M ANAGING Y OUR P ERSONAL D ATA Keeping Personal Data Private.

50
MANAGING YOUR PERSONAL DATA Keeping Personal Data Private

Transcript of M ANAGING Y OUR P ERSONAL D ATA Keeping Personal Data Private.

Managing Your Personal Data

Managing Your Personal DataKeeping Personal Data Private

Here is where you should introduce yourself1TOPICSDo I Still Have Any Personal Privacy?Data Brokers Your Car is Spying On You!Medical Identity TheftDont Bury You Digital AssetsGrifters and GivingThe People Who Know Everything (NSA)What Can You Do?2What Data Can Be Compromised?Personal PrivacySome Startling Facts

Lawyers use social media to weed out jurors that could potentially decide against their clients

Combines are feeding farming data such as soil conditions & crop yields to commodity speculators

Schools routinely transfer students data including lunchroom purchases, medical information, essays and transcripts to data aggregators for marketing

The amount of sensitive data available in public records is staggering

You might be surprise at the different groups that feel their privacy has been invaded. Not only do attorneys use social media postings to disqualify jurors who might not hold the same views as their clients, but after the trial if a juror posts information about the jury deliberations, the attorney can use that information to file an appeal.

Farmers are worried because the big seed and agri-business corporations are monitoring their soil conditions, seedling rates and crop yields using data sensors on plows, cultivators and combines. The main worry is that commodity speculators will be able to access this data and use it to manipulate the commodity market.

Did you know that schools, from elementary to college, sell your childs data to data aggregators who in turn sell it for marketing purposes. Everything from how much your child weighs to what he eats in the cafeteria, his homework, his transcripts, the sports she participates in, even student directories which include addresses, all are sold. Recently some school boards are trying to limit the amount of data that is provided to 3rd parties but this is big business and a source of income for the schools.

4

Criminal RecordsMarriage LicensesDeath NoticesCourt DocketsBusiness LicensesReal Estate AppraisalsVoter RegistrationsSex Offender ListMilitary RecordsDelinquent ParentsReverse Phone NumbersGenealogical RecordsObituariesProperty DeedsProfessional LicensesReverse Addresses Divorce RecordsData Available in Public RecordsMotor Vehicle RecordsCensus RecordsChange of AddressMany people dont realize how much data is available to anyone who wants to search public records. Everything from your divorce papers to the value of your house and how much you pay in property taxes, to your voter registration and whether you were ever convicted of a crime. On top of that, the government collects all kinds of medical data for everything from public health studies to product recalls. And they get this data from our medical providers and insurance companies.5What is a Data Broker?Data Brokers collect (steal) information about individuals from public records and private sources including user-contributed material on social networking sites such as Facebook, Twitter and LinkedIn, consumer purchase histories, credit & debit card transactions, health care records, phone apps and web browsing histories and then sell the information to marketing & advertising firms

6What do Brokers Sell? Individual profiles, such as a person's age, race, gender, height, weight, marital status, religious & political affiliations, occupation, income, net worth, home ownership, investment habits, product preferences, hobbies, travel habits and health-related interests.

7

This is how a tracking firm or website collects data and then sells it to a data broker who in turn sells it to advertisers.

Tracking technology is getting smarter and more intrusive as new tools scan in real time what people are doing on a web page, then they instantly access your location, shopping interests, income and even medical information.Whenever you access an online site, whether you are ordering a book, checking your bank balance, sending tweets or just browsing, you are adding to your digital footprint and behind the scenes aggregators are compiling huge amounts of information about you. It is estimate, on average, they collect 1,500 unique pieces of information for each individual.8

DEPARTMENT STOREStop to browse and a digital coupon appears on your phoneGROCERY STOREAn app reminds you of grocery items on sale and on your shopping listSPORTS STADIUMApp directs you toconcession stand for your favorite take out WINDOW SHOPPINGBased on how long you linger a special offer for the item is sent to your phoneELECTRONICS STOREProduct Info immediatelyavailable TICKET SALES Send you to the shortest lineReal-Time Apps These are some of the real-time applications that are already developed and used by organizations like the NFL (ticket sales and stadium concessions stands) and are being tested by various stores such as Macys and American Eagle.9YOU ARE THE PRODUCT!You are what is being bought and sold. Facebooks users are paying with their personal information instead of cash.

