SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Privacy and personal
information
Table of content
ď‚› What is privacy and personal information
ď‚› What is privacy of personal information
ď‚› Privacy and Personal Information at profession place
ď‚› Privacy and Personal Information at internet
ď‚› Privacy and Personal Information Advantages
Privacy and Personal information
ď‚› Privacy means secrecy and protection
ď‚› In this technology area mostly peoples
Personal information means recorded information about an
identifiable individual, including,
ď‚› a person's name, address, phone number or email address
ď‚› a photograph of a person
ď‚› a video recording of a person, whether CCTV or otherwise, for
example, a recording of events in a classroom, at a train station, or
at a family barbecue
ď‚› a person's salary, bank account or financial details
Continue…………..
ď‚› the fact that a person is a member, or leader, of an association
and their attendance at meetings
ď‚› a person's medical details or health information
ď‚› a person's fingerprints or blood type
ď‚› details about a person's religious or sexual preferences
privacy of personal information
An important goal of data privacy is to ensure that data in transit and data at rest is always
protected while still allowing the flow of information.
ď‚› Legislation, policies and best practices for data privacy cover:
ď‚› Internet privacy (online privacy): All personal data shared over the Internet is subject to
privacy issues. Most websites publish a privacy policy that details the website's intended
use of collected online and/or offline collected data.
ď‚› Financial privacy: Financial information is particularly sensitive, because while it is often
protected by law, it can easily be used to commit online and/or offline fraud.
ď‚› Medical privacy: All medical records are subject to stringent laws that address user
access privileges. By law, security and authentication systems are often required for
individuals that process and store medical records
Continue…………….
 Personal information privacy, “the ability of the individual to personally
control information about oneself”
ď‚› It is fast becoming one of the most important ethical issues of our
information age.
ď‚› Information technology developments coupled with the increasing value of
information to decision makers are causing a rising tide of concern about
personal information privacy management practices.
 As such concerns continue to grow, businesses’ ability to use personal
information may be threatened, and decision makers will have to make
trade-offs between the efficient, effective operation of businesses and the
protection of personal information privacy
Privacy at the Work place
ď‚› Privacy in the workplace is one of the more troubling personal and
professional issues of our time.
ď‚› But privacy cannot be adequately addressed without considering a
basic foundation of “ethics.”
ď‚› We cannot reach a meaningful normative conclusion about
workplace privacy rights and obligations
ď‚› without a fundamental and common understanding of the ethical
basis of justice and a thorough understanding of the individual and
organizational concerns and motivations.
Cnotinue…………
 Confidentially and Information’s misuse
ď‚› Ethical practices at the workplace is one of the most important practice
through which you can attract the customers and peoples to your
organization
ď‚› You must respect the confidentiality of your employers.
ď‚› You must responsible for their personal information.
 that’s why it is necessary to safe their data.
ď‚› You should not to misuse the employers personal data .
Continue…………
As a employers your responsibility
ď‚› If you are employers of A company and you spend two or more
years or any of time of your life then you also learned some
experienced about the strategies of A company . Due to the
some issues if you leave the A company and join the B
company then this is your responsibility for you to don’t discuss
the weak points of A company to B company and prohibited to
discuss the secretes of A company to
B company .
Privacy and personal information at internet
ď‚› Is You think that your data is safe or not
ď‚› Internet is one of the most popular and most useable platform
ď‚› Internet technology has made personal data collection more widespread
than ever before.
ď‚› Today, personal information is stored in a variety of places.
ď‚› For instance, web applications, social media platforms, ad networks,
employers, or healthcare providers all might have data about a given
person stored in digital form on servers all over the world. This has
important implications for data privacy as people may have less control
over who can see their personal information than they want.
ď‚›
Continue…………..
ď‚› you share the information either in term of pictures, id card, emails,
phone numbers, audios and videos by using the social medias
ď‚› The big companies commits to share your data to the business
companies or any other institute for the sake of money
ď‚› By using these data the business companies will text you to aware
about their business because the trend is too fast change
ď‚› Instead of all these you must be aware to less use of sharing data as
well as.
Tips to use the internet for safety
ď‚› 1. Disable Ad and Data Tracking
 Most of your personal data collected online isn’t for scams or data breaches
it’s for marketing. With a few simple steps, you can disable many of these
trackers. First, when pop-ups ask if you want to share data, say no.
ď‚› 2. Commit to Sharing Less Online
ď‚› The best step you can take to protect your information from people trying
to scam you to online is to share less of it. We immediately think of social
networks when it comes to sharing information, and that’s a great starting
place. Be especially careful of pictures of you or your loved ones,
geotagged posts, or any information you wouldn’t want strangers to know
about.
Continue ………………
ď‚› 3. Use Strong, Unique Passwords and Two-Factor Authentication
ď‚› Strong passwords are the most important and sometimes the only
protection we have against identify theft and hackers. If you don’t already
have passwords or passcodes for all your devices (including guest
accounts), add them now.
ď‚› 4. Block Search Engines From Tracking You
ď‚› Your search engine collects a huge amount of personal data about you. And
for 90% of us that search engine is Google. The owners of the two largest
search engines Google and Bing also operate the popular browsers
Chrome and Edge, respectively. (So, they track a lot of data.)
Continue……………..
5. Install and run anti-virus, anti-spyware and firewall
programs on mobile device – and keep those programs up-to-
date.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction PoliciesRichard Austin
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyKarthikeyan Dhayalan
 
