Internet Privacy Laws.ppt

上传人:roleaisle130 文档编号:376570 上传时间:2018-10-08 格式:PPT 页数:13 大小:332KB
下载 相关 举报
Internet Privacy Laws.ppt_第1页
第1页 / 共13页
Internet Privacy Laws.ppt_第2页
第2页 / 共13页
Internet Privacy Laws.ppt_第3页
第3页 / 共13页
Internet Privacy Laws.ppt_第4页
第4页 / 共13页
Internet Privacy Laws.ppt_第5页
第5页 / 共13页
亲,该文档总共13页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、MIS 111,Internet Privacy Laws,Jennifer Almond and Colin Zupancic“Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”,MIS 111,Basic Issues,The Childrens Online Privacy Protection Act (COPPA) Gender and Electronic Privacy U

2、SA PATRIOT Act Terrorist Information Awareness Cookies Spam,MIS 111,The Childrens Online Privacy Protection Act (COPPA),The Childrens Online Privacy Protection Act (“COPPA“) specifically protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of

3、any personal information of the users.Main requirements of the ActThe Act was passed in response to a growing awareness of Internet marketing techniques that targeted children and collected their personal information from websites without any parental notification.,MIS 111,The Childrens Online Priva

4、cy Protection Act (COPPA),In the 1990s, children began to access the Web more and more. Marketers would track information kids gave out in chat rooms or while playing games (such as addresses, full names, ages, etc.) and would retain this data in order to sell to third parties. It became very easy f

5、or anyone to simply send money to one of these companies and receive lists of childrens addresses and personal information.,MIS 111,The Childrens Online Privacy Protection Act (COPPA),COPPA applies to any website directed specifically at children, any general site which has a childrens section, and

6、any foreign websites aimed at U.S. childrenOn each website, there must be an easily accessible privacy policyA web operator must obtain parental permission via credit card, digital signature, or a signed and faxed consent form. The operator must also make available any information collected about th

7、e child to the guardians of the child.,MIS 111,Gender and Electronic Privacy,Pretexting and Cyberstalking:*Pretexting is the practice of collecting information about a person using false pretenses. *Cyberstalking-Coincidence Design, Amy BoyerVideo voyeurism and webcams,MIS 111,USA PATRIOT Act,“Uniti

8、ng and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001”Authorizes the installation of devices to record all computer routing, addressing, and signaling information.Governs government access to stored email and other electronic communicati

9、ons. Creates a new exception, permitting government interception of the “communications of a computer trespasser“ if the owner or operator of a “protected computer“ authorizes the interception. The new exception has broad implications, given that a “protected computer“ includes any “which is used in

10、 interstate or foreign commerce or communication“ (which, with the Internet, includes effectively any computer).,?,MIS 111,Terrorist Information Awareness,MIS 111,Cookies,A cookie is a mechanism that allows a web site to record your comings and goings, usually without your knowledge or consent. Cook

11、ies do provide outside sources with personal information, but only information that you give while on the website. Yes, it does violate personal privacy to a degree, but cookies can be turned off or restricted to specific websites.,MIS 111,Cookies,A server cannot set a cookie for a domain that it is

12、nt a member of.How does a cookie work?DoubleclickThis usage of cookies is the most controversial, and has led to the polarized opinions on cookies, privacy, and the Internet.,MIS 111,Spam,Spam is unsolicited commercial e-mail. Spammers get e-mail addresses in three ways: *by scavenging, the practice

13、 of automatically collecting e-mail addresses listed or posted on webpages and electronic bulletin boards* by guessing, where the spammer uses dictionary terms or randomly-generated strings to develop e-mail addresses*and by purchasing e-mail addresses through list brokers. Currently, there is no federal legislation regulating the transmission of spam. “Remove me“ options,MIS 111,Spam,Case study: One person, six years,MIS 111,Protecting Your Privacy Online,http:/www.epic.org/privacy/tools.html,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教学课件 > 大学教育

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1