10
Privacy and the Internet John R Nicholson Updated 8/17

Privacy: Protecting Personal Information

Embed Size (px)

Citation preview

Page 1: Privacy: Protecting Personal Information

Privacy and the Internet

John R Nicholson

Updated 8/17

Page 2: Privacy: Protecting Personal Information

What is Privacy

Definition

Ability of individual to seclude information about themselves and express it selectively

Something that is inherently special or sensitive

Amendment IV

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures…”

Pizza video: http://bit.ly/1ep4ODT

Note: last set of characters is case sensitive

Page 3: Privacy: Protecting Personal Information

Why is Privacy Important?

Credit Reports (CBS says 4/5 contain errors)

Precursor to identity theft

Incorrect information

Incorrect interpretation

The Internet is forever

Streisand Effect (6 downloads turned into 420,000 views)

Page 4: Privacy: Protecting Personal Information

Defining Big Data

Big Data is a term for data sets that are so large or complex that traditional data processing application software is inadequate to deal with them.

Refers to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data

Page 5: Privacy: Protecting Personal Information

What is Big Data

SciTech Now: http://bit.ly/2xHHxgU (6 min)Note: last set of characters is case sensitive

60 Minutes: http://bit.ly/2xHtaJm (15 min)

PBS: http://bit.ly/2mUXqeS (4 min)

TED: http://bit.ly/2wNUf1k (17 minutes)

iTunes privacy agreement: 7 Days, 7 attorneys, 27 pages

Personally Identifiable Information (PII) only valuable information

http://Google.com/maps/timeline

Page 6: Privacy: Protecting Personal Information

Big Data Pros

Allows businesses to quickly detect frauds and errors

Develop strategies towards competitors in less time offering deep insight into consumer trends and sales

Used to provide cutting-edge healthcare.

Medical records and wearables provide information about patients analyzed in real time

Page 7: Privacy: Protecting Personal Information

Big Data Cons

Companies wanting to use Big Data must redefine their data collection methods and upgrade computers

Cost of developing algorithms

Lack of privacy

Only .5% of all information has been analyzed

Page 8: Privacy: Protecting Personal Information

Net Neutrality

Move from Title I to Title II by FCC

ISPs can throttle speeds to specific sites

If an ISP were to develop a movie site, they could have speedy access to it, throttling Netflix

If Pizza Hut pays a fee, and ISP could drop calls or add interference to Domino’s customers

If repealed, ISP has access to all information you send across the Internet and can sell it.

Page 9: Privacy: Protecting Personal Information

How Can I Protect Myself

Duckduckgo.com search engine

TOR browser (never open PDFs online)

VPNVyper (goldenfrog.com) $5 mo/billed annually

Password7x@CTd!A

Mypasswrdiseasytoremember1

Don’t provide personal information (especially surveys)

Page 10: Privacy: Protecting Personal Information

Summary

Use a safe search engine

Use a safe browser

Use a pass phrase rather than a password

Don’t fill out surveys

The Internet is forever