction
of, or damage to, personal data.
8. Personal data shall not be transferred to a country or
territory outside the European Economic Area unless that
country or territory ensures an adequate level of
protection for the rights and freedoms of data.
Aurora Computer Studies
(www.auroracs.lk)
22
23. USA acts on privacy
• Health Insurance Portability and
Accountability Act –1996 (HIPAA)
• Children’s Online Privacy Protection
Act -1998 (COPPA)
• Family Education Rights and Privacy
Act –1974 (FERPA)
• Gramm-Leach-Bliley Act -1999
Aurora Computer Studies
(www.auroracs.lk)
23
24. HIPAA - 1996
• Health Insurance Portability and
Accountability Act (HIPAA)
• Idea
o Established procedures for the exercise of individual
health information privacy rights.
o The use and disclosure of individual health
information should be authorized or required.
Aurora Computer Studies
(www.auroracs.lk)
24
25. COPPA - 1998
• The primary goal of COPPA is to
place parents in control (consent)
over what information is collected
from their young children online.
• The Rule was designed to protect
children under age 13 while
accounting for the dynamic nature of
the Internet.
Aurora Computer Studies
(www.auroracs.lk)
25
26. FERPA - 1974
• Family Education Rights and Privacy
Act
• Assigns rights to parents regarding
their children’s education records
• Rights transfer to student once
student becomes 18
Aurora Computer Studies
(www.auroracs.lk)
26
27. Gramm-Leach-Bliley Act -1999
• Also known as the Financial Modernization Act
of 1999
• A federal law enacted in the United States to
control the ways that financial institutions deal
with the private information of individuals.
• companies that offer consumers financial
products or services like loans, financial or
investment advice, or insurance requires to
explain their information-sharing practices to
their customers and to safeguard sensitive data.
Aurora Computer Studies
(www.auroracs.lk)
27
29. Thank You !
Presented by
Aurora Computer Studies
(auoracs.lk)
Aurora Computer Studies
(www.auroracs.lk)
29
30. "We are what we repeatedly do.
Excellence, then, is not an act,
but a habit."
~ Aristotle.
Aurora Computer Studies
(www.auroracs.lk)
30
31. You may also interested in
“How to be a real professional”
http://www.slideshare.net/auroracslk/how-to-
be-a-real-professional
Aurora Computer Studies
(www.auroracs.lk)
31
32. Contact Information
Premier Study Center
Aurora Computer Studies,
Summerset College,
# 135, 3rd Floor,
DFCC Building,
High Level Road,
Maharagama.
0115 690 290
City Study Center
Aurora Computer Studies,
Summerset College,
# 88/2, 2nd Floor,
BOC Building,
High Level Road,
Kirulapone, Colombo 06
0703 001 010
For further details and enquiries :
Call - 0719 842030
E-mail – info@auroracs.lk
Web - www.auroracs.lk
Aurora Computer Studies www.auroracs.lk 32