SlideShare uma empresa Scribd logo
1 de 9
Personal information




 Social Media in Marketing, Assignment 4,
          Pia Hoffrén 18.10.2012
Table of contents
• Slide 3: Definition of personal information
• Slide 4: Special elements and uses in personal
  information
• Slide 5: The use of personal information
• Slide 6: 5 Design Tricks Facebook Uses To Affect
  Your Privacy Decisions
• Slide 7: Tips for guarding your information
• Slide 8: Five Ways to Boost Your Facebook Privacy
• Slide 9: Bibliography
Personal information
is recorded information about an identifiable individual
that may include his or her:

1.   name, address, email address, phone number
2.   race, nationality, ethnicity, origin, colour, religious or political
     beliefs or associations,
3.   age, sex, sexual orientation, marital status, family status,
4.   identifying number, code, symbol,
5.   finger prints, blood type, inherited characteristics,
6.   health care history including information on physical/mental
     disability,
7.   educational, financial, criminal, employment history,
8.   others' opinion about the individual, and
9.   personal views except those about other individuals.
(Business Dictionary 2012)
Special elements and uses in personal
            information

                   Companies collect and use
                   information about
                   customers and website
                   visitors for a variety of
                   purposes.
                   Information is obtained
                   when you interact, use
                   products and services, and
                   when you visit websites.
The use of personal information
This information can be used to:

• deliver, provide, and repair products or services
• establish and maintain customer accounts and billing
   records
• contact you about products and services and direct specific
   offers or promotions to you
• monitor website statistics
• manage and protect company’s networks
• monitor the company’s customer service employees
• establish your online account
• predict customer preferences and to direct marketing offers
   by the company or by third parties.
(Verizon 2012)
5 Design Tricks Facebook Uses To
       Affect Your Privacy Decisions
                                      #1: The Single Button Trick (old design:
Facebook keeps “improving” their      2 buttons = choice)
design so that more of us will add
apps without realising we’re          #2: The Tiny Gray Font Trick (old
granting those apps (and their        design: bold black font + prominent
creators) access to our personal      permission icon)
information.
                                      #3: The Tiny Hidden Info Symbol Trick
                                      (old design: detailed & visible
After all, this access to our         permissions)
information and identity is the
currency Facebook is trading in       #4: The Action Line Trick (old design:
and what is driving its stock up or   permissions visible above action line)
down.
                                      #5: The Friendly Talk Trick (old design:
                                      clear messaging)
                                      (Charkham, A. 25.8.2012.)
Tips for guarding your information
•  Limit the information you share
•  Set up strong passwords
•  Limit Unwanted Marketing Emails (Spam)
•  Don’t open suspicious emails -> If you receive a
   suspicious email, you should not reply to it, nor should
   you open any attachments, click on links contained in
   the email or provide any information in response to it.
• Protect your computer from viruses, hackers and
   spyware by anti-virus and anti-spyware software
• Get an unlisted telephone number
(Verizon 2012; Consumer Action 2007)
Five Ways to Boost Your Facebook
                  Privacy
1.   Limit Who Can Post to Your Timeline (prevent and fine-tune)

2.   Block Tagged Photos From Your Timeline (posts and photos your friends
     tag don't appear on your timeline without your explicit approval)

3.   Prevent Friends' Apps From Gathering Your Info (Many apps ask users for
     access to their friends' info.)

4.   Disable "Instant Personalization“ (By default, Facebook provides a
     handful of "partner websites," including Yelp and Bing, with information
     about you and your friends when you visit them.

5.   Change Your Default Post Privacy (Facebook uses the privacy setting of
     your most recent post as the default privacy setting for your next post—
     except for on certain mobile apps.
(The Wall Street Journal 12.10.2012)
Bibliography
Slide 3: Business Dictionary 2012. Personal information. URL:
http://www.businessdictionary.com/definition/personal-information.html#ixzz29bD9BI00.
Quoted 18.10.2012

Slide 4: Verizon 2012. Privacy Policy Summary. URL: https://www22.verizon.com/about/privacy/.
Quoted 18.10.2012

Slide 5: Verizon 2012. Privacy Policy Summary. URL:
https://www22.verizon.com/about/privacy/. Quoted 18.10.2012

Slide 6: Charkham, A. 25.8.2012. 5 Design Tricks Facebook Uses To Affect Your Privacy Decisions.
URL: http://techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy-
decisions/. Quoted 18.10.2012

