You are on page 1of 5

Privacy

Table of Contents
What is privacy? ............................................................................................................................................ 1 The impact of large databases ...................................................................................................................... 1 The impact of the Internet, and the web ...................................................................................................... 2 Online identity and the major privacy laws .................................................................................................. 2 Security and Computer Crimes...................................................................................................................... 2 What are a virus, worm and Trojan horses? ................................................................................................. 3 What are the ways of protecting security including restricting access, encrypting data, and preventing data loss? ....................................................................................................................................................... 3 What is Plagiarism? ....................................................................................................................................... 4 What is Copyright? ........................................................................................................................................ 4 Resources ...................................................................................................................................................... 5

What is privacy?
Privacy as a concept is becoming increasingly important in the digital world. People recognize it, but do they know what it is? If web-services rely on advertising to survive, and targeted advertising is the holy grail of advertising doesnt it make sense that privacy as a right is defined? There needs to be an agreement between consumers, publishers, and advertisers of where the lines in the sand are. We cant afford to have this concept hidden in the shadow its too important. For me, privacy is three things. The right to determine: 1) Who can see information about you 2) when people can see information about you 3) what information they can see about you

The impact of large databases


Large organizations are constantly compiling information about us. Reserve directions list telephone numbers followed by subscriber names. Information resellers collect and sell personal data. Electronic profiles are compiled from databases to provide highly detailed and personalized descriptions of individuals.

Identify theft is the illegal assumption of someones identity for the purposes of economic gain. Mistaken identify occurs when an electronic profile of one person is switched with another. The Freedom of Information Act entitles individuals access to governmental records relating to them.

The impact of the Internet, and the web


Many people believe that, while using the Web, little can be done to invade their privacy. This is called the illusion of anonymity. History files record locations of visited sites. Cookies store and track information. Two basic types are traditional cookies and network cookies. Privacy mode eliminates history files and block cookies. Spyware secretly records and reports Internet activities. Computer monitoring watches what you do. Web bugs provide information back to spammers about activity on your e-mail account. Antispyware detects Web bugs and monitoring software.

Online identity and the major privacy laws


Many people post personal information and sometimes intimate details of their lives without considering the consequences. This creates an online identity. With the archiving and search features of the Web, this identity is indefinitely available to anyone who cares to look for it. The Gramm-Leach-Bliley Act protects personal financial information; the health Insurance Portability and Accountability Act (HIPAA) protects medical records; and the Family Educational Rights and Privacy Act restricts disclosure of educational records.

Security and Computer Crimes


Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber-crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet. High technology has become commonplace in today's environment, and it is no surprise that it has also found its way into the criminal domain. For a new breed of criminals, computers are rapidly becoming the "weapon of choice." There are four major categories of computer crime: internal computer crimes--Trojan horses, logic bombs, trap doors, worms, and viruses; telecommunications crimes--phreaking and hacking; computer manipulation crimes that result in embezzlement and fraud; and traditional thefts of hardware and software. Not surprisingly, new

computer crimes are stimulating innovative ways to combat it, giving rise to a wide range of advanced computer security systems and techniques as well as the rapid development of computer-related laws and legislation.

What are a virus, worm and Trojan horses?


Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other bad or illegitimate action on data, hosts, or networks. There are many different classes of malware that have varying ways of infecting systems and propagating themselves. Malware can infect systems by being bundled with other programs or attached as macros to files. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a hole in a browser that only requires users to visit a website to infect their computers. The vast majority, however, are installed by some action from a user, such as clicking an e-mail attachment or downloading a file from the Internet. Some of the more commonly known types of malware are viruses, worms, Trojans, bots, back doors, spyware, and adware. Damage from malware varies from causing minor irritation (such as browser popup ads), to stealing confidential information or money, destroying data, and compromising and/or entirely disabling systems and networks. Malware cannot damage the physical hardware of systems and network equipment, but it can damage the data and software residing on the equipment. Malware should also not be confused with defective software, which is intended for legitimate purposes but has errors or bugs.

What are the ways of protecting security including restricting access, encrypting data, and preventing data loss?
Data controllers in the private and public sectors hold increasing amounts of personal data on individuals. The decreasing cost of electronic storage and processing has greatly contributed to this. Organizations also increasingly outsource data processing to third parties (data processors). Many organizations also continue to hold large quantities of personal data in manual form often in off-site locations. This large increase in the quantity of personal data processed and held gives rise to security challenges for the organizations that collect the data. Data controllers need to regularly audit their holdings of personal data and the procedures they have in place to protect this data. Questions they should ask include: Do we know what types of personal data we hold - electronically (including less obvious data such as CCTV images)? - on paper?

Can we justify the collection of this information? - Why do we collect it? - What it is used for? - How long do we hold it? - Who has access to it? - To whom do we disclose it? - Is it held securely? - How we dispose of the data? If we outsource processing of personal data to a data processor (including a 'cloud computing' service provider), are we satisfied that their security procedures are adequate?

What is Plagiarism?
Taking the ideas or copying the language of another writer without formal acknowledgment is plagiarism. Students who would never copy another student's exam answers may think nothing of borrowing the ideas or wording from another author. Writers must always document the ideas and information which are outside the realm of common knowledge. For example, well known facts require no documentation, while obscure facts would require documentation. When in doubt, it is always better to err on the side of caution and document your sources. Plagiarism is a violation of NSU's academic policies and honor code. Plagiarism is also a federal crime and violates copyright laws.

What is Copyright?
Copyright laws strive to balance the interests of copyright owners and users. A copyright owner has control or exclusive rights to prohibit users from using a work in specific way without the owner's permission. A copyright owner has the exclusive rights to control distribution of their work reproduction of their work adaptation of their work public performance of their work public display of their work

It protects the copyright owner's monetary rights for a fixed period of timea copyright owner has the right to profit from the sale or performance of a work. The fixed period of time varies, depending on the work, before the work enters the public domain. Some works are in the public domain because they are not protected by copyright law. However, simply because a work is in the public domain, does not mean that the an individual can claim authorship of the work.

Resources
http://eliasbizannes.com/blog/2007/04/define-privacy-what-does-it-mean-to-you/ http://www.webopedia.com/TERM/C/cyber_crime.html http://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html http://www.dataprotection.ie/viewdoc.asp?DocID=1091 http://www.nova.edu/library/dils/lessons/plagiarism/ Book Chapters

You might also like