1 / 21

Privacy on the WEB

Privacy on the WEB. Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme. Topics. Privacy Enablers of Privacy Invasion Methods of Protection Government Regulation. Privacy on the WEB. Is there really any? “You’ve got mail”, but is it secure?

bryce
Télécharger la présentation

Privacy on the WEB

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme

  2. Topics • Privacy • Enablers of Privacy Invasion • Methods of Protection • Government Regulation

  3. Privacy on the WEB Is there really any? “You’ve got mail”, but is it secure? Does a company have the right to profile your Internet use? Do you have the right to know if your are being “watched”? Do others have the right to gather personal data without your knowledge or permission?

  4. Privacy – Intro. Invasion of privacy intentional intrusion upon the solitude or seclusion of another that is highly offensive to a reasonable person (Webster’s) Privacy on the WEB Refers to security and confidentiality of personal and/or financial information

  5. Privacy – Intro. • Forbes article • 56% of Americans are “very concerned” • 86% of computer user believe business should get explicit permission before collecting data • Expect federal and state regulatory agencies to take notice Forbes ASAP February 19,2001

  6. Why the recent concern? • Profiling – on-line retailers collect data to target individual preferences for direct solicitation • Selling of marketing lists Data has always been available but not with the current easy of access

  7. Privacy • Personal • Anonymity is still widespread on the Internet but information is collected • Workplace • 66% of 500 firms conduct electronic surveillance • 27% monitor email • Consumer Relationships • Collection of personal information for profiling

  8. What has enabled the invasion? Wide spread use of the Internet & E-mail • Cooperative Browsers • Cookies • Track personal usage • Anonymous or customized • Persistent or Session

  9. What has enabled the invasion? • WEB Banners • Can use cookies • Setup on many sites to track patterns • WEB Bugs • 1-pixel gif file setup on the WEB page or sent via email • Undetectable by ant-cookie filters • Can run executable code

  10. What has enabled the invasion? • Spyware • Email monitoring • WEB use monitoring • Data interception • Email interception • Naïve Users • High-speed Internet access • Wireless Internet access • Free Internet access

  11. What has enabled the invasion? • Inadequate Business Practices • Outdated email protocols • Trusted networks • Poor user maintenance on unused accounts • Instant messaging • Inadequate firewalls

  12. What has enabled the invasion? • Vendor – Back Doors Code written into programs to allow the developer of the software to circumvent security • Examples • RealJukebox • Alexa • Cuecat • Microsoft • Barbie

  13. Has your privacy been Compromised? • 411 Locate, InfoUSA, 555-1212 • List phone numbers and email addresses • Bigfoot • Email addresses • YBLost, Stalker Site • Links to just about anything

  14. Methods of Protection • Individual • Anonymity • Education • Protection software • HW & SW • VPN (Virtual Private Network) • Encryption

  15. Methods of Protection • Businesses • Good security • Control email • Monitor systems • Corporate Privacy Policies • Cybersurance

  16. Government Regulation • Carnivore • FBI email monitoring • Federal Trade Commission • FTC Fair Information Practices • Notice • Choice • Access • Security

  17. Government Regulation • USA does not have a comprehensive e-commerce privacy bill • Children's Online Privacy Protection Act • 13 years and younger • Parental consent to collect information • Refrain from re-distribution of identifiable information • Best effort to discourage posting of contact information • No special offers

  18. Government Regulation • Privacy Bills Currently in Congress • Spyware Control and Privacy Protection Act • Electronic Privacy Protection Act • Consumer Online Privacy and Disclosure Act • Consumer Internet Privacy Enhancement Act

  19. Government Regulation • Non-Government Privacy Organizations • CERT Coordination Center • Online Privacy Alliance • Platform for Privacy Preferences Project (P3P)

  20. Government Regulation • International : European Union • 1998 law requiring personal information on the Internet to be: • Accurate • Current • Gathered fairly and lawfully • Processed and used for a specified legitimate purpose • Kept no longer than deemed necessary;y to fulfill the stated purpose

  21. Conclusion • Need for strong laws • Consumers need to be fully informed and educated • Privacy Policies • Tenacious in fighting for privacy

More Related