Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

What Is Privacy Issue

What Is Privacy Issue


What Is Privacy Issue
What Is Privacy Issue

• It refers to concerns,
difficulties, or violations
relating to a person's right to
maintain control over and
protect their personal
information from illegal
access, use, or disclosure.
What Is Privacy Issue

• It refers to concerns,
difficulties, or violations
relating to a person's right to
maintain control over and
protect their personal
information from illegal
access, use, or disclosure.
What Is Privacy Issue

• It refers to concerns,
difficulties, or violations
relating to a person's right to
maintain control over and
protect their personal
information from illegal
access, use, or disclosure.
TYPES OF PRIVACY ISSUES
INVOLVING ICT

 Data breaches and hacking


 Surveillance and monitoring

 Online tracking and


profiling
 Unauthorized access to
personal information
 Online scams and frauds
See More…
TYPES OF PRIVACY ISSUES
INVOLVING ICT
• Data breaches refer to
unauthorized access or disclosure
of sensitive and private
 Data breaches and hacking
information by individuals, groups,
 Surveillance and monitoring
or entities.
• Hacking involves the use of
 Online tracking and various techniques and methods to
profiling break into computer systems,
 Unauthorized access to networks, or software programs.
personal information This can be done to gain
 Online scams and frauds unauthorized access, steal data,
manipulate information, or disrupt
See More…
the functioning of systems
TYPES OF PRIVACY ISSUES
INVOLVING ICT • Surveillance and monitoring refer to the act
of observing, tracking, or recording
activities, behaviors, or data for various
purposes.
 Data breaches and hacking • Surveillance involves the systematic and
continuous monitoring of people, places, or
 Surveillance and monitoring
activities to gather information, prevent or
investigate potential threats, maintain
 Online tracking and security, or enforce regulations. It can be
conducted using various methods such as
profiling cameras, audio recording devices, GPS
 Unauthorized access to tracking, or online monitoring tools.
personal information • Monitoring typically refers to the ongoing
observation or tracking of systems, networks,
 Online scams and frauds data, or behaviors to identify deviations,
detect anomalies, or ensure operational
See More… efficiency
TYPES OF PRIVACY ISSUES
INVOLVING ICT • Refer to the collection and analysis of
individuals' online activities, behaviors, and
preferences to create detailed profiles and
track their online interactions. This practice
 Data breaches and hacking is usually carried out by companies,
advertisers, and data brokers to gather
 Surveillance and monitoring
information about users' interests, habits,
demographics, and preferences.
 Online tracking and • Involves the use of various technologies like
cookies, beacons, and tracking scripts
profiling embedded in websites and online
 Unauthorized access to advertisements. These technologies allow
personal information companies to monitor users' actions, such as
website visits, clicks, searches, purchases,
 Online scams and frauds and content consumption.
• Profiling, on the other hand, involves the
See More… creation and analysis of detailed individual
profiles based on collected data.
TYPES OF PRIVACY ISSUES
INVOLVING ICT  Refers to the act of gaining entry or obtaining
sensitive data without proper authorization or
consent. It involves accessing personal
information, such as passwords, financial
 Data breaches and hacking details, social security numbers, medical
records, or any other personally identifiable
 Surveillance and monitoring
information (PII), without the owner's
knowledge or permission.
 Online tracking and  Can be done through various means, including
profiling hacking into computer systems, exploiting
security vulnerabilities, phishing attacks, social
 Unauthorized access to engineering, or illicitly accessing physical
personal information documents or devices.
 Online scams and frauds  Can lead to identity theft, financial fraud,
privacy invasion, reputational damage, and other
See More… harmful consequences for individuals whose
data is compromised.
TYPES OF PRIVACY ISSUES
INVOLVING ICT  Online scams and frauds refer to
deceptive practices carried out through
the internet with the intent to deceive
 Data breaches and hacking individuals or organizations for
 Surveillance and monitoring financial gain
 common examples of online scams and
 Online tracking and frauds include:
profiling -Phishing
 Unauthorized access to -Roman’s scam
-Identify theft
personal information
-Fake online Auctions or sales
 Online scams and frauds -Advance free Fraud
See More… -Online investment fraud
TYPES OF PRIVACY ISSUES
INVOLVING ICT  Online scams and frauds refer to
deceptive practices carried out through
the internet with the intent to deceive
 Data breaches and hacking individuals or organizations for
 Surveillance and monitoring financial gain
 common examples of online scams and
 Online tracking and frauds include:
profiling -Phishing
 Unauthorized access to -Roman’s scam
-Identify theft
personal information
-Fake online Auctions or sales
 Online scams and frauds -Advance free Fraud
See More… -Online investment fraud
WHY DATA PRIVACY IS
IMPORTANT? THERE ARE SEVERAL MEASURES YOU
CAN TAKE TO PROTECT YOUR PRIVACY IN
ICT:
• Our personal information is valuable • Use strong and unique passwords
for many reasons. Advertisers use it • Enable two-factor authentication (2FA)
to target us with personalized ads. • Update your software
Social media companies use it to • Be cautious with email and
analyze our behavior and show us attachments
more engaging content. But when • Be mindful of sharing personal
our personal data falls into the information
wrong hands, it can be used for • Secure devices
malicious purposes. Hackers can use • Regularly back up your data
our personal information to commit • Be aware of privacy setting
identity theft, access our bank • Educate yourself
accounts, and even blackmail us. •
WHY DATA PRIVACY IS
IMPORTANT? THERE ARE SEVERAL MEASURES YOU
CAN TAKE TO PROTECT YOUR PRIVACY IN
ICT:
• Our personal information is valuable • Use strong and unique passwords
for many reasons. Advertisers use it • Enable two-factor authentication (2FA)
to target us with personalized ads. • Update your software
Social media companies use it to • Be cautious with email and
analyze our behavior and show us attachments
more engaging content. But when • Be mindful of sharing personal
our personal data falls into the information
wrong hands, it can be used for • Secure devices
malicious purposes. Hackers can use • Regularly back up your data
our personal information to commit • Be aware of privacy setting
identity theft, access our bank • Educate yourself
accounts, and even blackmail us. •
WHY DATA PRIVACY IS
IMPORTANT? THERE ARE SEVERAL MEASURES YOU
CAN TAKE TO PROTECT YOUR PRIVACY IN
ICT:
• Our personal information is valuable • Use strong and unique passwords
for many reasons. Advertisers use it • Enable two-factor authentication (2FA)
to target us with personalized ads. • Update your software
Social media companies use it to • Be cautious with email and
analyze our behavior and show us attachments
more engaging content. But when • Be mindful of sharing personal
our personal data falls into the information
wrong hands, it can be used for • Secure devices
malicious purposes. Hackers can use • Regularly back up your data
our personal information to commit • Be aware of privacy setting
identity theft, access our bank • Educate yourself
accounts, and even blackmail us. •
THANK YOU

You might also like