SlideShare a Scribd company logo
What data  do they  track?
What data  do they  track? Can I anonymize my online  activity?
What data  do they  track? Doesthe web  know who  I am? Can I anonymize my online  activity?
What data  do they  track? Doesthe web  know who  I am? Can I anonymize my online  activity? What about  privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
What data  do they  track? Doesthe web  know who  I am? Can I anonymize my online  activity? What about  privacy rights?
    This is me.
    This is me.
    This is me.  Voluntary.
Photos
Photos build a life.
=
    It’s automatic. : - 0
    It’s automatic. : - 0
+
39% +
39% rejected +
49 Data Channels!
- Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
In-Voluntary? Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
In-Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
In-Voluntary? Voluntary. - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
test drive.
How does it happen? How
How does it happen? How Where does it go? Where
Traffic Analysis
Traffic Analysis Audience Profiling
Log Files
Web Beacons
Cookies
Consider this.
Consider this.
Consider this. PII
Risk / Reward [-] [+]
Risk / Reward [-] [+]
Badware
Badware
Badware Malware
Badware Malware
Badware Malware Spyware
Badware Malware Spyware
Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse							         …
Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse Web Bug Phishing Rootkit Virus Worm Probe									  …
What’s my defense?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Privacy  Dictionary 1  The quality or state of being apart from company or        observation 2  Freedom from unauthorized intrusion   Legal Unlawful intrusion into private affairs, disclosure of private information, publication in a false light, or appropriation of a name for personal gain
Security  Dictionary 1  Freedom from danger, risk, etc.; safety 2  Something that secures or makes safe; protection; defense   Legal Internet security is a subset of actions aimed at securing information based on computers and in transit between them.
What you can do about privacy and security.
Privacy From Two Perspectives Tips For Consumers and Business Owners
Personal Privacy Ask yourself are you trying to secure your information or your activities? To Secure Activities on the internet consider Anonymity Tools The Onion Router (TOR) – Attempts to conceal your internet tracks by bouncing you around several layers of proxy routers, hence the term onion in the name. Think WikiLeaks To Secure information on your computer consider Privacy Tools Firewalls Antivirus Software (Microsoft Security Essentials-Free) Antimalware Software (SpyBot, Malware Bytes) Always check for proper SSL (https://) encryption before submitting any info to websites Change your Passwords!!!!!
Consumer Privacy Goals Maintain Secure Identity Only give out personal information on a need to know basis Check URL’s of websites to see that they match the SSL certificate before submitting personal info to sites Computer Updates to OS Plug security holes Data Backups Only as good as your last backup Backups can be infected as well if virus infections are not caught early
URL SSL Encryption Example
A Business Owner’s Perspective (i) Ever increasing customer privacy compliance requirements Data Breaches  Hackers directly targeting individual companies Sony PS network LulzSec / Anonymous  Lockheed Martin (RSA) Industrial Command And Control Virus Stuxnet (Iran)
A Business Owner’s Perspective (ii) LAN Security - Firewalls Wireless Security – Encryption (WPA2) Website Security – Encryption (SSL) PCI Compliance – External Network Probe For Security Database Security – Encryption of sensitive info on the DB Change Logs – Tracking all changes to sensitive information storage and management  Audit Yourself before “THEY” Do – Find issues and fix them, its cheaper and easier….
A Business Owner’s Perspective (iii) Email Filtering Spam Filtering Services – AppRiver, Postini Email Virus Filtering – AppRiver, AV on the email server Daily Temp file deletion on workstations Clear Cookies, History from web browsers  Daily AV Scans on all workstations Daily AV Scans on all servers before backups Cultivate a culture that allows staff to own up to virus infections when they happen. Catching virus activity early is the best defense.
A Business Owner’s Perspective (iv) Customer Data Collection All Websites and Apps must use SSL encryption when collecting user data.  Even something as simple as a email newsletter should be secured. Opt-In on all data collection practices Clearly define what you will and won’t do with client data in a Privacy Policy posted on your site Adhere to your policy or change it if you deem necessary. Do not operate outside your stated policy Define a Data Retention Policy (Usually 3 years) Secure Destruction of data after retention policy
A Business Owner’s Perspective (v) Going International Know your countries privacy laws and adjust your internal collection practices to match.  Sometimes Opt-in is not enough US-EU Safe Harbor Framework COPPA – Under 13 in the US Going international opens up easier routes to hacking corporate networks.  Think China Hacking Google
The Ins, Outs, and Nuances  of Internet Privacy June 30, 2011 Greg Hall Owner, 247 IT Outsourcing ghall@247ITOutsourcing.com

