Privacy and Personal Information 2012

Embed Size (px)

Citation preview

  • 8/12/2019 Privacy and Personal Information 2012

    1/23

    1

    Privacy and Personalnformation

  • 8/12/2019 Privacy and Personal Information 2012

    2/23

    2

    The Impact of

    Computer Technology

    Computers are not needed for the invasion

    of privacy.

    Computers simply make new threatspossible and old threats more potent.

    Privacy can mean:

    Freedom from intrusion. Control of information about oneself.

    Freedom from surveillance.

  • 8/12/2019 Privacy and Personal Information 2012

    3/23

  • 8/12/2019 Privacy and Personal Information 2012

    4/23

    4

    Whats this ?

  • 8/12/2019 Privacy and Personal Information 2012

    5/23

    5

  • 8/12/2019 Privacy and Personal Information 2012

    6/23

  • 8/12/2019 Privacy and Personal Information 2012

    7/23

  • 8/12/2019 Privacy and Personal Information 2012

    8/23

    8

  • 8/12/2019 Privacy and Personal Information 2012

    9/23

    9

    Eiffel

  • 8/12/2019 Privacy and Personal Information 2012

    10/23

    10

    Talking caller-id - 32.95

    Caller ID

    http://aa.wrs.yahoo.com/_ylt=A9FJqh54cCNGAx8AF3vNQwx./SIG=1ksnk70s0/EXP=1176814072/**http%3A//id.search.yahoo.com/search/images/view%3Fback=http%253A%252F%252Fid.search.yahoo.com%252Fsearch%252Fimages%253Fp%253Dcaller%252Bid%2526ei%253DUTF-8%2526fr%253Dyfp-t-img%2526x%253Dwrt%26w=200%26h=202%26imgurl=img.epinions.com%252Fimages%252Fopti%252Fb0%252F5e%252FDual_Handset_Cordless_Telephone_with_Caller_ID_TRU_8860_2_TRU88602-resized200.jpg%26rurl=http%253A%252F%252Fwww.epinions.com%252FDual_Handset_Cordless_Telephone_with_Caller_ID_TRU_8860_2_TRU88602%26size=7.5kB%26name=Dual_Handset_Cordless_Telephone_with_Caller_ID_TRU_8860_2_TRU88602-resized200.jpg%26p=caller%2Bid%26type=jpeg%26no=20%26tt=49374%26oid=93f6beae87580b3a%26ei=UTF-8
  • 8/12/2019 Privacy and Personal Information 2012

    11/23

    11

    0-800-1-558000

    Suara Konsumen - ????

    Sabun

    Pasta gigi

    Susu

    Ticket

    Human Body ???

    .

  • 8/12/2019 Privacy and Personal Information 2012

    12/23

  • 8/12/2019 Privacy and Personal Information 2012

    13/23

    13

    The Impact of

    Computer Technology

    Monitoring and Tracking

    Examples:

    GPS (global positioning system). Cell-phones.

    Blackboxes in automobiles.

    Other wireless appliances.

  • 8/12/2019 Privacy and Personal Information 2012

    14/23

    14

    More Examples

    Traffic Monitor Camera can

    be used to check vehicles,

    persons

    Face recognition for

    unwelcome people

  • 8/12/2019 Privacy and Personal Information 2012

    15/23

    15

    Consumer Information

    Consumer Databases Gathering Information:

    Warranty cards.

    Purchasing records. Membership lists.

    Web activity.

    Change-of-addressforms.

    Much more

  • 8/12/2019 Privacy and Personal Information 2012

    16/23

    16

    Lihat contoh penipuan Carefour:

    amplop

    surat pemberitahuan

    kupon asli

    surat pengambilan hadiah

    pemberitahuan pajak

  • 8/12/2019 Privacy and Personal Information 2012

    17/23

    17

    Consumer Information

    Consumer Databases (contd)

    Limiting Collection, Use, Sharing, and Sale ofPersonal Data:

    Consumers can take measures to restrict the useof their personal information.

    Some information sharing is prohibited by law.

    Some information sharing is prohibited by

    published, privacy policies.

  • 8/12/2019 Privacy and Personal Information 2012

    18/23

    18

    Consumer Information

    Marketing: Using Consumer Information Trading/buying customer lists.

    Telemarketing.

    Data Mining.

    Mass-marketing.

    Web ads.

    Spam (unsolicited e-mail).

    http://images.google.com.hk/imgres?imgurl=http://www.ecliptic.ch/Stock/Detail/FV0894_sex_spam_mail.jpg&imgrefurl=http://www.ecliptic.ch/Stock/Detail/FV0894_sex_spam_mail.html&h=350&w=349&sz=23&hl=zh-CN&start=1&tbnid=-Sx70MtvXpsUCM:&tbnh=120&tbnw=120&prev=/images%3Fq%3Dspam%2Bemail%26svnum%3D10%26hl%3Dzh-CN%26lr%3D%26rls%3DGGLJ,GGLJ:2006-34,GGLJ:zh-CN%26sa%3DG
  • 8/12/2019 Privacy and Personal Information 2012

    19/23

  • 8/12/2019 Privacy and Personal Information 2012

    20/23

    20

    More Privacy Risks

    National ID Card System

    If implemented, the card could contain your:

    Name. Address.

    Telephone number(s).

    Photo.

    SSN.

  • 8/12/2019 Privacy and Personal Information 2012

    21/23

    21

    National ID Card

    System

    If implemented, the

    system could allow

    access to your:

    Medical information.

    Tax records.

    Citizenship.

    Credit history.

    Much more

    More privacy risk

  • 8/12/2019 Privacy and Personal Information 2012

    22/23

    22

    NKRI

  • 8/12/2019 Privacy and Personal Information 2012

    23/23

    23

    NKRI