Wednesday, April 10, 2013

Is There Change in the Future?

As a citizen of the United States, I myself, along with many others seem to have the assumption that all of our problems will be solved if the government would just pass certain laws.  Unfortunately, that is not the case because it takes time and a lot of research to ensure that the law is ethical, and does not affect any other previously passed laws.  The basis of most privacy laws in United States is Fair Information Practices (FIP).  Such practices helped make changes in privacy legislation for things like HIPPA, which was described in a previous blog.  FIP is a group of standards that govern the collection and use of individual's information.

President Obama states that “American consumers can’t wait any longer for clear rules of the road that ensure their personal information is safe online,” he goes on to say, “As the Internet evolves, consumer trust is essential for the continued growth of the digital economy. That’s why an online privacy Bill of Rights is so important.  For businesses to succeed online, consumers must feel secure. By following this blueprint, companies, consumer advocates and policymakers can help protect consumers and ensure the Internet remains a platform for innovation and economic growth.”


Consumer Privacy Bill of Rights is a promising outlook into the future of consumers having control over their privacy. Including being in control over what information organizations are allowed to gather and what they may do with it. These Privacy Bill of Rights are meant to allow for better security, consumer understanding of privacy practices by organizations, control over what is collected, and accountability towards organizations for appropriately handling consumers personal data. The Consumer Privacy Bill of Rights is only one of four parts to the extensive blueprint revealed by Obama Administration in 2012, which is to help keep the Internet as a prosperous tool to future breakthroughs and continue a positive economical stand point.


Hopefully, these Consumer Privacy Bill of Rights will take effect soon and have a positive impact on the way organizations collect and use consumers personal data online. I personally would like the option to completely choose what organizations see, collect, and use of my own information. How about you?





Sources

Management Information Systems by Laudon & Laudon.  Twelfth Edition. Prentice Hall, 2012. ISBN: 0-13-214287-2. Chap 4
http://www.whitehouse.gov/the-press-office/2012/02/23/we-can-t-wait-obama-administration-unveils-blueprint-privacy-bill-rights


Social Media Sites Compromise our Privacy

     Social media sites as in Facebook, twiter, e.g. can hurt its users in more ways than one. Social media sites supposedly has privacy settings that assure their consumers that their information is private.  However, information is revealed every day. Social media sites can:

1. Reveal our personal information
2. Allow stalkers to find us
3. Allow future employers to view our profile
4. Allow future colleges to view our profile



    Revealing our information 

     Growing up, we were all told to never put anything on the Internet that we would not want everyone to see. However, in today's world teenagers and young adults are less concerned with what they are uploading to the Internet because they believe that their privacy settings only allow their friends to view their posts. This is unfortunately not the case. It is actually very easy for information to be revealed or leaked, even with information being set to private. Say a friend has your Facebook page up, all they have to do is right click, copy the picture and do what they will with it. With Facebook's recent upgrade of the "timeline" layout, user's information has been made available to view from years in the past. Within the article titled, Too Much Information , it states that due to the lack of physical interaction a false sense of security is given.

Stalkers 

     By simply "checking in" to where you are currently at on your social media website this gives stalkers your general where about day to day. For example, using the location setting available of Facebook makes it easier for others to pinpoint your wear about. This has been made easier by the use of smart phones. Through this use of technology it often times gets people in trouble without them having bad intentions. Even though social media sites have age restrictions there is not a fool proof way of ensuring they are who they say they are. A person can decide to act like they are younger or older than they really are and actually cause harm to another through law enforcement. Within the article, Social Media: The Digital You & The Social Stalker , it states that your digital self is essentially your online fingerprints. What a lot of people, including me, do not often think of is a stalker does not have to be someone you do not know. Often times, it is someone that in fact you do know. An example that I read about from the above mentioned article is of an ex boyfriend or girlfriend that continues to check up on you. The lesson to learn here is make sure your "friends" on Facebook are actually your friends. Personally, I know when I was in high school I wanted to have as many Facebook friends as possible. This meant that as long as I had heard of their name or was familiar with them I would accept their friend  request. That is what not to do!




