Click me
Transcribed

The Wild Wild Web: Wrestling with Online Privacy

WRESTLING Witd, Hild WEB ONLINE PRIVACY AUTION CAUTIONCAUTION On lanuary 24th. Google annaunced changes to Its privacy policy. combining over 70 policies into one universal to all its properties and products. In the new policy, they come clean abaut how they will collect and use information about Google users with Google accounts (on Gmail. YauTube, BlogSpot, and many others) across all Coogle properties. With this announcement has come some upset about how the informotion we shore on the web is becoming more ond more instrumental in how we are defined In reol life--and questions about who is seelng thot information, and what they do with it. While the Internet has braught unimaginable means of communication, commerce, and exchanging information, along with it have come complications and questions of how to use ond protect the vast amounts of sensitive, personal information flowing through it. With the intense popularity of social media, many people freely share even the smallest detals of their lives online for the sake of convenience- but whot many don't know just how much information obout them is uncavered when they use the Internet. IDENTITY THEFT JANE DOE LE:12 GENDER: FEMME 12144IC NE FRUITLUNU, NA OEOU 1 IN EVERY 10 US consumers has already been victimized by identity theft. MORE THAN 35 MILLION data records were compromised in corporate and government data breaches in 2008. A Carnegle Mellan study tound that public online data could be used to SOCIAL SECURITY accurately predict the full. nine-diyit social security numbers of nearly 000-00-00on JOHN DOE 5 MILLION PEOPLE. Phishing (getting people to volunteer personal information $1.2 BILLION. under false pretenses) has Cost cansumers SOCIAL MEDIA INFORMATION JALYMA SALT Like Until 2010, Facebook compiled user Information -EVEN OF NON-ME MBERS- through "Like' button cookies on other websites. (More than 900,000 sites employ these huttens as marketing alds.) These buttons did not require user to click on them to be able to read and store information. These buttons functioned * LIKE A DARK VIDEO CAMERA-YOU SEE THEM. THEY SEE YOU" ROB SHAVELL Co-founder of Abine, an online security company NOVEMBER 2011 The Federal Trade Commission ruled that Facebook had “ UNFAIR & DECEPTIVE practices regarding privacy/user dato: USER DATA They changed privacy defaults/made PRIVATE INFORMATION PUBLIC without notitying users. Facebook also shared: PERSONAL DATA WITH ADVERTISERS & USER DATA WITH OUTSIDE APPLICATION DEVELOPERS As a result, they're submitting to " PRIVACY AUDITS for the next 20 years. The FTC made a similar deci sion with Google who they found had Automatically opted users Into GOOGLE BUZZ WITHOUT THEIR CONSENT and only provided vague explonations as to how to turn It off. EMAILS When building Google Street View, they acciden telly collected personal Information Including entire emcils, posswords, ond PASSWORDS WEB ADDRESSES web addresses. Google Google is olso submitting to PRIVACY AUDITS for the next 20 years. "AN INDIVIDUAL'S ACTIONS, RESEARCHERS SAY. ARE RARELY ENDUGH TO PROTECT PRIVACY IN THE INTERCONNECTED WORLD OF THE INTERNET." STEVE LOHR New York Times, Technology Writer HOW INFORMATION IS COMMONLY MINED exchange information between user's computer COOKIES: and o website, stores Information about browsing history. 48.5% of the web's most frequently visited sites use cookles. THIRD PARTY COOKIES: Cookies placed by advertisers and marketers to track browsing infor mation through other websites. PERSISTENT COOKIES: the Information gathered Is stored well beyond the browsing session: for weeks, month, years. 18.5% of websites use persistent cookies. 4 GROWTH OUTPACING REGULATION ENITERS The FTC 1st established guideli nes for the protection of privacy in a repart in 1998, which laid the framework for oll existing privacy protection laws. Its focus was protecting consumer Issues, which has become an exponentially weightier matter as time thas progressed. E-commerce revenue In 1996 $600M E-commerce revenue expected ta reach by 2013 = $963B SELF-REGULATION IS ESTABLISHED: "THE COMMISSION BELIEVES THAT LEGISLATION TO ADDRESS ONLINE PRIVACY IS NOT APPROPRIATE AT THIS TIME." --FTC REPORT. 1999 This same report noted the fallowing: "ONLY A RELATIVELY SMALL PERCENTAGE OF THESE SITES ARE DISCLOSING INFORMATION PRACTICES THAT ADDRESS ALL FOUR SUBSTANTIVE FAIR INFORMATION PRACTICE PRINCIPLES: NOTICE, CHOICE, ACCESS, AND SECURITY." --FTC The following language appears In many webslte privacy policies online today: "ALWAYS TAKE INTO CONSIDERATION THAT THE INTERNET IS AN OPEN FORUM AND THAT DATA MAY FLOW ACROSS NETWORKS WITH LITTLE OR NO SECURITY MEASURES, AND THEREFORE SUCH INFORMATION MAY BE ACCESSED BY PEOPLE OTHER THAN THOSE YOU INTENDED TO ACCESS IT." This leaves the burden of privacy protection largely on the website users- YOU. 5 PROTECT YOURSELF IF YOU HAVE A SMART PHONE, SETA PASSWORD: Especially when using banking apps ar accessing other personally