The Ins, Outs, and Nuances of Internet Privacy

85

description

Facebook recently came under fire for the discreet international roll-out of its photo facial recognition feature. This feature automatically identifies and suggests tags for individuals appearing in photos posted on Facebook. At first glance, this seemingly innocuous feature appears to quietly augment online social lives. At second glance, the rollout of this feature as a defaulted-to-on setting with no explicit user consent raises many privacy concerns. As a site with extensive power driven by the quantity, quality, and kind of data it collects, Facebook’s decision to step into the world of visual recognition of its users without formal user consent is a big no-no—or is it?Join us for this month’s eBoost Consulting Brown Bag Lunch Webinar to explore this and other cases that raise internet privacy concerns. Learn the ins, outs, and nuances of internet privacy to determine where to draw the line on data collection and usage.

Transcript of The Ins, Outs, and Nuances of Internet Privacy

Page 1: The Ins, Outs, and Nuances of Internet Privacy
Page 2: The Ins, Outs, and Nuances of Internet Privacy

What data do they track?

Page 3: The Ins, Outs, and Nuances of Internet Privacy

What data do they track?

Can I anonymize my online activity?

Page 4: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

Page 5: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity? What about

privacy rights?

Page 6: The Ins, Outs, and Nuances of Internet Privacy
Page 7: The Ins, Outs, and Nuances of Internet Privacy
Page 8: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 9: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 10: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 11: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 12: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 13: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 14: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity?

What about privacy rights?

Page 15: The Ins, Outs, and Nuances of Internet Privacy

Does the web know who I am?

What data do they track?

Can I anonymize my online activity? What about

privacy rights?

Page 16: The Ins, Outs, and Nuances of Internet Privacy

This is me.

Page 17: The Ins, Outs, and Nuances of Internet Privacy

This is me.

Page 18: The Ins, Outs, and Nuances of Internet Privacy

This is me.

Voluntary.

Page 19: The Ins, Outs, and Nuances of Internet Privacy
Page 20: The Ins, Outs, and Nuances of Internet Privacy

Photos

Page 21: The Ins, Outs, and Nuances of Internet Privacy

build a life.

Photos

Page 22: The Ins, Outs, and Nuances of Internet Privacy
Page 23: The Ins, Outs, and Nuances of Internet Privacy
Page 24: The Ins, Outs, and Nuances of Internet Privacy
Page 25: The Ins, Outs, and Nuances of Internet Privacy
Page 26: The Ins, Outs, and Nuances of Internet Privacy

=

Page 27: The Ins, Outs, and Nuances of Internet Privacy
Page 28: The Ins, Outs, and Nuances of Internet Privacy

It’s automatic.: - 0

Page 29: The Ins, Outs, and Nuances of Internet Privacy

It’s automatic.: - 0

Page 30: The Ins, Outs, and Nuances of Internet Privacy

+

Page 31: The Ins, Outs, and Nuances of Internet Privacy

+

39%

Page 32: The Ins, Outs, and Nuances of Internet Privacy

+

39%rejected

Page 33: The Ins, Outs, and Nuances of Internet Privacy
Page 34: The Ins, Outs, and Nuances of Internet Privacy
Page 35: The Ins, Outs, and Nuances of Internet Privacy

49 Data Channels!

Page 36: The Ins, Outs, and Nuances of Internet Privacy
Page 37: The Ins, Outs, and Nuances of Internet Privacy

- Rubicon Project- AdSonar (AOL)- Advertising.com (AOL)- Tacoda.net (AOL)- Quantcast- Pulse 360- Undertone- AdBureau (Microsoft)- Traffic Marketplace- Doubleclick (Google)

Page 38: The Ins, Outs, and Nuances of Internet Privacy

- Rubicon Project- AdSonar (AOL)- Advertising.com (AOL)- Tacoda.net (AOL)- Quantcast- Pulse 360- Undertone- AdBureau (Microsoft)- Traffic Marketplace- Doubleclick (Google)

In-Voluntary?Voluntary?

