Top Banner
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor
15

Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Dec 30, 2015

Download

Documents

Branden Watson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Personal Privacy Rights & Abuses of

the Internet

Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor

Page 2: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Privacy Rights

• Includes: – Internet Hoaxes– SPAM– Identity theft– computer viruses – etc.

Page 3: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

• All include elements which deal with perils and problems – associated with the Internet

Page 4: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

• Many experienced hoaxes continue to resurface the net– taking advantage of new users.

• Usually take the general form of proportion – to be a warning about – some dangerous email message, – piece of software, etc.

Page 5: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

SPAM

• Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.

- E-mail spam- Instant messaging spam- Web search engine spam- Spam in blogs- Mobile phone messaging spam

Page 6: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Page 7: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Viruses

• A computer virus is a program that is hidden within the code of another program.– Viruses can be destructive or benign. – The virus is set up to replicate itself

and spread to other programs on a person’s computer.

Page 8: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Spoofing

• E-mail sent from someone pretending to be someone else is known as spoofing. – Spoofing is a technique commonly used for

spam e-mail and phishing to hide the origin of an e-mail message.

– It is often associated with website spoofing which mimics an actual, well-known website but are run by another party either with fraudulent intentions or as a means of criticism of the organization's activities.

Page 9: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

Identity Theft

• Is a term used to refer to a fraud that involves stealing money or getting other benefits by pretending to be someone else. – The term is relatively new and actually

is a misnomer.– Since it’s not inherently possible to

steal an identity, only to use it.

Page 10: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

– The stolen identity victim is held responsible for the perpetrator’s actions.

– In many countries, it is a crime to use another person’s identity for personal gain.

Page 11: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

– It is estimated 40 million credit card numbers have been compromised by well coordinated attacks.

– Some of the methods include wireless surveillance technology

– And computer break-ins owned by retailers.

Page 12: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Page 13: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

• Two key privacy principles are implicated by the incidents: – Securing of personal information held

by third parties– And not discarding information once

payment is received and the benefit or service is provided.

Page 14: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

• Now you have the basic understanding of the risks and dangers on the internet today.

• The internet does, however, create new possibilities for organizations and individuals to escape the strictures of geographically-based legal jurisdictions.

Page 15: Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.

The End