Site MapHelpFeedbackPrivacy
Privacy
(See related pages)

Social Networking

Have you ever seen one of those funny or not-so-funny embarrassing personal videos on the Internet? Unless you are careful, you could be starring in one of those videos. Without privacy settings, images and videos posted to these sites can be viewed and potentially reposted for all to see. If a social networking friend were to post an embarrassing video of you to Facebook, would all your friends be able to see it? What about parents, teachers, or potential employers? To check your Facebook privacy settings, go to Facebook and select Accounting/Privacy Settings.

Back to top

Smartphone Tracking

Did you know that many mobile phone apps track a phone’s physical location? For example, iOS’s Siri and Android’s Google Now use a smartphone’s GPS to track locations to customize interactions with users. The smartphone’s location is monitored, stored, and potentially used for a variety of different objectives. Privacy advocates argue that many people are unaware that they may be tracked in this manner and that their movements are recorded for possible later use. App developers argue that the objective is simply to improve users’ interactions with their smartphones. What do you think?

Back to top

Operating System Security

What information would you lose if a thief stole your computer or mobile phone? If you use your computer or phone to shop on the Internet, check your bank balance, or read e-mail, then the thief would have access to your credit cards, bank accounts, and personal correspondence. The operating system on your computer or phone can be set up to require a password or secret code whenever the OS starts up. This could prevent a lost or stolen device from providing access to your private information.

Back to top

Cryptoprocessors

Did you know that one type of specialty processor is devoted exclusively to protecting your privacy? Called cryptoprocessors, these microchips perform encoding and decoding of data faster and more securely than a CPU. These specialized chips exist in ATMs, TV set-top boxes, and smartcards.

Back to top

Printers and Anonymity

Did you know that your printer may be identifying itself in every document that it creates? Some color printers print nearly invisible dots in the margins of all printed documents. These microscopic dots form a code that can be used to trace the printed page back to the printer that generated it. Printer manufacturers secretly developed this code with the U.S. Secret Service to assist in counterfeiting investigations. Some privacy experts suggest that it is inappropriate to track equipment without the owner’s consent.

Back to top

Secure Data Deletion

Did you know that when you sell your computer, you might be selling all your data as well. When you delete a file, the computer does not remove the data. It simply makes that hard disk space available to be written on in the future. If you accidentally delete a file, file recovery software is available to check the hard disk to see if the data is still there and has not been overwritten yet. In the same way that data can be recovered when accidentally deleted, thieves can recover data that was intentionally deleted. To confidently delete files, use a secure deletion utility before selling a computer.

Back to top

Unauthorized Network Intrusion

Did you know that right now, people are attempting to access private networks that hold your private records and correspondence? Some individuals and governments are continually attempting to gain unauthorized access to networks and to obtain information stored on computers on those networks. Sometimes the objective is simply to create mischief; other times, to steal information or to test the security of a network. While some would say that any type of unauthorized intrusion is an unacceptable violation of privacy, others would say that under certain circumstances (such as homeland security), these intrusions can be essential.

Back to top

Social Networking and Information Sharing

Sharing personal information on a social network site like Facebook is a voluntary activity. However, many individuals do not fully understand the complex sharing and privacy policies of these networks. This often causes unintentional sharing with people outside their intended social circle. The social networks themselves have come under fire from privacy groups, saying that these companies use complex settings and policies to get users to share more information than intended. This information is in turn shared with advertisers. Do you think social network companies are a threat to privacy?

Back to top








OLearyCE, 25e Online Learning Center

Home > Privacy