1 / 50

Managing Your Personal Data

Learn about personal privacy and data brokers, how your car and phone can spy on you, and what you can do to protect your personal information.

shanam
Download Presentation

Managing Your Personal Data

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Managing Your Personal Data Keeping Personal Data Private

  2. TOPICS • Do I Still Have Any Personal Privacy? • Data Brokers • Your Car is Spying On You! • Medical Identity Theft • Don’t Bury You Digital Assets • Grifters and Giving • The People Who Know Everything (NSA) • What Can You Do?

  3. What Data Can Be Compromised?

  4. Personal Privacy • Some Startling Facts • Lawyers use social media to weed out jurors that could potentially decide against their clients • Combines are feeding farming data such as soil conditions & crop yields to commodity speculators • Schools routinely transfer student’s data including lunchroom purchases, medical information, essays and transcripts to data aggregators for marketing • The amount of sensitive data available in public records is staggering

  5. Data Available in Public Records Property Deeds Marriage Licenses Obituaries Criminal Records Court Dockets Motor Vehicle Records Professional Licenses Sex Offender List Military Records Business Licenses Reverse Phone Numbers Delinquent Parents Voter Registrations Real Estate Appraisals Death Notices Genealogical Records Divorce Records Census Records Reverse Addresses Change of Address

  6. What is a Data Broker? Data Brokers collect (steal) information about individuals from public records and private sources including user-contributed material on social networking sites such as Facebook, Twitter and LinkedIn, consumer purchase histories, credit & debit card transactions, health care records, phone apps and web browsing histories and then sell the information to marketing & advertising firms

  7. What do Broker’s Sell? • Individual profiles, such as a person's age, race, gender, height, weight, marital status, religious & political affiliations, occupation, income, net worth, home ownership, investment habits, product preferences, hobbies, travel habits and health-related interests.

  8. Real-Time Apps DEPARTMENT STORE Stop to browse and a digital coupon appears on your phone GROCERY STORE An app reminds you of grocery items on sale and on your shopping list WINDOW SHOPPING Based on how long you linger a “special offer” for the item is sent to your phone ELECTRONICS STORE Product Info immediately available SPORTS STADIUM App directs you to concession stand for your favorite take out TICKET SALES Send you to the shortest line

  9. YOU ARE THE PRODUCT! • “You are what is being bought and sold. Facebook’s users are paying with their personal information instead of cash.” • “It’s like World War Z(uckerberg)….There are still people here on God’s green earth that can conduct their social lives without being marketed to. Can’t we leave them alone?” • Article about Mark Zuckerberg in Time Magazine

  10. SUNDAY TRIBUNE 12/7/14 • “A lot of tech companies are geniuses at getting people to give them enormously personal information by clicking through a contract nobody reads and doing with it pretty much what they will.”

  11. Phone Data • Real-time bidding for your phone data • Crowd sourced through apps • Grouped into profiles • Many apps access your calendar and GPS location • Don’t make your phone your ‘Best Friend” • Sharing confidences with – • Phone’s Manufacturer • Phone’s Operating System • Wireless Carrier • App Developers • Mobile Advertisers

  12. What Should you Do? • Use Privacy Mgr. with a Caller Id • Choose Apps from a reliable source • Don’t click on pop-up links • Could download malicious software • Disable location tracking except when needed • Driving directions • Finding a location • Set a strong password in case of theft • Set your smartphone to delete all data • Don’t store sensitive data like pins or passwords • Buy a phone security app (some are free)

  13. How Your Car Spies On You

  14. How Your Car Spies On You Vehicle Telematics Traffic Cameras Electronic Data Recorder License Plate Scans CellPhone Tracking GPS Location Data

  15. License Plate Scans • A scanner can take 2,000 images per second • Scanning is not targeted • Original purpose was find stolen vehicle • Same vehicles show up multiple times • Locations can be plotted on a map • Few standards or policies • Police can track anyone (spouse, boss, rival, etc.) • “Only limited by officer’s imagination” • Data is stored indefinitely in most cases • Shared with Federal authorities

  16. Telematics • In most cars since 2011 • Maps speed, braking, geographic info • Date & Time of incident • Seat belt and air bag status • Insurance companies encouraging the use • Clever names such as Drivewise and Snapshot • Expectation of lower rates by consumer Can be used against you in an accident • Insurance companies legal access not standard • Total Loss? – Insurance Co. owns car

