Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Mobile Privacy

No description

Nikki Hurrell

on 31 July 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Mobile Privacy

Mobile Privacy
Common Ground
Mobile devices are seen as a requirement by many in our world of technological communication
It has been estimated that American mobile device users have increased from 38 million to 219 million since 1996
Mobile devices are used for banking, gaming, social media, networking, and business - this puts users at various risks for victimization
77.3% of the US population uses the internet
Problem Question
What can mobile device users in the United States do to increase their security and interactions while using mobile devices?
Pew Internet Project’s research related to mobile technology.

Overview of Points
Provisions passed by the Government infringe on citizen's privacy
Businesses collect user data
We put ourselves at risk by not thoroughly understanding or reading privacy policies and agreements
Best solutions for preserving privacy while using mobile devices
Explaining the problem
Evidence & Symptoms of the Problem
Explaining the Problem
Who is affected? How? How do we know they are affected?
Explaining the Problem
How are they affected?
Explaining the problem
Why does this matter to us?
Explaining the problem
How did this problem arise?
Explaining the problem
Has this problem occurred elsewhere?
Explaining the Problem
What solutions have been proposed?
Explaining the problem
What might happen in the future if this isn't dealt with?
Solution #1
Device Security
Solution #2
Be aware of what you are consenting to.
Privacy Policies & Control Settings
Solution #3
Personal Security Awareness
Information and Password Security
Government, businesses, and hackers will not cease collecting data and using it against you.

The best solution to protect your security while using mobile devices is ALL of the solutions. By
using security software
reviewing privacy policies
, and
keeping personal information well protected
, chances of personal data being collected and misused are drastically decreased.

Criteria And Limitations
Increase mobile device security
Accessible to all users
Protect user data
Lower the risk of identity theft
System restrictions
Passing of the Patriot Act & how it infringes on rights provided by the 1st, 4th, & 5th Ammendments

Identity theft, vulnerability of sensitive financial information (credit cards, banking, etc)

Businesses collect personal data such as e-mails, pictures, GPS location, and texts; release of this information puts users at risk to be victimized by criminals who can access this information
Government feels the benefits of data collection outweigh the detrimental effects on users

Hackers gain access to sensitive information from remote locations via viruses and downloads

Users lack knowledge of or do not understand terms & agreements/ privacy policies or what they are permitting applications to have access to.
Anybody with a mobile device (cell phone, tablet, laptop, etc) who utilizes the internet & internet dependent applications
91% of American adults have a cell phone
94% of college students have a cellphone, everyone in this statistic owns a smartphone
Users are vulnerable to privacy infringement and data exposure as well as not being aware of who has access to their personal information.
Anti-virus & anti-spyware/malware programs, maximize firewall protection, avoid downloading files that lack valid security certificates, be aware of website's security and legitimacy
11th Sep, 2001

Terrorist Attack on US, Al- Qaeda hijacks 4 commercial airplanes in a coordinated terrorist attack against the US
20th Oct, 2001
Patriot Act signed into Law
1st Feb, 2002

Data mining & profiling project made public
20th May, 2003
ACLU opposes Patriot Act

PRISM surveillance & data mining launched
1st Aug, 2007

Protect America Act passed removes warrant requirement for surveillance of international communications
29th Nov, 2007
Freedom of Information Act Filed by ACLU to learn about cell phone tracking
1st Jun, 2008

Operation Darkening Clouds ACLU files to receive records about this secret data mining program
26th May, 2011

Congress approves 4 yr. extension of expiring Patriot Act provisions
Use a 2 way firewall
Update your operating system regularly
Increase your browser security settings
Avoid questionable Web sites
Only download software from sites you trust.
Carefully evaluate free software and file-sharing applications before downloading them.

