1 / 30

Unit 2- Privacy and Cyberspace

Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online Privacy at Work Five Fair Information Practices Important Federal Privacy Laws. Kaizen 2006 - 2007. Unit 2- Privacy and Cyberspace. MIDTERM.

glennbenson
Télécharger la présentation

Unit 2- Privacy and Cyberspace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online Privacy at Work Five Fair Information Practices Important Federal Privacy Laws Kaizen 2006 - 2007 Unit 2- Privacy and Cyberspace MIDTERM

  2. Explain terms used in privacy and cyberspace. Identify hidden information technologies used in the Internet. Explain issues regarding privacy at work and things to remember at work. Identify existing legislation and laws regarding privacy. Kaizen 2006 - 2007 Objectives Privacy and Cyberspace

  3. TThe threat of privacy due to the sale of sensitive personal information on the Internet DDefinition of anonymity and how it is abused by users TTechnological developments and how they are eroding privacy and anonymity RReasons why employers are monitoring employees’ computer usage HHow public-key encryption threatens U.S. security, both foreign and domestic TThe U.S. government’s proposed key recovery plan and how it threatens the growth of Internet commerce Kaizen 2006 - 2007 COMPUTERS IN YOUR FUTURE 2004by Bryan Pfaffenberger and Bill Daley Privacy and Cyberspace

  4. Identity theft is one of the fastest growing crimes in the United States and Canada. Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account. Examples of information needed are name, address, social security number, and other personal information. Laws limit liability to $50 for each fraudulent charge. An individual’s credit report is affected by identity theft. Kaizen 2006 - 2007 Identity Theft Privacy and Cyberspace

  5. Privacy refers to an individual’s ability to restrict the collection, use, and sale of confidential personal information. The Internet is eroding privacy through the selling of information collected through registration forms on Web sites. Few laws regulate selling personal information. Technology is not only making it easier to invade someone’s privacy, but it is also providing a means to protect against privacy invasion. Kaizen 2006 - 2007 Privacy in Cyberspace Privacy and Cyberspace

  6. Encryption refers to the coding of information so that it is only readable by the intended recipient. It is used in electronic commerce transactions and e-mail. Encryption provides a way to use the Internet in a safe, secure way. It could be used misused by criminals and terrorists. Kaizen 2006 - 2007 Encryption Privacy and Cyberspace

  7. Anonymity is the ability to convey a message without disclosing one’s identity. It can be abused because it frees people from accountability. Defamation is the act of injuring someone’s reputation by making false statements. Libeloccurs when malicious statements are made in writing. Kaizen 2006 - 2007 Anonymity Privacy and Cyberspace

  8. Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view. Hidden information technologies used on the Internet are: Cookies Global Unique Identifiers (GUIDs) Kaizen 2006 - 2007 How Is Technology Eroding Privacy and Anonymity? Privacy and Cyberspace

  9. Cookies are small files that are written to an individual’s hard drive whenever a Web site is visited. Legitimate purposes of cookies include recording information for future use. Example: retail sites using “shopping carts.” Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on Web sites based on those actions. Kaizen 2006 - 2007 Cookies Privacy and Cyberspace

  10. Kaizen 2006 - 2007 Example ofCookies Privacy and Cyberspace

  11. A GUID is a unique identification number generated by hardware or a program. It is used to send user information back to the site that created it. Kaizen 2006 - 2007 Global Unique Identifiers (GUIDs) Privacy and Cyberspace

  12. Browse anonymously– Use Web sites such as www.anonymizer.com or www.the-cloak.com. Disable cookies on your Web browser. Use free e-mail addresses for information placed on Web sites. Don’t divulge personal information to online strangers. Make sure registration forms have a privacy policy statement. Kaizen 2006 - 2007 Protecting Your Privacy Online Privacy and Cyberspace