  17. Cell Phone Tracking • Apps & GPS track your driving habits • Info sold to marketing people • Government uses Stingray Technology • Cellphone location & Call logs • Can decrypt data • Parent or Spouse can track you • Sold as “security” feature • “Teen-Safe” , “Mobile Spy”, “Spy Phone” • Employers can track employee’s company cell • Is your employee really in a traffic jam? • Tracking devices as little as $27.00

  18. Medical Identity Theft

  19. MEDICAL IDENTITY THEFT • Theft of health care goods or services • Largest type of identity theft – 43% • Hospital treatment • Obtain Prescription drugs (Valium, OxyContin, etc.) • Sell patient info • Fraudulently bill insurance companies • Used to obtain Medicare benefits • Blackmail

  20. How is Medical Data Obtained? • Equipment Theft • Stolen laptops • Improper Disposal • Records not removed from obsolete computers • Written files not shredded • Hacking • Set up fake provider identification • Bill Medicare • Use Social Security Numbers to obtain Credit Cards • Unauthorized Access • Insiders in Doctor or Hospital Offices

  21. Your Body Online 24/7 • The Federal Trade Commission is worried that sensitive data collected on Smart watches and Health trackers could be sold to marketers. • The Apple Watch will be able to track a user's pulse and can potentially store health information. • Wearable's will make your physical self visible to the virtual world in the form of information, it will be copied and circulated, it will be used to track you and market to you. It will be bought and sold and leaked.

  22. Medical Identity Theft - $60 BillionProsecuted Theft - $6 Billion • Matthew Kolodesh submitted claims of $16.2 million for home hospice services - sold identities to other companies. 176 months prison • Margarita Grishkoff found guilty of submitting $28.3 million fraudulent claims using patient recruiters and clinic owners to obtain patient information. 70 months prison • Dr. Robert Glazer, signed prescriptions and documents for unnecessary home health services $33 million – sold info to other supply companies

  23. Consequences of Medical Theft • Called “the privacy crime that can kill” • Incorrect records lead to incorrect treatment • Insurance Benefits may be maxed out • Fraudulent Billing • Insured may not be aware • Blackmail of Political or Celebrity Figures • Depression, AIDS, Abortion, Venereal Disease • Genetic Testing Revealed • Life & Disability Insurance, Long-Term Care

  24. Your Sensitive Medical Information • Capture your “interests” in health conditions • Track internet searches • What you purchase Insurance Companies “share” data with others Insurance brokers Banks & Reinsurers Business Partners Government Agencies Law Enforcement Regulatory N.S.A.

  25. Protecting Your Digital Assets

  26. Don’t Bury Your Assets • Digital Assets • Intellectual Property & Digital Contracts • PayPal Account • Medical Files • Financial Information • Social Network Accounts • Downloads of iTunes, Netflix • Kindle Books • Pictures & Digital Photo Albums • Instructive Memos & Blogs • Domain Registrations • Recipes, Poems, School Essays • Family Tree • Points from Hotel Stays, Airline Miles, Store Credits • Stocks and Commodity Trading Accounts

  27. Obtaining access to an account • Facebook • Family can request an account be “memorialized” • Will allow download with prior consent of deceased • Will not turn over account or password to family • Yahoo • Emails are private no matter what! • Can ask accounts be deleted • Twitter • Provide info to have account “deactivated” • Need signed statement from executor

  28. Obtaining access to an account • Amazon (Kindle) • Can will books (if not licensed) • iTunes • You don’t actually own the song Licensed to download during your lifetime • Virtual Games (Farmville, World of Warcraft) • Accounts cannot be transferred • Avatars cannot be sold • Google • 2-step process for Inactive Account Manager • Can designate up to 10 people • Can ask to have content deleted

  29. Obtaining access to an account • Federal Law May Prevent Access • May violate Computer Fraud & Abuse Act • Unauthorized access to computers • Stored Communications Act • 4th Amendment Privacy Protection applies to information stored online • ISPs forbidden to divulge the contents of any communication • Intent of Act was to prevent hacking but used to prevent relatives from accessing accounts

  30. Prepare a will or power of attorney • Give Specific Instructions • “My spouse/parents can/cannot read my emails” • Designate which person(s) should take charge • Who should manage your online accounts • List accounts you want deleted • Many accounts have value Laws Vary By State Consult An Attorney

  31. THINGS TO CONSIDER • Keep An Inventory of What You Have • Update Inventory Periodically • Commercial Online Sites • Research Your State’s Laws • Identify Person in Charge • Someone You Trust • Identify Things to be Deleted • Keep List of Usernames & Passwords Separate • Keep in Safe Place • Average Person has 25 Password-Protected Accounts • Review Terms of Service Agreements • Every Vendor Has Own Policies