More Related Content

What's hot

Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
bpeacher
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
phexcom1
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PRISMA CSI
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
Chandrapal Badshah
 
Nmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationNmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanation
Wangolo Joel
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Priyanka Aash
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
Christian Martorella
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
Maximiliano Soler
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Olakanmi Oluwole
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
Christian Martorella
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
Rob Gillen
 
After the Data Breach: Stolen Credentials
After the Data Breach: Stolen CredentialsAfter the Data Breach: Stolen Credentials
After the Data Breach: Stolen Credentials
SBWebinars
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
Jose Manuel Ortega Candel
 
Information gathering
Information gatheringInformation gathering
Information gathering
Maulik Kotak
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
Christopher Beiring
 
Don't Fear the Content Audit
Don't Fear the Content AuditDon't Fear the Content Audit
Don't Fear the Content Audit
Kapost
 

What's hot (20)

Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Nmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationNmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanation
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
After the Data Breach: Stolen Credentials
After the Data Breach: Stolen CredentialsAfter the Data Breach: Stolen Credentials
After the Data Breach: Stolen Credentials
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
Don't Fear the Content Audit
Don't Fear the Content AuditDon't Fear the Content Audit
Don't Fear the Content Audit
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 

Similar to The Ins, Outs, and Nuances of Internet Privacy

Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
ebusinessmantra
 
17 00 distil rami
17 00 distil rami17 00 distil rami
17 00 distil rami
Property Portal Watch
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
Chris Gates
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
joevest
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
Aparna Sharma
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
OMNIRISC SECURITY SERVICES
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Property Portal Watch
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
G3 Communications
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internetvanalery
 
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsBuilding Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
Amazon Web Services
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
Distil Networks
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
Distil Networks
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
Susan Kennedy
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Dinesh O Bareja
 

Similar to The Ins, Outs, and Nuances of Internet Privacy (20)

Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
17 00 distil rami
17 00 distil rami17 00 distil rami
17 00 distil rami
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internet
 
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsBuilding Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 

More from eBoost Consulting

Seo toolkit (v1.1)
Seo toolkit (v1.1)Seo toolkit (v1.1)
Seo toolkit (v1.1)
eBoost Consulting
 
Beyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ GoogleBeyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ Google
eBoost Consulting
 
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable PersonasWho Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
eBoost Consulting
 
Scale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display AdvertisingScale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display Advertising
eBoost Consulting
 
Building an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's ChecklistBuilding an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's Checklist
eBoost Consulting
 
Linkbuilding Presentation
Linkbuilding PresentationLinkbuilding Presentation
Linkbuilding Presentation
eBoost Consulting
 
Essentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online MarketingEssentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online Marketing
eBoost Consulting
 

More from eBoost Consulting (7)

Seo toolkit (v1.1)
Seo toolkit (v1.1)Seo toolkit (v1.1)
Seo toolkit (v1.1)
 
Beyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ GoogleBeyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ Google
 
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable PersonasWho Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
 
Scale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display AdvertisingScale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display Advertising
 
Building an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's ChecklistBuilding an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's Checklist
 
Linkbuilding Presentation
Linkbuilding PresentationLinkbuilding Presentation
Linkbuilding Presentation
 
Essentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online MarketingEssentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online Marketing
 

Recently uploaded

Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 

Recently uploaded (20)

Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 

The Ins, Outs, and Nuances of Internet Privacy

  • 1.
  • 2. What data do they track?
  • 3. What data do they track? Can I anonymize my online activity?
  • 4. What data do they track? Doesthe web know who I am? Can I anonymize my online activity?
  • 5. What data do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 6.
  • 7.
  • 8. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 9. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 10. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 11. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 12. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 13. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 14. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 15. What data do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 16. This is me.
  • 17. This is me.
  • 18. This is me. Voluntary.
  • 19.
  • 21. Photos build a life.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. =
  • 27.
  • 28. It’s automatic. : - 0
  • 29. It’s automatic. : - 0
  • 30. +
  • 31. 39% +
  • 33.
  • 34.
  • 36.
  • 37. - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 38. In-Voluntary? Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 39. In-Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 40. In-Voluntary? Voluntary. - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 41.
  • 43. How does it happen? How
  • 44. How does it happen? How Where does it go? Where
  • 53. Risk / Reward [-] [+]
  • 54. Risk / Reward [-] [+]
  • 55.
  • 56.
  • 63. Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse …
  • 64. Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse Web Bug Phishing Rootkit Virus Worm Probe …
  • 66.
  • 67. Tell me, what is privacy?
  • 68. Tell me, what is privacy?
  • 69. Tell me, what is privacy?
  • 70. Tell me, what is privacy?
  • 71. Tell me, what is privacy?
  • 72. Tell me, what is privacy?
  • 73. Privacy Dictionary 1 The quality or state of being apart from company or observation 2 Freedom from unauthorized intrusion Legal Unlawful intrusion into private affairs, disclosure of private information, publication in a false light, or appropriation of a name for personal gain
  • 74. Security Dictionary 1 Freedom from danger, risk, etc.; safety 2 Something that secures or makes safe; protection; defense Legal Internet security is a subset of actions aimed at securing information based on computers and in transit between them.
  • 75. What you can do about privacy and security.
  • 76. Privacy From Two Perspectives Tips For Consumers and Business Owners
  • 77. Personal Privacy Ask yourself are you trying to secure your information or your activities? To Secure Activities on the internet consider Anonymity Tools The Onion Router (TOR) – Attempts to conceal your internet tracks by bouncing you around several layers of proxy routers, hence the term onion in the name. Think WikiLeaks To Secure information on your computer consider Privacy Tools Firewalls Antivirus Software (Microsoft Security Essentials-Free) Antimalware Software (SpyBot, Malware Bytes) Always check for proper SSL (https://) encryption before submitting any info to websites Change your Passwords!!!!!
  • 78. Consumer Privacy Goals Maintain Secure Identity Only give out personal information on a need to know basis Check URL’s of websites to see that they match the SSL certificate before submitting personal info to sites Computer Updates to OS Plug security holes Data Backups Only as good as your last backup Backups can be infected as well if virus infections are not caught early
  • 80. A Business Owner’s Perspective (i) Ever increasing customer privacy compliance requirements Data Breaches Hackers directly targeting individual companies Sony PS network LulzSec / Anonymous Lockheed Martin (RSA) Industrial Command And Control Virus Stuxnet (Iran)
  • 81. A Business Owner’s Perspective (ii) LAN Security - Firewalls Wireless Security – Encryption (WPA2) Website Security – Encryption (SSL) PCI Compliance – External Network Probe For Security Database Security – Encryption of sensitive info on the DB Change Logs – Tracking all changes to sensitive information storage and management Audit Yourself before “THEY” Do – Find issues and fix them, its cheaper and easier….
  • 82. A Business Owner’s Perspective (iii) Email Filtering Spam Filtering Services – AppRiver, Postini Email Virus Filtering – AppRiver, AV on the email server Daily Temp file deletion on workstations Clear Cookies, History from web browsers Daily AV Scans on all workstations Daily AV Scans on all servers before backups Cultivate a culture that allows staff to own up to virus infections when they happen. Catching virus activity early is the best defense.
  • 83. A Business Owner’s Perspective (iv) Customer Data Collection All Websites and Apps must use SSL encryption when collecting user data. Even something as simple as a email newsletter should be secured. Opt-In on all data collection practices Clearly define what you will and won’t do with client data in a Privacy Policy posted on your site Adhere to your policy or change it if you deem necessary. Do not operate outside your stated policy Define a Data Retention Policy (Usually 3 years) Secure Destruction of data after retention policy
  • 84. A Business Owner’s Perspective (v) Going International Know your countries privacy laws and adjust your internal collection practices to match. Sometimes Opt-in is not enough US-EU Safe Harbor Framework COPPA – Under 13 in the US Going international opens up easier routes to hacking corporate networks. Think China Hacking Google
  • 85. The Ins, Outs, and Nuances of Internet Privacy June 30, 2011 Greg Hall Owner, 247 IT Outsourcing ghall@247ITOutsourcing.com

