Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Privacy and Technology

No description
by

Melissa Guile

on 21 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Privacy and Technology

Privacy and technology risks to internet privacy spyware programs cookies data logging internet service providers most common problems experienced spam internet fraud online quizzes take personal information and use it to advertise to you track where you have been
track what you have stored on you hard drive moniters and records the websitess you've been to.
redirects URLs
shuts down systems on your computer can even shut down your entire computer
because all data must pass through the ISP
any ISP has the ability to observe all of the
information on a user's internet
examples of ISPs are AT&T, Charter, Comcast,
AOL, MSN unsolicitated email that offers
benefits but requests personal information
through this criminals can gain lots of
personal info that they can create false bank
accounts, etc. identity theft
when a criminal gains personal info about a victim to open bank accounts, purchase credit cards, etc.
mass marketing fraud
any type of fraud scheme that uses mass communication techniques and technologies to target victims

Internet Privacy - Ability to control what information one reveals about oneself over the Internet, and to control who can access that information what is the government
doing to protect us? Children's online privacy
protection act protects the privacy of children under age 13 by requesting parental consent before entering any personal information USA Patriot Act authorizes the installation of devices to record all computer uses
allows government to access email and electronic devices how can you protect yourself? turn on cookie notices in your web brower
do not trust any sites that offer rewards for
giving out peronal information
NEVER reply to spam!
be conscious of web security and spyware
ALWAYS read privacy policies
process of recording information and events
with an automated computer program
Works Cited
Brain, Marshall. "How Internet Cookies Work". How Stuff Works. April 16, 2010 <http://www.howstuffworks.com/cookie.htm>

"CDT's Guide to Online Privacy". Center for Democracy and Technology. April 16, 2010 <http://www.cdt.org/privacy/guide/basic/tips.php>.

"Five Year Olds in a Fight". Spot Cool Stuff. April 16, 2010 <http://web.spotcoolstuff.com/wp-content/uploads/2008/05/fight.jpg>

Malkin, Rachael. "Children's Online Privacy Protection Act". Electronic Privacy Information Center. April 16, 2010 <http://epic.org/privacy/kids/>

McCandlish, Stanton. "EFF's Top 12 Ways to Protect Your Online Privacy". Eletronic Frontier Foundation. April 16, 2010 <http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy>

McInerney, Denis J.. "Mass-Marketing Fraud". United States Department of Justice. April 16, 2010 <http://www.justice.gov/criminal/fraud/internet/>

Waisglass, Coulthart. "Spam". Silver Hairs. April 16, 2010 <http://www.silverhairs.co.uk/spam.jpg>
Full transcript