Prezi

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in the manual

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Privacy in the Digital Age

No description
by Gerol Petruzella on 30 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Privacy in the Digital Age

Privacy in the Digital Age
“We've arranged a global civilization in which most crucial elements profoundly depend on science and technology. We have also arranged things so that almost no one understands science and technology. This is a prescription for disaster. We might get away with it for a while, but sooner or later this combustible mixture of ignorance and power is going to blow up in our faces.”

- Carl Sagan, The Demon-Haunted World: Science as a Candle in the Dark
"Anything that's been digitized is not private."
Privacy
Results from Knowledgeable
Use
Resources
Codecademy: HTML & CSS for Beginners. http://www.codecademy.com/en/tracks/htmlcss

Electronic Frontier Foundation. https://www.eff.org/

HTTPS Everywhere. https://www.eff.org/https-everywhere

Mozilla's Web Literacy Map. https://webmaker.org/en-US/literacy

Terms of Service: Didn't Read. http://tosdr.org/
Data
Metadata
Technology Does Not Default to Protect Privacy
"So I want to be very clear. Some of the hype that we’ve been hearing over the last day or so — nobody’s listening to the content of people’s phone calls."

06/07/2013, President Barack Obama
http://blogs.wsj.com/

"The information acquired does not include the content of any communications or the identity of any subscriber. The only type of information acquired under the Court’s order is telephony metadata"

06/06/2013, James Clapper
http://www.dni.gov/
Imagine...

...someone knows you rang a phone sex service at 2:24 am and spoke for 18 minutes. But they don't know what you talked about.
...someone knows you called the suicide prevention hotline from the Golden Gate Bridge. But the topic of the call remains a secret.
...someone knows you spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour. But they don't know what was discussed.
...someone knows you received a call from the local NRA office while it was having a campaign against gun legislation, and then called your senators and congressional representatives immediately after. But the content of those calls remains safe from government intrusion.
...someone knows you called a gynecologist, spoke for a half hour, and then called the local Planned Parenthood's number later that day. But nobody knows what you spoke about.
https://www.eff.org/deeplinks/2013/06/why-metadata-matters
See the full transcript