Privacy and the Internet
John R Nicholson
Updated 8/17
What is Privacy
ď‚´Definition
ď‚´Ability of individual to seclude information about themselves
and express it selectively
ď‚´Something that is inherently special or sensitive
ď‚´Amendment IV
“The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and
seizures…”
ď‚´Pizza video: http://bit.ly/1ep4ODT
ď‚´Note: last set of characters is case sensitive
Why is Privacy Important?
ď‚´Credit Reports (CBS says 4/5 contain errors)
ď‚´Precursor to identity theft
ď‚´Incorrect information
ď‚´Incorrect interpretation
ď‚´The Internet is forever
ď‚´Streisand Effect (6 downloads turned into
420,000 views)
Defining Big Data
ď‚´Big Data is a term for data sets that are so
large or complex that traditional data
processing application software is inadequate
to deal with them.
ď‚´Refers to the use of predictive analytics, user
behavior analytics, or certain other advanced
data analytics methods that extract value from
data
What is Big Data
ď‚´SciTech Now: http://bit.ly/2xHHxgU (6 min)
ď‚´Note: last set of characters is case sensitive
ď‚´60 Minutes: http://bit.ly/2xHtaJm (15 min)
ď‚´PBS: http://bit.ly/2mUXqeS (4 min)
ď‚´TED: http://bit.ly/2wNUf1k (17 minutes)
ď‚´iTunes privacy agreement: 7 Days, 7 attorneys, 27
pages
ď‚´Personally Identifiable Information (PII) only
valuable information
ď‚´http://Google.com/maps/timeline
Big Data Pros
ď‚´Allows businesses to quickly detect frauds and
errors
ď‚´Develop strategies towards competitors in less
time offering deep insight into consumer
trends and sales
ď‚´Used to provide cutting-edge healthcare.
ď‚´Medical records and wearables provide information about
patients analyzed in real time
Big Data Cons
ď‚´Companies wanting to use Big Data must
redefine their data collection methods and
upgrade computers
ď‚´Cost of developing algorithms
ď‚´Lack of privacy
ď‚´Only .5% of all information has been analyzed
Net Neutrality
ď‚´Move from Title I to Title II by FCC
ď‚´ISPs can throttle speeds to specific sites
ď‚´If an ISP were to develop a movie site, they could have
speedy access to it, throttling Netflix
ď‚´If Pizza Hut pays a fee, and ISP could drop calls or add
interference to Domino’s customers
ď‚´If repealed, ISP has access to all information
you send across the Internet and can sell it.
How Can I Protect Myself
ď‚´Duckduckgo.com search engine
ď‚´TOR browser (never open PDFs online)
ď‚´VPN
ď‚´Vyper (goldenfrog.com) $5 mo/billed annually
ď‚´Password
ď‚´7x@CTd!A
ď‚´Mypasswrdiseasytoremember1
Don’t provide personal information (especially
surveys)
Summary
ď‚´Use a safe search engine
ď‚´Use a safe browser
ď‚´Use a pass phrase rather than a password
Don’t fill out surveys
ď‚´The Internet is forever

More Related Content

PDF
How to safe your company from having a security breach
PDF
Target data breach case study
PDF
Privacidad: La TensiĂłn entre las Capacidades TecnolĂłgicas y las Expectativas ...
PPTX
Security v. Privacy: the great debate
PPTX
The REAL Impact of Big Data on Privacy
PPTX
Target data breach presentation
PDF
Data Breach Visualization
PPTX
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
How to safe your company from having a security breach
Target data breach case study
Privacidad: La TensiĂłn entre las Capacidades TecnolĂłgicas y las Expectativas ...
Security v. Privacy: the great debate
The REAL Impact of Big Data on Privacy
Target data breach presentation
Data Breach Visualization
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...

What's hot (19)

PPTX
What I learned at the Infosecurity ISACA North America Conference 2019
PPTX
LifeLock Javelin Presentation
PDF
Hackers and Hacking a brief overview 5-26-2016
PPT
Data Privacy Micc Presentation
PPTX
Ensuring Property Portal Listing Data Security
ODP
Critical Controls Might Have Prevented the Target Breach
PPTX
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
PDF
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
PPTX
GDPR Part 1: Quick Facts
PDF
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
PPT
Policies and Law in IT
PPTX
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
PPTX
Be An IT Hero - 10 Reasons to Move to the Cloud
PPTX
Mobile Practice Management
PPTX
When not if
PDF
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
PPTX
Investigatory Powers Bill & ICRs
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
Cyber Security for Local Gov SAMFOG
What I learned at the Infosecurity ISACA North America Conference 2019
LifeLock Javelin Presentation
Hackers and Hacking a brief overview 5-26-2016
Data Privacy Micc Presentation
Ensuring Property Portal Listing Data Security
Critical Controls Might Have Prevented the Target Breach
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR Part 1: Quick Facts
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
Policies and Law in IT
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Be An IT Hero - 10 Reasons to Move to the Cloud
Mobile Practice Management
When not if
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Investigatory Powers Bill & ICRs
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Cyber Security for Local Gov SAMFOG
Ad