  32. No Will? • You Won’t Outlive Your Digital Life • Come to Grips with Who Will Inherit • Delete Old or Unwanted Files/Bills/Tax Returns • Not Everything Has Value • More in Cyberspace, More for Family to Sort Thru • Download Online Account Info • Create Own Backup Offsite • Have a Central Repository • Commercial Companies will Download For You • Legacy Locker, Keeper, Sourceforge, My Webwill

  33. CHARITIES

  34. The Joy of Giving • Don’t let “grifters” spoil your holiday giving • 50 worst charities give less than 4% to programs • Cyber-hustlers create bogus charities • Scammers follow disasters –and the money • Be skeptical of email solicitations • Most legitimate charities do not use email • Links within emails may lead to viruses • Often pictures of animals used to “soften” you up

  35. Make the most of your donation • $45 Billion donated each year in America • 2 million registered non-profits • Give locally • National donations under $25 barely break-even • Information is then sold to other charities • Send your donation directly to the charity • Ask if your contribution is tax deductible • Legitimate charities give financial info • Don’t give out any personal information

  36. National Security Agency

  37. C.I.A. vs N.S.A. (Lines have blurred) • CIA gathers intelligence involving people (HUMINT) • Gather’s information about foreign governments, corporations, and individuals • Counter-terrorism • Covert paramilitary operation • NSA specializes in signals intelligence (SIGINT) • Largest employer of Mathematicians in the world • Decoding, translation & analysis of data • Counter-intelligence & cyber-terrorism

  38. Collect it all – n.s.a. “slogan” • NSA has infiltrated video games, cell phone apps, social media, encrypted material, emails • Challenges basic assumptions about what is private • Is this the appropriate strategy? • Technology allows very detailed data • Will become more powerful and pervasive • Is this right in a democratic society? • Are we “sleepwalking” into abandoning our privacy?

  39. Public’s attitude on N.S.A. Spying • Group 1 – Don’t Care • Group 2 – Encourage the N.S.A. • Group 3 – Actively fighting to reverse NSA ability to collect, analyze & store data about citizens and other governments

  40. NSA – Exploiting Vulnerabilities • Thousands of Vulnerabilities • Large-scale graph analysis • Too much trust in developers • Heartbleed • Other known “bugs” • Attacks encryption • Create weaknesses • Open “back doors”

  41. The “New” NSA • Transfer storage of phone data • Now phone companies will hold info • Only to placate us? • Must obtain judge’s approval to access phone records • FISA Court (Federal Intelligence Surveillance) • Authorizes government requests for wiretapping • Only meant for “foreign intelligence purposes” • Never refuses a request from the NSA • Broad authority to intercept emails undiminished

  42. Do We Need New Laws?? • Signals are everywhere and the NSA believes the public has no right to keep them private • Collects hundreds of millions address books daily • 5 billion records per day on whereabouts of cell phones & their users • Need government to control invasion of privacy • Hodge-podge of laws by state legislatures • No uniform enforcement • ACLU fighting to stop unauthorized data collection

  43. WHAT CAN YOU DO?

  44. things you should do • Monitor your credit on all 3 credit bureaus • Never subscribe to unsolicited credit cards • Close out any old accounts not in use • Check your online statements regularly • Limit your use of debit cards • Can’t be reimbursed as easily as credit cards • Easier to hack • Use a Strong Password • Most common password is admin • Second is 1234 • Limit the info posted on social networks • Don’t disclose family names

  45. More Things To Do • Never open an email from an unknown source • Make a list of your digital assets • Do you need them in a will? • Can your heirs find your passwords? • Access your medical records • Make sure they are correct • Sign up for Do-Not-Call List • Use Lockout feature on your SmartPhone • Only donate to charities you know And check these out at Charity Navigator

  46. THINGS YOU SHOULD (Not) DO • Don’t give your Zip Code at stores • Can be combined with Credit Card to identify you • Don’t give your Credit Card info to “Take Out Restaurants” • Do you want some 17 year old kid to have it? • Don’t carry your Social Security Card • And don’t give it over the phone or to • a business except a financial institution

  47. Conclusion • Our Personal Privacy has been invaded • We can’t stop everything but can limit the amount of data available to criminals and data brokers • Don’t worry so much about the N.S.A. worry about the data brokers and tracking software • We need to write our legislators demanding stronger laws against selling our data

  48. Cathy Nolan cnolan@allstate.com Ashley Wilson Wilsonsport17@gmail.com

More Related