Robert Crawford, MBA West Middle School. Summarize the danger of sharing personal information on the internet. Explain how cookies and global unique

Embed Size (px)

Citation preview

  • Slide 1
  • Robert Crawford, MBA West Middle School
  • Slide 2
  • Summarize the danger of sharing personal information on the internet. Explain how cookies and global unique identifiers endanger privacy. Essential Question What are some of the threats to our privacy online?
  • Slide 3
  • Global Unique Identifier (GUID) Infringe In book, but not listed as a key term (these are the ones you need to write down) : Cookie Not in book: Digital Footprint
  • Slide 4
  • What is Privacy? I will provide a couple of definitions: noun I.the state or condition of being free from being observed or disturbed by other people. II.the state of being free from public attention.
  • Slide 5
  • Page 452 We share information both: Knowingly Unknowingly
  • Slide 6
  • Sources Include: Public Records Directly from the individual Website registration Online Purchases Warranty Registration Sweepstakes Entries This information is then, often, sold to other companies, such as marketing companies. The information is also saved, forming your digital footprint.
  • Slide 7
  • Digital Footprint (not in text) A digital footprint is the data that is left behind by users on digital services. There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected without the owner knowing An active digital footprint is created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media. Mention Amazon Adaptive Pricing http://en.wikipedia.org/wiki/Digital_footprint
  • Slide 8
  • Different countries have different standards of online privacy Most restricted Restricted Some restrictions Minimal restrictions Effectively no restrictions No legislation or no information http://www.forrestertools.com/heatmap/
  • Slide 9
  • It is not enough to guard your own privacy online. You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. Infringe: mid 16th century: from Latin infringere, from in- 'into' +frangere 'to break'.Latin
  • Slide 10
  • It is not enough to guard your own privacy online. You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. The Golden Rule isnt enough
  • Slide 11
  • Is your e-mail truly private? This is particularly relevant as the school goes to a Google domain Soon the school will be issuing you an e-mail address Your e-mail is not private. Firstly, it is easily forwarded. Secondly, anything on a computer system belongs to whoever owns the system. I am not saying this is right, only that it is. Do not ever send anything by e-mail that you would be deeply embarrassed if it were to become public information.
  • Slide 12
  • Page 453
  • Slide 13
  • We frequently share information about ourselves knowingly (we are aware that we are sharing information). Do we ever share information unknowingly? Remember the Passive Digital Footprint. A digital footprint is the data that is left behind by users on digital services. A passive digital footprint is created when data is collected without the owner knowing Remarketing Related video
  • Slide 14
  • As relates to computers, what is a cookie? As relates to computers, a cookie is a small file that is stored on your hard drive when you visit some websites. What do cookies provide? They provide the website with a means of storing information about you. You can mange the cookie settings on your computer
  • Slide 15
  • Global unique Identifier (GUID) A unique number assigned to a person, a piece of software, or a piece of hardware Similar to a MAC Address, except that people are not aware of its presence. A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. getmac ifconfig/all (can be spoofed) Because people are not aware they are being tracked, the information can be abused. http://en.wikipedia.org/wiki/MAC_address
  • Slide 16
  • Summarize the danger of sharing personal information on the internet. Explain how cookies and global unique identifiers endanger privacy.
  • Slide 17
  • Global Unique Identifier (GUID) Infringe In book, but not listed as a key term: Cookie Not in book (these are the ones you need to write down) Digital Footprint