SlideShare a Scribd company logo
Tech Topic: Privacy By: David Chait,  Steven Gonzalez, Travis Lopez, Kristen Magno, Steven Osaki
What is Computer Privacy? The ability to control what information one reveals about oneself, and to control who can access that information.
Summary History and cases of privacy Current legislation Future potential concerns and threats Tips on how to protect yourself
DIGITAL U: A Loss of Privacy?  http://www.youtube.com/watch?v=W31Xy2wp7wc VIDEO
Whose privacy is at risk?
Everyone Is At Risk Applicants Students Individuals Engaged with Large Firms The Unsuspecting Public
Applicants Harvard’s student database was hacked exposing over 10,000 applicants from 2007 This information was placed on Bittorrent
Students Our information has been made widely available within our own institutions, and at times is vulnerable to loss. University of Texas at Austin – McCombs School of Business was compromised on April 24, 2006 placing 197,000 people at risk In May of 2006, the Texas Student Loan Corporation lost the records of 1.7 million borrowers.
Individuals Engaged with Large Firms Stanford suffers a theft of 72,000 records relating to employees hired prior to September of 2007. Ernst and Young loses a laptop containing thousands of IBM employee Records On May 22,2006 The Department of Veterans Affairs reports the theft of 28,600,000 records (All vets discharged between 1975 and 2006).  The information was stolen from an employee’s home computer A federal Judge has ordered restitution over 20 million dollars due to this attack
The Unsuspecting Public Data Aggregation - The warehousing, repackaging, and resale of information about us. ChoicePoint loses information about 145,000 individuals with which it has no business relationship.
Legislation & Beyond
Key Legislation  Patriot Act Foreign Intelligence Surveillance Act (FISA) Real ID Act - The Creation of a National ID Card. 
Surveillance Technology     ECHELON  Used by the United States National Security Agency (NSA) to intercept and process international communications through satellites System is able to intercept messages over the internet messages over the internet System can also use orbiting satellites to monitor signals anywhere on the earth’s surface MAIN PURPOSE: to extract information and intelligence illicitly from millions of messages every day, across the globe NSA and allies have worked to limit/prevent privacy of international telecommunications The Echelon system has abilities to eavesdrop on everyday communications and to watch everything that is being said and done in the world
Advertising Technologies Technologies  Cookies Pixels Web Bugs Spyware Implications Building Profiles of everyone.  Understanding everyone's interests. Tracking your movement all around the web.   Overall...knowing what you do, when you do it, what you like, who you know, and what your opinion is on certain topics is very sensitive information. 
Privacy / Civil Liberty Organizations Electronic Frontier Foundation (EFF.org) American Civil Liberties Union (ACLU) Electronic Privacy Information Center (EPIC)  Privacy Coalition     Advice: Be aware of the services you use and the data you provide to each of them. Be informed of the latest privacy battles happening in the media and understand that everything you do online is archived forever! 
Potential Concerns and Threats
Threats : Spam Abuse of electronic messaging systems to send unsolicited messages constantly Mostly found in your emails
Spyware A type of malware that is installed on computers and collects little bits of information at the time about users without their knowledge
Malware Software designed to infiltrate a computer system without the owner’s informed consent It includes worms, trojans, and rootkits Make sure you computer has protection
Hackers A person who breaks into computers usually by gaining access to administrative controls Beware, they are out there
Identity Theft Fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Anytime you put your credit card number or any other personal information out on the web, its capable of being stolen.
Phishing http://www.youtube.com/watch?v=sqRZGhiHGxg
Phishing Scams   http://www.youtube.com/watch?v=sqRZGhiHGxg VIDEO
Certain ways your privacy is viewed Cookies, which has been around for awhile. Facebook, Twitter, and Myspace are websites where people in our society today post personal information about themselves, which can be viewed by anyone including employers.
Tips on How to Protect Yourself
Software Anti-virus (AVG) Anti-spyware (Lavasoft Ad-aware) Firewall (ZoneAlarm) P2P (PeerBlock) http://epic.org/privacy/tools.html
The Browser Security/Privacy Add-ons (Cookie Management) Website Security HTTPS and Padlock Privacy Policies Privacy Seals (TRUSTe)
Protecting your E-mail Use different e-mails for different web activities.  Free webmail services (Hushmail, Mailvault, S-mail) Pretty Good Privacy (PGP)
Browsing the Internet TOR, The Onion Router, Sponsored by the Electronics Frontier Foundation. Anonymizer browsing services tor.eff.org www.anonymizer.com Yahoo – 90 Days Google – 9 Months Microsoft – 18 Months
Summary History and cases of privacy Current legislation Future potential concerns and threats Tips on how to protect yourself
http://www.youtube.com/watch?v=R7yfV6RzE30 VIDEO
WORKS CITED LIST www.idsafe.us http://news.cnet.com/8301-10789_3-9893174-57.html http://www.computerworld.com/s/article/110813/Breach_at_Univ._of_Texas_Austin_exposes_data_on_197_000_people http://www.consumeraffairs.com/news04/2006/06/student_loan_loss.html http://www.securitymanagement.com/news/stanford-university-laptop-stolen-72-000-risk-identity-theft http://www.theregister.co.uk/2006/03/15/ernstyoung_ibm_laptop/ http://www.networkworld.com/news/2006/060606-active-duty-troop-information-part-of.html?nwwpkg=slideshows http://www.msnbc.msn.com/id/6979897/