Its like World War Z(uckerberg).There are still people here on Gods green earth that can conduct their social lives without being marketed to. Cant we leave them alone?Article about Mark Zuckerberg in Time Magazine

SUNDAY TRIBUNE 12/7/14A lot of tech companies are geniuses at getting people to give them enormously personal information by clicking through a contract nobody reads and doing with it pretty much what they will.

Phone DataReal-time bidding for your phone dataCrowd sourced through appsGrouped into profilesMany apps access your calendar and GPS location

Dont make your phone your Best FriendSharing confidences with Phones ManufacturerPhones Operating SystemWireless CarrierApp DevelopersMobile Advertisers

Flashlight Ap tracked your whereaboutsGames the most likely to track you

12What Should you Do?Use Privacy Mgr. with a Caller IdChoose Apps from a reliable sourceDont click on pop-up linksCould download malicious softwareDisable location tracking except when neededDriving directions Finding a locationSet a strong password in case of theftSet your smartphone to delete all data Dont store sensitive data like pins or passwordsBuy a phone security app (some are free)

Consumer groups rate appsCustomer satisfaction ratingsCompanies as Walgreens have their own safe apps that give you locations13How Your Car Spies On You

License Plate ScansGPS Location DataVehicle TelematicsCell Phone TrackingTraffic Cameras

How Your Car Spies On You

Electronic Data RecorderLicense Plate ScansA scanner can take 2,000 images per secondScanning is not targetedOriginal purpose was find stolen vehicleSame vehicles show up multiple timesLocations can be plotted on a mapFew standards or policiesPolice can track anyone (spouse, boss, rival, etc.)Only limited by officers imaginationData is stored indefinitely in most casesShared with Federal authorities

License plate scanner cameras were first introduced as a way to find stolen cars but the use of scanners soon became widespread and now most police departments use some type of scanning device to routinely take pictures of every license plate on every car they pass. This information is fed into a state or national database where the plate is matched against known stolen vehicles. But the vast majority of license plates, over 99%, belong to law-abiding citizens who dont want their driving habits monitored. Some law enforcement groups have argued that you never know when you might need this data to solve a crime so the plate data along with GPS coordinates is stored indefinitely. These scans can be plotted on a map to see what stores you frequent, what church you attend, if you routinely stop for a drink after work, and on and on. A fear is that any officer who has the ability to access the data can track anyone, a spouse, a friend or enemy, a neighbor, etc. One police department, documented in an ACLU report, says the use of a scanning database is only limited by an officers imagination. This data is also shared with other government agencies such as Homeland Security and the Drug Enforcement Agency.16TelematicsIn most cars since 2011Maps speed, braking, geographic infoDate & Time of incidentSeat belt and air bag status

Insurance companies encouraging the useClever names such as Drivewise and SnapshotExpectation of lower rates by consumer

Can be used against you in an accidentInsurance companies legal access not standardTotal Loss? Insurance Co. owns car

Cell Phone TrackingApps & GPS track your driving habitsInfo sold to marketing peopleGovernment uses Stingray Technology Cellphone location & Call logsCan decrypt data Parent or Spouse can track youSold as security featureTeen-Safe , Mobile Spy, Spy PhoneEmployers can track employees company cellIs your employee really in a traffic jam?Tracking devices as little as $27.00

Did you know you can buy tracking software?18

Medical Identity TheftMEDICAL IDENTITY THEFTTheft of health care goods or servicesLargest type of identity theft 43%Hospital treatmentObtain Prescription drugs (Valium, OxyContin, etc.)Sell patient info Fraudulently bill insurance companiesUsed to obtain Medicare benefitsBlackmail

Depression, sexually transmitted disease, Politicians Celebrities Cases where ordinary people blackmailed and harassed20How is Medical Data Obtained?Equipment TheftStolen laptops

Improper DisposalRecords not removed from obsolete computersWritten files not shredded

HackingSet up fake provider identificationBill MedicareUse Social Security Numbers to obtain Credit Cards

Unauthorized AccessInsiders in Doctor or Hospital Offices

Chicago Case Advocate social security numbers, date of birth, names & addresses - diagnosis, medical records21Your Body Online 24/7The Federal Trade Commission is worried that sensitive data collected on Smart watches and Health trackers could be sold to marketers.

The Apple Watch will be able to track a user's pulse and can potentially store health information.