Similar to Privacy: Protecting Personal Information (20)

PDF
Consumers' and Citizens' Privacy
PDF
Privacy and Surveillance
PPTX
Presentation on Information Privacy
PPT
Chapter2
PPTX
Data privacy over internet
PPTX
How you can protect your online identity, online privacy and VPNs
PPTX
Group 2 privacy and me in a web 2.0 world final
PPTX
Online privacy
PPTX
Online privacy; myth or reality?
PPT
Making sense of big data
PDF
Online Privacy, the next Battleground
PPT
Privacy - USC 2005
PDF
Internet Privacy: Does it Truly Exist?
PPTX
IT law : the middle kingdom between east and West
PPTX
Internet privacy presentation
PPTX
Online privacy & security
PPTX
Privacy issues and internet privacy
PPT
2008 12 08 2008 Privacy
PPTX
Data set Legislation
Consumers' and Citizens' Privacy
Privacy and Surveillance
Presentation on Information Privacy
Chapter2
Data privacy over internet
How you can protect your online identity, online privacy and VPNs
Group 2 privacy and me in a web 2.0 world final
Online privacy
Online privacy; myth or reality?
Making sense of big data
Online Privacy, the next Battleground
Privacy - USC 2005
Internet Privacy: Does it Truly Exist?
IT law : the middle kingdom between east and West
Internet privacy presentation
Online privacy & security
Privacy issues and internet privacy
2008 12 08 2008 Privacy
Data set Legislation
Ad

More from Jonathan Bacon (20)

PPTX
Chapter 5 Jeremiah: Plucking Up and Planting
PPTX
The Naked Truth About Retirement 2021 Edition
PPTX
Johnson County Community College Fall 2020 General Meeting
PPTX
Walking, Hiking, Cycling Trails of Johnson County
PPTX
Online Discussion: Ways to Address Online Privacy and Security
PPTX
The Naked Truth About Retirement - 2020 Edition
PDF
Mobile Photo Editing with Snapseed
PPTX
Fake News and Mainstream Media Bias
PPTX
400+ Channels & Nothing to Watch
PPTX
Social Media Risks
PDF
iPhone Tips for Everyday Users
PDF
Notes Included: Naked Truth About Retirement 2019
PDF
Naked Truth About Retirement 2019
PPTX
The Ten Commandments of Online Security and Privacy
PDF
Notes to The Ten Commandments of Online Security and Privacy
PPTX
Exploring Travel Apps and Tools
PPTX
Athanasius of Alexandria
PPTX
Exploring Do-It-Yourself and Installed Home Security Systems
PPTX
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
PPTX
Quick Guide to Google Photos
Chapter 5 Jeremiah: Plucking Up and Planting
The Naked Truth About Retirement 2021 Edition
Johnson County Community College Fall 2020 General Meeting
Walking, Hiking, Cycling Trails of Johnson County
Online Discussion: Ways to Address Online Privacy and Security
The Naked Truth About Retirement - 2020 Edition
Mobile Photo Editing with Snapseed
Fake News and Mainstream Media Bias
400+ Channels & Nothing to Watch
Social Media Risks
iPhone Tips for Everyday Users
Notes Included: Naked Truth About Retirement 2019
Naked Truth About Retirement 2019
The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
Exploring Travel Apps and Tools
Athanasius of Alexandria
Exploring Do-It-Yourself and Installed Home Security Systems
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Quick Guide to Google Photos

Recently uploaded (20)