Employers

It is suggested that before entering the workforce after college that you clean up your social media websites. Even with private settings employers often times can check your profile online. The article title, Can Having a Social Networking Site Affect Your Job Search? , says that companies try to find a friend of the applicant to view their personal page that way. In this day and age, finding a job is hard enough. Don't do something to lessen the chance of you getting a job interview or the position. 

 College 

     Admissions offices often search social media sites for their current applicants to see what their personality is like. Studies show that by doing this up to 38% of the rejections given can contribute to what was found on their website. 



Sources

Tuesday, April 9, 2013

Privacy Protection Outside the US

Laws and regulation on privacy varies amongst countries. Privacy protection is difficult to regulate for such reason. For example, if someone outside of the United States were to break a U.S. privacy law over the Internet, it is challenging for the United States to enforce punishment on that person due to the fact they are not held accountable to US laws in another country.


Countries that are working to protect their citizens rights on the Internet:

  • Germany
    • The German Constitutional Court ruled that government surveillance of personal computers was a violation of its citizens privacy rights in 2008
  • Canada
    • In 2004 passed a Personal information Protection and Electronic Document Act. This act regulates how private-sector organizations collect, use, and disclose personal information by using stricter privacy policies.
  • Europe
    • EU member nations are not  allowed totransfer personal data to countries with no similar privacy protection
To address the European Union's (EU) concern with the United State's lack of defense against Internet privacy; the U.S. Department of Congress (DOC) put into effect the consultation with European Commission the Safe Harbor Privacy Principals.  The U.S. also has a Safe Harbor framework with Switzerland.  The Safe Harbor frameworks help bridge the difference in views on privacy between countries, and allow U.S. Organizations to  conform with other's privacy laws (Safe Harbor Privacy Framework 1).  A public announcement to the DOC in writing, along with a statement published to their private policy is required of any organization participating in the Safe Harbor agreement. A few requirements of the organizations partaking in the agreement include:
  • Must inform Internet users of how, and when data will be collected on the Web and if it will be disclosed to third parties
  • Notify users of options for reducing the use and disclosure of such information.
  • Put in place precautions to shield the data out of harm's way.

Countries that have less privacy often have more restrictions:
  • China
    • Political websites are frequently censored
      • In April 2012, 16 blogs were shutdown and  6 people were arrested
  • Russia
    • Very strict on privacy-the court system attempted to ban YouTube in 2012 because of an ultra-nationalist video posted on their website

Wednesday, April 3, 2013

Hacking





What is a hacker?


A hacker is someone who accesses a computer system by circumventing its security system. (Hacker 1.)  Online users being hacked is a growing issue related to Internet privacy. Did you know that your entire computer can be hacked, including your hard drive or just websites, such as Facebook and Twitter?

What do hackers take?

 Hackers take our bank account information which allows them to use our money. Hackers take our username and passwords which allow them to see our phone number, personal address and photos. Hackers tap into hospitals information systems and take our personal health records. All of this information can be used to harm us or black mail us, and once they have it there is no way to get it back.

Social Media websites
  • Facebook is easiest hacked when a consumer visits a website that has been compromised.
  • Over 250,000 people have had their Twitter account hacked already this year.
  • Both social media websites suggest you contact them immediately if this happens to you so they may start to resolve the problem.
  • Both social media websites state that your password can be reset by the administrator once you have been hacked.





Tips to avoid being hacked
  1. Ensure that you have a firewall and it is working correctly
  2. Back up all of your important files
  3. Erase your "cookies" folder on a regular basis. This can be found in your settings as discussed on a prior blog
  4. Install and run an antivirus program. The key in doing this is to make sure the program you install has excellent ratings and does not contain a virus itself
  5. When you are finished using a computer, even if for a short period of time- disconnect from the Internet and turn your computer off 

Phreaking

Phreaking is a specific type of hacking. Phreaking affects your phone lines and services. An example of this is when noticing your monthly phone bill and it shows you have a number of phone calls you supposedly, but did not, call that were long distance and very costly. With further research I learned that this method has been around since the early eighties. Hackers often time hack by using and uploading a program that cracks passwords and fire walls. 



Sources