More Related Content

PPTX
How to stay safe online
PPTX
Cyber Safety Class 9
PPTX
High Tech (Cyber) Crimes
PPTX
presentation on hacking
PPTX
Cyber crimes
PPTX
Cyber crime (do's&dont's)
DOCX
Hamza
PPTX
Cyber Space
How to stay safe online
Cyber Safety Class 9
High Tech (Cyber) Crimes
presentation on hacking
Cyber crimes
Cyber crime (do's&dont's)
Hamza
Cyber Space

What's hot (20)

PPTX
Cyberspace slide show
PPTX
Online Safety and Security
PPTX
How to stay safe online
PDF
The Secret Of Hacking Trial Pages
PPTX
C3 and digital citizenship
PPT
Cyber crime among students
PDF
Steps and Tips to Protect Yourself and your Private Information while Online....
PPT
finance and accounting
PPTX
Cyber Space
PPTX
Cyberspace
PPTX
Cyber Crime & Security
PDF
Cyber Security Awareness at Dadar April 25, 2010
PPT
Cyber Security & Hygine
PPTX
Cyber law (identity theft)
PPSX
Unit 1
PPTX
Cyber crime and Security
PPTX
Cybercrimes
PPTX
cyber crime - slideshare by jayed hossain jibon
DOC
Hacking for Dummies 2
PPT
Cybercrime 1
Cyberspace slide show
Online Safety and Security
How to stay safe online
The Secret Of Hacking Trial Pages
C3 and digital citizenship
Cyber crime among students
Steps and Tips to Protect Yourself and your Private Information while Online....
finance and accounting
Cyber Space
Cyberspace
Cyber Crime & Security
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security & Hygine
Cyber law (identity theft)
Unit 1
Cyber crime and Security
Cybercrimes
cyber crime - slideshare by jayed hossain jibon
Hacking for Dummies 2
Cybercrime 1
Ad

Viewers also liked (20)

PPT
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
PPTX
Wearable Tech Privacy and Intellectual Property
PPTX
Patient remote monitoring system in Wearable Technology
PPTX
Computer security privacy and ethics
PDF
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
ODP
Sofia Linux Bg Presentation 2009 09 26
PPTX
Ethics in computing
PDF
Cross Device Tracking - An FTC Staff Report
PPT
Security & Privacy In Cloud Computing
PPTX
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Freedom of speech
PDF
The 2017 Budget and Economic Outlook
PPTX
EGLA's Patent and Intellectual Property Portfolio - Licensing
PDF
Let's Google My Audience - Privacy is for Losers!
PDF
The Security and Privacy Threats to Cloud Computing
PPTX
Freedom of Speech & Expression
PPT
Ethical and social issues in information systems
PPT
Speech PPT Presentation
PDF
Intellectual property rights
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Wearable Tech Privacy and Intellectual Property
Patient remote monitoring system in Wearable Technology
Computer security privacy and ethics
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
Sofia Linux Bg Presentation 2009 09 26
Ethics in computing
Cross Device Tracking - An FTC Staff Report
Security & Privacy In Cloud Computing
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Computer Security and Safety, Ethics & Privacy
Freedom of speech
The 2017 Budget and Economic Outlook
EGLA's Patent and Intellectual Property Portfolio - Licensing
Let's Google My Audience - Privacy is for Losers!
The Security and Privacy Threats to Cloud Computing
Freedom of Speech & Expression
Ethical and social issues in information systems
Speech PPT Presentation
Intellectual property rights
Ad

Similar to Tech Topic Privacy (20)

