SlideShare uma empresa Scribd logo
1 de 85
What data  do they  track?
What data  do they  track? Can I anonymize my online  activity?
What data  do they  track? Doesthe web  know who  I am? Can I anonymize my online  activity?
What data  do they  track? Doesthe web  know who  I am? Can I anonymize my online  activity? What about  privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
What data  do they  track? Doesthe web  know who  I am? Can I anonymize my online  activity? What about  privacy rights?
    This is me.
    This is me.
    This is me.  Voluntary.
Photos
Photos build a life.
=
    It’s automatic. : - 0
    It’s automatic. : - 0
+
39% +
39% rejected +
49 Data Channels!
- Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
In-Voluntary? Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
In-Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
In-Voluntary? Voluntary. - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
test drive.
How does it happen? How
How does it happen? How Where does it go? Where
Traffic Analysis
Traffic Analysis Audience Profiling
Log Files
Web Beacons
Cookies
Consider this.
Consider this.
Consider this. PII
Risk / Reward [-] [+]
Risk / Reward [-] [+]
Badware
Badware
Badware Malware
Badware Malware
Badware Malware Spyware
Badware Malware Spyware
Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse							         …
Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse Web Bug Phishing Rootkit Virus Worm Probe									  …
What’s my defense?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Tell me,  what is privacy?
Privacy  Dictionary 1  The quality or state of being apart from company or        observation 2  Freedom from unauthorized intrusion   Legal Unlawful intrusion into private affairs, disclosure of private information, publication in a false light, or appropriation of a name for personal gain
Security  Dictionary 1  Freedom from danger, risk, etc.; safety 2  Something that secures or makes safe; protection; defense   Legal Internet security is a subset of actions aimed at securing information based on computers and in transit between them.
What you can do about privacy and security.
Privacy From Two Perspectives Tips For Consumers and Business Owners
Personal Privacy Ask yourself are you trying to secure your information or your activities? To Secure Activities on the internet consider Anonymity Tools The Onion Router (TOR) – Attempts to conceal your internet tracks by bouncing you around several layers of proxy routers, hence the term onion in the name. Think WikiLeaks To Secure information on your computer consider Privacy Tools Firewalls Antivirus Software (Microsoft Security Essentials-Free) Antimalware Software (SpyBot, Malware Bytes) Always check for proper SSL (https://) encryption before submitting any info to websites Change your Passwords!!!!!
Consumer Privacy Goals Maintain Secure Identity Only give out personal information on a need to know basis Check URL’s of websites to see that they match the SSL certificate before submitting personal info to sites Computer Updates to OS Plug security holes Data Backups Only as good as your last backup Backups can be infected as well if virus infections are not caught early
URL SSL Encryption Example
A Business Owner’s Perspective (i) Ever increasing customer privacy compliance requirements Data Breaches  Hackers directly targeting individual companies Sony PS network LulzSec / Anonymous  Lockheed Martin (RSA) Industrial Command And Control Virus Stuxnet (Iran)
A Business Owner’s Perspective (ii) LAN Security - Firewalls Wireless Security – Encryption (WPA2) Website Security – Encryption (SSL) PCI Compliance – External Network Probe For Security Database Security – Encryption of sensitive info on the DB Change Logs – Tracking all changes to sensitive information storage and management  Audit Yourself before “THEY” Do – Find issues and fix them, its cheaper and easier….
A Business Owner’s Perspective (iii) Email Filtering Spam Filtering Services – AppRiver, Postini Email Virus Filtering – AppRiver, AV on the email server Daily Temp file deletion on workstations Clear Cookies, History from web browsers  Daily AV Scans on all workstations Daily AV Scans on all servers before backups Cultivate a culture that allows staff to own up to virus infections when they happen. Catching virus activity early is the best defense.
A Business Owner’s Perspective (iv) Customer Data Collection All Websites and Apps must use SSL encryption when collecting user data.  Even something as simple as a email newsletter should be secured. Opt-In on all data collection practices Clearly define what you will and won’t do with client data in a Privacy Policy posted on your site Adhere to your policy or change it if you deem necessary. Do not operate outside your stated policy Define a Data Retention Policy (Usually 3 years) Secure Destruction of data after retention policy
A Business Owner’s Perspective (v) Going International Know your countries privacy laws and adjust your internal collection practices to match.  Sometimes Opt-in is not enough US-EU Safe Harbor Framework COPPA – Under 13 in the US Going international opens up easier routes to hacking corporate networks.  Think China Hacking Google
The Ins, Outs, and Nuances  of Internet Privacy June 30, 2011 Greg Hall Owner, 247 IT Outsourcing ghall@247ITOutsourcing.com

