The document discusses characteristics and privacy issues related to the internet and new technologies. It notes that while the internet provides access to information, it can also be vulnerable to security and accuracy issues and enable illegal activity. Privacy is defined as the right to be left alone. Privacy issues discussed include electronic surveillance, email monitoring, data collection from websites, and workplace monitoring. Technologies like cookies, spyware, and RFID are examined in terms of the privacy risks they pose. Guidelines to minimize privacy invasions are provided.
2. Characteristics of the Internet
(+) public and available for anyone,
(+) a useful tool for opening access to data of
public interest
(+) serves freedom of thinking and freedom of
expression on a global level
BUT
(-) rather vulnerable in terms of data security
(-) a potential source of inaccurate or untruthful
information;
(-) apt to make room for illegal activity
3. What is Privacy?
Privacy is the right to be left alone and free from
surveillance and unreasonable personal intrusions.
Information privacy is the right to determine when
and to what extent information about oneself can be
communicated to others.
This applies to individuals, groups, and institutions.
4. Internet privacy
ability to control what information one reveals about
oneself over the Internet, and to control who can
access that information
5. Privacy issues
There are a number of privacy issues that are of
concern, including
electronic surveillance
Email
Web
availability of personal information,
cookies and spyware
workplace monitoring
6. Privacy Issues
Employers search social networking sites for
background information on applicants
Monitoring systems are adopted by employers to
check employee performance
Information technology has aided in the easy
availability of personal information
• Information in databases can be used for direct
marketing and for credit checks on potential
borrowers or renters
7. E-surveillance
Electronic surveillance involves
monitoring people with technology, often without their
knowledge
Video recordings
photography
audio recordings
8. E-mail
Spam: Unsolicited e-mail sent for advertising
purposes
• Sent in bulk using automated mailing software
Ease of access
• Individuals should assume that others have access to
their messages
• Any e-mails sent on company-owned computers are
the property of the organization
9. Data Collection on the Web
Due to the increase in online shopping, personal
details of individuals are prone to misuse
• Issue of personal information being sold to
telemarketing firms resulting in spam
Information provided on the Web can be combined
with other information and technologies to produce
new information
10. Technologies Used for Data
Collection
Cookies: Small text files with unique ID tags that
are embedded in a Web browser and saved on the
user’s hard drive
• Help websites customize pages for users
• Considered an invasion of privacy when users’
information is used without prior consent
• Installing a cookie manager helps users disable
cookies
• Log files: Generated by Web server software,
record a user’s actions on a website
11. Personal Information
• Personal information can be disclosed in a number of ways:
• Loans
• Orders via mail
• Magazine subscriptions
• Tax forms
• Applications for schools, jobs, clubs
• Insurance claim
• Hospital stay
• Sending checks
• Advertisers
12. Cookies
Cookie
Stores information about you
Located on your hard drive
Beneficial uses
Viewing preferences
Online shopping
Secure sites retain password in cookie
Controversial use
Tracking surfing habits for advertisers
Can set browser to refuse cookies or warn before storing
Software available to manage cookies
13. Spyware
Spyware is unwanted software that infiltrates your
computing device, stealing your internet usage data
and sensitive information.
Spyware is classified as a type of malware —
malicious software designed to gain access to or
damage your computer, often without your knowledge.
15. Risks to Internet privacy
User-tracking:
Internet Service Providers (capable to observe any Internet-related
activity of the user)
Cookies (parcels of text sent by a server) tracking and maintaining
specific information of the user
Data logging (may include recording times when the computer is in
use, or which web sites are visited)
Spyware programs
Web bug
Social engineering
Phishing
Malicious proxy server
Search engines
16. Risks to Internet privacy (ctd.)
On-line social networks:
Participants are offering self-profile in order to contact
or being contacted.
Risks range from identity theft to online and physical
stalking, embarrasment, discrimination and
blackmailing.
17. Guidelines to Minimize the Invasion of Privacy
Conduct business only with websites having privacy
policies
Limit access to personal information to those with
authorization
Ensure data’s reliability and take precautions to
prevent misuse of the data
Data collection must have a stated purpose
Identify ways to prevent personal information
gathered being disclosed without consent
18. Guidelines to Minimize the Invasion of Privacy
Organizations should use verification procedures to
ensure data accuracy
Organizations must correct or delete incorrect data
• Prevent unauthorized access to data and misuse of
data
Users should review their records and correct any
inaccuracies
Transparency in record-keeping systems storing
personal data
19. RFID
RFID stands for Radio-Frequency IDentification.
The acronym refers to small electronic devices that
consist of a small chip and an antenna.
The chip typically is capable of carrying 2,000 bytes of
data or less.
The RFID device serves the same purpose as a bar code
or a magnetic strip on the back of a credit card or ATM
card; it provides a unique identifier for that object.
And, just as a bar code or magnetic strip must be
scanned to get the information, the RFID device must
be scanned to retrieve the identifying information.
20. RFID Works Better Than Barcodes
A significant advantage of RFID devices over the
others mentioned above is that the RFID device does
not need to be positioned precisely relative to the
scanner. RFID devices will work within a few feet (up
to 20 feet for high-frequency devices) of the scanner.
For example, you could just put all of your groceries or
purchases in a bag, and set the bag on the scanner. It
would be able to query all of the RFID devices and
total your purchase immediately.
21. Below are some additional benefits
of using RFID:
RFID doesn’t need line of sight
RFID tags are able to be rewritten and reused
RFID tags can be extremely durable against impact and
environmental factors
RFID tag data is encrypted and can also be locked for extra
security
RFID tags can hold more data than other types of tags or labels
RFID readers can read hundreds of tags within seconds
RFID tags can have information printed on them like
instructions, barcodes, or company names
RFID systems can be integrated with other internal systems or
processes
22. Applications of RFID
RFID technology may be used in a variety of applications
including:
Passports
Smart cards
Airplane luggage
Toll booth passes
Home appliances
Merchandise tags
Animal and pet tags
Automobile key-and-lock
Monitoring heart patients
Telephone and computer networks
Operation of spacecraft and satellites
23. RFID: a threat to privacy?
There is growing recognition that the same RFID
application which is employed exstensibly to prevent
counterfeiting or the theft of cash or goods could also
be used to track an individual’s spending habits,
preferences and even physical movements.
From a privacy standpoint, the current simplicity of
the tag’s response, which does not differentiate
between requests based on origin or identity, is a flaw.
Thieves could use the tags to locate the whereabouts of
valuables and interested persons could obtain access
to another’s medical records or passport details, or
trace another’s spending habits or physical
movements.