PPTX
PP Lec9n10 Sp2020.pptx
PPT
Topic 5 understanding privacy
PPTX
Presentation on Information Privacy
PPT
Chapter2
PPT
Chapter 3 ethics and privacy
PPT
Internet privacy
PPT
Wk_2_Privacy (1) (1).ppt
PPT
Privacy.ppt
PPT
information, people $ threats
PPTX
Exploring Data Privacy - SQL Saturday Louisville 2011
PPTX
Cyber Security Awareness October 2014
PPT
computer ethics for information technology.ppt
PPTX
Group 2 privacy and me in a web 2.0 world final
PPT
P R I V A C Y!!!
PPT
“Privacy Today” Slide Presentation
PPTX
Online privacy
PPTX
Online privacy; myth or reality?
PPTX
Digital Defense for Activists (and the rest of us)
PPT
Innovative Ideas in Privacy Research.ppt
PPT
dexa.ppt
PP Lec9n10 Sp2020.pptx
Topic 5 understanding privacy
Presentation on Information Privacy
Chapter2
Chapter 3 ethics and privacy
Internet privacy
Wk_2_Privacy (1) (1).ppt
Privacy.ppt
information, people $ threats
Exploring Data Privacy - SQL Saturday Louisville 2011
Cyber Security Awareness October 2014
computer ethics for information technology.ppt
Group 2 privacy and me in a web 2.0 world final
P R I V A C Y!!!
“Privacy Today” Slide Presentation
Online privacy
Online privacy; myth or reality?
Digital Defense for Activists (and the rest of us)
Innovative Ideas in Privacy Research.ppt
dexa.ppt

Recently uploaded (20)

PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
A Brief Introduction About Julia Allison
PPT
Data mining for business intelligence ch04 sharda
PDF
How to Get Funding for Your Trucking Business
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
Amazon (Business Studies) management studies
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Types of control:Qualitative vs Quantitative
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Business model innovation report 2022.pdf
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
IFRS Notes in your pocket for study all the time
PDF
WRN_Investor_Presentation_August 2025.pdf
DOCX
Euro SEO Services 1st 3 General Updates.docx
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
COST SHEET- Tender and Quotation unit 2.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
Probability Distribution, binomial distribution, poisson distribution
A Brief Introduction About Julia Allison
Data mining for business intelligence ch04 sharda
How to Get Funding for Your Trucking Business
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Roadmap Map-digital Banking feature MB,IB,AB
Amazon (Business Studies) management studies
Nidhal Samdaie CV - International Business Consultant
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Types of control:Qualitative vs Quantitative
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Reconciliation AND MEMORANDUM RECONCILATION
Business model innovation report 2022.pdf
Lecture (1)-Introduction.pptx business communication
IFRS Notes in your pocket for study all the time
WRN_Investor_Presentation_August 2025.pdf
Euro SEO Services 1st 3 General Updates.docx

