Sei sulla pagina 1di 23

Privacy Issues and

Internet Privacy

Introduction

Information technology
-> Collects, stores, integrates and
retrieves
data and information

Store and Retrieve information!!!


-> a Negative impact on right to
Privacy???

What Is Privacy?

The ability of an individual or group to


secluded themselves or information about
themselves and thereby reveal it selectively

A personal, subjective condition. One


person cannot decide for another what his
or her sense of privacy should be

Privacy is sometimes related to anonymity,


the wish to remain unnoticed or unidentified
in the public

10/19/15

Eg. for Privacy Issues

Violation of Privacy

Computer Monitoring

Computer Matching

Unauthorized Personal Files

How our Personal


Information Gets
Revealed

10/19/15

When surfing the


internet, avoid free
Beware of phishing,offers and protectChatting guard
which are fake e-mails
your information!your information unless
Sent to try to gain
You are 100%
your personal and
Sure who you are
financial information.
chatting with.
Protect your
Cookies arent just
privacy
Dont even
for eating, they may
on the Web
open Spam, download
be sending your
a spam buster!

personal information
to others.
E-mail is not
Protect your passwords
secure and should like you would your
never be though wallet or car keys.
of as private.
Make it complicate!

By ISP

Internet Service Providers (ISP) always know


your IP address and the IP address to which
you are communicating

ISPs are capable of observing unencrypted


data passing between you and the Internet,
but not properly-encrypted data

They are usually prevented to do so due to


social pressure and law.
10/19/15

By Email

May be inappropriately spread by the


original receiver

May be intercepted

May be legally viewed or disclosed by


service providers or authorities

10/19/15

By Discussion groups

Any member of the list or group could


collect and distribute your Email address
and information you post

10/19/15

By Internet Browsers

Most web browsers can save some forms of


personal data, such as browsing history,
cookies, web form entries and password

You may accidentally reveal such


information when using a browser on a
public computer or someone else's.

10/19/15

10

What are cookies?

Cookies are data packets sent by a server to


a web client and then sent back unchanged
by the client each time it accesses that server

Cookies are used for authenticating, session


tracking and maintaining specific information
about users, such as site preferences or the
contents of their electronic shopping carts

Cookies are only data, not programs nor


viruses
10/19/15

11

A Sample of Cookie

-->If you type JavaScript:alert(document.cookie) into the address bar,


when logged onto a site, it is possible to see the cookies which have
been set from that domain.
10/19/15

12

By Search Engine

Search engines have and use the ability to


track each one of your searches (e.g. ,IP
address, search terms, time)

10/19/15

13

What search engines did?


August, 7, 2006, AOL apologized for releasing
search log data on subscribers that had been
intended for use with the company's newly
launched research site. Almost 2 weeks before
that, AOL had quietly released roughly 20 million
search records from 658,000 users on their new
AOL Research site. The data includes a number
assigned to the anonymous user, the search
term, the date and time of the search, and the
website visited as a result of the search.

10/19/15

14

By indirect Marketing

Web bugs:
-> A graphic (in a Web site or a graphicenabled email) that can confirm when the
message or Web page is viewed and record
the IP address of the viewer

Third party cookies:


-> Comes from web page may contain
images or advertisements

10/19/15

15

By Social Networks, Blog &


Personal Websites

Employers
and
school
officials
are
increasingly sensitive to the messages you
convey in social networks

10/19/15

16

Want to be a hacker?

10/19/15

17

By Cybercrime

Spyware takes advantage of security holes by


attacking the browser and forcing it to be
downloaded and installed and gather your
information without your knowledge

Phishing occurs when a criminal lures the


victim into providing financial or personal data

Pharming occurs when criminals plant


programs in the victims computer which redirect the victim from legitimate Web sites to
scam look-alike sites
10/19/15

18

Solutions to Protect
Online Privacy

10/19/15

19

Cookie Controls

10/19/15

20

Other Technical Resorts

Anti-virus software

Firewalls

Encryption tools

10/19/15

21

The Platform for Privacy Preferences


(P3P)

Developed by the
Consortium (W3C)

World

Wide

A protocol allowing websites to declare their


intended use of information they collect
about browsing users and allow users to
configure their browsers or other software
tools in such a way that they are notified
whether web site privacy policies match
their pre-set preferences
10/19/15

Web

22

The Only Two Absolute


Choices

Avoid yourself from the Internet

1) Raise awareness of privacy


2) Learn to safeguard your
privacy with a minimum sacrifice
of convenience

10/19/15

23

Potrebbero piacerti anche