SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Privacy by Design:


                            1er Congreso Internacional Menores
                                                    en las TIC
                             Educando para una Internet más segura
                                                     Palacio de Congresos
                                       – Recinto Ferial Luis Adaro (Gijón)
  Estella Cohen,
  Information and Privacy                   27 y 28 de octubre de 2009

  Commissioner’s Office
  Ontario, Canada
Logo	
  del	
  
              Focus of our Discussion               ponente	
  



 The Office of Information and Privacy Commissioner’s
  Office of Ontario, Canada plays a major role in
  providing education and awareness to ensure strong
  privacy protections are in place.
        Fostering the value of privacy in a global
         environment;
        Using SmartPrivacy to ensure personal information is
         appropriately managed;
        Building in Privacy by Design principles from the
         outset;
        Advancing Privacy Enhancing Technologies- (PETs)
        Future of Privacy?
The Value of                Logo	
  del	
  
                                          ponente	
  
                Privacy


  rivacy is a key value in our democratic
  P
society. Critical component to our freedom and
rights;

  rivacy means that we control information
 P
about ourselves. Privacy lets us decide who will
know what about ourselves.
                               rivacy = Freedom
                               P
Technology... A    Logo	
  del	
  
           blessing or curse?   ponente	
  




  Privacy
   transcends
   jurisdiction…
  Technology
   knows no
   borders.
Logo	
  del	
  
                                                                                     ponente	
  


                                Privacy by Design — “The sine qua non”




                                       Security
                              Fair Information Practices
“Smart Privacy is the umbrella that offers the complete suite of protections to ensure data
privacy. It consists of multiple measures ranging from regulatory protections to education and
awareness, but one measure stands out as the sine qua non: Privacy by Design.” Dr. Ann
Cavoukian, Information & Privacy Commissioner of Ontario, Canada, August 13, 2009.
7 Foundational                             Logo	
  del	
  
                        Principles                               ponente	
  




1.    Proactive not Reactive;
      Preventative not Remedial
2.    Privacy as the Default
3.    Privacy Embedded into Design

4.    Full Functionality: Positive-Sum,
      not Zero-Sum
5.    End-to-End Lifecycle
      Protection
6.    Visibility and Transparency
7.    Respect for User Privacy

                                          Available at www.privacybydesign.ca
Our work with                   Logo	
  del	
  
                       FACEBOOK                       ponente	
  



 In 2005, Facebook approached our Office seeking input on
  their privacy measures;
 We convened a student focus group to determine if and how
  students are aware of their privacy options;
 Surprising discovery that none of them had set their privacy
  filters, and most were completely unaware of the privacy
  options available to them;
 Critical to get the message out that while social networking
  websites can be addictive, they can also be dangerous;
 Important to make students aware that when they choose to
  connect with their friends through a social networking
  website, they must remember that it is they who are
  ultimately responsible for determining what information they
  share with others – which led us to the 5Ps.
Talking to YOUTH:           Logo	
  del	
  
              Beware of the 5Ps           ponente	
  




 IPC has spoken at a number of schools and
  universities reaching out to students
  regarding how they can stay safe, and in
  control, while online. Our message to them has
  been to always beware of the 5 Ps:
     1. Predators
     2. Parents
     3. Professors (Teachers)
     4. Prospective employers
     5. Police
When Online       Logo	
  del	
  
                   Gets Out of Line   ponente	
  


  niversity and high school
 U
 students need to consider all the
 potential implications before
 posting personal information to
 online social networking sites;
  t is important that students
 I
 take the time to make informed
 choices about the site they use,
 the information they post and
 those with whom they choose to
 share their information;
 Going on “automatic pilot” online
 is a bad idea… always think
 before you click!
How to Protect your Privacy   Logo	
  del	
  
                     on Facebook            ponente	
  




  hen you sign up as a user
 W
 of Facebook, the default
 settings allow all other
 Facebook users to find you
 in searches;
  y default, your name and
 B
 thumbnail profile picture
 can also be found on public
 search engines. Facebook
 has selected these settings
 based on what it believes
 most users want, but you
 can always change them to
 restrict access to your
 information, as you see fit.
Be a Player: Take Control   Logo	
  del	
  
                      of your Privacy        ponente	
  



  ssues covered in our
 I
 Facebook video include:
    Weak privacy controls,
    Intrinsic risks involved in
     using them,
                                  I
    Some of the protections
     students should be aware of
     when posting their personal
     information online., such as
     being able to control access
     to one’s profile and being
     able to block access to
     specific information.

