18

Privacy Game1

Embed Size (px)

DESCRIPTION

Design for Innovation

Citation preview

Page 1: Privacy Game1
Page 2: Privacy Game1
Page 3: Privacy Game1

“If you want to liberate a society, Just give them the internet.”

- Wael Ghonim

What is the real price of ‘free’ internet?

Page 4: Privacy Game1

*On January 24th, Google announced changes ro their privacy policy, it was a combination of 70 policies into one universal to all its properties and products. In the new policy, they came clean about how they will collect and use information about users with Google accounts; this included Gmail, Youtube, Blogspot and many others. The web is becoming more and more intrusive and controlled with ow we live in real life.

The internet has brought many unimaginable means of communication, commerce and exchanging of information, along with it have come complicaions and questions of how to use and protect the mass amounts of sensitive and personal information.

Page 5: Privacy Game1

With the huge popularity of social media, many people share even the smallest

details of their lives online for the sake convenience.

But how much of that information is uncovered when they use the internet?

Page 6: Privacy Game1

IDENTITY THEFT -

1 in every 10 Consumer has already been victimized by Identity Theft.

sarah CHRISTISON

sam pamelan sam smith

eddy mane freddy mancra

sarah CHRISTISON chrstina sartica

Identity theft is a form of stealing someone’s identity in which

someone pretends to be someone else by assuming that person’s

identity, usually as a method to gain access to resources or obtain

credit and other benefits in that person’s name.

The victim of identity theft can suffer adverse consequences if they are

held responsible, Identity theft occurs when someone uses another’s

personally information.

Examples includes: Their name

phone numbercredit card number.

Page 7: Privacy Game1

MORE THEN 35 MILLIONData records were compromised in corporate and government data breaches in 2008

IDENTITY THEFT

DATA RECORDS DATA RECORDS DATA RECORDS DATA RECORDSDATA RECORDS

DATA RECORDSDATA RECORDS

DATA RECORDS

DATA RECORDSDATA RECORDS

PHISHINGPhishing is when people unintentionally volunteer to give their personal infor“mation under false pretenses that have been set up by hackers.

This is one of the most common forms of hacking and has cost consumers up to $1.2 billion in the US.

Page 8: Privacy Game1

Until 2010, Facebook compiled user information, including through “Like“ button cookies on other websites.

More than 900,000 sites employ these buttons as marketing aids.

These buttons did not require the user to click on them to be able to read and store information. As said by Rob Shavell, the Co“founder of an online security company called Abine; these buttons functioned

‘Like a dark video camera; you see them, they see you“.’

YOU SEE ME, THEY SEE YOU

Page 9: Privacy Game1
Page 10: Privacy Game1

The Federal Trade Commision ruled that Facebook had

“ Unfair & Deceptive "practices regarding PRIVACY/USER data.

They changed privacy defaults and made it all PUBLIC without notifying

the users.

FACEBOOK ALSO SHARED

Personal Data With Advertisers

User Data With Outside Application Developers

As a result they will be submitting

“ PRIVACY AUDITS”

for the next 20 years.

NOVEMBER 2011

Page 11: Privacy Game1

DONT DIGITIZE

YOURLIFE

You don’t know who could be looking at your things right this moment.

Page 12: Privacy Game1

COOKIES

Exchange information between the USER’S COMPUTER and a WEBSITE, storing your information and also browsing history.

..NOT SO TASTYAlmost 50% of the web’s most frequently visited

sites use cookies.

THIRD PARTY COOKIESCookies that are placed by ad“vertisers and marketers to track browsing information through other website.

PERSISTENT COOKIES:

The information gathered is stored well beyond the brows“ing session;

for Weeks, Months & Years.

Page 13: Privacy Game1

PROTECTYOURSELF

Page 14: Privacy Game1

PROTECT YOURSELF

#1. SET A PASSWORD !

If you have a smartphone be sure to set a password, especially if you are using banking apps or accessing other personally identifiable information.

Also, chck to see what security apps are available for your phone, you may be missing out on a variety of ways to protect all the important information on your phone.

#2. BE CAUTIOUS ABOUT WHAT APPS YOU AUTHORIZE

On your mobile phone and on social media sites, some apps ask you authorize their full access to all

your data, even down to your current location.

If an app doesn’t need to know as much as they’re asking to know, don’t give it permission.

Read their privacy policy!

#3. CHANGE YOUR PASSWORDS FREQUENTLY

Creat complex passwords that would be difficult to guess, mis it up with num“bers and symbols, not just words! Don’t use the same password across multiple site, having variation will help you stay protected.

*****

Page 15: Privacy Game1

PROTECT YOURSELF

#4. IMPLEMENT SECURITY MEASURES AVAILABLEMost major banks will allow you to set up notifica“tions that will alert you of any unusual activity on

your accout: you also set up limits on your debit card and require additional authorization when yo log into

your bank account from and unrecognized location.

#5. TURN ON COOKIE NOTICES

This will alert you when (and who) is placing cookies while you browse and give you the option of blocking them.“

#6. READ PRIVACY POLICIES

This does mean alot of reading, you can specifi“cally look for sections that refer to "data collection" and "third parties".

Self regulation doesn’t work wwithout staying informed, so do what you can to be aware of what you are volunteering and how that information will be used.

Page 16: Privacy Game1

- REMEMBER -ANYTHING YOU PUT ONLINE

WILL REMAIN A DIGITAL FOOTPRINT

Everything that you put out about yourself on social media sites like Twitter, Facebook, and Google Plus

becomes a digital footprint. Not only that, but what others post about you on socialmedia will follow you as well.

So be mindful of what you and others are sharing, and dow aht you can do to protect your privacy and the privacy

of others.

What you think is "deleted" is actually only hidden from your own eyes making you think it is deleted.

PROTECT YOURSELF

Page 17: Privacy Game1

The internet is a deep, dark place with no boundaries to explore, all the freedom that comes with a price.

While the online market, the government, and the wider public are slowly beginning to understand one another in terms of what happens with per“

sonal information online, it is far from being settled issue.

With companies like Google setting the parameters of how information is mined and used, the most important thing for users like you to do is to stay informed, and exercise your right to make intelligent decisions about

what information you want to share online.

So don’t skip over the privacy policies: more and more, they are becoming a tangable force in shaping the way the internet works and the way you

represented on it.

* * *

Page 18: Privacy Game1