Tech Topic Privacy

  • 1. Tech Topic: Privacy By: David Chait, Steven Gonzalez, Travis Lopez, Kristen Magno, Steven Osaki
  • 2. What is Computer Privacy? The ability to control what information one reveals about oneself, and to control who can access that information.
  • 3. Summary History and cases of privacy Current legislation Future potential concerns and threats Tips on how to protect yourself
  • 4. DIGITAL U: A Loss of Privacy? http://www.youtube.com/watch?v=W31Xy2wp7wc VIDEO
  • 5. Whose privacy is at risk?
  • 6. Everyone Is At Risk Applicants Students Individuals Engaged with Large Firms The Unsuspecting Public
  • 7. Applicants Harvard’s student database was hacked exposing over 10,000 applicants from 2007 This information was placed on Bittorrent
  • 8. Students Our information has been made widely available within our own institutions, and at times is vulnerable to loss. University of Texas at Austin – McCombs School of Business was compromised on April 24, 2006 placing 197,000 people at risk In May of 2006, the Texas Student Loan Corporation lost the records of 1.7 million borrowers.
  • 9. Individuals Engaged with Large Firms Stanford suffers a theft of 72,000 records relating to employees hired prior to September of 2007. Ernst and Young loses a laptop containing thousands of IBM employee Records On May 22,2006 The Department of Veterans Affairs reports the theft of 28,600,000 records (All vets discharged between 1975 and 2006). The information was stolen from an employee’s home computer A federal Judge has ordered restitution over 20 million dollars due to this attack
  • 10. The Unsuspecting Public Data Aggregation - The warehousing, repackaging, and resale of information about us. ChoicePoint loses information about 145,000 individuals with which it has no business relationship.
  • 12. Key Legislation Patriot Act Foreign Intelligence Surveillance Act (FISA) Real ID Act - The Creation of a National ID Card. 
  • 13. Surveillance Technology     ECHELON  Used by the United States National Security Agency (NSA) to intercept and process international communications through satellites System is able to intercept messages over the internet messages over the internet System can also use orbiting satellites to monitor signals anywhere on the earth’s surface MAIN PURPOSE: to extract information and intelligence illicitly from millions of messages every day, across the globe NSA and allies have worked to limit/prevent privacy of international telecommunications The Echelon system has abilities to eavesdrop on everyday communications and to watch everything that is being said and done in the world
  • 14. Advertising Technologies Technologies Cookies Pixels Web Bugs Spyware Implications Building Profiles of everyone.  Understanding everyone's interests. Tracking your movement all around the web.   Overall...knowing what you do, when you do it, what you like, who you know, and what your opinion is on certain topics is very sensitive information. 
  • 15. Privacy / Civil Liberty Organizations Electronic Frontier Foundation (EFF.org) American Civil Liberties Union (ACLU) Electronic Privacy Information Center (EPIC) Privacy Coalition     Advice: Be aware of the services you use and the data you provide to each of them. Be informed of the latest privacy battles happening in the media and understand that everything you do online is archived forever! 
  • 17. Threats : Spam Abuse of electronic messaging systems to send unsolicited messages constantly Mostly found in your emails
  • 18. Spyware A type of malware that is installed on computers and collects little bits of information at the time about users without their knowledge
  • 19. Malware Software designed to infiltrate a computer system without the owner’s informed consent It includes worms, trojans, and rootkits Make sure you computer has protection
  • 20. Hackers A person who breaks into computers usually by gaining access to administrative controls Beware, they are out there
  • 21. Identity Theft Fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Anytime you put your credit card number or any other personal information out on the web, its capable of being stolen.
  • 23. Phishing Scams   http://www.youtube.com/watch?v=sqRZGhiHGxg VIDEO
  • 24. Certain ways your privacy is viewed Cookies, which has been around for awhile. Facebook, Twitter, and Myspace are websites where people in our society today post personal information about themselves, which can be viewed by anyone including employers.
  • 25. Tips on How to Protect Yourself
  • 26. Software Anti-virus (AVG) Anti-spyware (Lavasoft Ad-aware) Firewall (ZoneAlarm) P2P (PeerBlock) http://epic.org/privacy/tools.html
  • 27. The Browser Security/Privacy Add-ons (Cookie Management) Website Security HTTPS and Padlock Privacy Policies Privacy Seals (TRUSTe)
  • 28. Protecting your E-mail Use different e-mails for different web activities. Free webmail services (Hushmail, Mailvault, S-mail) Pretty Good Privacy (PGP)
  • 29. Browsing the Internet TOR, The Onion Router, Sponsored by the Electronics Frontier Foundation. Anonymizer browsing services tor.eff.org www.anonymizer.com Yahoo – 90 Days Google – 9 Months Microsoft – 18 Months
  • 30. Summary History and cases of privacy Current legislation Future potential concerns and threats Tips on how to protect yourself
  • 32. WORKS CITED LIST www.idsafe.us http://news.cnet.com/8301-10789_3-9893174-57.html http://www.computerworld.com/s/article/110813/Breach_at_Univ._of_Texas_Austin_exposes_data_on_197_000_people http://www.consumeraffairs.com/news04/2006/06/student_loan_loss.html http://www.securitymanagement.com/news/stanford-university-laptop-stolen-72-000-risk-identity-theft http://www.theregister.co.uk/2006/03/15/ernstyoung_ibm_laptop/ http://www.networkworld.com/news/2006/060606-active-duty-troop-information-part-of.html?nwwpkg=slideshows http://www.msnbc.msn.com/id/6979897/

Editor's Notes

  • #3: SOURCE: /www.idsafe.us
  • #5: SOURCE:
  • #8: http://news.cnet.com/8301-10789_3-9893174-57.html
  • #9: http://www.computerworld.com/s/article/110813/Breach_at_Univ._of_Texas_Austin_exposes_data_on_197_000_people http://www.consumeraffairs.com/news04/2006/06/student_loan_loss.html
  • #10: http://www.securitymanagement.com/news/stanford-university-laptop-stolen-72-000-risk-identity-theft http://www.theregister.co.uk/2006/03/15/ernstyoung_ibm_laptop/ http://www.networkworld.com/news/2006/060606-active-duty-troop-information-part-of.html?nwwpkg=slideshows
  • #11: http://www.msnbc.msn.com/id/6979897/
  • #13: Picture: http://www.acluutah.org/Images/03fall_4.jpg Case and point is that Michael McConnell, Director of National Intelligence, is "leading the way for the US government to have unfettered warrant-less access to citizen's search histories, emails, and other online activities. As Ryan Singel, the author of a recent article in Wired, reported that "the NSA was able to devise legislation by the strong-armed passage of the Protect America Act which was an amendment to FISA (Foreign Intelligence Surveillance Act). " As Singel puts it, "This legislation single-handedly allowed for the NSA to turn GMail servers and AT&T switches into de-facto arms of the surveillance industrial complex without any court oversight." There are obvious reasons on why citizens should be concerned over this type of warrant-less access to personal, private information.
  • #32: http://www.youtube.com/watch?v=R7yfV6RzE30