Mais conteúdo relacionado

Mais procurados

Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overviewbpeacher
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)PRISMA CSI
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINTChandrapal Badshah
 
Nmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationNmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationWangolo Joel
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Priyanka Aash
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainChristian Martorella
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
After the Data Breach: Stolen Credentials
After the Data Breach: Stolen CredentialsAfter the Data Breach: Stolen Credentials
After the Data Breach: Stolen CredentialsSBWebinars
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] Jose Manuel Ortega Candel
 
Information gathering
Information gatheringInformation gathering
Information gatheringMaulik Kotak
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseChristopher Beiring
 
Don't Fear the Content Audit
Don't Fear the Content AuditDon't Fear the Content Audit
Don't Fear the Content AuditKapost
 

Mais procurados (20)

Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Open Source Intelligence Overview
Open Source Intelligence OverviewOpen Source Intelligence Overview
Open Source Intelligence Overview
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
 
Let’s hunt the target using OSINT
Let’s hunt the target using OSINTLet’s hunt the target using OSINT
Let’s hunt the target using OSINT
 
Nmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanationNmapper theHarvester OSINT Tool explanation
Nmapper theHarvester OSINT Tool explanation
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
A fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP SpainA fresh new look into Information Gathering - OWASP Spain
A fresh new look into Information Gathering - OWASP Spain
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
After the Data Breach: Stolen Credentials
After the Data Breach: Stolen CredentialsAfter the Data Breach: Stolen Credentials
After the Data Breach: Stolen Credentials
 
OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition] OSINT tools for security auditing [FOSDEM edition]
OSINT tools for security auditing [FOSDEM edition]
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
Don't Fear the Content Audit
Don't Fear the Content AuditDon't Fear the Content Audit
Don't Fear the Content Audit
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 

Semelhante a The Ins, Outs, and Nuances of Internet Privacy

Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issuesebusinessmantra
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionChris Gates
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internetvanalery
 
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsBuilding Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsAmazon Web Services
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityDistil Networks
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Kelly Finnerty
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 

Semelhante a The Ins, Outs, and Nuances of Internet Privacy (20)

Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
17 00 distil rami
17 00 distil rami17 00 distil rami
17 00 distil rami
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internet
 
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning SolutionsBuilding Next Generation Cybersecurity with Today's Machine Learning Solutions
Building Next Generation Cybersecurity with Today's Machine Learning Solutions
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 

Mais de eBoost Consulting

Beyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ GoogleBeyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ GoogleeBoost Consulting
 
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable PersonasWho Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable PersonaseBoost Consulting
 
Scale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display AdvertisingScale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display AdvertisingeBoost Consulting
 
Building an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's ChecklistBuilding an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's ChecklisteBoost Consulting
 
Essentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online MarketingEssentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online MarketingeBoost Consulting
 

Mais de eBoost Consulting (7)

Seo toolkit (v1.1)
Seo toolkit (v1.1)Seo toolkit (v1.1)
Seo toolkit (v1.1)
 
Beyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ GoogleBeyond Search: Can't Miss Marketing Opportunities w/ Google
Beyond Search: Can't Miss Marketing Opportunities w/ Google
 
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable PersonasWho Is Your Business' MVP A DIY Guide to the Most Valuable Personas
Who Is Your Business' MVP A DIY Guide to the Most Valuable Personas
 
Scale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display AdvertisingScale Your Digital Marketing with Display Advertising
Scale Your Digital Marketing with Display Advertising
 
Building an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's ChecklistBuilding an SEO Foundation - A Corporate Marketer's Checklist
Building an SEO Foundation - A Corporate Marketer's Checklist
 
Linkbuilding Presentation
Linkbuilding PresentationLinkbuilding Presentation
Linkbuilding Presentation
 
Essentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online MarketingEssentials of Successful B2B B2G Online Marketing
Essentials of Successful B2B B2G Online Marketing
 

Último

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escortdlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 

Último (20)

SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 

The Ins, Outs, and Nuances of Internet Privacy

  • 1.
  • 2. What data do they track?
  • 3. What data do they track? Can I anonymize my online activity?
  • 4. What data do they track? Doesthe web know who I am? Can I anonymize my online activity?
  • 5. What data do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 6.
  • 7.
  • 8. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 9. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 10. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 11. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 12. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 13. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 14. Whatdata do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 15. What data do they track? Doesthe web know who I am? Can I anonymize my online activity? What about privacy rights?
  • 16. This is me.
  • 17. This is me.
  • 18. This is me. Voluntary.
  • 19.
  • 21. Photos build a life.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. =
  • 27.
  • 28. It’s automatic. : - 0
  • 29. It’s automatic. : - 0
  • 30. +
  • 31. 39% +
  • 33.
  • 34.
  • 36.
  • 37. - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 38. In-Voluntary? Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 39. In-Voluntary? - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 40. In-Voluntary? Voluntary. - Rubicon Project - AdSonar(AOL) - Advertising.com (AOL) - Tacoda.net (AOL) - Quantcast - Pulse 360 - Undertone - AdBureau (Microsoft) - Traffic Marketplace - Doubleclick (Google)
  • 41.
  • 43. How does it happen? How
  • 44. How does it happen? How Where does it go? Where
  • 53. Risk / Reward [-] [+]
  • 54. Risk / Reward [-] [+]
  • 55.
  • 56.
  • 63. Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse …
  • 64. Badware Malware Spyware Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse Web Bug Phishing Rootkit Virus Worm Probe …
  • 66.
  • 67. Tell me, what is privacy?
  • 68. Tell me, what is privacy?
  • 69. Tell me, what is privacy?
  • 70. Tell me, what is privacy?
  • 71. Tell me, what is privacy?
  • 72. Tell me, what is privacy?
  • 73. Privacy Dictionary 1 The quality or state of being apart from company or observation 2 Freedom from unauthorized intrusion Legal Unlawful intrusion into private affairs, disclosure of private information, publication in a false light, or appropriation of a name for personal gain
  • 74. Security Dictionary 1 Freedom from danger, risk, etc.; safety 2 Something that secures or makes safe; protection; defense Legal Internet security is a subset of actions aimed at securing information based on computers and in transit between them.
  • 75. What you can do about privacy and security.
  • 76. Privacy From Two Perspectives Tips For Consumers and Business Owners
  • 77. Personal Privacy Ask yourself are you trying to secure your information or your activities? To Secure Activities on the internet consider Anonymity Tools The Onion Router (TOR) – Attempts to conceal your internet tracks by bouncing you around several layers of proxy routers, hence the term onion in the name. Think WikiLeaks To Secure information on your computer consider Privacy Tools Firewalls Antivirus Software (Microsoft Security Essentials-Free) Antimalware Software (SpyBot, Malware Bytes) Always check for proper SSL (https://) encryption before submitting any info to websites Change your Passwords!!!!!
  • 78. Consumer Privacy Goals Maintain Secure Identity Only give out personal information on a need to know basis Check URL’s of websites to see that they match the SSL certificate before submitting personal info to sites Computer Updates to OS Plug security holes Data Backups Only as good as your last backup Backups can be infected as well if virus infections are not caught early
  • 80. A Business Owner’s Perspective (i) Ever increasing customer privacy compliance requirements Data Breaches Hackers directly targeting individual companies Sony PS network LulzSec / Anonymous Lockheed Martin (RSA) Industrial Command And Control Virus Stuxnet (Iran)
  • 81. A Business Owner’s Perspective (ii) LAN Security - Firewalls Wireless Security – Encryption (WPA2) Website Security – Encryption (SSL) PCI Compliance – External Network Probe For Security Database Security – Encryption of sensitive info on the DB Change Logs – Tracking all changes to sensitive information storage and management Audit Yourself before “THEY” Do – Find issues and fix them, its cheaper and easier….
  • 82. A Business Owner’s Perspective (iii) Email Filtering Spam Filtering Services – AppRiver, Postini Email Virus Filtering – AppRiver, AV on the email server Daily Temp file deletion on workstations Clear Cookies, History from web browsers Daily AV Scans on all workstations Daily AV Scans on all servers before backups Cultivate a culture that allows staff to own up to virus infections when they happen. Catching virus activity early is the best defense.
  • 83. A Business Owner’s Perspective (iv) Customer Data Collection All Websites and Apps must use SSL encryption when collecting user data. Even something as simple as a email newsletter should be secured. Opt-In on all data collection practices Clearly define what you will and won’t do with client data in a Privacy Policy posted on your site Adhere to your policy or change it if you deem necessary. Do not operate outside your stated policy Define a Data Retention Policy (Usually 3 years) Secure Destruction of data after retention policy
  • 84. A Business Owner’s Perspective (v) Going International Know your countries privacy laws and adjust your internal collection practices to match. Sometimes Opt-in is not enough US-EU Safe Harbor Framework COPPA – Under 13 in the US Going international opens up easier routes to hacking corporate networks. Think China Hacking Google
  • 85. The Ins, Outs, and Nuances of Internet Privacy June 30, 2011 Greg Hall Owner, 247 IT Outsourcing ghall@247ITOutsourcing.com