  13. Employees are given e-mail and Internet access at work. Companies are concerned about employees’ wasting time surfing the net and sending personal e-mail. Three-quarters of large corporations monitor employees’ phone calls, e-mail, Web browsing habits, and computer files. Laws do not protect employees from being monitored. Kaizen 2006 - 2007 Privacy at Work Privacy and Cyberspace

  14. 1. Do not use the employer’s phone for personal calls. 2. Do not use the employer’s e-mail for personal messages. 3. Assume everything you do at work is being monitored. Kaizen 2006 - 2007 Things to Remember at Work Privacy and Cyberspace

  15. - The Fair Information Practices were developed by the U.S. Department of Health, Education, and Welfare in the early 1970s. They have been adopted by many public and private organizations since Kaizen 2006 - 2007 The Five Fair Information and Important Federal Privacy Laws Privacy and Cyberspace

  16. There must be no personal data record-keeping systems whose existence is a secret from the general public. People have the right to access, inspect, review, and amend data about them that is kept in an information system. Kaizen 2006 - 2007 Fair Information Practices Privacy and Cyberspace

  17. 3. There must be no use of personal information for purposes other than those for which it was gathered without prior consent. 4. Managers of systems are responsible and should be held accountable and liable for the reliability and security of the systems under their control, as well as for many damage done by those systems. Kaizen 2006 - 2007 Fair Information Practices Privacy and Cyberspace

  18. 5. Governments have the right to intervene in the information relationships among private parties to protect the privacy of individuals. Kaizen 2006 - 2007 Fair Information Practices Privacy and Cyberspace

  19. Freedom of Information Act (1970): Gives you the right to look at data concerning you that is stored by the federal government. A drawback is that sometimes a lawsuit is necessary to pry it loose. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  20. Fair Credit Reporting Act (1970): Bars credit agencies from sharing credit information with anyone but authorized customers. Gives you the right to review and correct your records and to be notified of credit investigations for insurance employment. A drawback is that credit agencies may share information with anyone that reasonably believe has a “legitimate business need.” Legitimate is not defined. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  21. Privacy Act (1974):Prohibits federal information collected about you for one purpose from being used for a different purpose. Allows the right to inspect and correct records. A drawback is that exceptions written into the law allow federal agencies to share information anyway. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  22. Family Educational Rights and Privacy Act (1978):Sets strict procedures that federal agencies must follow when seeking to examine customer records in bank; regulates financial industry’s use of personal financial records. A drawback is that the law does not cover state and local governments. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  23. Privacy Protection Act (1980): Prohibits agents of federal government from making unannounced searches of press offices if no one there is suspected of a crime. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  24. Cable Communication Policy Act (1984):Restricts cable companies in the collection and sharing of information about their customers. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  25. Computer Fraud and Abuse Act (1986): Makes eavesdropping on private conversations illegal without a court order. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  26. Computer Security Act (1987): Makes actions that affect the security of computer files and telecommunications illegal. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  27. Computer Matching and Privacy Protection Act (1998): Regulates computer matching of federal data; allows individual a chance to respond before government takes adverse actions against them. A drawback is that many possible computer matches are not affected, such as those done for law-enforcement or tax reasons. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  28. Video Privacy Protection Act (1988): Prevents retailers from disclosing video-rental records without the customer’s consent or a court order. Kaizen 2006 - 2007 Important Federal Privacy Laws Privacy and Cyberspace

  29. Sensitive personal information is for sale on the Internet. Web sites collect personal information without informing their visitors. Anonymity is the ability to convey a message without disclosing one’s identity. Cookies provide a way for Web sites to record one’s browsing activities. GUIDs make anonymous usage of the Internet difficult. Many employers monitor their employees phone calls, e-mail, Web browsing habits, and computer files. Kaizen 2006 - 2007 Summary Privacy and Cyberspace

  30. What does Big Brother term mean? What are other pre-cautionary measures to keep one’s privacy? What can you say about Global Positioning System or the GPS? Case Analysis Kaizen 2006 - 2007 Evaluation Privacy and Cyberspace

More Related