Page 39: The Ins, Outs, and Nuances of Internet Privacy

- Rubicon Project- AdSonar (AOL)- Advertising.com (AOL)- Tacoda.net (AOL)- Quantcast- Pulse 360- Undertone- AdBureau (Microsoft)- Traffic Marketplace- Doubleclick (Google)

In-Voluntary?

Page 40: The Ins, Outs, and Nuances of Internet Privacy

- Rubicon Project- AdSonar (AOL)- Advertising.com (AOL)- Tacoda.net (AOL)- Quantcast- Pulse 360- Undertone- AdBureau (Microsoft)- Traffic Marketplace- Doubleclick (Google)

In-Voluntary?Voluntary.

Page 41: The Ins, Outs, and Nuances of Internet Privacy
Page 42: The Ins, Outs, and Nuances of Internet Privacy

test drive.

Page 43: The Ins, Outs, and Nuances of Internet Privacy

How does it happen?

How

Page 44: The Ins, Outs, and Nuances of Internet Privacy

How does it happen?

Where does it go?

How

Where

Page 45: The Ins, Outs, and Nuances of Internet Privacy

Traffic Analysis

Page 46: The Ins, Outs, and Nuances of Internet Privacy

Traffic Analysis

Audience Profiling

Page 47: The Ins, Outs, and Nuances of Internet Privacy

Log Files

Page 48: The Ins, Outs, and Nuances of Internet Privacy

Web Beacons

Page 49: The Ins, Outs, and Nuances of Internet Privacy

Cookies

Page 50: The Ins, Outs, and Nuances of Internet Privacy

Consider this.

Page 51: The Ins, Outs, and Nuances of Internet Privacy

Consider this.

Page 52: The Ins, Outs, and Nuances of Internet Privacy

Consider this.

PII

Page 53: The Ins, Outs, and Nuances of Internet Privacy

Risk / Reward

[+]

[-]

Page 54: The Ins, Outs, and Nuances of Internet Privacy

[+]

[-]

Risk / Reward

Page 55: The Ins, Outs, and Nuances of Internet Privacy
Page 56: The Ins, Outs, and Nuances of Internet Privacy
Page 57: The Ins, Outs, and Nuances of Internet Privacy

Badware

Page 58: The Ins, Outs, and Nuances of Internet Privacy

Badware

Page 59: The Ins, Outs, and Nuances of Internet Privacy

BadwareMalware

Page 60: The Ins, Outs, and Nuances of Internet Privacy

BadwareMalware

Page 61: The Ins, Outs, and Nuances of Internet Privacy

BadwareMalware

Spyware

Page 62: The Ins, Outs, and Nuances of Internet Privacy

BadwareMalwareSpyware

Page 63: The Ins, Outs, and Nuances of Internet Privacy

BadwareMalwareSpywareWeb Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse

Page 64: The Ins, Outs, and Nuances of Internet Privacy

Badware

MalwareSpyware

Web Bug Phishing Rootkit Virus Worm Probe Keylogger Trojan Horse Web Bug Phishing Rootkit Virus Worm Probe

Page 65: The Ins, Outs, and Nuances of Internet Privacy

What’s my defense?

Page 66: The Ins, Outs, and Nuances of Internet Privacy
Page 67: The Ins, Outs, and Nuances of Internet Privacy

Tell me,

what is privacy?

Page 68: The Ins, Outs, and Nuances of Internet Privacy

Tell me,

what is privacy?

Page 69: The Ins, Outs, and Nuances of Internet Privacy

Tell me,

what is privacy?

Page 70: The Ins, Outs, and Nuances of Internet Privacy

Tell me,

what is privacy?

Page 71: The Ins, Outs, and Nuances of Internet Privacy

Tell me,

what is privacy?

Page 72: The Ins, Outs, and Nuances of Internet Privacy

Tell me,

what is privacy?

