SlideShare una empresa de Scribd logo
1 de 10
Online Privacy  Lilyana Ruiz
What is internet privacy ,[object Object]
Is online privacy possible Online privacy is possible if common sense is used when giving and receiving  personal information.It is also possible if privacy laws and practice provide comprehensive protection.Instead of causing confusion that fuels a sense of distrust and skepticism,limiting realization of the internets potential.
What is Being Done To Protect On Line Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Your Privacy Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks of internet privacy ,[object Object],[object Object]
Cookies ,[object Object]
Privacy spy software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What can happen when online privacy is invaded ,[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15Naval OPSEC
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15Naval OPSEC
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationDerwin Kitch
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices  iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices Gordon Owen
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Privacy On The Web
Privacy On The WebPrivacy On The Web
Privacy On The WebQuynhBanh
 

La actualidad más candente (17)

Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Do not track me
Do not track meDo not track me
Do not track me
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices  iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Privacy On The Web
Privacy On The WebPrivacy On The Web
Privacy On The Web
 

Destacado

Staff Member of the Year 2014 Nomination
Staff Member of the Year 2014 NominationStaff Member of the Year 2014 Nomination
Staff Member of the Year 2014 NominationBrittany Petree
 
The Oath of Office Bill (Version2)
The Oath of Office Bill (Version2)The Oath of Office Bill (Version2)
The Oath of Office Bill (Version2)German Failano, Jr
 
SSP 107 Unit 1 Test Revised
SSP 107 Unit 1 Test RevisedSSP 107 Unit 1 Test Revised
SSP 107 Unit 1 Test RevisedBrittany Petree
 
Etapas de la negociacion
Etapas de la negociacionEtapas de la negociacion
Etapas de la negociacionErika Lorena
 
LightingMcBridge_PKN_011410
LightingMcBridge_PKN_011410LightingMcBridge_PKN_011410
LightingMcBridge_PKN_011410Dennis McGrath
 
The Senate Oath of Office Bill (Final Version)
The Senate Oath of Office Bill (Final Version)The Senate Oath of Office Bill (Final Version)
The Senate Oath of Office Bill (Final Version)German Failano, Jr
 
Ejercicios Psicomotrices.
Ejercicios Psicomotrices. Ejercicios Psicomotrices.
Ejercicios Psicomotrices. yenny maestre
 
Speaking test evaluation sheet
Speaking test evaluation sheetSpeaking test evaluation sheet
Speaking test evaluation sheetErasmus+
 

Destacado (13)

Staff Member of the Year 2014 Nomination
Staff Member of the Year 2014 NominationStaff Member of the Year 2014 Nomination
Staff Member of the Year 2014 Nomination
 
pai yu hsuan cv
pai yu hsuan cvpai yu hsuan cv
pai yu hsuan cv
 
Hermès 20150911 fr
Hermès 20150911 frHermès 20150911 fr
Hermès 20150911 fr
 
The Oath of Office Bill (Version2)
The Oath of Office Bill (Version2)The Oath of Office Bill (Version2)
The Oath of Office Bill (Version2)
 
Quasi Senator Bill #3
Quasi Senator Bill #3Quasi Senator Bill #3
Quasi Senator Bill #3
 
SSP 107 Unit 1 Test Revised
SSP 107 Unit 1 Test RevisedSSP 107 Unit 1 Test Revised
SSP 107 Unit 1 Test Revised
 
Etapas de la negociacion
Etapas de la negociacionEtapas de la negociacion
Etapas de la negociacion
 
LightingMcBridge_PKN_011410
LightingMcBridge_PKN_011410LightingMcBridge_PKN_011410
LightingMcBridge_PKN_011410
 
The Senate Oath of Office Bill (Final Version)
The Senate Oath of Office Bill (Final Version)The Senate Oath of Office Bill (Final Version)
The Senate Oath of Office Bill (Final Version)
 
Ejercicios Psicomotrices.
Ejercicios Psicomotrices. Ejercicios Psicomotrices.
Ejercicios Psicomotrices.
 
Ejercicios de activacion pensamiento creativo
Ejercicios de activacion pensamiento creativoEjercicios de activacion pensamiento creativo
Ejercicios de activacion pensamiento creativo
 
Luxembourg 2017
Luxembourg 2017Luxembourg 2017
Luxembourg 2017
 
Speaking test evaluation sheet
Speaking test evaluation sheetSpeaking test evaluation sheet
Speaking test evaluation sheet
 

Similar a Online Privacy Lilyana Ruiz

Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy OnlineJohn Curry
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital agecomplianceonline123
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securitySejahtera Affif
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptxITStudy Ltd.
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprintCybermaterial
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 

Similar a Online Privacy Lilyana Ruiz (20)

Privacy
PrivacyPrivacy
Privacy
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Protect
ProtectProtect
Protect
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Online Privacy Lilyana Ruiz

  • 1. Online Privacy Lilyana Ruiz
  • 2.
  • 3. Is online privacy possible Online privacy is possible if common sense is used when giving and receiving personal information.It is also possible if privacy laws and practice provide comprehensive protection.Instead of causing confusion that fuels a sense of distrust and skepticism,limiting realization of the internets potential.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.