  his video can be viewed at
 T
 www.ipc.on.ca
IPC Youth                              Logo	
  del	
  

                             Conference                              ponente	
  



 Last year, the IPC held a conference, Youth Privacy Online: Take Control,
  Make It Your Choice! – attended by professionals from a diverse range
  of public and private sector organizations including education, technology
  and social studies.
 The conference also highlighted the work of my office in developing and
  distributing educational materials to schools. To date, we have distributed:
    •  8,500 copies of our brochure – When Online Gets Out of Line:
       Privacy - Make an Informed Online Choice
    •  7,000 copies of our Tip Sheet – How to Protect Your Privacy on
       Facebook
    •  500 copies of our brochure – Reference Check: Is Your Boss
       Watching? Privacy and Your Facebook Profile
    •  500 copies of our DVD – Be A Player: Take Control of Your Privacy
       on Facebook
 We have also recently updated our IPC School-Kits to include material on
  how to safely navigate and engage in online social activities.
Logo	
  del	
  
                      IPC School Kits                              ponente	
  



  he IPC has been distributing
 T
 school kits all across Ontario for
 more than a decade;
  hese kits target Grades 5, 10, 11,
 T
 and 12;
  he kits are designed to assist
 T
 educators in teaching children about
 various topics including: privacy;
 personal information; open
 government; transparency; freedom
 of information laws; and how to
 access government information.
  s part of a major update,
 A
 additional lessons about online social
 networking are being added to the
 teachers' kits.

                 www.ipc.on.ca/images/Resources/grade-10-e-2008_802919762855.pdf
Privacy Enhacing                  Logo	
  del	
  
                                                   ponente	
  
                   Technologies
 Privacy Enhancing Technologies include those that
  empower individuals to manage their own identities in
  a privacy enhancing manner. These include tools or
  systems to:
        ecurely manage login IDs and passwords and
       S
       other authentication requirements;
        estrict traceability and limit surveillance;
       R
        llow users to selectively disclose their
       A
       personal information to others and exert
       maximum control over their information once
       disclosed.
Future of             Logo	
  del	
  
                                    ponente	
  
               Privacy
  nsist / demand that privacy be built in
 I
 to the design of applications and
 processes;
  iven the extent and reach of
 G
 technology, without Privacy by Design,
 we will inevitably lose our ability to
 protect our privacy.
                         rivacy = Freedom
                         P
Contact Us!
                    Logo	
  del	
  
                    ponente	
  




         Gracias!

Más contenido relacionado

La actualidad más candente

Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Privacy-by-Design Cavoukian TTI March 2011
Privacy-by-Design Cavoukian TTI March 2011Privacy-by-Design Cavoukian TTI March 2011
Privacy-by-Design Cavoukian TTI March 2011Bern Grush
 
Accenture - Innovation at Work
Accenture - Innovation at WorkAccenture - Innovation at Work
Accenture - Innovation at WorkRobert Casselman
 
Digital literacy 1
Digital literacy 1Digital literacy 1
Digital literacy 1mj_jamal
 
Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Researchsiswarren
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesJohn Macasio
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Mobility, Context, Interactions and Data
Mobility, Context, Interactions and DataMobility, Context, Interactions and Data
Mobility, Context, Interactions and DataCarlos Enrique Ortiz
 

La actualidad más candente (9)

Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Privacy-by-Design Cavoukian TTI March 2011
Privacy-by-Design Cavoukian TTI March 2011Privacy-by-Design Cavoukian TTI March 2011
Privacy-by-Design Cavoukian TTI March 2011
 
Accenture - Innovation at Work
Accenture - Innovation at WorkAccenture - Innovation at Work
Accenture - Innovation at Work
 
Digital literacy 1
Digital literacy 1Digital literacy 1
Digital literacy 1
 
Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Tutor Guide 09
Tutor Guide 09Tutor Guide 09
Tutor Guide 09
 
