1 / 0

How much privacy do you have on the Internet

How much privacy do you have on the Internet. HOW PRIVATE IS YOUR FACEBOOK ? . People from all around the world have facebook ! . According to St. Columba’s students, 1 in 12 girls DON’T have facebook . The website currently has more than 300 million active users worldwide!

rane
Download Presentation

How much privacy do you have on the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How much privacy do you have on the Internet
  2. HOW PRIVATE IS YOUR FACEBOOK? People from all around the world have facebook! According to St. Columba’s students, 1 in 12 girls DON’T have facebook. The website currently has more than 300 million active users worldwide! About 4 million Facebook users are over the age of 25. You may not use the Facebook Service if you are under 13. If you are between the ages of 13 and 17, we strongly suggest that you seek parental consent to use the Facebook Service. This rule is not always followed which is a hazard to young facebook users. If Facebook were a country, it would have a population nearly as large as Brazil's.
  3. ISSUES WITH FACEBOOK It appears that even avid sharers of personal information online have their limits. Facebook'snew targeted advertising partnership, called Beacon, which was introduced in November has not been terribly well received. In fact, Facebook members and groups have called the aggressive advertising an invasion of privacy. Even more egregious, they argue, is the fact that is not clear how users can opt out. Beacon was designed to incorporate online actions of a user--such as reviewing a restaurant on Yelp or buying movie tickets on Fandango--into the person's 'news feed' and broadcast it to the user's friends. TOP FRIEND (behind the computer...)
  4. ISSUES WITH FACEBOOK Because of the outcry, Facebook has already made some changes to how Beacon works, such as a new notification on users' Facebook pages so that they can decide whether they want the information sent to their friends or not. Facebook's chef privacy officer Chris Kelly recognized that the site did a poor job of educating its users about the new feature, but also noted that the company is not selling information to outside parties. TOP FRIEND (behind the computer...) TOP FRIEND (behind the computer...)
  5. Privacy Several concerns have emerged regarding the use of Facebook as a means of surveillance and data mining. Two MIT students were able to download over 70,000 Facebook profiles from four schools using an automated shell script, as part of a research project on Facebook privacy published on December 14, 2005. The possibility of data mining remains open, as evidenced in May 2008, when the BBC technology program "Click" demonstrated that personal details of Facebook users and their friends could be stolen by submitting malicious applications.
  6. FOUNDER OF FACEBOOK The original founder of Facebook and CEO is 24 year old Mark Zuckerburg. Mark and 3 of his roommates created Facebook while attending Harvard University and launched the site on February 4, 2004 from their college dorm room. Forbes Magazine named Mark “the world’s youngest self-made billionaire” being worth an estimated $1.5 billion due to his creation of the popular website.
  7. YOU HAVE THE POWER Facebookprovides users a way to restrict and specify the types of users that can viewdifferent parts of their profile. They can control who can search for them, who can view their profile, who can see their contact information, and who can see various other profile details. The types of users they can choose from to view parts of their profile are users attending the same school, just friends, and friends of friends at the same school. Friends can always view everything. For profile searches, users can allow everyone, or some subset of people to search for them. They also have the option of blocking specific people.
  8. Stalker Story Richard Reed Pannell is a student at the University of Mary Washington in Fredericksburg, VA. One Saturday, he was minding his own business, taking a shower in this house he shares with classmates when an unhinged stranger–a raving leftist who had tracked him down on social networking site Facebook–barged in and attacked him and his roomies after impersonating a military recruiter.
  9. Statistics Actual Facebook statistics report that over five million accounts have been hacked. OMG
  10. What is hacking? Hacking is unauthorized use of computer and network resources. The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications. VIRUS SENT
  11. How can you prevent your computer from being hacked? Hackers are a major problem when it comes to yourpersonal computer files; follow these steps to make sure your safe: 1). Always make backups of your files and folders and store them in a separate place than your computer. 2). Make sure you have a good firewall. 3). Review your browser and email setting for security. 4). Watch out for Active-X and JavaScript files as hackers can plant viruses and other harmful elements in your programs. 5). Install some kind of anti virus software 6). Don't open unknown email attachments 7). Only run and download programs from places you trust.
  12. How do you know if your computer has been hacked? Viral infections do not cause your computer to crash anymore. They keep you computer busy in the background while your computer is working so you do not realize anything is wrong. A key logger program attaches to your system, so they can log your keystrokes when you type your password or credit card numbers when purchasing or paying bills online. They also will use your computer for a server to mail out spam, which you may not know unless your internet service disables your service until you call in. 1. Do you have pop-up ads that won't stop or go away? 2. Is your computer continually slowing down? 3. Are you being redirected to other websites unintentionally? Or are search results showing things you didn't type into the search bar? If you answered yes to any of these questions, then you may have been hacked.
  13. How are credit cards gained by hackers? A hacker has many ways to gain a credit card number from an innocent user. The most common one is known as phishing. In this technique, the hacker poses as an officer within an organization, let's say VISA. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled.If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let's say, Costco, and search for the database where the retailer stores the information of all of the users who have made recent transactions.The third way is through the online process of buying. Let's say an adult finds a website with adult content that he or she finds attractive. It's quite probable that the website is only a masquerade for acquiring credit card information from you.
  14. Information Privacy Principles The IPPs regulate how Australian and ACT government agencies manage personal information.  They cover how and when personal information can be collected, how it should be used and disclosed, and storage and security.  They also allow individuals to access that information and have it corrected if it is wrong.
  15. What are the different IPP’s IPP 1: manner and purpose of collectionThe information must be necessary for the agency's work, and collected fairly and lawfully. IPP 3: collecting information generallyAn agency must take steps to ensure the personal information it collects is relevant, up-to-date and complete and not collected in an unreasonably intrusive way. IPP 2: collecting information directly from individuals An agency must take steps to tell individuals why they are collecting personal information, what laws give them authority to collect it, and to whom they usually disclose it. This is often done by what is called an IPP 2 notice.
  16. IPP 4: storage and securityPersonal information must be stored securely to prevent its loss or misuse. IPPs 5 - 7: access and amendmentThese principles require agencies to take steps to record the type of personal information that they hold and to give individuals access to personal information about them.  Personal information can be amended or corrected if it is wrong. IPP 11: disclosureThis principle sets out when an agency may disclose personal information to someone else, for example another agency. This can only be done in special circumstances, such as with the individual's consent or for some health and safety or law enforcement reasons. IPPs 8 - 10: information useThese principles outline the rules about keeping accurate, complete and up-to-date personal information; using information for a relevant purpose; and only using the information for another purpose in special circumstances, such as with the individual's consent or for some health and safety or law enforcement reasons.
  17. When can people collect information about you? Personal information can be collected if the person who’s personal information it is has given consented or would reasonably expect to have it collected if for example, if it is on a publicly available source such as a websites like facebook or MySpace. Nobody can give out personal information unless at least of the following apply: you have consented you'd expect to have it collected or someone has told you thewill it is required or authorised by law it will prevent or lessen a serious and imminent threat to somebody's life or health or the disclosure is reasonably necessary for law enforcement or for the protection of public revenue.
More Related