Privacy Game1

Page 1



“If you want to liberate a society, Just give them the internet.”

- Wael Ghonim

What is the real price of ‘free’ internet?


* On January 24th, Google announced changes ro their privacy policy, it was a combination of 70 policies into one universal to all its properties and products. In the new policy, they came clean about how they will collect and use information about users with Google accounts; this included Gmail, Youtube, Blogspot and many others. The web is becoming more and more intrusive and controlled with ow we live in real life. The internet has brought many unimaginable means of communication, commerce and exchanging of information, along with it have come complicaions and questions of how to use and protect the mass amounts of sensitive and personal information.


With the huge popularity of social media, many people share even the smallest details of their lives online for the sake convenience.

But how much of that information is uncovered when they use the internet?


IDENTITY THEFT 1 in every 10

sarah CHRISTISON

sam pamelan

sam smith

eddy mane

freddy mancra

sarah CHRISTISON

chrstina sartica

Consumer has already been victimized by Identity Theft.

Identity theft is a form of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, usually as a method to gain access to resources or obtain credit and other benefits in that person’s name.

The victim of identity theft can suffer adverse consequences if they are held responsible, Identity theft occurs when someone uses another’s personally information. Examples includes: Their name phone number credit card number.


IDENTITY THEFT

MORE THEN 35 MILLION Data records were compromised in corporate and government data breaches in 2008 DATA RECORDS

DATA RECORDS DATA RECORDS

DATA RECORDS DATA RECORDS

PHISHING Phishing is when people unintentionally volunteer to give their personal infor“ mation under false pretenses that have been set up by hackers. This is one of the most common forms of hacking and has cost consumers up to $1.2 billion in the US.

DATA RECORDS DATA RECORDS DATA RECORDS DATA RECORDS DATA RECORDS


YOU SEE ME, THEY SEE YOU Until 2010, Facebook compiled user information, including through “Like” button cookies on other websites. More than 900,000 sites employ these buttons as marketing aids. These buttons did not require the user to click on them to be able to read and store information. As said by Rob Shavell, the Co-founder of an online security company called Abine; these buttons functioned

‘Like a dark video camera; you see them, they see you”.’



NOVEMBER 2011 The Federal Trade Commision ruled that Facebook had

“ Unfair & Deceptive " practices regarding PRIVACY/USER data.

They changed privacy defaults and made it all PUBLIC without notifying the users.

FACEBOOK ALSO SHARED Personal Data With Advertisers User Data With Outside Application Developers

As a result they will be submitting

“ PRIVACY AUDITS” for the next 20 years.


DONT DIGITIZE YOUR LIFE You don’t know who could be looking at your things right this moment.


COOKIES Exchange information between the USER’S COMPUTER and a WEBSITE, storing your information and also browsing history.

..NOT SO TASTY

THIRD PARTY COOKIES Cookies that are placed by ad“ vertisers and marketers to track browsing information through other website.

PERSISTENT COOKIES: The information gathered is stored well beyond the brows“ ing session;

for Weeks, Months & Years.

Almost 50% of the web’s most frequently visited sites use cookies.


PROTECT YOURSELF


PROTECT YOURSELF

#1. SET A PASSWORD ! If you have a smartphone be sure to set a password, especially if you are using banking apps or accessing other personally identifiable information. Also, chck to see what security apps are available for your phone, you may be missing out on a variety of ways to protect all the important information on your phone.

#2. BE CAUTIOUS ABOUT WHAT APPS YOU AUTHORIZE On your mobile phone and on social media sites, some apps ask you authorize their full access to all your data, even down to your current location. If an app doesn’t need to know as much as they’re asking to know, don’t give it permission. Read their privacy policy!

#3. CHANGE YOUR PASSWORDS FREQUENTLY Creat complex passwords that would be difficult to guess, mis it up with num“ bers and symbols, not just words! Don’t use the same password across multiple site, having variation will help you stay protected.

*****


PROTECT YOURSELF

#4. IMPLEMENT SECURITY MEASURES AVAILABLE Most major banks will allow you to set up notifica“ tions that will alert you of any unusual activity on your accout: you also set up limits on your debit card and require additional authorization when yo log into your bank account from and unrecognized location.

#5. TURN ON COOKIE NOTICES This will alert you when (and who) is placing cookies while you browse and give you the option of blocking them.§

#6. READ PRIVACY POLICIES This does mean alot of reading, you can specifi“ cally look for sections that refer to "data collection" and "third parties". Self regulation doesn’t work wwithout staying informed, so do what you can to be aware of what you are volunteering and how that information will be used.


PROTECT YOURSELF

- REMEMBER -

ANYTHING YOU PUT ONLINE WILL REMAIN A DIGITAL FOOTPRINT Everything that you put out about yourself on social media sites like Twitter, Facebook, and Google Plus becomes a digital footprint. Not only that, but what others post about you on socialmedia will follow you as well. So be mindful of what you and others are sharing, and dow aht you can do to protect your privacy and the privacy of others. What you think is "deleted" is actually only hidden from your own eyes making you think it is deleted.


The internet is a deep, dark place with no boundaries to explore, all the freedom that comes with a price. While the online market, the government, and the wider public are slowly beginning to understand one another in terms of what happens with per“ sonal information online, it is far from being settled issue. With companies like Google setting the parameters of how information is mined and used, the most important thing for users like you to do is to stay informed, and exercise your right to make intelligent decisions about what information you want to share online. So don’t skip over the privacy policies: more and more, they are becoming a tangable force in shaping the way the internet works and the way you represented on it.

***



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.