1 / 12

Against Free Accessibility of Personal Information

Against Free Accessibility of Personal Information. By Maria Lopez CIS1055.6. Overview. Types of accessibility Video Facts Argument Government Statistics. Types of Accessibility. Social networking Sites Facebook Twitter LinkedIn Telecommunications Companies Comcast Verizon

march
Télécharger la présentation

Against Free Accessibility of Personal Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Against Free Accessibility of Personal Information By Maria Lopez CIS1055.6

  2. Overview • Types of accessibility • Video • Facts • Argument • Government • Statistics

  3. Types of Accessibility • Social networking Sites • Facebook • Twitter • LinkedIn • Telecommunications Companies • Comcast • Verizon • Phishing Scams • Website Pop ups • Email

  4. Phishing Video

  5. Facts • Information accessibility • Information is recorded and transferred through the internet • Privacy • No single law in the US that provide a comprehensive treatment of data protection (Stratford & Stratford, 2011)

  6. Argument • Ease of access • No privacy • damage • Safety • Stalkers • Access to children • Loss of ownership • Personal information belongs to the site entered Everyone is entitled to an opinion

  7. Argument continued • Where is the line? • No boundary identified • Intangible place • Who can you trust? • This the perception of the individual • No one

  8. Argument continued • Everyone must educate themselves (Cyberethics)

  9. Government • Cyberethics - refers to a code of safe and responsible behavior for the Internet community. • Privacy act of 1974 – is itemized to protect the rights of individuals DOJ, 2011

  10. Statistics • This chart outlines identity theft statistics by region. • These statistics have a direct relationship to identity theft attempts. ITAC, 2011

  11. Questions

  12. Works Cited • DOJ. Cyberethics. (2011): Retrieved from http://www.cybercrime.gov/cyberethics.htm • FTC. Consumer alert. How not to get hooked by Phishing Scam. (2011) Retrieved from http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm • Stratford, Jean, Stratford, Juri. Data protection and privacy in the US and Europe (2011). N.pag.Web 20 Nov. 2011. • ITAC. Research and Statistics. (2011) Retrieved from http://www.identitytheftassistance.org/pageview.php?cateid=47

More Related