SlideShare a Scribd company logo
THE INSTITUTE OF CHARTERED
ACCOUNTANTS OF INDIA
Submitted By: Devashish Bharti
Registration No.: ERO0211459
“DATA PRIVACY OVER
INTERNET”
DEFINITION : INTERNET PRIVACY INVOLVES THE RIGHT OR
MANDATE OF PERSONAL PRIVACY CONCERNING THE STORING,
REPURPOSING, PROVISION TO THIRD PARTIES, AND DISPLAYING OF
INFORMATION PERTAINING TO ONESELF VIA OF THE INTERNET.
Types of Privacy:-
There are two types of privacy of data based on data availability i.e.,
Online privacy and Offline privacy but both are same in terms of
privacy protection.
Is Internet Privacy A Human Right?
 Privacy has already had numerous “obituaries” written over the
years. Some claim that privacy was dead long ago with the
advent of the internet and social media. The threat of terrorism
has compounded the erosion of privacy as successive
governments slowly roll back laws to collect and protect data
and communications online.
 We now live in a world where phone calls are closely monitored,
security cameras record every move, and internet giants offer a
backdoor to our personal data to the highest bidder and most
relevant authority.
 The United Nations Human Rights Council, the International
Covenant on Civil and Political Rights, a number of national and
international treaties, and the constitutions of various countries
enshrine ‘privacy’ as a Fundamental Human Rights.
 Recently, In an April 2014 decision by the European Court of
Justice (ECJ) declared that the European Data Retention Directive
was a gross violation of privacy rights under European law and,
Data is recognized as an important corporate asset that needs to be
safeguarded. Loss of information can lead to direct financial losses, such as
lost sales, fines, or monetary judgments. Other laws are designed to ensure
the privacy of the information contained in documents, files, and databases
Risks to Internet privacy
 Companies are hired to watch what internet sites people visit, and then use
the information, for instance by sending advertising based on one's browsing
history. There are many ways in which people can divulge their personal
information, for instance by use of "social media" and by sending bank and
credit card information to various websites.
 Moreover, directly observed behaviour, such as browsing logs, search
queries, or contents of the Facebook profile can be automatically processed
to infer potentially more intrusive details about an individual, such as sexual
orientation, political and religious views, preferences, substance use,
intelligence, and personality.
 Several social networking sites try to protect the personal information of their
subscribers. On Facebook, for example, privacy settings are available to all
registered users: they can block certain individuals from seeing their profile,
they can choose their "friends", and they can limit who has access to one's
pictures and videos. Privacy settings are also available on other social
networking sites such as Google Plus and Twitter.
 Children and adolescents often use the Internet (including social media) in
ways which risk their privacy: a cause for growing concern among parents.
 Young people also may not realise that all their information and browsing
can and may be tracked while visiting a particular site, and that it is up to
them to protect their own privacy. They must be informed about all these
risks.
 For example, on Twitter, threats include shortened links that lead one to
potentially harmful places. In their email inbox, threats include email scams
and attachments that get them to install malware and disclose personal
information. On Torrent sites, threats include malware hiding in video,
music, and software downloads. Even when using a smartphone, threats
include geo-location, meaning that one's phone can detect where they are
and post it online for all to see.
 Users can protect themselves by updating virus protection, using security
settings, downloading patches, installing a firewall, screening email,
shutting down spyware, controlling cookies, using encryption, fending off
browser hijackers, and blocking pop-ups.
Cookie
 An HTTP cookie is data stored on a user's computer that assists in
automated access to websites or web features, or other information
required in complex web sites. It may also be used for user-tracking
by storing special usage history data in a cookie, and such cookies—
for example, those used by Google Analytics—are called tracking
cookies.
 Cookies are a common concern in the field of Internet privacy.
Although website developers most commonly used cookies are for
legitimate technical purposes, cases of abuse may still occur.
 Cookies do have benefits that many people may not know. One
benefit is that, for some websites that one frequently visits that
require a password, cookies make it possible in some way so they do
not have to sign in every time. A cookie can also track one's
preferences to show them websites that might interest them. Cookies
make more websites free to use without any type of payment.
 Some of these benefits are also seen as negative. For example, one of
the most common ways of theft is hackers taking one's username and
password that a cookie saves. While a lot of sites are free, they have