Editor's Notes

  1. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  2. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  3. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  4. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  5. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  6. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  7. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  8. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  9. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  10. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  11. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  12. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  13. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  14. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  15. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  16. Based on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.
  17. Based on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.
  18. Based on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.
  19. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  20. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  21. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  22. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  23. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  24. Search for (214) 244-3399 in phone.Spokeo - Going to go through a manual search of my own nameInformation is embedded not only on the “surface web” but also on the “deepnet”Think of this like the ocean—cast a net in the ocean and you’ll catch all in the surface, but nothing in the deep which is rich with lifeGRAPHIC: http://www.spokeo.com/privacyOther places your data lives electronicallyMedical recordsGovernment databasesEcommerce sites (Amazon, eBay)Search engines (Google, Bing, AOL)
  25. Search for (214) 244-3399 in phone.Spokeo - Going to go through a manual search of my own nameInformation is embedded not only on the “surface web” but also on the “deepnet”Think of this like the ocean—cast a net in the ocean and you’ll catch all in the surface, but nothing in the deep which is rich with lifeGRAPHIC: http://www.spokeo.com/privacyOther places your data lives electronicallyMedical recordsGovernment databasesEcommerce sites (Amazon, eBay)Search engines (Google, Bing, AOL)
  26. http://www.ted.com/talks/aaron_koblin.html
  27. traffic analysisHow does traffic analysis work? Every user is given a unique ID (e.g. within Google, AOL, Bing, etc.)Every device that accesses the internet has a unique IPInternet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.https://www.torproject.org/about/overview.html.enhow else do sites get my data?data logging - records computer usage (time, sites visited, etc)it’s as basic as searches…search engines--every search is tracked
  28. how else do sites get my data?data logging - records computer usage (time, sites visited, etc)it’s as basic as searches…search engines--every search is tracked
  29. log filesWeb beaconscookies - data stored on a user's computer that assists in automated access to websites or web features or other information; can also be used for user-tracking by storing special usage history data in a cookietraditional cookie is a HTTP cookie, invented by Lou Montulli and John Giannandrea at Netscape in 1994Cookies are small text files that web servers typically send to computers when a user visits a website. Cookies are stored as text files on the hard drive, and can be accessed by web servers when the user returns to that website or goes to another website. Cookies are used by companies to collect and send information about a user's website visit – for example, number of visits, average time spent, pages viewed, navigation history through the website, and other statistics. This information helps companies improve the user's online experience in many ways: allowing companies to monitor website performance, making the website easier to use, measuring the effectiveness of promotional placement, and tailoring the website to better match a user's interests and preferences. Cookies cannot be used to access any other data on a computer's hard drive, or to personally identify a user. Users who prefer not to accept cookies can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive.http://selectout.org/results/optout/users are generally not explicitly alerted when a cookie is droppedflash cookies - local shared objects; work the same way as normal cookies except are used by Adobe Flash Player; same risks as normal cookies but are not as easily blocksThese cookie files are stored outside of the browser's control. Web browsers do not directly allow users to view or delete the cookies stored by a Flash application, users are not notified when such cookies are set, and these cookies never expire. Flash cookies can track users in all the ways traditionally HTTP cookies do, and they can be stored or retrieved whenever a user accesses a page containing a Flash applicationhttps://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideWhat's more, the Berkeley researchers found that Flash cookies are often used to deliberately circumvent users' HTTP cookie policies. That is, a site may intentionally store the same information redundantly in both HTTP cookie and Flash cookie forms. When a user deletes the HTTP cookie, the site may "respawn" it from the copy that was stored as a Flash cookie! It seems clear that site operators know many users don't want to be tracked with cookies, but have found a way of circumventing those users' privacy preferences.https://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideevercookie - JS based application which produces cookies in a web browser that actively "resist" deletion by redundantly compying themselves in different forms on the user's machine (e.g. Flash Local Shared Objects, window.name caching)
