Technologies Impact On Privacy
Technologies Impact On Privacy
What Is Privacy?
4
Unsolicited
Activities
Done Crime
Online
Cybercrime
Internet Privacy
Internet Security
7
How they look at privacy?
"you have to realize
that we're people
and we just need
privacy and we
need our respect
and these are just
things you have to
have as a human
being."
-- Britney Spears
June15, 2006
NBC Dateline
Sensitive information is information or knowledge that might result in
loss of an advantage or level of security if revealed (disclosed) to others who
might have low or unknown trustability and/or indeterminable or hostile intentions.
Loss, misuse, modification or unauthorized access to sensitive
information can adversely affect the privacy of an individual.
11
Internet Service Providers (ISP)
always know your IP address and the
IP address to which you are
communicating.
ISPs are capable of observing.
unencrypted data passing between
you and the Internet, but not properly-
encrypted data.
They are usually prevented to do so
due to social pressure and law.
12
Emails
May be inappropriately spread by the
original receiver
May be intercepted
May be legally viewed or disclosed by
services providers or authorities.
13
There is no barrier for unsolicited
messages or Emails within a mailing
list or online discussion group.
Any member of the list or group could
collect and distribute your Email
address and information you post.
14
By Internet Browsers
Most web browsers can save some
forms of personal data, such as
browsing history, cookies, web form
entries and password.
You may accidentally reveal such
information when using a browser on
a public computer or someone’s.
What cookie are?
Cookies are data packets sent by a server
to a web client and then sent back
unchanged by the client each time it
accesses that server.
It used for authenticating,
session tracking and maintaining specific
information about users, such as site
preferences or the contents of their
electronic shopping carts.
These are only data, not programs nor
viruses
17
• If you type JavaScript:alert(document.cookie)
into the address bar, when logged onto a site, it is
possible to see the cookies which have been set
from that domain.
Yahoo: “Yahoo! collects personal information when you register
with Yahoo!, when you use Yahoo! products or services, when
you visit Yahoo! pages or the pages of certain Yahoo! partners,
and when you enter promotions or sweepstakes. Yahoo! may
combine information about you that we have with information we
obtain from business partners or other companies.”
Google: “Log information – When you access Google services,
our servers automatically record information that your browser
sends whenever you visit a website. These server logs may
include information such as your web request, Internet Protocol
address, browser type, browser language, the date and time of
your request and one or more cookies that may uniquely identify
your browser. Also, in order to protect you from fraud, phishing,
and other misconduct, we may collect information about your
interaction with our services. Any such information we collect will
only be used to detect and prevent fraud or other misconduct.”
• Web bugs: a graphic (in a Web site
or a graphic-enabled email) that can
confirm when the message or Web
page is viewed and record the IP
address of the viewer.
• Third party cookies: a web page
may contain images or other components
stored on servers in other domains.
Cookies that are set during retrieval of
these components are called third-
party cookies.
22
Many companies also sell or share
your information to others. This
Sharing with other businesses can be
done rapidly and cheaply.
By Instant Messaging
• Your IM conversation can
be saved
onto a computer even if
only one
person agrees.
• Workplace IM can be
monitored by
your employer.
• Spim: Spam distributed in
IM.
When you file a
lawsuit for divorce or are a party to a
civil lawsuit or criminal case, court
records, are accessible to the public.
The government may
want your personal information for law
enforcement purposes as well as for
foreign intelligence investigations.
Various laws govern these procedures.
takes advantage of security
holes by attacking the browser and
forcing it to be downloaded and installed
and gather your information without your
knowledge.
occurs when criminal lure the
victim into providing financial data.
occurs when criminals plant
programs in the victim’s computer
which re-direct the victim from legitimate Web
sites to scam look-alike sites.
32
Cookie Controls
33
Anti-virus software
Firewalls & Proxies
Encryption tools
Anonymizer
34
developed by the World Wide Web
Consortium (W3C), is a protocol
allowing websites to declare their
intended use of information they
collect about browsing users and allow
users to configure their browsers or
other software tools in such a way that
they are notified whether web site
privacy policies match their pre-set
preferences.
Insulate yourself from the Internet
• Raise awareness of privacy
• learn to safeguard your
privacy with a minimum
sacrifice of convenience