Slide 7: Verizon 2012. Privacy Policy Tips for Guarding Your Information . URL:
https://www22.verizon.com/about/privacy/personalinformation/. Quoted 18.10.2012

Slide 7: Consumer Action 2007. Protect Your Phone Records. URL: http://www.consumer-
action.org/english/articles/protect_your_phone_records/. Quoted 18.10.2012

Slide 8: The Wall Street Journal 2012. Five Ways to Boost Your Facebook Privacy. URL:
http://blogs.wsj.com/digits/2012/10/12/five-ways-to-boost-your-facebook-privacy/?mod=e2fb.
Quoted 18.10.2012

Mais conteúdo relacionado

Destaque

trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datos
cesar82703
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
 

Destaque (17)

crea tu pagina web
crea tu pagina webcrea tu pagina web
crea tu pagina web
 
Functional Testing - Carlos Vences
Functional Testing - Carlos VencesFunctional Testing - Carlos Vences
Functional Testing - Carlos Vences
 
How to be a great husband
How to be a great husbandHow to be a great husband
How to be a great husband
 
How to lose a job?
How to lose a job?How to lose a job?
How to lose a job?
 
Global warming.jasper
Global warming.jasperGlobal warming.jasper
Global warming.jasper
 
American Karma
American KarmaAmerican Karma
American Karma
 
Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1Mdp 511 2012 organizations in development - session 1
Mdp 511 2012 organizations in development - session 1
 
State of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-previewState of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-preview
 
trabajo 2 Datos
trabajo 2 Datostrabajo 2 Datos
trabajo 2 Datos
 
Invt ques
Invt quesInvt ques
Invt ques
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Sot 2008 revisi
Sot 2008 revisiSot 2008 revisi
Sot 2008 revisi
 
LEAPIN
LEAPINLEAPIN
LEAPIN
 
Fdlp presentation
Fdlp presentationFdlp presentation
Fdlp presentation
 
2 ruslaiana dancedrama
2 ruslaiana dancedrama2 ruslaiana dancedrama
2 ruslaiana dancedrama
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Karmax itinerary(3)
Karmax itinerary(3)Karmax itinerary(3)
Karmax itinerary(3)
 

Semelhante a Personal information

Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Social networking sites selling information to third parties
Social networking sites selling information to third partiesSocial networking sites selling information to third parties
Social networking sites selling information to third parties
julia594
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
Adzappier
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
Visa
 

Semelhante a Personal information (20)

Social Media and Financial Services presentation to Financial Planners Associ...
Social Media and Financial Services presentation to Financial Planners Associ...Social Media and Financial Services presentation to Financial Planners Associ...
Social Media and Financial Services presentation to Financial Planners Associ...
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Social networking sites selling information to third parties
Social networking sites selling information to third partiesSocial networking sites selling information to third parties
Social networking sites selling information to third parties
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdfA Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
A Marketer's Dilemma - Collecting Data Without Paying Fines.pdf
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Financial Information System; FB 405; Group No_11.pptx
Financial Information System; FB 405; Group No_11.pptxFinancial Information System; FB 405; Group No_11.pptx
Financial Information System; FB 405; Group No_11.pptx
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
GDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your AppsGDPR, User Data, Privacy, and Your Apps
GDPR, User Data, Privacy, and Your Apps
 
Employee social media Toolbox Talk v1.0
Employee social media Toolbox Talk  v1.0 Employee social media Toolbox Talk  v1.0
Employee social media Toolbox Talk v1.0
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Linked in policy primer mwilson
Linked in policy primer mwilsonLinked in policy primer mwilson
Linked in policy primer mwilson
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
Day 10: Privacy, TOS & identity
Day 10: Privacy, TOS & identityDay 10: Privacy, TOS & identity
Day 10: Privacy, TOS & identity
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 

Mais de HHSome

Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
HHSome
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
HHSome
 
Social engineering
Social engineeringSocial engineering
Social engineering
HHSome
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
HHSome
 
Over posting
Over postingOver posting
Over posting
HHSome
 
Censorship
CensorshipCensorship
Censorship
HHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
HHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
HHSome
 

Mais de HHSome (19)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Personal information

