LITE

Subdecks (1)

Cards (161)

  • Etiquette is the rules indicating the proper and polite way to behave
  • Social etiquette is important as it teaches how to behave in society
  • Bathroom etiquette is the set of rules while using public restrooms
  • Meeting etiquette is attending meeting, and seminar, one should bring notepad and pen, listen to the presenter and jot down important points for future references
  • Netiquette is the code of acceptable behaviors users should follow on the internet
    • Short for Internet/Online Etiquette
  • Digital Footprints/Digital Shadow is a trail of data you create while using the internet.
  • Privacy is the right to be left alone - the most comprehensive of rights, and the right most valued by a free people.
  • Information privacy is a combination of:
    • Communications privacy - ability to communicate with others without being monitored by other persons or organizations
    • Data privacy - ability to limit access to one's personal data by other individuals and organizations in order to exercise a substantial degree control over that data and its use
  • Privacy is the key concern of internet users and this is the top reason why nonusers still avoid the internet
  • Fair Credit Reporting Act (1970) regulates operations of credit-reporting bureaus
  • Fair and Accurate Credit Transactions Act (2003) allows consumers to request and obtain a free credit report once each year from each of the three primary consumer credit reporting companies
  • Right to Financial Privacy Act (1978) protects the financial records of financial institution customers from unauthorized scrutiny by the federal government
  • Opt-out policy assumes that consumers approve of companies collecting and storing their personal information
    • Favored by data collectors
  • Opt-in policy must obtain specific permission from consumers before collecting any data
    • Favored by consumers
  • Health Insurance Portability and Accountability Act (1996) improves the portability and continuity of health insurance coverage
  • American Recovery and Reinvestment Act (2009) included strong privacy provisions for electronic health records
  • Children's Online Privacy Protection Act (1998) includes websites catering to children must offer comprehensive privacy policies, notify parents or guardians about its data-collection practices, and receive parental consent before collecting personal information from children under 13
  • Family Education Rights and Privacy Act (1974) assigns rights to parents regarding their children's education records. Rights transfer to student once student becomes 18.
  • Communications Act of 1934 established the Federal Communications Commision (FCC)
  • Title III of the Omnibus Crime Control and Safe Streets Act (Wiretap Act) regulates interception of telephone and oral communcations
  • Freedom to Information Act (1966 amended 1974) grants citizens the right to access certain information and records of the federal government upon request
  • Identity Theft is the theft of key pieces of personal information to impersonate a person
  • Identity Theft is the fastest-growing form of fraud in the United States
  • Data breaches of large databases may be causes by hackers or failure to follow proper security procedures to gain personal identity information
  • Phishing is stealing personal identity data by tricking users into entering information on a counterfeit website
  • Spyware is the keystroke-logging software and enables the capture of account usernames, passwords, and credit card numbers. It operates even if infected computer is not online.
  • Consumer profiling is when companies openly collect personal information about internet users
  • Cookies are the text files that a website can download to visitors' hard drives so that it can identify visitors later
  • Aggregating consumer data are the databases containing a huge amount of consumer behavioral data
  • Types of data collected: GET data, POST data, Click-stream data
  • Personalization software is used by marketers to optimize the number, frequency, and mixture of their ad placements
  • Platform for Privacy Preferences (P3P) shields users from sites that do not provide the level of privacy protection desired
  • Camera surveillance
    • many cities plan to expand surveillance systems
    • advocates argue people have no expectation of privacy in a public place
  • Global positioning system (GPS) chips is placed in many devices and precisely locate users
  • Event refers to schedule one-time activities such as conferences as well as recurring events
  • Google meet holds video meetings such as conduct classes, webinars, meeting and more
  • Privacy enables us to create boundaries and protect ourselves from unwarranted interference in our lives, allowing us to negotiate who we are and how we want to interact with
  • Data privacy is the right of individuals with respect to their personal information
  • Data security ensures the integrity of the data to authorized parties
  • Republic Act 10173 - Data Privacy Act of 2012 is a law that seeks to protect all forms of information, be it private, personal, or sensitive.