to make a profit somehow so they sell their space to advertisers.
 Cookies are mostly harmless except for third-party cookies.
These cookies are not made by the website itself, but by web
banner advertising companies. These third-party cookies are
so dangerous because they take the same information that
regular cookies do, such as browsing habits and frequently
visited websites, but then they give out this information to
other companies.
 Cookies store unique identifiers on a person's computer that
are used to predict what one wants. Many advertisement
companies want to use this technology to track what their
customers are looking at online.
Some habits which may create
Privacy concerns nowadays are:-
 Photographs on the Internet.
 Google Street View.
 Search engines.
 Social networking sites.
 Internet service providers.
 HTML5 which stores data on Web Cloud as well as in System
itself.
 Big Data by
Facebook, Google, Apple, Spotify or GPS systems.
Other potential Internet privacy risks :-
 Malware is a term short for "malicious software" and is used to describe software to
cause damage to a single computer, server, or computer network whether that is
through the use of a virus, trojan horse, spyware, etc.
 Spyware is a piece of software that obtains information from a user's computer
without that user's consent.
 A web bug is an object embedded into a web page or email and is usually invisible to
the user of the website or reader of the email. It allows checking to see if a person has
looked at a particular website or read a specific email message.
 Phishing is a criminally fraudulent process of trying to obtain sensitive information
such as user names, passwords, credit card or bank information. Phishing is an
internet crime in which someone masquerades as a trustworthy entity in some form
of electronic communication.
 Pharming is a hacker's attempt to redirect traffic from a legitimate website to a
completely different internet address. Pharming can be conducted by changing the
hosts file on a victim’s computer or by exploiting a vulnerability on the DNS server.
 Social engineering where people are manipulated or tricked into performing actions
or divulging confidential information.
 Malicious proxy server (or other "anonymity" services).
 Use of weak passwords that are short, consist of all numbers, all lowercase or all
uppercase letters, or that can be easily guessed such as single words, common phrases, a
person's name, a pet's name, the name of a place, an address, a phone number, a social
security number, or a birth date.
 Using the same login name and/or password for multiple accounts where one
compromised account leads to other accounts being compromised.
 Allowing unused or little used accounts, where unauthorized use is likely to go
unnoticed, to remain active.
 Using out-of-date software that may contain vulnerabilities that have been fixed in newer
more up-to-date versions.
 WebRTC is a protocol which suffers from a serious security flaw that compromises the
privacy of VPN-tunnels, by allowing the true IP address of the user to be read. It is
enabled by default in major browsers such as Firefox and Google Chrome.
 Ransomware is a type of malicious software from cryptovirology that threatens to publish
the victim's data or perpetually block access to it unless a ransom is paid. While some
simple ransomware may lock the system in a way which is not difficult for a
knowledgeable person to reverse, more advanced malware uses a technique
called cryptoviral extortion, in which it encrypts the victim's files, making them
inaccessible, and demands a ransom payment to decrypt them.
Some privacy protection measures which helps in controlling data breach and
restricting retention of data over internet without users’ consent are:
 Global privacy policies
 Data protection regulation of such Country
 Internet privacy in some Countries like China
 Decision of European Court of Justice (ECJ)
 Encryption and Additional security features
 Some Privacy focused search engines/browsers
a. DuckDuckGo
b. MetaGer
c. Ixquick
d. Yacy
e. Search Encrypt
f. Tor Browser (The Onion Router)
The Need for Encryption:
While legislations catch up in different parts of the world and
internet data has no boundary limit, billions of citizens are
left without any means of data protection.
This has encouraged whistle-blowers like Edward Snowden to
insist on better encryption and tighter protection of online
data. Internet users are encouraged to take matters into their
own hands and lock down all private information online. Tools
such as end-to-end encryption and two-step verification can
ensure data is online accessible by authorized individuals.
In an era of widespread surveillance and warrantless privacy
breaches, encryption is more necessary than ever.
“Governments have rolled out extensive surveillance
operations and online privacy is still under threat from
large corporations and rouge cyber criminals. Tight
encryption and better online security measures seem to
be the best option for individuals and businesses
concerned about their data privacy.”
Devashish Bharti
www.dbharti.com
“Inputs are most welcome at devashish.bharti@icai.org”

