SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
Privacy Issues and Internet PrivacyBy,Vinyas S
Information technology      -> Collects, stores, integrates and retrieves   	    data and informationStore and Retrieve information!!!	    -> a Negative impact on right to Privacy???Introduction
The ability of an individual or group to secluded themselves or information about themselves and thereby reveal it selectivelyA personal, subjective condition. One person cannot decide for another what his or her sense of privacy should bePrivacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the publicWhat Is Privacy?6/9/20113
Violation of PrivacyComputer MonitoringComputer MatchingUnauthorized Personal FilesEg. for Privacy Issues
How our Personal Information Gets Revealed6/9/20115
Privacy issues and internet privacy
Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicatingISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data   They are usually prevented to do so due to social pressure and law.By ISP6/9/20117
May be inappropriately spread by the original receiver   May be interceptedMay be legally viewed or disclosed by service providers or authoritiesBy Email6/9/20118
Any member of the list or group could collect and distribute your Email address and information you postBy Discussion groups6/9/20119
Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password You may accidentally reveal such information when using a browser on a public computer or someone else's.By Internet Browsers6/9/201110
Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that serverCookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping cartsCookies are only data, not programs nor virusesWhat are cookies?6/9/201111
A Sample of Cookie6/9/201112-->If you type JavaScript:alert(document.cookie)into the address bar, when logged onto a site, it is possible to see the cookies which have been set from that domain.
Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time)By Search Engine6/9/201113
   “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site.  Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.”What search engines did?6/9/201114
Web bugs:  	-> A graphic (in a Web site or a graphic-	     enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewerThird party cookies: 	-> Comes from web page may contain 	      images or advertisementsBy indirect Marketing6/9/201115
Employers and school officials are increasingly sensitive to the messages you convey in social networks By Social Networks, Blog & Personal Websites6/9/201116
Want to be a hacker?6/9/201117
By CybercrimeSpywaretakes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge Phishingoccurs when a criminal lures the victim into providing financial or personal dataPharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites186/9/2011
Solutions to Protect Online Privacy 196/9/2011
Cookie Controls206/9/2011
Other Technical ResortsAnti-virus softwareFirewallsEncryption tools216/9/2011
The Platform for Privacy Preferences (P3P)Developed by the World Wide Web Consortium (W3C) A protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences226/9/2011
The Only Two Absolute ChoicesAvoid yourself from the Internet1) Raise awareness of privacy2) Learn to safeguard your privacy with a minimum sacrifice of convenience 236/9/2011
THANK YOU!!!!!

More Related Content

PPTX
Internet Privacy
PPTX
Internet privacy presentation
PPTX
Data Security - English
PPT
Personal privacy and computer technologies
PPTX
Implementing cybersecurity best practices and new technology ppt (1).pptx
PPTX
Information Privacy
PPTX
Presentation on Information Privacy
PPT
“Privacy Today” Slide Presentation
Internet Privacy
Internet privacy presentation
Data Security - English
Personal privacy and computer technologies
Implementing cybersecurity best practices and new technology ppt (1).pptx
Information Privacy
Presentation on Information Privacy
“Privacy Today” Slide Presentation

What's hot (20)

PPTX
Data Privacy and Protection Presentation
PPTX
Online privacy & security
PDF
Online Privacy
PPTX
cyber stalking
PPTX
Social Media Cyber Security Awareness Briefing
PDF
Privacy and Data Security
PPTX
Cyber crime and its types
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
Social media privacy and safety
PPT
General Awareness On Cyber Security
PPTX
Phishing Presentation
PDF
Computer Security Threats
PPTX
cyber security presentation.pptx
PPT
PPTX
Right to privacy on internet and Data Protection
PPTX
Social engineering
PPTX
Data security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
PPTX
Data Privacy Introduction
Data Privacy and Protection Presentation
Online privacy & security
Online Privacy
cyber stalking
Social Media Cyber Security Awareness Briefing
Privacy and Data Security
Cyber crime and its types
Unit 6 Privacy and Data Protection 8 hr
Social media privacy and safety
General Awareness On Cyber Security
Phishing Presentation
Computer Security Threats
cyber security presentation.pptx
Right to privacy on internet and Data Protection
Social engineering
Data security
Network security (vulnerabilities, threats, and attacks)
Data Privacy Introduction
Ad

Similar to Privacy issues and internet privacy (20)