  • 1. Personal information Social Media in Marketing, Assignment 4, Pia Hoffrén 18.10.2012
  • 2. Table of contents • Slide 3: Definition of personal information • Slide 4: Special elements and uses in personal information • Slide 5: The use of personal information • Slide 6: 5 Design Tricks Facebook Uses To Affect Your Privacy Decisions • Slide 7: Tips for guarding your information • Slide 8: Five Ways to Boost Your Facebook Privacy • Slide 9: Bibliography
  • 3. Personal information is recorded information about an identifiable individual that may include his or her: 1. name, address, email address, phone number 2. race, nationality, ethnicity, origin, colour, religious or political beliefs or associations, 3. age, sex, sexual orientation, marital status, family status, 4. identifying number, code, symbol, 5. finger prints, blood type, inherited characteristics, 6. health care history including information on physical/mental disability, 7. educational, financial, criminal, employment history, 8. others' opinion about the individual, and 9. personal views except those about other individuals. (Business Dictionary 2012)
  • 4. Special elements and uses in personal information Companies collect and use information about customers and website visitors for a variety of purposes. Information is obtained when you interact, use products and services, and when you visit websites.
  • 5. The use of personal information This information can be used to: • deliver, provide, and repair products or services • establish and maintain customer accounts and billing records • contact you about products and services and direct specific offers or promotions to you • monitor website statistics • manage and protect company’s networks • monitor the company’s customer service employees • establish your online account • predict customer preferences and to direct marketing offers by the company or by third parties. (Verizon 2012)
  • 6. 5 Design Tricks Facebook Uses To Affect Your Privacy Decisions #1: The Single Button Trick (old design: Facebook keeps “improving” their 2 buttons = choice) design so that more of us will add apps without realising we’re #2: The Tiny Gray Font Trick (old granting those apps (and their design: bold black font + prominent creators) access to our personal permission icon) information. #3: The Tiny Hidden Info Symbol Trick (old design: detailed & visible After all, this access to our permissions) information and identity is the currency Facebook is trading in #4: The Action Line Trick (old design: and what is driving its stock up or permissions visible above action line) down. #5: The Friendly Talk Trick (old design: clear messaging) (Charkham, A. 25.8.2012.)
  • 7. Tips for guarding your information • Limit the information you share • Set up strong passwords • Limit Unwanted Marketing Emails (Spam) • Don’t open suspicious emails -> If you receive a suspicious email, you should not reply to it, nor should you open any attachments, click on links contained in the email or provide any information in response to it. • Protect your computer from viruses, hackers and spyware by anti-virus and anti-spyware software • Get an unlisted telephone number (Verizon 2012; Consumer Action 2007)
  • 8. Five Ways to Boost Your Facebook Privacy 1. Limit Who Can Post to Your Timeline (prevent and fine-tune) 2. Block Tagged Photos From Your Timeline (posts and photos your friends tag don't appear on your timeline without your explicit approval) 3. Prevent Friends' Apps From Gathering Your Info (Many apps ask users for access to their friends' info.) 4. Disable "Instant Personalization“ (By default, Facebook provides a handful of "partner websites," including Yelp and Bing, with information about you and your friends when you visit them. 5. Change Your Default Post Privacy (Facebook uses the privacy setting of your most recent post as the default privacy setting for your next post— except for on certain mobile apps. (The Wall Street Journal 12.10.2012)
  • 9. Bibliography Slide 3: Business Dictionary 2012. Personal information. URL: http://www.businessdictionary.com/definition/personal-information.html#ixzz29bD9BI00. Quoted 18.10.2012 Slide 4: Verizon 2012. Privacy Policy Summary. URL: https://www22.verizon.com/about/privacy/. Quoted 18.10.2012 Slide 5: Verizon 2012. Privacy Policy Summary. URL: https://www22.verizon.com/about/privacy/. Quoted 18.10.2012 Slide 6: Charkham, A. 25.8.2012. 5 Design Tricks Facebook Uses To Affect Your Privacy Decisions. URL: http://techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy- decisions/. Quoted 18.10.2012 Slide 7: Verizon 2012. Privacy Policy Tips for Guarding Your Information . URL: https://www22.verizon.com/about/privacy/personalinformation/. Quoted 18.10.2012 Slide 7: Consumer Action 2007. Protect Your Phone Records. URL: http://www.consumer- action.org/english/articles/protect_your_phone_records/. Quoted 18.10.2012 Slide 8: The Wall Street Journal 2012. Five Ways to Boost Your Facebook Privacy. URL: http://blogs.wsj.com/digits/2012/10/12/five-ways-to-boost-your-facebook-privacy/?mod=e2fb. Quoted 18.10.2012