More Related Content

PDF
Online Privacy
PDF
A Guide to Internet Security For Businesses- Business.com
PPTX
Online spying tools
PDF
Cyber Law & Forensics
PPTX
online spying tools
PDF
E0334035040
PPT
Lessons on netfreedom+best practices in cyber security
PDF
Cyber Law & Forensics
Online Privacy
A Guide to Internet Security For Businesses- Business.com
Online spying tools
Cyber Law & Forensics
online spying tools
E0334035040
Lessons on netfreedom+best practices in cyber security
Cyber Law & Forensics

What's hot (19)

PDF
Why Do You Know So Much About Me
PPTX
ECDL Module 7: Web Browsing and Communication
PPTX
Oula 9 a
PDF
Don't Panic. Making Progress on the 'Going Dark' Debate
PDF
2015 Labris SOC Annual Report
PPTX
Protecting Personal Privacy
PPTX
PDF
Research on Privacy Protection in Big Data Environment
PPTX
PROTECTION PERSONAL PRIVACY
PDF
PDF
Social media and security essentials.pptx
PDF
Corporate role in protecting consumers from the risk of identity theft
PDF
Computer and Cyber forensics, a case study of Ghana
PPTX
Internet safety
PPT
Social media & cyber crime
PPTX
Mao p.cs.102.01
PPTX
Chapter 3
PPTX
Module vi mis
DOCX
Insider Attacks: Theft of Intellectual and Proprietary Data
Why Do You Know So Much About Me
ECDL Module 7: Web Browsing and Communication
Oula 9 a
Don't Panic. Making Progress on the 'Going Dark' Debate
2015 Labris SOC Annual Report
Protecting Personal Privacy
Research on Privacy Protection in Big Data Environment
PROTECTION PERSONAL PRIVACY
Social media and security essentials.pptx
Corporate role in protecting consumers from the risk of identity theft
Computer and Cyber forensics, a case study of Ghana
Internet safety
Social media & cyber crime
Mao p.cs.102.01
Chapter 3
Module vi mis
Insider Attacks: Theft of Intellectual and Proprietary Data
Ad

Similar to Data privacy over internet (20)

PDF
Edu 03 assingment
PPTX
Internet fraud and Common modes of security threats .pptx
PPT
Shailendra Pandey.ppt
PPTX
2ndnov_txicybersec& SAFETY.pptx
PPTX
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
PPT
Shailendra Pandey.ppt
PPTX
Crimes in digital marketing..pptx
PPTX
Cyber safety.pptx
PPTX
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
PDF
Cyber Privacy & Password Protection
DOCX
Target Data Breach Case Study 10242014
PPTX
Cyber Safety
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
PDF
What are cybercrimes? How cybercrime works?
DOCX
Hamza
PPTX
Ethics and privacy ppt 3rd period
PPT
Effects of using IT
DOC
Computer crimes
PPTX
Online spying tools
PPTX
Internet security
Edu 03 assingment
Internet fraud and Common modes of security threats .pptx
Shailendra Pandey.ppt
2ndnov_txicybersec& SAFETY.pptx
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
Shailendra Pandey.ppt
Crimes in digital marketing..pptx
Cyber safety.pptx
Empowerment Technologies - Lesson 2: ONLINE SAFETY-SECURITY-ETHICS-AND-ETIQUETTE
Cyber Privacy & Password Protection
Target Data Breach Case Study 10242014
Cyber Safety
c13 Security and Ethics(1)(1)(1).pptsasdax
What are cybercrimes? How cybercrime works?
Hamza
Ethics and privacy ppt 3rd period
Effects of using IT
Computer crimes
Online spying tools
Internet security
Ad

Recently uploaded (20)

