SlideShare a Scribd company logo
1 of 15
The Data Protection Act & Facebook Privacy



Tutor: Corina Cirstea                       Group C
Luke Short                  Botty Dimanov                  Victor Dama




       Tihomir Bozadzhiev                   Radu Popescu
   The Data Protection Act – Botty Dimanov
   Facebook Privacy – Victor Dama
   Facebook Apps Privacy – Tihomir Bozadzhiev
   Final thoughts – Radu Popescu
   8 main principles
   Personal data shall be processed fairly and lawfully and, in
    particular, shall not be processed unless the data subject has given
    his consent to the processing 1
   In determining for the purposes of the first principle whether
    personal data are processed fairly, regard is to be had to the
    method by which they are obtained, including in particular
    whether any person from whom they are obtained is deceived or
    misled as to the purpose or purposes for which they are to be
    processed 1
   Possible exceptions
   Bridget Treacy: “Legislation will always be playing catch up to
    technology in this area, that's just the way it is” 2
   Statistical companies
   “Take the data now, find out what it reveals later” 2
   We do share information with social networks
   It is passed on to marketing companies and even for
    “analysis and predictive modelling”
   People rely on explicit conformation
   Terms and conditions section
   Every fourth person from 93% have suffered 3
   EU derivatives
   Is Facebook really private?
   Companies targeted advertisement
   Hiring based on Facebook
   Cyberstalking 5
   63% of apps post on your behalf, 69% get your email
    address 6
   Access to your birthdate can reveal your Personal
    Identification Number in some countries 6
   Does Facebook or the apps make money from your data? 6
   People very rarely carefully read the app privacy info
   Recent changes to Facebook design make it even easier to
    skip the privacy info 7


                                         Old design clearly stated
                                          that your are allowing the
                                          app to access your info 7




                                         New design only has a
                                          “Play Game” button 7
   Old design explained
    every piece of personal
    data the app will access in
    detail 7




   New design hides all that
    info, you need to hover
    over the little “?” symbol
    to see details 7
   We now know the whats and the whos, let’s focus on the
    why?
   Is it good or bad?
   We know that most large companies could use our data to
    find out everything about us. But why would they?
   The real danger seems to be Facebook stalking and
    phishing, rather than sharing statistical information with
    marketing companies
   That is something we can easily control
   With a little bit of caution, social networks can become a
    tool, for both the user, the network itself and third parties,
    such as marketing companies, rather than a threat
   The Data Protection Act:
    1 - http://www.legislation.gov.uk/ukpga/1998/29/schedule/1
    2 - http://www.guardian.co.uk/news/datablog/2013/apr/12/data-
protection-law-lagging-behind-technology
     3 - http://www.guardian.co.uk/money/2011/may/11/terms-conditions-
small-print-big-problems


   Facebook Privacy:
     4 - http://articles.baltimoresun.com/2013-04-19/news/bs-ed-facebook-
20130419_1_facebook-privacy-privacy-policies-internet-privacy
     5 - http://www.idesigntimes.com/articles/4624/20130415/billy-joel-
daughter-stalked-alexa-ray-alleged-stalker-found-paul-mccartney-private-
security-detectiv.htm
   Facebook Apps Privacy:
     6 - http://mashable.com/2012/09/04/most-facebook-apps-post-behind-
your-back-exclusive/
      7 - http://techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-
affect-your-privacy-decisions/

More Related Content

Similar to Personal privacy and security

The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy PrimerBrett Elphick
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowVisitor Analytics
 
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist  AVG / GDPR - Algemene Verordering GegevensbeschermingMagento checklist  AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist AVG / GDPR - Algemene Verordering GegevensbeschermingErwin Otten
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
GDPR - A practical guide
GDPR - A practical guideGDPR - A practical guide
GDPR - A practical guideAngad Dayal
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationN N
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementWilliamjohnesUK123
 
GDPR_Skillcast Presentation Template (1).pptx
GDPR_Skillcast Presentation Template (1).pptxGDPR_Skillcast Presentation Template (1).pptx
GDPR_Skillcast Presentation Template (1).pptxkimonesinghunicomerc
 
Presentation on data privacy group 5
Presentation on data privacy   group 5Presentation on data privacy   group 5
Presentation on data privacy group 5Carla Garcia Font
 
GDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookGDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookPlr-Printables
 
Week 5: Dataveillance
Week 5: DataveillanceWeek 5: Dataveillance
Week 5: DataveillanceTom Allen
 

Similar to Personal privacy and security (20)

