Social NetworkingHave you ever seen one of those funny or not-so-funny embarrassing personal videos on the Internet? Unless you are careful, you could be starring in one of those videos. Without privacy settings, images and videos posted to these sites can be viewed and potentially reposted for all to see. If a social networking friend were to post an embarrassing video of you to Facebook, would all your friends be able to see it? What about parents, teachers, or potential employers? To check your Facebook privacy settings, go to Facebook and select Accounting/Privacy Settings. Back to top Smartphone TrackingDid you know that many mobile phone apps track a phones physical location? For example, iOSs Siri and Androids Google Now use a smartphones GPS to track locations to customize interactions with users. The smartphones location is monitored, stored, and potentially used for a variety of different objectives. Privacy advocates argue that many people are unaware that they may be tracked in this manner and that their movements are recorded for possible later use. App developers argue that the objective is simply to improve users interactions with their smartphones. What do you think? Back to top Operating System SecurityWhat information would you lose if a thief stole your computer or mobile phone? If you use your computer or phone to shop on the Internet, check your bank balance, or read e-mail, then the thief would have access to your credit cards, bank accounts, and personal correspondence. The operating system on your computer or phone can be set up to require a password or secret code whenever the OS starts up. This could prevent a lost or stolen device from providing access to your private information. Back to top CryptoprocessorsDid you know that one type of specialty processor is devoted exclusively to protecting your privacy? Called cryptoprocessors, these microchips perform encoding and decoding of data faster and more securely than a CPU. These specialized chips exist in ATMs, TV set-top boxes, and smartcards. Back to top Printers and AnonymityDid you know that your printer may be identifying itself in every document that it creates? Some color printers print nearly invisible dots in the margins of all printed documents. These microscopic dots form a code that can be used to trace the printed page back to the printer that generated it. Printer manufacturers secretly developed this code with the U.S. Secret Service to assist in counterfeiting investigations. Some privacy experts suggest that it is inappropriate to track equipment without the owners consent. Back to top Secure Data DeletionDid you know that when you sell your computer, you might be selling all your data as well. When you delete a file, the computer does not remove the data. It simply makes that hard disk space available to be written on in the future. If you accidentally delete a file, file recovery software is available to check the hard disk to see if the data is still there and has not been overwritten yet. In the same way that data can be recovered when accidentally deleted, thieves can recover data that was intentionally deleted. To confidently delete files, use a secure deletion utility before selling a computer. Back to top Unauthorized Network IntrusionDid you know that right now, people are attempting to access private networks that hold your private records and correspondence? Some individuals and governments are continually attempting to gain unauthorized access to networks and to obtain information stored on computers on those networks. Sometimes the objective is simply to create mischief; other times, to steal information or to test the security of a network. While some would say that any type of unauthorized intrusion is an unacceptable violation of privacy, others would say that under certain circumstances (such as homeland security), these intrusions can be essential. Back to top Sharing personal information on a social network site like Facebook is a voluntary activity. However, many individuals do not fully understand the complex sharing and privacy policies of these networks. This often causes unintentional sharing with people outside their intended social circle. The social networks themselves have come under fire from privacy groups, saying that these companies use complex settings and policies to get users to share more information than intended. This information is in turn shared with advertisers. Do you think social network companies are a threat to privacy? Back to top |