PPTX
Data privacy over internet
PPT
internet privacy presentation cranor.ppt
PPT
PPT
Ntia 0900
PPT
Online Privacy Lilyana Ruiz
PPTX
online spying tools
PDF
Why Do You Know So Much About Me
PPTX
Group 2 privacy and me in a web 2.0 world final
PDF
Christos_Beretas_Internet_Privacy_and_Myths_TE
PDF
Online Privacy, the next Battleground
PDF
internet privacy and myths (second edition)
PPTX
INTERNET PRIVACY
PPTX
Online privacy
PPTX
Online privacy; myth or reality?
PDF
Final%20 presentation
PPT
Research Project Ms
PPT
Unit 6 Privacy technological impacts.ppt
PPTX
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
PPT
Threats ,Security , social and legal issues regarding internet
PPTX
Internet Safety & Privacy
Data privacy over internet
internet privacy presentation cranor.ppt
Ntia 0900
Online Privacy Lilyana Ruiz
online spying tools
Why Do You Know So Much About Me
Group 2 privacy and me in a web 2.0 world final
Christos_Beretas_Internet_Privacy_and_Myths_TE
Online Privacy, the next Battleground
internet privacy and myths (second edition)
INTERNET PRIVACY
Online privacy
Online privacy; myth or reality?
Final%20 presentation
Research Project Ms
Unit 6 Privacy technological impacts.ppt
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
Threats ,Security , social and legal issues regarding internet
Internet Safety & Privacy
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Privacy issues and internet privacy

  • 1. Privacy Issues and Internet PrivacyBy,Vinyas S
  • 2. Information technology -> Collects, stores, integrates and retrieves data and informationStore and Retrieve information!!! -> a Negative impact on right to Privacy???Introduction
  • 3. The ability of an individual or group to secluded themselves or information about themselves and thereby reveal it selectivelyA personal, subjective condition. One person cannot decide for another what his or her sense of privacy should bePrivacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the publicWhat Is Privacy?6/9/20113
  • 4. Violation of PrivacyComputer MonitoringComputer MatchingUnauthorized Personal FilesEg. for Privacy Issues
  • 5. How our Personal Information Gets Revealed6/9/20115
  • 7. Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicatingISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data They are usually prevented to do so due to social pressure and law.By ISP6/9/20117
  • 8. May be inappropriately spread by the original receiver May be interceptedMay be legally viewed or disclosed by service providers or authoritiesBy Email6/9/20118
  • 9. Any member of the list or group could collect and distribute your Email address and information you postBy Discussion groups6/9/20119
  • 10. Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password You may accidentally reveal such information when using a browser on a public computer or someone else's.By Internet Browsers6/9/201110
  • 11. Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that serverCookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping cartsCookies are only data, not programs nor virusesWhat are cookies?6/9/201111
  • 12. A Sample of Cookie6/9/201112-->If you type JavaScript:alert(document.cookie)into the address bar, when logged onto a site, it is possible to see the cookies which have been set from that domain.
  • 13. Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time)By Search Engine6/9/201113
  • 14. “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site. Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.”What search engines did?6/9/201114
  • 15. Web bugs: -> A graphic (in a Web site or a graphic- enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewerThird party cookies: -> Comes from web page may contain images or advertisementsBy indirect Marketing6/9/201115
  • 16. Employers and school officials are increasingly sensitive to the messages you convey in social networks By Social Networks, Blog & Personal Websites6/9/201116
  • 17. Want to be a hacker?6/9/201117
  • 18. By CybercrimeSpywaretakes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge Phishingoccurs when a criminal lures the victim into providing financial or personal dataPharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites186/9/2011
  • 19. Solutions to Protect Online Privacy 196/9/2011
  • 21. Other Technical ResortsAnti-virus softwareFirewallsEncryption tools216/9/2011
  • 22. The Platform for Privacy Preferences (P3P)Developed by the World Wide Web Consortium (W3C) A protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences226/9/2011
  • 23. The Only Two Absolute ChoicesAvoid yourself from the Internet1) Raise awareness of privacy2) Learn to safeguard your privacy with a minimum sacrifice of convenience 236/9/2011

Editor's Notes

  • #5: 1.Accessing individuals’ private e-mail conversations, computer records and sharing this information2. Knowing or tracking where a person is tracking his mobile or paging devices3. Using the customer info from many sources to market additional business services4. Collecting cell no’s, e-mail add, credit no to build fake profiles