Notas do Editor

  1. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  2. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  3. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  4. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  5. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  6. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  7. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  8. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  9. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  10. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  11. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  12. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  13. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  14. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  15. Facebook is the most obvious example of a site with serious privacy considerations to address.Lives are documented onlineVoluntarily postedPhotos, locations, marital status, and moreBased on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.http://www.bespokeit.co.uk/2011/06/02/9interesting-facts-about-social-networking-and-internet-privacy/As mentioned in the webinar invitation, Facebook recently came under fire as a result of turning on the photo auto-tagging feature to most of its users be defaultPicasa can do this as can Apple’s iPhotoThe issue is that the database detecting and tagging these photos lives on FB servers (not on the users computer)Creep factor enters when you realize how deep and broad FB’s facial recognition database isSourceshttp://www.pcworld.com/article/229870/facebook_photo_tagging_a_privacy_guide.htmlhttp://nakedsecurity.sophos.com/2011/06/07/facebook-privacy-settings-facial-recognition-enabled/In this case, the distribution of this feature raised privacy concerns
  16. Based on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.
  17. Based on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.
  18. Based on a recent survey in the US, 39% of employers have rejected job candidates after viewing their Facebook profile.
  19. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  20. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  21. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  22. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  23. CareerBuilder.com – behavioral targeting focus Let's start with an example of 3rd party tracking: when we went to CareerBuilder.com, which is the largest online jobs site in the United States, and searched for a job, CareerBuilder included JavaScript code from 10 (!) different tracking domains: Rubicon Project, AdSonar, Advertising.com, Tacoda.net (all three are divisions of AOL advertising), Quantcast, Pulse 360, Undertone, AdBureau (part of Microsoft Advertising), Traffic Marketplace, and DoubleClick (which is owned by Google). On other visits we've also seen CareerBuilder include tracking scripts and non-JavaScript web bugs from several other domains. There are pretty sound reasons to hope that when you search for a job online, that fact isn't broadcast to dozens of companies you've never heard of — but that's precisely what's happening here. https://www.eff.org/deeplinks/2009/09/online-trackers-and-social-networks
  24. Search for (214) 244-3399 in phone.Spokeo - Going to go through a manual search of my own nameInformation is embedded not only on the “surface web” but also on the “deepnet”Think of this like the ocean—cast a net in the ocean and you’ll catch all in the surface, but nothing in the deep which is rich with lifeGRAPHIC: http://www.spokeo.com/privacyOther places your data lives electronicallyMedical recordsGovernment databasesEcommerce sites (Amazon, eBay)Search engines (Google, Bing, AOL)
  25. Search for (214) 244-3399 in phone.Spokeo - Going to go through a manual search of my own nameInformation is embedded not only on the “surface web” but also on the “deepnet”Think of this like the ocean—cast a net in the ocean and you’ll catch all in the surface, but nothing in the deep which is rich with lifeGRAPHIC: http://www.spokeo.com/privacyOther places your data lives electronicallyMedical recordsGovernment databasesEcommerce sites (Amazon, eBay)Search engines (Google, Bing, AOL)
  26. http://www.ted.com/talks/aaron_koblin.html
  27. traffic analysisHow does traffic analysis work? Every user is given a unique ID (e.g. within Google, AOL, Bing, etc.)Every device that accesses the internet has a unique IPInternet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.https://www.torproject.org/about/overview.html.enhow else do sites get my data?data logging - records computer usage (time, sites visited, etc)it’s as basic as searches…search engines--every search is tracked
  28. how else do sites get my data?data logging - records computer usage (time, sites visited, etc)it’s as basic as searches…search engines--every search is tracked