Practice safe email protocol:
Don't open messages from unknown senders
Immediately delete messages you suspect to be spam
Make sure that you have the best security software products installed on your PC
Use antivirus protection
Get antispyware software protection
Software Protection
Software And Price
2012 Webroot SecureAnywhere Complete AntiVirus Software by Webroot Inc.
2012 ZoneAlarm Extreme Security AntiVirus Software by ZoneAlarm
Bitdefender Antivirus Plus
Microsoft Premium for Windows 7
Explaining the problem
A Major Contributor
The Patriot Act

Enacted in October 20, 2001
Created because of the terrorist attack on 9/11
The Act gives permission to law enforcement officers to search a home or business without the owner or occupant’s consent or knowledge.
The FBI can search telephone, e-mail, and financial records without a court order & expands access of law enforcement agencies to business records, including library and financial records.
Congress denied the Patriot Act multiple times before 9/11.
Bush Administration pushed for it because 9/11 occurred.
Prism Surveillance
A secret program called PRISM, captures the private data of citizens who are not suspected of any connection to terrorism or any wrongdoing.

The Government has a mechanism that allows them to collect user data from companies like Microsoft, Google, Apple, Yahoo, Facebook and others.

In Europe, users have learned to pay for a nominally free service by providing personal data for marketing purposes. Against this background, the overhaul of data protection regulation is now being discussed across Europe.
Data Protection in Europe
A year ago, the European Commission presented a new draft of a European Data Protection Regulation. The current EU Data Protection Directive does not consider aspects like globalization and technological developments such as social networks and cloud computing sufficiently and new guidelines for data protection and privacy were required. The adoption is aimed for in 2014 and the regulation is planned to take effect in 2016 after a transition period of 2 years. Discussions regarding specific contents are still ongoing.

It is not yet possible to determine if the EU Data Protection Directive is effective; however the proposal is proof that data privacy is a global issue.
Solution #1
Dina Attalla
Nikki Hurrell
Ardian Shala
Jill Smith
Pat Sutliff

The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the Intelligence Community's efforts to monitor, strengthen and protect the nation.

The steady rise in available computer power will enable us to easily turn the huge volume of incoming data into an asset to be exploited, for the "good of the nation."

Bottom Line:
These 'data landfills' makes a mass amount of user information available to those able to access it, including hackers.
Password Protection
Create a Strong Password
Make the password easy to remember but hard to guess
Personal Information
Guard your social security number
Be cautious when using the ATM
Be aware of sites that offer incentives in exchange for contact information
Solution #3
Increase mobile device security +
Accessible to all users +
Convenient +
Protect user data +
Lower the risk of identity theft +
Criteria & Limitations
Price +
Availability +
System restrictions +
Legal +
Solution #1
Criteria & Limitations
Increase mobile device security +
Accessible to all users -
Not for Apple users
Convenient +
Protect user data +
Lower the risk of identity theft +
Price +/ -
from $25 -$100
Prices vary.
Availability +
System restrictions -
Most programs not compatible with Apple products
Legal +
How are they affected?
Identity Theft
Average victim spent $631 and 33 hours to clear their finances
In 2010 8.1 mill. Americans were a victim of identity theft.
Electronic monitoring is used to stalk 1 in 13 stalking victims
How do we know they are affected?
In 2010 Tyler Clementi, 18, committed suicide after his roommate recorded and broadcast his sexual encounters with another man via webcam
Do you remember where you were on September 11, 2001?
Five weeks after 9/11 Congress created new laws and put the United Sates into a surveillance state..
Mobile devices gives the government more control, they open up new markets for business and create dangerous pit falls due hackers. Stalkers use this technology to learn your behaviors.
What are the government and business doing with your mobile data?
How can you protect yourself from hackers and stalkers?

Many consumers ignore privacy policies.
Policies are notorious for being filled with legal jargon.
Privacy statements were created for a reason – to sooth fears about companies requesting consumers to disclose personal information.
57% of U.S. adults who use the internet at home believe incorrectly that if a website has a privacy policy, it will not share their personal information.

Contained in a Privacy Statement:
1. What personal data the company collects

2.How the company uses that data

3.Personal information that the company discloses to others

What Users Can Do
Nearly every business on the Internet requires the collection of personal data. It is the consumer's responsibility to know what is and isn't essential.

Name, address, phone number and payment information if something is being purchased.

Non-essential bank account numbers, any type of password or user name, SS Number or
anything else YOU feel is none of the companies business
How Companies Use Personal Data
Some businesses may use this information to track spending habits, often for the purpose of targeting their advertising.

Others may sell this information to data companies or other services supplying the dreaded SPAM e-mails and telemarketer phone calls.

What can mobile device users in the United States do to increase their security and interactions while using mobile devices?
Full transcript