Tags

    Formal Presentation

    Comments

    Slide 1
    Title: Data Privacy
    intro

    Slide 2
    Title: what is personal data, why/how do companies gather it, and what they do with it?

    1.What is personal data?
    • Personal data is any and all information that relates to you. E.X. e-mail, relationships, financial status, where you live, how you act/talk/write, age/gender/interests, etc. Think of it as your online fingerprint.
    2. why do companies gather it?
    •Data is knowledge, knowledge is power, and power = money. Companies gather, analyze, and extract crucial information from personal data to turn it into cash. Almost every action you take online will be logged and stored somewhere.
    3.what do they do with it?
    •Companies use that data to improve their customer services, refine their marketing strategy, find their audience. Once they have everything they needed, they sell off your data to other third party companies.

    Slide 3
    Title: What are the dangers of personal data gathering/trading?
    •In my perspective, the four most frightening consequences of data collection are:
    How company gather data
    The amount of data gathered about you
    Unknown use of personal data
    Sharing/trading data to third party companies/consumers

    Slide 4
    Title: Prevention
    1.learn gathering methods
    •Phishing , surveys, sign ups, website cookies, opt out data mining, wi-fi, or just plain asking.
    2.use a premium vpn
    Use a trusted paid vpn. Free vpns store and sell your data to make money.
    3.fill out as little info needed
    When required to fill out information, fill out as little as you can.
    4.be wise about where to store info
    Store your most private or valuable information somewhere safe. This can be documents printed out stored in a safe or not pressing "save credit card info" when buying things online.

    Slide 5
    Title: Solutions?
    1.Paid VPNS
    2.Tor browser
    Browser, redirects traffic to worldwide overlay networks, 7k relays
    3.Search Engines
    4.Location Services
    5.“The Amnesiac Incognito Live System (TAILS)”
    6.keep private credentials offline or encrypt them
    7.Be unexpected
    8.if all else fails, cut your internet access

    Slide 6
    Title: My impact.
    Articles, blog, PSA, video skit