identifiable intormation. Also, check to see what security apps are avallable for your phone-you may be missing out on a variety of ways to protect your information. BE CAUTIQUS ABOUT WHAT APPS YOU AUTHORIZE: On your mobile phane and on saclal medla sites, same apps ask you to authorize their full access to all your data-even down ta yaur current location. Be cautlcus about the kinds of apps you authorize, and iE they don't need to know as much as they're asking to know, don't authorize them. CHANGE YOUR PASSWORDS FREQUENTLY: 6. Create complex passwords that would be difficult to 8. guess, with a mixture of numbers and symbols-not just words. Don't use the same password across multiple sites, elther-varl atlon will help you stay protected. SET UP A SIDE EMAIL ADDRESS: Save your per sonal/business emall for penple you trust, and direct everything else (newsletters, consumer companies, etc) ta a side emal account. IMPLEMENT SECURITY MEASURES AVAILABLE: Most major banks will allow you to set up notifications that will alert you ot any unusual activity on your account: you can also set debit card spending limits and require additional authorization when you log Into your bank account from an unrecognized location. USE EXTREME CAUTION WITH PUBLIC COMPUTERS: Avold logging Into social medla. banking, or bill-paying sites at libraries or any publicly used computers. If you absolutely must, make absolutely sure that you log out, that you haven't allowed any of the sites to remember your usernarne pr passward, and clear the browser history before you leave. TURN ON COOKIE NOTICES: This will alert you to when (and who) is placing cookies while you browse and glve you the option of blacking them. READ PRIVACY POLICIES: PRIVACY POLICY This does meun a lot of reading-you can specifically look for sections that refer to 'data collection' and "third parties.' Self-regulation doesn't work without staying Informed-so do what you can to be aware of what you're volunteering and how that information will be used. BECOME FAMILIAR WITH PRIVACY WATCH SITES: epic There are a number af reputable organizations dedicated to privacy and clvil liberty Issues. Do some investigation, and stay up to date on the concerns they ralse. A reputable example is the Electronic Privacy Information Center. which helped call attentlon to privacy violations surrounding Google Buzz. (www.epic.com) REMEMBER THAT WHAT YOU SHARE ON SOCIAL MEDIA SITES BECOMES YOUR DIGITAL FOOTPRINT: Everything that you put aut about yourself on sacial media sites like Twitter, Facebook, and Google Plus becomes a digital footprint. Not only that, but what others post about you on social media sites will follow you as well-so be mindful of what you and others are sharing, and do what you can to protect your pr ivacy and the privacy of others. AUTION CAUTI AUTION UTION CAUTIONCAUTI While the online market, the government. and the wider public are slowly beginning to understand one another in terms of what happens with personal information onli ne. it's far from being a settled issue. With companies like Gaogle setting the parameters of haw information is mined and used, the most important thing for users like you to do is to stay informed, and exercise your right to mcke intelligent decisions about whot Informotion obout you want to share online. So don't skip over privacy nolicies: more and more, they are becoming o tangible force in shoping the woy the Internet works-and the woy you are represented on it. END BrOuylhi le yuuby FRUGAL DAD 50.JRES htt://3:agleblog.Elogspct.com/2012/ovupdrirg our p1vacy pol aes and-trrs.html Hllewww.spenierilecuv'yliderdenlly-trel l-slelislia httr//www.spensarlitaconfi.ldesantty-therr-statistl:s htt://www.mu:dørewrdarnte20c9/l.ty/jutyfrarad an cntml hllo/www.guard-grivazy-en-ulresecur ly.an/mlerne.-c-L'ie l-slalis La.s.itml rttrei/nits blaps.nytimas.cem/2ITYD/2/as-IRE-nuttore-spread-so-13-tareheoks-tentacies/?smc-r-ryrimenteks cid-zute hlluwww.yimes.com/2011/TV30/LetTr:legy/fecelo:k-agrees-la-lis-selJlemert-urprivay.unlisy=2asFFe.el neekst-rsa httr//www.ftr.gnw npa01/03/gng shtm Fll/www.ylimes.cum/2010/10/28/uL'imelogy/28guugleh.rl rttoe: /www.tortescon's tes/kasmI/20TVI SU/s-ntst-are-tr ese-privacy-aud:-that-google-and-13cebcok-ra? e to de forthe net 20 ye sri hll/www.rylinmes.com/2010/03/17/Lutrwlegy/17prwatylitl htto//enwiepeds.crg/WRVHIIPC30KIE httx//w3t: hr.cam/te hrolag retrtall:/re pertistentenokm/alal hll/www.refrencferbuaress.com/myclepedia ELu EnU'Electrene CunCrcunluli Hll/led ururch.am20V01/03/+-marLArelulul-eumerLe ererce-lk-grv-by-13-peen.-rr201-l-EE0L htt://www.ftr peri zpa/1999/07/ranrt'999.shtm hlwww.curvuprwuy.p

The Wild Wild Web: Wrestling with Online Privacy

shared by kthorspear on Feb 06
939 views
1 shares
0 comments
According to Carnegie Mellon researchers, information listed on social media may be enough to guess a social security number, the key to identity theft. And with mobile banking apps, more and more peo...

Publisher

Frugal Dad

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size