Wearable's will make your physical self visible to the virtual world in the form of information, it will be copied and circulated, it will be used to track you and market to you. It will be bought and sold and leaked.

Medical Identity Theft - $60 BillionProsecuted Theft - $6 BillionMatthew Kolodesh submitted claims of $16.2 million for home hospice services - sold identities to other companies. 176 months prison

Margarita Grishkoff found guilty of submitting $28.3 million fraudulent claims using patient recruiters and clinic owners to obtain patient information. 70 months prison

Dr. Robert Glazer, signed prescriptions and documents for unnecessary home health services $33 million sold info to other supply companies

Consequences of Medical TheftCalled the privacy crime that can killIncorrect records lead to incorrect treatment

Insurance Benefits may be maxed outFraudulent Billing Insured may not be aware

Blackmail of Political or Celebrity FiguresDepression, AIDS, Abortion, Venereal Disease

Genetic Testing RevealedLife & Disability Insurance, Long-Term Care

Genetic Testing - Medical Insurance & Employers Off Limits

24Your Sensitive Medical InformationCapture your interests in health conditionsTrack internet searchesWhat you purchase

Insurance Companies share data with othersInsurance brokersBanks & ReinsurersBusiness Partners Government AgenciesLaw EnforcementRegulatoryN.S.A.

If you browse the internet for subjects such as depression, diseases such as diabetes or cancer, dieting websites, 25Protecting Your Digital Assets

Dont Bury Your AssetsDigital AssetsIntellectual Property & Digital ContractsPayPal AccountMedical FilesFinancial InformationSocial Network AccountsDownloads of iTunes, NetflixKindle Books Pictures & Digital Photo AlbumsInstructive Memos & BlogsDomain RegistrationsRecipes, Poems, School EssaysFamily TreePoints from Hotel Stays, Airline Miles, Store CreditsStocks and Commodity Trading Accounts

Im not going to read all of these digital assets but consider that in 2012 shoppers spent around $600 million buying digital films and TV shows, another $7 Billion on iTunes, & Flickr and that 1 in 4 books is now an e-book

Some digital assets may not have any value except to you and your family such as a family tree or your childrens school essays but as one credit card company is fond of saying to you they are Priceless.You probably feel you have plenty of time to consider what to do with all these digital assets but unfortunately many people never make arrangements and their heirs either cant access their accounts due to the vendors terms of service or the family doesnt even know about many of the accounts.

27Obtaining access to an accountFacebookFamily can request an account be memorializedWill allow download with prior consent of deceasedWill not turn over account or password to family

YahooEmails are private no matter what!Can ask accounts be deleted

TwitterProvide info to have account deactivatedNeed signed statement from executor

Obtaining access to an accountAmazon (Kindle)Can will books (if not licensed)

iTunesYou dont actually own the songLicensed to download during your lifetime

Virtual Games (Farmville, World of Warcraft)Accounts cannot be transferredAvatars cannot be sold

Google2-step process for Inactive Account ManagerCan designate up to 10 peopleCan ask to have content deleted

Obtaining access to an accountFederal Law May Prevent AccessMay violate Computer Fraud & Abuse ActUnauthorized access to computers

Stored Communications Act4th Amendment Privacy Protection applies to information stored online ISPs forbidden to divulge the contents of any communicationIntent of Act was to prevent hacking but used to prevent relatives from accessing accounts

Prepare a will or power of attorneyGive Specific InstructionsMy spouse/parents can/cannot read my emailsDesignate which person(s) should take chargeWho should manage your online accountsList accounts you want deletedMany accounts have value

Laws Vary By StateConsult An AttorneyTHINGS TO CONSIDERKeep An Inventory of What You HaveUpdate Inventory Periodically Commercial Online SitesResearch Your States LawsIdentify Person in ChargeSomeone You TrustIdentify Things to be DeletedKeep List of Usernames & Passwords SeparateKeep in Safe PlaceAverage Person has 25 Password-Protected AccountsReview Terms of Service AgreementsEvery Vendor Has Own Policies

No Will?You Wont Outlive Your Digital LifeCome to Grips with Who Will Inherit

Delete Old or Unwanted Files/Bills/Tax ReturnsNot Everything Has ValueMore in Cyberspace, More for Family to Sort Thru