Page 73: The Ins, Outs, and Nuances of Internet Privacy

Privacy

1 The quality or state of being apart from company or observation2 Freedom from unauthorized intrusion

Unlawful intrusion into private affairs, disclosure of private information, publication in a false light, or appropriation of a name for personal gain

Dictionary

Legal

Page 74: The Ins, Outs, and Nuances of Internet Privacy

Security

1 Freedom from danger, risk, etc.; safety2 Something that secures or makes safe; protection; defense

Internet security is a subset of actions aimed at securing information based on computers and in transit between them.

Dictionary

Legal

Page 75: The Ins, Outs, and Nuances of Internet Privacy

What you can doabout privacy and security.

Page 76: The Ins, Outs, and Nuances of Internet Privacy

Privacy From Two Perspectives

Tips For Consumers and Business Owners

Page 77: The Ins, Outs, and Nuances of Internet Privacy

Ask yourself are you trying to secure your information or your activities?

To Secure Activities on the internet consider Anonymity Tools The Onion Router (TOR) – Attempts to conceal your internet tracks by

bouncing you around several layers of proxy routers, hence the term onion in the name. Think WikiLeaks

To Secure information on your computer consider Privacy Tools

Firewalls Antivirus Software (Microsoft Security Essentials-Free) Antimalware Software (SpyBot, Malware Bytes) Always check for proper SSL (https://) encryption before submitting

any info to websites Change your Passwords!!!!!

Personal Privacy

Page 78: The Ins, Outs, and Nuances of Internet Privacy

Consumer Privacy Goals Maintain Secure Identity

Only give out personal information on a need to know basis

Check URL’s of websites to see that they match the SSL certificate before submitting personal info to sites

Computer Updates to OS Plug security holes

Data Backups Only as good as your last backup Backups can be infected as well if virus infections are not

caught early

Page 79: The Ins, Outs, and Nuances of Internet Privacy

URL SSL Encryption Example

Page 80: The Ins, Outs, and Nuances of Internet Privacy

Ever increasing customer privacy compliance requirements Data Breaches Hackers directly targeting individual companies

Sony PS network LulzSec / Anonymous Lockheed Martin (RSA)

Industrial Command And Control Virus Stuxnet (Iran)

A Business Owner’s Perspective (i)

Page 81: The Ins, Outs, and Nuances of Internet Privacy

LAN Security - Firewalls Wireless Security – Encryption (WPA2) Website Security – Encryption (SSL) PCI Compliance – External Network Probe For Security Database Security – Encryption of sensitive info on the DB Change Logs – Tracking all changes to sensitive information

storage and management Audit Yourself before “THEY” Do – Find issues and fix them,

its cheaper and easier….

A Business Owner’s Perspective (ii)

Page 82: The Ins, Outs, and Nuances of Internet Privacy

Email Filtering Spam Filtering Services – AppRiver, Postini Email Virus Filtering – AppRiver, AV on the email server

Daily Temp file deletion on workstations Clear Cookies, History from web browsers Daily AV Scans on all workstations Daily AV Scans on all servers before backups Cultivate a culture that allows staff to own up to virus

infections when they happen. Catching virus activity early is the best defense.

A Business Owner’s Perspective (iii)

Page 83: The Ins, Outs, and Nuances of Internet Privacy

All Websites and Apps must use SSL encryption when collecting user data.

Even something as simple as a email newsletter should be secured.

Opt-In on all data collection practices Clearly define what you will and won’t do with

client data in a Privacy Policy posted on your site Adhere to your policy or change it if you deem

necessary. Do not operate outside your stated policy

Define a Data Retention Policy (Usually 3 years) Secure Destruction of data after retention policy

A Business Owner’s Perspective (iv)Customer Data Collection

Page 84: The Ins, Outs, and Nuances of Internet Privacy

Know your countries privacy laws and adjust your internal collection practices to match.

Sometimes Opt-in is not enough US-EU Safe Harbor Framework COPPA – Under 13 in the US Going international opens up easier routes to

hacking corporate networks. Think China Hacking Google

A Business Owner’s Perspective (v)Going International

Page 85: The Ins, Outs, and Nuances of Internet Privacy

The Ins, Outs, and Nuances of Internet Privacy June 30, 2011

Greg HallOwner, 247 IT Outsourcing

[email protected]