Effectively Protecting Confidential Infomation
Effectively Protecting Confidential InfomationEffectively Protecting Confidential Infomation
Effectively Protecting Confidential Infomationblewisbell
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?Martin Hawksey
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101April Mardock CISSP
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Rana Muhammad Asif
 
Top 10 information systems interview questions and answers
Top 10 information systems interview questions and answersTop 10 information systems interview questions and answers
Top 10 information systems interview questions and answersEminem789
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...PECB
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy Amiit Keshav Naik
 

Was ist angesagt? (20)

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
GDPR
GDPRGDPR
GDPR
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Effectively Protecting Confidential Infomation
Effectively Protecting Confidential InfomationEffectively Protecting Confidential Infomation
Effectively Protecting Confidential Infomation
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Top 10 information systems interview questions and answers
Top 10 information systems interview questions and answersTop 10 information systems interview questions and answers
Top 10 information systems interview questions and answers
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 

Ă„hnlich wie Privacy and personal information presention of professional practice.pptx

Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Michel Bitter
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacyKatherine Cancelado
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdfAroraRajinder1
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 

Ă„hnlich wie Privacy and personal information presention of professional practice.pptx (15)

Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 

KĂĽrzlich hochgeladen

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 

KĂĽrzlich hochgeladen (20)

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

Privacy and personal information presention of professional practice.pptx

  • 2. Table of content ď‚› What is privacy and personal information ď‚› What is privacy of personal information ď‚› Privacy and Personal Information at profession place ď‚› Privacy and Personal Information at internet ď‚› Privacy and Personal Information Advantages
  • 3. Privacy and Personal information ď‚› Privacy means secrecy and protection ď‚› In this technology area mostly peoples Personal information means recorded information about an identifiable individual, including, ď‚› a person's name, address, phone number or email address ď‚› a photograph of a person ď‚› a video recording of a person, whether CCTV or otherwise, for example, a recording of events in a classroom, at a train station, or at a family barbecue ď‚› a person's salary, bank account or financial details
  • 4.
  • 5. Continue………….. ď‚› the fact that a person is a member, or leader, of an association and their attendance at meetings ď‚› a person's medical details or health information ď‚› a person's fingerprints or blood type ď‚› details about a person's religious or sexual preferences
  • 6. privacy of personal information An important goal of data privacy is to ensure that data in transit and data at rest is always protected while still allowing the flow of information. ď‚› Legislation, policies and best practices for data privacy cover: ď‚› Internet privacy (online privacy): All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website's intended use of collected online and/or offline collected data. ď‚› Financial privacy: Financial information is particularly sensitive, because while it is often protected by law, it can easily be used to commit online and/or offline fraud. ď‚› Medical privacy: All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records
  • 7. Continue……………. ď‚› Personal information privacy, “the ability of the individual to personally control information about oneself” ď‚› It is fast becoming one of the most important ethical issues of our information age. ď‚› Information technology developments coupled with the increasing value of information to decision makers are causing a rising tide of concern about personal information privacy management practices. ď‚› As such concerns continue to grow, businesses’ ability to use personal information may be threatened, and decision makers will have to make trade-offs between the efficient, effective operation of businesses and the protection of personal information privacy