Mobility, Context, Interactions and Data
Mobility, Context, Interactions and DataMobility, Context, Interactions and Data
Mobility, Context, Interactions and Data
 

Destacado

GRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasGRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasCTIC Technology Centre
 
Ist Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTIst Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTCTIC Technology Centre
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyCTIC Technology Centre
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road aheadCTIC Technology Centre
 
11 1 asiria general
11 1 asiria general11 1 asiria general
11 1 asiria generalJOSE ARIAS
 
Music Origins Project Educational Overview
Music Origins Project Educational OverviewMusic Origins Project Educational Overview
Music Origins Project Educational OverviewDavid Grandison Jr
 
How and When to Pivot - Lean Startup Principles Applied
How and When to Pivot  - Lean Startup Principles AppliedHow and When to Pivot  - Lean Startup Principles Applied
How and When to Pivot - Lean Startup Principles AppliedDavid Binetti
 
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...CTIC Technology Centre
 
Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Mellember
 

Destacado (19)

GRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradorasGRACIAS a todas nuestras entidades colaboradoras
GRACIAS a todas nuestras entidades colaboradoras
 
The NICAM approach
The NICAM approachThe NICAM approach
The NICAM approach
 
WebGUI Developers Workshop
WebGUI Developers WorkshopWebGUI Developers Workshop
WebGUI Developers Workshop
 
1st Congress Speech Final
1st Congress Speech Final1st Congress Speech Final
1st Congress Speech Final
 
Ist Intermational Congress Children In ICT
Ist Intermational Congress Children In ICTIst Intermational Congress Children In ICT
Ist Intermational Congress Children In ICT
 
The NICAM approach
The NICAM approachThe NICAM approach
The NICAM approach
 
SafeLine: towards a safer Internet
SafeLine: towards a safer InternetSafeLine: towards a safer Internet
SafeLine: towards a safer Internet
 
01. menorestic2010 richardson
01. menorestic2010 richardson01. menorestic2010 richardson
01. menorestic2010 richardson
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Children Online Protection
Children Online ProtectionChildren Online Protection
Children Online Protection
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road ahead
 
La Generación i
La Generación iLa Generación i
La Generación i
 
11 1 asiria general
11 1 asiria general11 1 asiria general
11 1 asiria general
 
Music Origins Project Educational Overview
Music Origins Project Educational OverviewMusic Origins Project Educational Overview
Music Origins Project Educational Overview
 
How and When to Pivot - Lean Startup Principles Applied
How and When to Pivot  - Lean Startup Principles AppliedHow and When to Pivot  - Lean Startup Principles Applied
How and When to Pivot - Lean Startup Principles Applied
 
Agnieszka Wrzesien
Agnieszka WrzesienAgnieszka Wrzesien
Agnieszka Wrzesien
 
Startup Case Study
Startup Case StudyStartup Case Study
Startup Case Study
 
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
Digital Backpacks, Pockets and Purses... New Access, Risks, and Approaches...
 
Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0Recursos temáticas en la web 2.0
Recursos temáticas en la web 2.0
 

Similar a Youth Privacy

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmRiina Vuorikari
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipdarlinga
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
 
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceIoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceChristopher P. Williams
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...ESET
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Principles of Digital Literacy.pptx
Principles of Digital Literacy.pptxPrinciples of Digital Literacy.pptx
Principles of Digital Literacy.pptxSomendraSingh48
 

Similar a Youth Privacy (20)

Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmDigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
DigComp - Konferens om skolans digitalisering, 8 sep, Stockholm
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
 
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceIoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Principles of Digital Literacy.pptx
Principles of Digital Literacy.pptxPrinciples of Digital Literacy.pptx
Principles of Digital Literacy.pptx
 

Más de CTIC Technology Centre

Estudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroEstudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroCTIC Technology Centre
 
Identidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesIdentidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesCTIC Technology Centre
 
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...CTIC Technology Centre
 
Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)CTIC Technology Centre
 
Contribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaContribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaCTIC Technology Centre
 
Por un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasPor un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasCTIC Technology Centre
 
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasLas TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasCTIC Technology Centre
 

Más de CTIC Technology Centre (20)

Estudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuroEstudio tecnologias cientificos futuro
Estudio tecnologias cientificos futuro
 
Comunidad de aprendizaje
Comunidad de aprendizajeComunidad de aprendizaje
Comunidad de aprendizaje
 
Escuela 2.0
Escuela 2.0Escuela 2.0
Escuela 2.0
 
Aprender a comunicar en la red
Aprender a comunicar en la redAprender a comunicar en la red
Aprender a comunicar en la red
 
Corresponsabilidad
CorresponsabilidadCorresponsabilidad
Corresponsabilidad
 
Educar Comunicando
Educar ComunicandoEducar Comunicando
Educar Comunicando
 
Identidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes socialesIdentidad digital, datos personales y redes sociales
Identidad digital, datos personales y redes sociales
 
Habbo
HabboHabbo
Habbo
 
Privacidad en Tuenti
Privacidad en TuentiPrivacidad en Tuenti
Privacidad en Tuenti
 
Inclusión digital en el aula
Inclusión digital en el aulaInclusión digital en el aula
Inclusión digital en el aula
 
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
Experiencias integrales de introducción de las TIC en el aula y el hogar. (Fe...
 
05. identidad digitalmenorestic (1)
05. identidad digitalmenorestic (1)05. identidad digitalmenorestic (1)
05. identidad digitalmenorestic (1)
 
Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)Radiografía de Riesgos (Informática64)
Radiografía de Riesgos (Informática64)
 
Radiografía de Riesgos (Protégeles)
Radiografía de Riesgos (Protégeles)Radiografía de Riesgos (Protégeles)
Radiografía de Riesgos (Protégeles)
 
Radiografía de los riesgos.
Radiografía de los riesgos.Radiografía de los riesgos.
Radiografía de los riesgos.
 
Salud, cine y pantallas sanas
Salud, cine y pantallas sanasSalud, cine y pantallas sanas
Salud, cine y pantallas sanas
 
Salud, cine y pantallas sanas
Salud, cine y pantallas sanasSalud, cine y pantallas sanas
Salud, cine y pantallas sanas
 
Contribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industriaContribuyendo a la ciudadanía digital: el rol de la industria
Contribuyendo a la ciudadanía digital: el rol de la industria
 
Por un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en CanariasPor un uso seguro y responsable de las TIC en Canarias
Por un uso seguro y responsable de las TIC en Canarias
 
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticasLas TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
Las TIC y la Seguridad en la Comunidad Educativa: Producciones didácticas
 

