Chapter 9: Privacy, Security and Ethics Flashcards
Technology has had a very positive impact on
People, but some of the impact could be negative
Most significant concerns about technology
1) Privacy: What are the threats to personal privacy, and how can we protect ourselves?
2) Security: How can access sensitive information be controlled, and how can we secure hardware and software?
3) Ethics: How do the actions of individual users and companies affect society?
Privacy
Concerns the collection and use of data about individuals
Accuracy
Responsibility of those who collect data and must be secure and correct
Property
Relates to who owns the data
Access
Responsibility of those who control data and use that data
Large organizations compile
Information about us daily
Big data is
Exploding and ever-growing
90% of the data collected has been
Collected over the last 2 years
Information Resellers/Brokers
1) Collect and sell personal data
2) Create electronic profiles
Personal information is
A marketable commodity, which raises many issues:
Collecting public, but
Personally identifying information (e.g Google’s Street View)
Spreading information without
Personal consent, leading to identity theft
Spreading inaccurate information
Mistaken identity
Freedom of Information Act
Entitlement to look at your records held by government agencies
Employee monitoring software
Employers can monitor email legally
A proposed law could
Prohibit this type of electronic monitoring or at least require the employer to notify the employee first
Illusion of anonymity
People are not concerned about privacy when surfing the Internet or when sending email
When browsing the web, critical information is stored on the hard drive in these locations, and these are included.
1) History Files
2) Temporary Internet Files
3) Browser cache
4) Cookies
5) Privacy Mode
6) Spyware
History Files
Include locations or addresses of sites you have recently visited
Temporary Internet Files/Browser Cache
1) Saved files from visited websites
2) Offers quick re-display when you return to the site
Small data files that are deposited on your hard disk from
Web sites you have visited
First-party cookies
Generated only by websites you are visiting
Third-party cookies
Generated by an advertising company that is affiliated with the website
Tracking cookies
To keep track of your Internet activities through third party cookies
Privacy Modes
Ensure your browsing activity is not recorded on your hard drive
Recognition Mode is
Google Chrome
Private Browsing
Safari
Web bugs
Invisible images or HTML code hidden within an e-mail message or webpage
Spyware
1) Record and report Internet activities
2) Change the browser to manipulate what you view
Computer monitoring software
1) Most invasive and dangerous
2) Keystroke loggers: Record activities and keystrokes
Anti-Spyware programs
Detect and remove privacy threats
Online Identity
The information that people voluntarily post and online
Archiving and search features of
The Web makes it available indefinitely
Major Laws on Privacy
1) Gramm-Leach-Bliley Act
2) Health Insurance Portability and Accountability Act (HIPAA)
3) Family Educational Rights and Privacy Act (FERPA)
1) Gramm-Leach-Bliley Act
Protects personal financial information
2) Health Insurance Portability and Accountability Act (HIPAA)
Protects medical records
3) Family Educational Rights and Privacy Act (FERPA)
Resists disclosure of educational records
Security
Involve protecting individuals or organizations from theft and danger