Safeguarding Sensitive Personal Information in the Digital Age

privacy n.w
1 / 16
Embed
Share

Discover the risks associated with sharing sensitive personal data online and explore the importance of maintaining privacy while reaping benefits from information sharing. Learn about leaks, exploitation, and the challenges of safeguarding your identity in a connected world.

  • Privacy
  • Cybersecurity
  • Information Sharing
  • Data Protection
  • Privacy Concerns

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Privacy Dror Feitelson Hebrew University

  2. Sensitive Personal Information Identity ID number, birth date, address, phone Financial Bank account, credit card transactions, insurance Work related Confidential documents, evaluations of personnel, complaints Embarrassing Nude photos

  3. Sharing Personal Information Improved buying experience if we just Share location advice on local businesses Share buying history relevant advertisements Share account info one-click buying New social connections if we just Share pictures Share interests and preferences A bright new world if we just Share everything AI will take care of us

  4. Are you concerned about any of this?

  5. Leaks and Exploitation You enter information about your family tree into geni.com You want to connect to unknown relatives You expose your mother s maiden name and your birthdays You upload pictures of your family to facebook You want to share You expose your pet s name The exposed info can be used in faked profiles and to answer security questions

  6. Leaks and Exploitation A vacation booking company maintains a log of all activity Put it on the web to enable company wide access All data accessible via port 9200 Governmental legal database requires authorization for viewing record details But data is loaded anyway, just not shown Can be seen using view source Exposed personal info plus theft of credit card and maybe options for blackmail

  7. The Main Issue: How to maintain privacy of sensitive personal information While benefitting from using and sharing information

  8. Multiple Dimensions Technical Access controls and security Social What is accepted What is expected Legal Who owns the data about you? The default: opt-in or opt-out Somebody could be making tons of money from this

  9. FIPPs Fair Information Practice Principles Guidelines developed since the 1970s Provide basic vocabulary and concepts used in many current frameworks around the world 5-10 principles in difference formulations

  10. FIPPs 1. People should be given notice of data being collected from them Who is collecting the data What data is being collected What it is being collected for Who will have access to the data

  11. FIPPs 2. People should give consent for data collection Including additional uses of the data Consent is subject to the default policy: opt in explicit consent required opt out default is that collection is performed; users must explicitly decline permissions to prevent this Only the minimal data required will be collected

  12. FIPPs 3. People should be given access to the data collected about them View the data Verify correctness of the data Correct errors in the data

  13. FIPPs 4. The collected data should be secured using reasonable means to prevent unauthorized access and use And data will not be handed over to others 5. The rules should be regulated and enforced, and those responsible held accountable

  14. GDPR European Union General Data Privacy Regulation Went into effect on 25.5.2018 Binding for all companies operating in Europe Including foreign international companies Also covers export of data outside Europe Similar to TIPPs + more Default is that data is strictly protected

  15. GDPR 1. Data collection must have a lawful basis Subjects must be informed 2. Explicit informed consent must be given Opt out is not allowed Consent can be withdrawn at any time 3. Data must be protected and those responsible held accountable 4. Default setting provides high protection 5. Subjects have right of access 6. Subjects have right to erasure 7. Data breaches must be reported within 72 hours

  16. Privacy and Your Work Coding guidelines for preserving privacy e.g. limit access rate to prevent brute-force attacks Monitoring activity to identify suspicious traffic Awareness of legal requirements Not making stupid mistakes that lead to inadvertent data leaks

Related


More Related Content