personal privacy rights & abuses of the internet andrew whalin, robby deaver, manvinder chohan,...

15
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor

Upload: branden-watson

Post on 30-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Personal Privacy Rights & Abuses of

the Internet

Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor

Privacy Rights

• Includes: – Internet Hoaxes– SPAM– Identity theft– computer viruses – etc.

• All include elements which deal with perils and problems – associated with the Internet

• Many experienced hoaxes continue to resurface the net– taking advantage of new users.

• Usually take the general form of proportion – to be a warning about – some dangerous email message, – piece of software, etc.

SPAM

• Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.

- E-mail spam- Instant messaging spam- Web search engine spam- Spam in blogs- Mobile phone messaging spam

Viruses

• A computer virus is a program that is hidden within the code of another program.– Viruses can be destructive or benign. – The virus is set up to replicate itself

and spread to other programs on a person’s computer.

Spoofing

• E-mail sent from someone pretending to be someone else is known as spoofing. – Spoofing is a technique commonly used for

spam e-mail and phishing to hide the origin of an e-mail message.

– It is often associated with website spoofing which mimics an actual, well-known website but are run by another party either with fraudulent intentions or as a means of criticism of the organization's activities.

Identity Theft

• Is a term used to refer to a fraud that involves stealing money or getting other benefits by pretending to be someone else. – The term is relatively new and actually

is a misnomer.– Since it’s not inherently possible to

steal an identity, only to use it.

– The stolen identity victim is held responsible for the perpetrator’s actions.

– In many countries, it is a crime to use another person’s identity for personal gain.

– It is estimated 40 million credit card numbers have been compromised by well coordinated attacks.

– Some of the methods include wireless surveillance technology

– And computer break-ins owned by retailers.

• Two key privacy principles are implicated by the incidents: – Securing of personal information held

by third parties– And not discarding information once

payment is received and the benefit or service is provided.

• Now you have the basic understanding of the risks and dangers on the internet today.

• The internet does, however, create new possibilities for organizations and individuals to escape the strictures of geographically-based legal jurisdictions.

The End