Download Online Account InfoCreate Own Backup OffsiteHave a Central RepositoryCommercial Companies will Download For YouLegacy Locker, Keeper, Sourceforge, My Webwill

You probably wont outlive your Facebook, Kindle or iTunes accounts. Much of your life is online and much is valuable, either financial or sentimental Important to be organized and in control Store photos you want to keep on thumb drivesDo you really need copies of old bills, tax returns and outdated financial records?More stuff, more for hackers to findYou central repository should be stored offline but designate one person to know where it isBe sure to include passwords and user ids which will ease the transfer of accountsCommercial Companies not as secure as your own offsite backup and instructions to your attorneyLegacy Locker, Keeper, Sourceforge, My Webwill

33CHARITIES

The Joy of GivingDont let grifters spoil your holiday giving50 worst charities give less than 4% to programsCyber-hustlers create bogus charitiesScammers follow disasters and the money

Be skeptical of email solicitationsMost legitimate charities do not use emailLinks within emails may lead to virusesOften pictures of animals used to soften you up

Make the most of your donation$45 Billion donated each year in America2 million registered non-profitsGive locallyNational donations under $25 barely break-evenInformation is then sold to other charitiesSend your donation directly to the charity

Ask if your contribution is tax deductibleLegitimate charities give financial infoDont give out any personal information

National Security Agency

C.I.A. vs N.S.A. (Lines have blurred)CIA gathers intelligence involving people (HUMINT)Gathers information about foreign governments, corporations, and individualsCounter-terrorismCovert paramilitary operation

NSA specializes in signals intelligence (SIGINT)Largest employer of Mathematicians in the worldDecoding, translation & analysis of dataCounter-intelligence & cyber-terrorism

Collect it all n.s.a. slogan NSA has infiltrated video games, cell phone apps, social media, encrypted material, emails Challenges basic assumptions about what is private

Is this the appropriate strategy?Technology allows very detailed dataWill become more powerful and pervasiveIs this right in a democratic society?Are we sleepwalking into abandoning our privacy?

Publics attitude on N.S.A. SpyingGroup 1 Dont CareGroup 2 Encourage the N.S.A.Group 3 Actively fighting to reverse NSAability to collect, analyze & store data about citizens and other governments

NSA Exploiting VulnerabilitiesThousands of VulnerabilitiesLarge-scale graph analysisToo much trust in developersHeartbleedOther known bugsAttacks encryptionCreate weaknessesOpen back doors

The New NSATransfer storage of phone dataNow phone companies will hold infoOnly to placate us?

Must obtain judges approval to access phone recordsFISA Court (Federal Intelligence Surveillance)Authorizes government requests for wiretappingOnly meant for foreign intelligence purposesNever refuses a request from the NSA

Broad authority to intercept emails undiminished

Do We Need New Laws??Signals are everywhere and the NSA believes the public has no right to keep them privateCollects hundreds of millions address books daily5 billion records per day on whereabouts of cell phones & their users

Need government to control invasion of privacyHodge-podge of laws by state legislaturesNo uniform enforcementACLU fighting to stop unauthorized data collection

WHAT CAN YOU DO?

things you should doMonitor your credit on all 3 credit bureausNever subscribe to unsolicited credit cardsClose out any old accounts not in useCheck your online statements regularlyLimit your use of debit cardsCant be reimbursed as easily as credit cardsEasier to hackUse a Strong PasswordMost common password is adminSecond is 1234Limit the info posted on social networksDont disclose family names

More Things To DoNever open an email from an unknown sourceMake a list of your digital assetsDo you need them in a will?Can your heirs find your passwords?Access your medical recordsMake sure they are correctSign up for Do-Not-Call ListUse Lockout feature on your SmartPhoneOnly donate to charities you knowAnd check these out at Charity Navigator

THINGS YOU SHOULD (Not) DODont give your Zip Code at storesCan be combined with Credit Card to identify you

Dont give your Credit Card info to Take Out RestaurantsDo you want some 17 year old kid to have it?

Dont carry your Social Security CardAnd dont give it over the phone or to a business except a financial institution

ConclusionOur Personal Privacy has been invadedWe cant stop everything but can limit the amount of data available to criminals and data brokers

Dont worry so much about the N.S.A. worry about the data brokers and tracking software

We need to write our legislators demanding stronger laws against selling our data

Cathy NolanAshley Wilson

[email protected]@gmail.com