Week 8: November 10-14


Communications: Privacy, Reputation. Book: Chapter 22

ITC MIDTERM, due Wednesday, November 12

ITC QUIZ 6, due Sunday, November 16.

ITC ASSIGN 6, due Sunday, November 16.



  • Online Privacy
  • Personal Information Privacy
  • Reputation


Online Privacy
  • The right of personal privacy regarding the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. There are many ways that information about you gets out there.
  • Personally identifying information: information you give when filling out information on a website, such as for registering, getting free downloads, creating a profile, applying for a job, purchasing a product, and otherwise sharing likes and dislikes.
  • Site visitor's behavior: The accumulation of information about your behavior on the web, also captured and stored by websites. This information can be and is usually shared and/or sold to marketing firms and other web services.
  • Public records information: Address, birthdate, relatives, phone number, birth, marriage, divorce, and death records, property info, and bankruptcy info. There are sites that aggregate this info from public records, record them in a database, then sell the info.
  • Privacy policies: A statement or a legal document (privacy law) that discloses some or all of the ways a party gathers, uses, discloses and manages a customer's data.
Risks to online privacy
  • Cookies: A small piece of data stored in a user's web browser while a user is browsing a website. When the user returns, the data stored in the cookie can be retrieved by the website.
  • Photographs: Any individual can be unwillingly tagged with Facial Recognition in a photo and displayed in a manner that might violate them personally in some way. Property locations can be shown on Google Street View.
  • Search engines: Personal information can be revealed through searches by the user's computer, account, or IP address being linked to the search terms used.
  • Social networking preferences and info: Sites like Facebook are responsive to you because of all the information captured by your likes, dislikes, posts, etc.
  • E-commerce: Website cookies and search engines capture your purchasing information. Also, when you make a purchase, your data is stored in the vendor's database and can be packaged and sold.
  • Marketing companies: A person's web surfing habits are collected and sold on to advertisers in order to provide targeted advertising.
  • Employers and recruiters: They can access your public profiles and they do use these to help them decide whether to consider you for jobs you apply for.
Laws and regulations
  • Global privacy: There is no overarching global privacy law although the United Nations has discussed this and the thought is that since the Internet is global, there should also be some unified global policy.
  • Information privacy laws: These cover the protection of information on private individuals from misuse or intentional or unintentional disclosure. The US has not adopted a comprehensive law, while more than 80 other countries/independent territories have.
  • Data protection: The United States prefers what it calls a 'sectoral' approach to data protection legislation, which relies on a combination of legislation, regulation, and self-regulation, rather than governmental regulation alone. The preference seems to be to encourage the private sector to lead.
  • Police/government access: The Electronic Communications Privacy Act of 1986 was enacted by the United States Congress to extend government restrictions to include transmissions of electronic data by computer. Title I protects wire, oral, and electronic communications while in transit and sets down requirements for search warrants that are more stringent. Title II, the Stored Communications Act (SCA), protects communications held in electronic storage, including messages stored on computers. A primary difficulty regarding information in social media is that information is willingly given by customers and might not be considered private as a result.
Controlling your personal information
  • Once information is out there, you don't have much control. You can take a few steps to help stem the flow from now forward.
  • Create your own online profile(s) and control what you choose to share.
  • Limit what information you do share on social networking by allowing only friends and/or trusted contacts to se it, and keeping away from "public" settings.
  • Close unnecessary accounts.
  • Check out some specific tips here. (Eff.org)
  • Microsoft Privacy tips (Microsoft)
  • Some Neat Tools (Techland)
  • From Blake (2/14): Ghostery - tool to block data collection
  • Disconnect
Protecting your own reputation
  • Create your OWN online profile(s) on more than one service and control what you choose to share. Add links to your best reputable online presences - Google Profile, LinkedIn, good articles & tutes you shared, your portfolio, etc.
  • Create your OWN primary web page, wit the links to the above online profiles you control.
  • Never post anything you don't want to see made public in the most embarrassing way possible.
  • Monitor what others post and tag about you. Check out Google's Me on the Web.
  • Microsoft Reputation tips (Microsoft)
  • Monitor your Reputation (SocialFresh)
  • BrandYourself - free version
  • Fix Online Embarassments ( LifeHacker)


Let's check out our reputations.

Interesting Links





  • NO CLASS: Veteran's Day!! SLEEEEEEP!







  • ITC MIDTERM, do in class today, November 12. You have until 11:55pm TODAY ONLY to complete/submit your exam on CANVAS.
  • IF, after class, you have trouble finalizing/submitting your Midterm, PLEASE respond to my HOT-ITC Midterm email with details and a screenshot.
  • Image for 9 Questions about PC Diagram Hardware
  • NOTE: We DO still have an assignment and a quiz due this coming Sunday, like always.



  • ITC MIDTERM, do in class Wednesday, November 12.
  • ITC QUIZ 6: Due Sunday, November 16.
  • ITC ASSIGN 6: Due Sunday, November 16.