  30. log filesWeb beaconscookies - data stored on a user's computer that assists in automated access to websites or web features or other information; can also be used for user-tracking by storing special usage history data in a cookietraditional cookie is a HTTP cookie, invented by Lou Montulli and John Giannandrea at Netscape in 1994Cookies are small text files that web servers typically send to computers when a user visits a website. Cookies are stored as text files on the hard drive, and can be accessed by web servers when the user returns to that website or goes to another website. Cookies are used by companies to collect and send information about a user's website visit – for example, number of visits, average time spent, pages viewed, navigation history through the website, and other statistics. This information helps companies improve the user's online experience in many ways: allowing companies to monitor website performance, making the website easier to use, measuring the effectiveness of promotional placement, and tailoring the website to better match a user's interests and preferences. Cookies cannot be used to access any other data on a computer's hard drive, or to personally identify a user. Users who prefer not to accept cookies can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive.http://selectout.org/results/optout/users are generally not explicitly alerted when a cookie is droppedflash cookies - local shared objects; work the same way as normal cookies except are used by Adobe Flash Player; same risks as normal cookies but are not as easily blocksThese cookie files are stored outside of the browser's control. Web browsers do not directly allow users to view or delete the cookies stored by a Flash application, users are not notified when such cookies are set, and these cookies never expire. Flash cookies can track users in all the ways traditionally HTTP cookies do, and they can be stored or retrieved whenever a user accesses a page containing a Flash applicationhttps://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideWhat's more, the Berkeley researchers found that Flash cookies are often used to deliberately circumvent users' HTTP cookie policies. That is, a site may intentionally store the same information redundantly in both HTTP cookie and Flash cookie forms. When a user deletes the HTTP cookie, the site may "respawn" it from the copy that was stored as a Flash cookie! It seems clear that site operators know many users don't want to be tracked with cookies, but have found a way of circumventing those users' privacy preferences.https://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideevercookie - JS based application which produces cookies in a web browser that actively "resist" deletion by redundantly compying themselves in different forms on the user's machine (e.g. Flash Local Shared Objects, window.name caching)
  31. log filesWeb beaconscookies - data stored on a user's computer that assists in automated access to websites or web features or other information; can also be used for user-tracking by storing special usage history data in a cookietraditional cookie is a HTTP cookie, invented by Lou Montulli and John Giannandrea at Netscape in 1994Cookies are small text files that web servers typically send to computers when a user visits a website. Cookies are stored as text files on the hard drive, and can be accessed by web servers when the user returns to that website or goes to another website. Cookies are used by companies to collect and send information about a user's website visit – for example, number of visits, average time spent, pages viewed, navigation history through the website, and other statistics. This information helps companies improve the user's online experience in many ways: allowing companies to monitor website performance, making the website easier to use, measuring the effectiveness of promotional placement, and tailoring the website to better match a user's interests and preferences. Cookies cannot be used to access any other data on a computer's hard drive, or to personally identify a user. Users who prefer not to accept cookies can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive.http://selectout.org/results/optout/users are generally not explicitly alerted when a cookie is droppedflash cookies - local shared objects; work the same way as normal cookies except are used by Adobe Flash Player; same risks as normal cookies but are not as easily blocksThese cookie files are stored outside of the browser's control. Web browsers do not directly allow users to view or delete the cookies stored by a Flash application, users are not notified when such cookies are set, and these cookies never expire. Flash cookies can track users in all the ways traditionally HTTP cookies do, and they can be stored or retrieved whenever a user accesses a page containing a Flash applicationhttps://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideWhat's more, the Berkeley researchers found that Flash cookies are often used to deliberately circumvent users' HTTP cookie policies. That is, a site may intentionally store the same information redundantly in both HTTP cookie and Flash cookie forms. When a user deletes the HTTP cookie, the site may "respawn" it from the copy that was stored as a Flash cookie! It seems clear that site operators know many users don't want to be tracked with cookies, but have found a way of circumventing those users' privacy preferences.https://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideevercookie - JS based application which produces cookies in a web browser that actively "resist" deletion by redundantly compying themselves in different forms on the user's machine (e.g. Flash Local Shared Objects, window.name caching)
  32. Talk about how
  33. Talk about how
  34. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  35. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  36. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  37. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  38. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  39. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  40. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  41. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  42. how else do sites get my data?data logging - records computer usage (time, sites visited, etc)it’s as basic as searches…search engines--every search is tracked
  43. What exactly is the scope of the issue we’re looking at here?Privacy, security, compliancePrivacy determines what is and is not tracked and collected. Security addresses how this tracking and data storage are done. Compliance addresses standards set (especially in the courts) that set minimum privacy and security measures in place.
  44. What exactly is the scope of the issue we’re looking at here?Privacy, security, compliancePrivacy determines what is and is not tracked and collected. Security addresses how this tracking and data storage are done. Compliance addresses standards set (especially in the courts) that set minimum privacy and security measures in place.