DOC
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
DOCX
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
PDF
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PPTX
Self management and self evaluation presentation
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
water for all cao bang - a charity project
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
The spiral of silence is a theory in communication and political science that...
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PDF
Instagram's Product Secrets Unveiled with this PPT
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
worship songs, in any order, compilation
PPTX
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
PPT
First Aid Training Presentation Slides.ppt
PPTX
Project and change Managment: short video sequences for IBA
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
fundraisepro pitch deck elegant and modern
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
Swiggy’s Playbook: UX, Logistics & Monetization
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
Self management and self evaluation presentation
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
water for all cao bang - a charity project
The Effect of Human Resource Management Practice on Organizational Performanc...
The spiral of silence is a theory in communication and political science that...
_ISO_Presentation_ISO 9001 and 45001.pptx
Instagram's Product Secrets Unveiled with this PPT
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
worship songs, in any order, compilation
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
First Aid Training Presentation Slides.ppt
Project and change Managment: short video sequences for IBA
Tablets And Capsule Preformulation Of Paracetamol
fundraisepro pitch deck elegant and modern

Data privacy over internet

  • 1. THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA Submitted By: Devashish Bharti Registration No.: ERO0211459 “DATA PRIVACY OVER INTERNET”
  • 2. DEFINITION : INTERNET PRIVACY INVOLVES THE RIGHT OR MANDATE OF PERSONAL PRIVACY CONCERNING THE STORING, REPURPOSING, PROVISION TO THIRD PARTIES, AND DISPLAYING OF INFORMATION PERTAINING TO ONESELF VIA OF THE INTERNET. Types of Privacy:- There are two types of privacy of data based on data availability i.e., Online privacy and Offline privacy but both are same in terms of privacy protection.
  • 3. Is Internet Privacy A Human Right?  Privacy has already had numerous “obituaries” written over the years. Some claim that privacy was dead long ago with the advent of the internet and social media. The threat of terrorism has compounded the erosion of privacy as successive governments slowly roll back laws to collect and protect data and communications online.  We now live in a world where phone calls are closely monitored, security cameras record every move, and internet giants offer a backdoor to our personal data to the highest bidder and most relevant authority.  The United Nations Human Rights Council, the International Covenant on Civil and Political Rights, a number of national and international treaties, and the constitutions of various countries enshrine ‘privacy’ as a Fundamental Human Rights.  Recently, In an April 2014 decision by the European Court of Justice (ECJ) declared that the European Data Retention Directive was a gross violation of privacy rights under European law and,
  • 4. Data is recognized as an important corporate asset that needs to be safeguarded. Loss of information can lead to direct financial losses, such as lost sales, fines, or monetary judgments. Other laws are designed to ensure the privacy of the information contained in documents, files, and databases
  • 5. Risks to Internet privacy  Companies are hired to watch what internet sites people visit, and then use the information, for instance by sending advertising based on one's browsing history. There are many ways in which people can divulge their personal information, for instance by use of "social media" and by sending bank and credit card information to various websites.  Moreover, directly observed behaviour, such as browsing logs, search queries, or contents of the Facebook profile can be automatically processed to infer potentially more intrusive details about an individual, such as sexual orientation, political and religious views, preferences, substance use, intelligence, and personality.  Several social networking sites try to protect the personal information of their subscribers. On Facebook, for example, privacy settings are available to all registered users: they can block certain individuals from seeing their profile, they can choose their "friends", and they can limit who has access to one's pictures and videos. Privacy settings are also available on other social networking sites such as Google Plus and Twitter.
  • 6.  Children and adolescents often use the Internet (including social media) in ways which risk their privacy: a cause for growing concern among parents.  Young people also may not realise that all their information and browsing can and may be tracked while visiting a particular site, and that it is up to them to protect their own privacy. They must be informed about all these risks.  For example, on Twitter, threats include shortened links that lead one to potentially harmful places. In their email inbox, threats include email scams and attachments that get them to install malware and disclose personal information. On Torrent sites, threats include malware hiding in video, music, and software downloads. Even when using a smartphone, threats include geo-location, meaning that one's phone can detect where they are and post it online for all to see.  Users can protect themselves by updating virus protection, using security settings, downloading patches, installing a firewall, screening email, shutting down spyware, controlling cookies, using encryption, fending off browser hijackers, and blocking pop-ups.