  • 8. Privacy at the Work place ď‚› Privacy in the workplace is one of the more troubling personal and professional issues of our time. ď‚› But privacy cannot be adequately addressed without considering a basic foundation of “ethics.” ď‚› We cannot reach a meaningful normative conclusion about workplace privacy rights and obligations ď‚› without a fundamental and common understanding of the ethical basis of justice and a thorough understanding of the individual and organizational concerns and motivations.
  • 9. Cnotinue………… ď‚› Confidentially and Information’s misuse ď‚› Ethical practices at the workplace is one of the most important practice through which you can attract the customers and peoples to your organization ď‚› You must respect the confidentiality of your employers. ď‚› You must responsible for their personal information. ď‚› that’s why it is necessary to safe their data. ď‚› You should not to misuse the employers personal data .
  • 10. Continue………… As a employers your responsibility ď‚› If you are employers of A company and you spend two or more years or any of time of your life then you also learned some experienced about the strategies of A company . Due to the some issues if you leave the A company and join the B company then this is your responsibility for you to don’t discuss the weak points of A company to B company and prohibited to discuss the secretes of A company to B company .
  • 11. Privacy and personal information at internet ď‚› Is You think that your data is safe or not ď‚› Internet is one of the most popular and most useable platform ď‚› Internet technology has made personal data collection more widespread than ever before. ď‚› Today, personal information is stored in a variety of places. ď‚› For instance, web applications, social media platforms, ad networks, employers, or healthcare providers all might have data about a given person stored in digital form on servers all over the world. This has important implications for data privacy as people may have less control over who can see their personal information than they want. ď‚›
  • 12. Continue………….. ď‚› you share the information either in term of pictures, id card, emails, phone numbers, audios and videos by using the social medias ď‚› The big companies commits to share your data to the business companies or any other institute for the sake of money ď‚› By using these data the business companies will text you to aware about their business because the trend is too fast change ď‚› Instead of all these you must be aware to less use of sharing data as well as.
  • 13. Tips to use the internet for safety ď‚› 1. Disable Ad and Data Tracking ď‚› Most of your personal data collected online isn’t for scams or data breaches it’s for marketing. With a few simple steps, you can disable many of these trackers. First, when pop-ups ask if you want to share data, say no. ď‚› 2. Commit to Sharing Less Online ď‚› The best step you can take to protect your information from people trying to scam you to online is to share less of it. We immediately think of social networks when it comes to sharing information, and that’s a great starting place. Be especially careful of pictures of you or your loved ones, geotagged posts, or any information you wouldn’t want strangers to know about.
  • 14. Continue ……………… ď‚› 3. Use Strong, Unique Passwords and Two-Factor Authentication ď‚› Strong passwords are the most important and sometimes the only protection we have against identify theft and hackers. If you don’t already have passwords or passcodes for all your devices (including guest accounts), add them now. ď‚› 4. Block Search Engines From Tracking You ď‚› Your search engine collects a huge amount of personal data about you. And for 90% of us that search engine is Google. The owners of the two largest search engines Google and Bing also operate the popular browsers Chrome and Edge, respectively. (So, they track a lot of data.)
  • 15. Continue…………….. 5. Install and run anti-virus, anti-spyware and firewall programs on mobile device – and keep those programs up-to- date.