Youth Privacy

  • 1. Privacy by Design: 1er Congreso Internacional Menores en las TIC Educando para una Internet más segura Palacio de Congresos – Recinto Ferial Luis Adaro (Gijón) Estella Cohen, Information and Privacy 27 y 28 de octubre de 2009 Commissioner’s Office Ontario, Canada
  • 2. Logo  del   Focus of our Discussion ponente    The Office of Information and Privacy Commissioner’s Office of Ontario, Canada plays a major role in providing education and awareness to ensure strong privacy protections are in place.   Fostering the value of privacy in a global environment;   Using SmartPrivacy to ensure personal information is appropriately managed;   Building in Privacy by Design principles from the outset;   Advancing Privacy Enhancing Technologies- (PETs)   Future of Privacy?
  • 3. The Value of Logo  del   ponente   Privacy   rivacy is a key value in our democratic P society. Critical component to our freedom and rights;   rivacy means that we control information P about ourselves. Privacy lets us decide who will know what about ourselves.   rivacy = Freedom P
  • 4. Technology... A Logo  del   blessing or curse? ponente     Privacy transcends jurisdiction…   Technology knows no borders.
  • 5. Logo  del   ponente   Privacy by Design — “The sine qua non” Security Fair Information Practices “Smart Privacy is the umbrella that offers the complete suite of protections to ensure data privacy. It consists of multiple measures ranging from regulatory protections to education and awareness, but one measure stands out as the sine qua non: Privacy by Design.” Dr. Ann Cavoukian, Information & Privacy Commissioner of Ontario, Canada, August 13, 2009.
  • 6. 7 Foundational Logo  del   Principles ponente   1.  Proactive not Reactive; Preventative not Remedial 2.  Privacy as the Default 3.  Privacy Embedded into Design 4.  Full Functionality: Positive-Sum, not Zero-Sum 5.  End-to-End Lifecycle Protection 6.  Visibility and Transparency 7.  Respect for User Privacy Available at www.privacybydesign.ca
  • 7. Our work with Logo  del   FACEBOOK ponente    In 2005, Facebook approached our Office seeking input on their privacy measures;  We convened a student focus group to determine if and how students are aware of their privacy options;  Surprising discovery that none of them had set their privacy filters, and most were completely unaware of the privacy options available to them;  Critical to get the message out that while social networking websites can be addictive, they can also be dangerous;  Important to make students aware that when they choose to connect with their friends through a social networking website, they must remember that it is they who are ultimately responsible for determining what information they share with others – which led us to the 5Ps.
  • 8. Talking to YOUTH: Logo  del   Beware of the 5Ps ponente    IPC has spoken at a number of schools and universities reaching out to students regarding how they can stay safe, and in control, while online. Our message to them has been to always beware of the 5 Ps: 1. Predators 2. Parents 3. Professors (Teachers) 4. Prospective employers 5. Police
  • 9. When Online Logo  del   Gets Out of Line ponente     niversity and high school U students need to consider all the potential implications before posting personal information to online social networking sites;   t is important that students I take the time to make informed choices about the site they use, the information they post and those with whom they choose to share their information;  Going on “automatic pilot” online is a bad idea… always think before you click!
  • 10. How to Protect your Privacy Logo  del   on Facebook ponente     hen you sign up as a user W of Facebook, the default settings allow all other Facebook users to find you in searches;   y default, your name and B thumbnail profile picture can also be found on public search engines. Facebook has selected these settings based on what it believes most users want, but you can always change them to restrict access to your information, as you see fit.
  • 11. Be a Player: Take Control Logo  del   of your Privacy ponente     ssues covered in our I Facebook video include:  Weak privacy controls,  Intrinsic risks involved in using them, I  Some of the protections students should be aware of when posting their personal information online., such as being able to control access to one’s profile and being able to block access to specific information.   his video can be viewed at T www.ipc.on.ca
  • 12. IPC Youth Logo  del   Conference ponente    Last year, the IPC held a conference, Youth Privacy Online: Take Control, Make It Your Choice! – attended by professionals from a diverse range of public and private sector organizations including education, technology and social studies.  The conference also highlighted the work of my office in developing and distributing educational materials to schools. To date, we have distributed: •  8,500 copies of our brochure – When Online Gets Out of Line: Privacy - Make an Informed Online Choice •  7,000 copies of our Tip Sheet – How to Protect Your Privacy on Facebook •  500 copies of our brochure – Reference Check: Is Your Boss Watching? Privacy and Your Facebook Profile •  500 copies of our DVD – Be A Player: Take Control of Your Privacy on Facebook  We have also recently updated our IPC School-Kits to include material on how to safely navigate and engage in online social activities.
  • 13. Logo  del   IPC School Kits ponente     he IPC has been distributing T school kits all across Ontario for more than a decade;   hese kits target Grades 5, 10, 11, T and 12;   he kits are designed to assist T educators in teaching children about various topics including: privacy; personal information; open government; transparency; freedom of information laws; and how to access government information.   s part of a major update, A additional lessons about online social networking are being added to the teachers' kits. www.ipc.on.ca/images/Resources/grade-10-e-2008_802919762855.pdf
  • 14. Privacy Enhacing Logo  del   ponente   Technologies  Privacy Enhancing Technologies include those that empower individuals to manage their own identities in a privacy enhancing manner. These include tools or systems to:   ecurely manage login IDs and passwords and S other authentication requirements;   estrict traceability and limit surveillance; R   llow users to selectively disclose their A personal information to others and exert maximum control over their information once disclosed.
  • 15. Future of Logo  del   ponente   Privacy   nsist / demand that privacy be built in I to the design of applications and processes;   iven the extent and reach of G technology, without Privacy by Design, we will inevitably lose our ability to protect our privacy.   rivacy = Freedom P
  • 16. Contact Us! Logo  del   ponente   Gracias!