1 / 15

Privacy

Privacy. Protecting Yourself and Your Information. Privacy and the Courts. 4 th Amendment “Reasonable Search and Seizure” “Reasonable Expectation of Privacy” Examples?. Courts, Technology and Searches. City of Ontario v. Quon Supreme Court (2010) Narrow Decision

anthonylove
Download Presentation

Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Protecting Yourself and Your Information

  2. Privacy and the Courts • 4th Amendment • “Reasonable Search and Seizure” • “Reasonable Expectation of Privacy” • Examples?

  3. Courts, Technology and Searches • City of Ontario v. Quon • Supreme Court (2010) • Narrow Decision • City could look at messages sent from a pager owned by the city by a city employee • Not reasonable expectation of privacy • What might this mean when using school technology?

  4. Courts, Technology and Searches • Riley v. California • Supreme Court (2014) • Search Incident to Arrest • Need a warrant before searching your phone • Contains so much of our personal information • Not a dangerous implement

  5. Courts, Technology and Searches • United States v. Davis • 11th Circuit Court of Appeals (2014) • Cell phone tower location data requires a warrant • Based on reasonable expectation of privacy and lack of knowledge that data is shared • What’s this mean for location data when shared with companies through apps?

  6. Not Just The Government • What are some other entities that can violate our privacy? • Companies • Hackers • Other people in public

  7. Packet Collection • WireShark • Allows people to collect packets on a network • What’s this mean on public Wi-Fi? • Demonstration

  8. Break Into Groups

  9. Protection On Public Wi-Fi • Make sure you’re at a site with HTTPS • Use a VPN Service • Make sure your computer isn’t automatically sharing information with other computers on network (like you might do at home) • Turn Wi-Fi off when you’re not using it • Use tethering from your phone

  10. Protection When In Customs • Lower expectation of privacy • Don’t use thumbprint or retinal scan to unlock phone or computer • Have computer and phone in mode that requires a password • They can still take your computer and image the hard drive

  11. Protection From ISP • Recent bill allowing your internet service provider to sell your browsing history • RuinMyHistory • Use a VPN • Tor

  12. Protection On Social Media • Be careful about what you post • Don’t post items that are commonly used to recover passwords • Change your privacy settings

  13. Password Best Practices • Create different passwords for each account • Use combinations of uppercase, lowercase, numbers, and symbols • Don’t use common words • Don’t use dates, SSN, names of pets, etc. • Consider using a password storage program

  14. What else do you want to talk about?

  15. Thank You

More Related