The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018[REPORT PREVIEW] GDPR Beyond May 25, 2018
[REPORT PREVIEW] GDPR Beyond May 25, 2018
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy Primer
 
Is data privacy a reality with the gdpr?
Is data privacy a reality with the gdpr?Is data privacy a reality with the gdpr?
Is data privacy a reality with the gdpr?
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to Know
 
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist  AVG / GDPR - Algemene Verordering GegevensbeschermingMagento checklist  AVG / GDPR - Algemene Verordering Gegevensbescherming
Magento checklist AVG / GDPR - Algemene Verordering Gegevensbescherming
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
GDPR - A practical guide
GDPR - A practical guideGDPR - A practical guide
GDPR - A practical guide
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulation
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcement
 
GDPR_Skillcast Presentation Template (1).pptx
GDPR_Skillcast Presentation Template (1).pptxGDPR_Skillcast Presentation Template (1).pptx
GDPR_Skillcast Presentation Template (1).pptx
 
Presentation on data privacy group 5
Presentation on data privacy   group 5Presentation on data privacy   group 5
Presentation on data privacy group 5
 
GDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e bookGDPR, what you need to know and how to prepare for it e book
GDPR, what you need to know and how to prepare for it e book
 
Week 5: Dataveillance
Week 5: DataveillanceWeek 5: Dataveillance
Week 5: Dataveillance
 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 

Recently uploaded (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 

Personal privacy and security

  • 1. The Data Protection Act & Facebook Privacy Tutor: Corina Cirstea Group C
  • 2. Luke Short Botty Dimanov Victor Dama Tihomir Bozadzhiev Radu Popescu
  • 3. The Data Protection Act – Botty Dimanov  Facebook Privacy – Victor Dama  Facebook Apps Privacy – Tihomir Bozadzhiev  Final thoughts – Radu Popescu
  • 4. 8 main principles  Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless the data subject has given his consent to the processing 1  In determining for the purposes of the first principle whether personal data are processed fairly, regard is to be had to the method by which they are obtained, including in particular whether any person from whom they are obtained is deceived or misled as to the purpose or purposes for which they are to be processed 1  Possible exceptions
  • 5. Bridget Treacy: “Legislation will always be playing catch up to technology in this area, that's just the way it is” 2  Statistical companies  “Take the data now, find out what it reveals later” 2
  • 6. We do share information with social networks  It is passed on to marketing companies and even for “analysis and predictive modelling”  People rely on explicit conformation  Terms and conditions section  Every fourth person from 93% have suffered 3  EU derivatives
  • 7. Is Facebook really private?
  • 8. Companies targeted advertisement  Hiring based on Facebook  Cyberstalking 5
  • 9. 63% of apps post on your behalf, 69% get your email address 6  Access to your birthdate can reveal your Personal Identification Number in some countries 6  Does Facebook or the apps make money from your data? 6
  • 10. People very rarely carefully read the app privacy info  Recent changes to Facebook design make it even easier to skip the privacy info 7  Old design clearly stated that your are allowing the app to access your info 7  New design only has a “Play Game” button 7
  • 11. Old design explained every piece of personal data the app will access in detail 7  New design hides all that info, you need to hover over the little “?” symbol to see details 7
  • 12. We now know the whats and the whos, let’s focus on the why?  Is it good or bad?  We know that most large companies could use our data to find out everything about us. But why would they?
  • 13. The real danger seems to be Facebook stalking and phishing, rather than sharing statistical information with marketing companies  That is something we can easily control  With a little bit of caution, social networks can become a tool, for both the user, the network itself and third parties, such as marketing companies, rather than a threat
  • 14. The Data Protection Act: 1 - http://www.legislation.gov.uk/ukpga/1998/29/schedule/1 2 - http://www.guardian.co.uk/news/datablog/2013/apr/12/data- protection-law-lagging-behind-technology 3 - http://www.guardian.co.uk/money/2011/may/11/terms-conditions- small-print-big-problems  Facebook Privacy: 4 - http://articles.baltimoresun.com/2013-04-19/news/bs-ed-facebook- 20130419_1_facebook-privacy-privacy-policies-internet-privacy 5 - http://www.idesigntimes.com/articles/4624/20130415/billy-joel- daughter-stalked-alexa-ray-alleged-stalker-found-paul-mccartney-private- security-detectiv.htm
  • 15. Facebook Apps Privacy: 6 - http://mashable.com/2012/09/04/most-facebook-apps-post-behind- your-back-exclusive/ 7 - http://techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to- affect-your-privacy-decisions/

Editor's Notes

  1. 1-