  • 7. Cookie  An HTTP cookie is data stored on a user's computer that assists in automated access to websites or web features, or other information required in complex web sites. It may also be used for user-tracking by storing special usage history data in a cookie, and such cookies— for example, those used by Google Analytics—are called tracking cookies.  Cookies are a common concern in the field of Internet privacy. Although website developers most commonly used cookies are for legitimate technical purposes, cases of abuse may still occur.  Cookies do have benefits that many people may not know. One benefit is that, for some websites that one frequently visits that require a password, cookies make it possible in some way so they do not have to sign in every time. A cookie can also track one's preferences to show them websites that might interest them. Cookies make more websites free to use without any type of payment.  Some of these benefits are also seen as negative. For example, one of the most common ways of theft is hackers taking one's username and password that a cookie saves. While a lot of sites are free, they have to make a profit somehow so they sell their space to advertisers.
  • 8.  Cookies are mostly harmless except for third-party cookies. These cookies are not made by the website itself, but by web banner advertising companies. These third-party cookies are so dangerous because they take the same information that regular cookies do, such as browsing habits and frequently visited websites, but then they give out this information to other companies.  Cookies store unique identifiers on a person's computer that are used to predict what one wants. Many advertisement companies want to use this technology to track what their customers are looking at online.
  • 9. Some habits which may create Privacy concerns nowadays are:-  Photographs on the Internet.  Google Street View.  Search engines.  Social networking sites.  Internet service providers.  HTML5 which stores data on Web Cloud as well as in System itself.  Big Data by Facebook, Google, Apple, Spotify or GPS systems.
  • 10. Other potential Internet privacy risks :-  Malware is a term short for "malicious software" and is used to describe software to cause damage to a single computer, server, or computer network whether that is through the use of a virus, trojan horse, spyware, etc.  Spyware is a piece of software that obtains information from a user's computer without that user's consent.  A web bug is an object embedded into a web page or email and is usually invisible to the user of the website or reader of the email. It allows checking to see if a person has looked at a particular website or read a specific email message.  Phishing is a criminally fraudulent process of trying to obtain sensitive information such as user names, passwords, credit card or bank information. Phishing is an internet crime in which someone masquerades as a trustworthy entity in some form of electronic communication.  Pharming is a hacker's attempt to redirect traffic from a legitimate website to a completely different internet address. Pharming can be conducted by changing the hosts file on a victim’s computer or by exploiting a vulnerability on the DNS server.  Social engineering where people are manipulated or tricked into performing actions or divulging confidential information.  Malicious proxy server (or other "anonymity" services).
  • 11.  Use of weak passwords that are short, consist of all numbers, all lowercase or all uppercase letters, or that can be easily guessed such as single words, common phrases, a person's name, a pet's name, the name of a place, an address, a phone number, a social security number, or a birth date.  Using the same login name and/or password for multiple accounts where one compromised account leads to other accounts being compromised.  Allowing unused or little used accounts, where unauthorized use is likely to go unnoticed, to remain active.  Using out-of-date software that may contain vulnerabilities that have been fixed in newer more up-to-date versions.  WebRTC is a protocol which suffers from a serious security flaw that compromises the privacy of VPN-tunnels, by allowing the true IP address of the user to be read. It is enabled by default in major browsers such as Firefox and Google Chrome.  Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.
  • 12. Some privacy protection measures which helps in controlling data breach and restricting retention of data over internet without users’ consent are:  Global privacy policies  Data protection regulation of such Country  Internet privacy in some Countries like China  Decision of European Court of Justice (ECJ)  Encryption and Additional security features  Some Privacy focused search engines/browsers a. DuckDuckGo b. MetaGer c. Ixquick d. Yacy e. Search Encrypt f. Tor Browser (The Onion Router)
  • 13. The Need for Encryption: While legislations catch up in different parts of the world and internet data has no boundary limit, billions of citizens are left without any means of data protection. This has encouraged whistle-blowers like Edward Snowden to insist on better encryption and tighter protection of online data. Internet users are encouraged to take matters into their own hands and lock down all private information online. Tools such as end-to-end encryption and two-step verification can ensure data is online accessible by authorized individuals. In an era of widespread surveillance and warrantless privacy breaches, encryption is more necessary than ever.
  • 14. “Governments have rolled out extensive surveillance operations and online privacy is still under threat from large corporations and rouge cyber criminals. Tight encryption and better online security measures seem to be the best option for individuals and businesses concerned about their data privacy.”
  • 15. Devashish Bharti www.dbharti.com “Inputs are most welcome at devashish.bharti@icai.org”