  29. log filesWeb beaconscookies - data stored on a user's computer that assists in automated access to websites or web features or other information; can also be used for user-tracking by storing special usage history data in a cookietraditional cookie is a HTTP cookie, invented by Lou Montulli and John Giannandrea at Netscape in 1994Cookies are small text files that web servers typically send to computers when a user visits a website. Cookies are stored as text files on the hard drive, and can be accessed by web servers when the user returns to that website or goes to another website. Cookies are used by companies to collect and send information about a user's website visit – for example, number of visits, average time spent, pages viewed, navigation history through the website, and other statistics. This information helps companies improve the user's online experience in many ways: allowing companies to monitor website performance, making the website easier to use, measuring the effectiveness of promotional placement, and tailoring the website to better match a user's interests and preferences. Cookies cannot be used to access any other data on a computer's hard drive, or to personally identify a user. Users who prefer not to accept cookies can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive.http://selectout.org/results/optout/users are generally not explicitly alerted when a cookie is droppedflash cookies - local shared objects; work the same way as normal cookies except are used by Adobe Flash Player; same risks as normal cookies but are not as easily blocksThese cookie files are stored outside of the browser's control. Web browsers do not directly allow users to view or delete the cookies stored by a Flash application, users are not notified when such cookies are set, and these cookies never expire. Flash cookies can track users in all the ways traditionally HTTP cookies do, and they can be stored or retrieved whenever a user accesses a page containing a Flash applicationhttps://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideWhat's more, the Berkeley researchers found that Flash cookies are often used to deliberately circumvent users' HTTP cookie policies. That is, a site may intentionally store the same information redundantly in both HTTP cookie and Flash cookie forms. When a user deletes the HTTP cookie, the site may "respawn" it from the copy that was stored as a Flash cookie! It seems clear that site operators know many users don't want to be tracked with cookies, but have found a way of circumventing those users' privacy preferences.https://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideevercookie - JS based application which produces cookies in a web browser that actively "resist" deletion by redundantly compying themselves in different forms on the user's machine (e.g. Flash Local Shared Objects, window.name caching)
  30. log filesWeb beaconscookies - data stored on a user's computer that assists in automated access to websites or web features or other information; can also be used for user-tracking by storing special usage history data in a cookietraditional cookie is a HTTP cookie, invented by Lou Montulli and John Giannandrea at Netscape in 1994Cookies are small text files that web servers typically send to computers when a user visits a website. Cookies are stored as text files on the hard drive, and can be accessed by web servers when the user returns to that website or goes to another website. Cookies are used by companies to collect and send information about a user's website visit – for example, number of visits, average time spent, pages viewed, navigation history through the website, and other statistics. This information helps companies improve the user's online experience in many ways: allowing companies to monitor website performance, making the website easier to use, measuring the effectiveness of promotional placement, and tailoring the website to better match a user's interests and preferences. Cookies cannot be used to access any other data on a computer's hard drive, or to personally identify a user. Users who prefer not to accept cookies can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive.http://selectout.org/results/optout/users are generally not explicitly alerted when a cookie is droppedflash cookies - local shared objects; work the same way as normal cookies except are used by Adobe Flash Player; same risks as normal cookies but are not as easily blocksThese cookie files are stored outside of the browser's control. Web browsers do not directly allow users to view or delete the cookies stored by a Flash application, users are not notified when such cookies are set, and these cookies never expire. Flash cookies can track users in all the ways traditionally HTTP cookies do, and they can be stored or retrieved whenever a user accesses a page containing a Flash applicationhttps://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideWhat's more, the Berkeley researchers found that Flash cookies are often used to deliberately circumvent users' HTTP cookie policies. That is, a site may intentionally store the same information redundantly in both HTTP cookie and Flash cookie forms. When a user deletes the HTTP cookie, the site may "respawn" it from the copy that was stored as a Flash cookie! It seems clear that site operators know many users don't want to be tracked with cookies, but have found a way of circumventing those users' privacy preferences.https://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideevercookie - JS based application which produces cookies in a web browser that actively "resist" deletion by redundantly compying themselves in different forms on the user's machine (e.g. Flash Local Shared Objects, window.name caching)