PPTX
DAY 1 - Introduction to Git.pptxttttttttttttttttttttttttttttt
PPTX
Chapter 1_Overview hhhhhhhhhhhhhhhhhhhhhhhhhh
PDF
JuanConnect E-Wallet Guide for new users.pdf
DOCX
MLS 113 Medical Parasitology (LECTURE).docx
DOCX
Audio to Video AI Technology Revolutiona
PPTX
National-Historical-Commission-of-the-PhilippinesNHCP.pptx
PPTX
Data Flows presentation hubspot crm.pptx
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
Introduction to networking local area networking
PPTX
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
PPT
chapter 5: system unit computing essentials
PDF
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
PPTX
Basic_of_Computer_System.pptx class-8 com
PDF
How Technology Shapes Our Information Age
PDF
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
PPTX
PORTFOLIO SAMPLE…….………………………………. …pptx
PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PDF
Information Technology practical assignment
PPTX
Introduction: Living in the IT ERA.pptx
PPTX
Going_to_Greece presentation Greek mythology
DAY 1 - Introduction to Git.pptxttttttttttttttttttttttttttttt
Chapter 1_Overview hhhhhhhhhhhhhhhhhhhhhhhhhh
JuanConnect E-Wallet Guide for new users.pdf
MLS 113 Medical Parasitology (LECTURE).docx
Audio to Video AI Technology Revolutiona
National-Historical-Commission-of-the-PhilippinesNHCP.pptx
Data Flows presentation hubspot crm.pptx
Digital Project Mastery using Autodesk Docs Workshops
Introduction to networking local area networking
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
chapter 5: system unit computing essentials
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
Basic_of_Computer_System.pptx class-8 com
How Technology Shapes Our Information Age
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
PORTFOLIO SAMPLE…….………………………………. …pptx
Lesson.-Reporting-and-Sharing-of-Findings.pdf
Information Technology practical assignment
Introduction: Living in the IT ERA.pptx
Going_to_Greece presentation Greek mythology

Privacy: Protecting Personal Information

  • 1. Privacy and the Internet John R Nicholson Updated 8/17
  • 2. What is Privacy ď‚´Definition ď‚´Ability of individual to seclude information about themselves and express it selectively ď‚´Something that is inherently special or sensitive ď‚´Amendment IV “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures…” ď‚´Pizza video: http://bit.ly/1ep4ODT ď‚´Note: last set of characters is case sensitive
  • 3. Why is Privacy Important? ď‚´Credit Reports (CBS says 4/5 contain errors) ď‚´Precursor to identity theft ď‚´Incorrect information ď‚´Incorrect interpretation ď‚´The Internet is forever ď‚´Streisand Effect (6 downloads turned into 420,000 views)
  • 4. Defining Big Data ď‚´Big Data is a term for data sets that are so large or complex that traditional data processing application software is inadequate to deal with them. ď‚´Refers to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data
  • 5. What is Big Data ď‚´SciTech Now: http://bit.ly/2xHHxgU (6 min) ď‚´Note: last set of characters is case sensitive ď‚´60 Minutes: http://bit.ly/2xHtaJm (15 min) ď‚´PBS: http://bit.ly/2mUXqeS (4 min) ď‚´TED: http://bit.ly/2wNUf1k (17 minutes) ď‚´iTunes privacy agreement: 7 Days, 7 attorneys, 27 pages ď‚´Personally Identifiable Information (PII) only valuable information ď‚´http://Google.com/maps/timeline
  • 6. Big Data Pros ď‚´Allows businesses to quickly detect frauds and errors ď‚´Develop strategies towards competitors in less time offering deep insight into consumer trends and sales ď‚´Used to provide cutting-edge healthcare. ď‚´Medical records and wearables provide information about patients analyzed in real time
  • 7. Big Data Cons ď‚´Companies wanting to use Big Data must redefine their data collection methods and upgrade computers ď‚´Cost of developing algorithms ď‚´Lack of privacy ď‚´Only .5% of all information has been analyzed
  • 8. Net Neutrality ď‚´Move from Title I to Title II by FCC ď‚´ISPs can throttle speeds to specific sites ď‚´If an ISP were to develop a movie site, they could have speedy access to it, throttling Netflix ď‚´If Pizza Hut pays a fee, and ISP could drop calls or add interference to Domino’s customers ď‚´If repealed, ISP has access to all information you send across the Internet and can sell it.
  • 9. How Can I Protect Myself ď‚´Duckduckgo.com search engine ď‚´TOR browser (never open PDFs online) ď‚´VPN ď‚´Vyper (goldenfrog.com) $5 mo/billed annually ď‚´Password ď‚´7x@CTd!A ď‚´Mypasswrdiseasytoremember1 ď‚´Don’t provide personal information (especially surveys)
  • 10. Summary ď‚´Use a safe search engine ď‚´Use a safe browser ď‚´Use a pass phrase rather than a password ď‚´Don’t fill out surveys ď‚´The Internet is forever