SlideShare una empresa de Scribd logo
1 de 7
Personal Information In Internet
Assignment IV
Nadine Morper
Social Media in Marketing
MAR8PO067-2
What is “personal information”?
•
•
•
•

name, address, phone number, email address
nationality, race, origin
religious and political beliefs
age, sex, marital status, family status, sexual
orientation
• finger prints, blood type, health care
history, disabilities
• educational, criminal, employment history
10/27/2013

Assignment IV, N. Morper

2
why is personal information online
risky?
•
•
•
•

employers will check your online profile
danger of cybermobbing
danger of stealing of identities
the internet will never forget
– published data is available for everybody all over
the world and saved forever in the cache

10/27/2013

Assignment IV, N. Morper

3
Special elements and uses of personal
information
• information is collected via
intercourse, interaction, when you use services or
products and even when you browse on the website
• information is used to
– deliver, provide and repair products or services
– save customers billig records, home address and maintain
customer accounts (customer relationship management)
– contact you about current offers, promotions or new
products
– build up a company‘s network
– do research on customer behaviour, preferences and
marketing strategies
10/27/2013

Assignment IV, N. Morper

4
how to avoid this risk and threat
•
•
•
•
•

think before you share
limit the information you share
use strong passwords
limit spam emails
protect your computer with anti-spyware
software and anti-virus programms

10/27/2013

Assignment IV, N. Morper

5
special tipps for avoiding risks when
using Facebook
• use strong password you use nowhere else
• do not upload embarrassing or privat content
• do not publish personal information like address
or phone number
• do not add strangers as friends
• limit who can post to your timeline
• check Facebook‘s security settings regularly
• prevent apps from having access to your
information
10/27/2013

Assignment IV, N. Morper

6
Sources
• https://www.verizon.com/about/privacy
• http://www.businessdictionary.com/definition/p
ersonal-information.html
• http://www.saferinternet.at/datenschutz/
• http://www.klicksafe.de/themen/datenschutz/gr
undlagenwissen/
• Witt, Bernhard: Datenschutz kompakt und
verständlich: Eine praxisorientierte Einführung:
Eine praxisorientierte Einführung und OnlineService
10/27/2013

Assignment IV, N. Morper

7

Más contenido relacionado

Destacado (15)

Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
2 ruslaiana dancedrama
2 ruslaiana dancedrama2 ruslaiana dancedrama
2 ruslaiana dancedrama
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
Rmj2012 summary
Rmj2012 summaryRmj2012 summary
Rmj2012 summary
 
Video games
Video gamesVideo games
Video games
 
vmware optimization
vmware optimizationvmware optimization
vmware optimization
 
Blogger !!
Blogger !!Blogger !!
Blogger !!
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
Rural Minnesota Journal: About the authors
Rural Minnesota Journal: About the authorsRural Minnesota Journal: About the authors
Rural Minnesota Journal: About the authors
 
Twitter
TwitterTwitter
Twitter
 
Cele mai importante inventii din istorie
Cele mai importante inventii din istorieCele mai importante inventii din istorie
Cele mai importante inventii din istorie
 
Walter
WalterWalter
Walter
 
1
11
1
 

Más de HHSome

Assignment4
Assignment4Assignment4
Assignment4HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonHHSome
 
Social engineering
Social engineeringSocial engineering
Social engineeringHHSome
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessHHSome
 
Over posting
Over postingOver posting
Over postingHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingHHSome
 
Phishing
PhishingPhishing
PhishingHHSome
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsHHSome
 
Malware
MalwareMalware
MalwareHHSome
 

Más de HHSome (19)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Assignement iv

  • 1. Personal Information In Internet Assignment IV Nadine Morper Social Media in Marketing MAR8PO067-2
  • 2. What is “personal information”? • • • • name, address, phone number, email address nationality, race, origin religious and political beliefs age, sex, marital status, family status, sexual orientation • finger prints, blood type, health care history, disabilities • educational, criminal, employment history 10/27/2013 Assignment IV, N. Morper 2
  • 3. why is personal information online risky? • • • • employers will check your online profile danger of cybermobbing danger of stealing of identities the internet will never forget – published data is available for everybody all over the world and saved forever in the cache 10/27/2013 Assignment IV, N. Morper 3
  • 4. Special elements and uses of personal information • information is collected via intercourse, interaction, when you use services or products and even when you browse on the website • information is used to – deliver, provide and repair products or services – save customers billig records, home address and maintain customer accounts (customer relationship management) – contact you about current offers, promotions or new products – build up a company‘s network – do research on customer behaviour, preferences and marketing strategies 10/27/2013 Assignment IV, N. Morper 4
  • 5. how to avoid this risk and threat • • • • • think before you share limit the information you share use strong passwords limit spam emails protect your computer with anti-spyware software and anti-virus programms 10/27/2013 Assignment IV, N. Morper 5
  • 6. special tipps for avoiding risks when using Facebook • use strong password you use nowhere else • do not upload embarrassing or privat content • do not publish personal information like address or phone number • do not add strangers as friends • limit who can post to your timeline • check Facebook‘s security settings regularly • prevent apps from having access to your information 10/27/2013 Assignment IV, N. Morper 6
  • 7. Sources • https://www.verizon.com/about/privacy • http://www.businessdictionary.com/definition/p ersonal-information.html • http://www.saferinternet.at/datenschutz/ • http://www.klicksafe.de/themen/datenschutz/gr undlagenwissen/ • Witt, Bernhard: Datenschutz kompakt und verständlich: Eine praxisorientierte Einführung: Eine praxisorientierte Einführung und OnlineService 10/27/2013 Assignment IV, N. Morper 7