  31. log filesWeb beaconscookies - data stored on a user's computer that assists in automated access to websites or web features or other information; can also be used for user-tracking by storing special usage history data in a cookietraditional cookie is a HTTP cookie, invented by Lou Montulli and John Giannandrea at Netscape in 1994Cookies are small text files that web servers typically send to computers when a user visits a website. Cookies are stored as text files on the hard drive, and can be accessed by web servers when the user returns to that website or goes to another website. Cookies are used by companies to collect and send information about a user's website visit – for example, number of visits, average time spent, pages viewed, navigation history through the website, and other statistics. This information helps companies improve the user's online experience in many ways: allowing companies to monitor website performance, making the website easier to use, measuring the effectiveness of promotional placement, and tailoring the website to better match a user's interests and preferences. Cookies cannot be used to access any other data on a computer's hard drive, or to personally identify a user. Users who prefer not to accept cookies can set their Internet browser to notify them when they receive a cookie or to prevent cookies from being placed on their hard drive.http://selectout.org/results/optout/users are generally not explicitly alerted when a cookie is droppedflash cookies - local shared objects; work the same way as normal cookies except are used by Adobe Flash Player; same risks as normal cookies but are not as easily blocksThese cookie files are stored outside of the browser's control. Web browsers do not directly allow users to view or delete the cookies stored by a Flash application, users are not notified when such cookies are set, and these cookies never expire. Flash cookies can track users in all the ways traditionally HTTP cookies do, and they can be stored or retrieved whenever a user accesses a page containing a Flash applicationhttps://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideWhat's more, the Berkeley researchers found that Flash cookies are often used to deliberately circumvent users' HTTP cookie policies. That is, a site may intentionally store the same information redundantly in both HTTP cookie and Flash cookie forms. When a user deletes the HTTP cookie, the site may "respawn" it from the copy that was stored as a Flash cookie! It seems clear that site operators know many users don't want to be tracked with cookies, but have found a way of circumventing those users' privacy preferences.https://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wideevercookie - JS based application which produces cookies in a web browser that actively "resist" deletion by redundantly compying themselves in different forms on the user's machine (e.g. Flash Local Shared Objects, window.name caching)
  32. Talk about how
  33. Talk about how
  34. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  35. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  36. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  37. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  38. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  39. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  40. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  41. outside of legal, common practice data collection, there are security risksbadwaremalwarespywareweb bugphishingPhishing emailsare an attempt by thieves to lure you into divulging personal and financial information, for their profit. They pretend to be from well-known legitimate businesses, and increasingly look as if they actually are. They use clever techniques to induce a sense of urgency on your part so that you don't stop to think about whether they are legitimate or not. You can learn to know what to look for and where to report these scams when you find them
  42. how else do sites get my data?data logging - records computer usage (time, sites visited, etc)it’s as basic as searches…search engines--every search is tracked
  43. What exactly is the scope of the issue we’re looking at here?Privacy, security, compliancePrivacy determines what is and is not tracked and collected. Security addresses how this tracking and data storage are done. Compliance addresses standards set (especially in the courts) that set minimum privacy and security measures in place.
  44. What exactly is the scope of the issue we’re looking at here?Privacy, security, compliancePrivacy determines what is and is not tracked and collected. Security addresses how this tracking and data storage are done. Compliance addresses standards set (especially in the courts) that set minimum privacy and security measures in place.