1 / 12

Privacy Protection in the Digital Age: Defending Your Personal Information

Explore the various types of accessibility, video facts, and arguments against the free accessibility of personal information. Learn about government regulations, statistics on identity theft, and ways to safeguard your data online. Dive into the debate on privacy, safety, and ownership in the digital realm.

march
Télécharger la présentation

Privacy Protection in the Digital Age: Defending Your Personal Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Against Free Accessibility of Personal Information By Maria Lopez CIS1055.6

  2. Overview • Types of accessibility • Video • Facts • Argument • Government • Statistics

  3. Types of Accessibility • Social networking Sites • Facebook • Twitter • LinkedIn • Telecommunications Companies • Comcast • Verizon • Phishing Scams • Website Pop ups • Email

  4. Phishing Video

  5. Facts • Information accessibility • Information is recorded and transferred through the internet • Privacy • No single law in the US that provide a comprehensive treatment of data protection (Stratford & Stratford, 2011)

  6. Argument • Ease of access • No privacy • damage • Safety • Stalkers • Access to children • Loss of ownership • Personal information belongs to the site entered Everyone is entitled to an opinion

  7. Argument continued • Where is the line? • No boundary identified • Intangible place • Who can you trust? • This the perception of the individual • No one

  8. Argument continued • Everyone must educate themselves (Cyberethics)

  9. Government • Cyberethics - refers to a code of safe and responsible behavior for the Internet community. • Privacy act of 1974 – is itemized to protect the rights of individuals DOJ, 2011

  10. Statistics • This chart outlines identity theft statistics by region. • These statistics have a direct relationship to identity theft attempts. ITAC, 2011

  11. Questions

  12. Works Cited • DOJ. Cyberethics. (2011): Retrieved from http://www.cybercrime.gov/cyberethics.htm • FTC. Consumer alert. How not to get hooked by Phishing Scam. (2011) Retrieved from http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm • Stratford, Jean, Stratford, Juri. Data protection and privacy in the US and Europe (2011). N.pag.Web 20 Nov. 2011. • ITAC. Research and Statistics. (2011) Retrieved from http://www.identitytheftassistance.org/pageview.php?cateid=47

More Related