second term

Cards (49)

  • Web browser
    Software application used to access information on the World Wide Web
  • Web browsers
    • Google Chrome
    • Mozilla Firefox
    • Safari
  • Private browsing

    Feature available in most web browsers that allows users to browse the internet without storing local data such as browsing history, cookies, or temporary files
  • Private browsing
    • Prevents the browser from storing data locally on the user's device, such as browsing history, cookies, and temporary files
    • Typically disables tracking mechanisms used by websites and advertisers to monitor user activity
  • Private browsing does not prevent the user's internet service provider, employer, or the websites themselves from tracking their activity
  • Private browsing does not provide complete anonymity, as the user's IP address can still be logged by websites
  • Internet cookie
    Small piece of data stored on the user's device by websites they visit
  • Cookies
    • Used to remember user preferences, login information, and other browsing data to enhance the user experience and facilitate website functionality
  • Disabling cookies
    Increased privacy and security, as it prevents websites from tracking user activity and collecting personal information
  • Disabling cookies
    Can hinder the functionality of certain websites, as they rely on cookies to remember user preferences, maintain login sessions, and provide personalized content
  • Hackers could misuse cookies
    • Steal session cookies to hijack user sessions and gain unauthorized access to accounts
    • Use tracking cookies to monitor and collect sensitive information about users' online activities for malicious purposes
  • Digital footprint
    The trail of data left behind by interactions in the digital world, including social media activity, online purchases, and website visits
  • Active digital footprints
    • Intentionally created, like posting on social media or filling out online forms
  • Passive digital footprints

    • Generated without direct user action, such as website cookies or IP addresses tracked by websites
  • Managing cookies to reduce digital footprint
    1. Regularly clear browser cookies
    2. Use private browsing modes
  • Private browser
    Does not store browsing history, cookies, or other data locally on the device, preventing websites from tracking online activity and maintaining higher privacy
  • VPN (Virtual Private Network)

    Encrypts internet connection and routes traffic through a remote server, hiding IP address and location
  • Using a VPN to manage digital footprint
    1. Encrypt internet traffic
    2. Hide IP address
    3. Connect to VPN servers in different countries to access geo-restricted content and bypass censorship
  • TOR browser

    Web browser that routes internet traffic through a network of volunteer-operated servers, encrypting it multiple times
  • Using the TOR browser to manage digital footprint
    1. Browse the internet anonymously
    2. Routing traffic through multiple servers makes it challenging for anyone to track online activities
  • Privacy
    The right of individuals to control their personal information and to keep it protected from unauthorized access or use
  • Privacy laws and regulations

    Safeguard individuals' personal information and ensure that organizations handle it responsibly
  • Privacy policy
    A document that outlines how an organization collects, uses, stores, and protects the personal information of individuals
  • Privacy notice

    A specific type of communication provided by an organization to individuals whose personal information it collects, informing them about how their data will be processed, who will have access to it, and for what purposes it will be used
  • The LFPDPPP (Law for the Protection of Personal Data Held by Private Parties) was published in Mexico
    2010
  • Goal of the LFPDPPP
    Regulate the handling of personal data by private entities operating in Mexico, protect the privacy rights of individuals by establishing principles for the lawful collection, use, storage, and disclosure of personal information, and outline the rights of individuals regarding their data
  • ARCO
    Access: The right to access personal data held by an organization
  • ARCO
    RectificationThe right to request the correction of inaccurate or incomplete personal data
  • Cancellation
    The right to request the deletion or removal of personal data when it's no longer necessary for the purposes for which it was collected, or when consent is withdrawn
  • Opposition
    The right to object to the processing of personal data for certain purposes, such as direct marketing
  • COPPA

    Children's Online Privacy Protection Act
  • Operators of online services must comply with COPPA by

    1. Obtaining verifiable parental consent before collecting personal information from children under 13
    2. Providing parents with notice about the types of personal information being collected from their children, how it will be used, and the disclosure practices
    3. Giving parents the option to review and delete their children's personal information and to prevent further collection or use
    4. Maintaining the confidentiality, security, and integrity of personal information collected from children
  • Olimpia Law

    Inspired by the case of Olimpia Coral Melo Cruz, a Mexican woman who became a victim of non-consensual pornography (often referred to as "revenge porn"), leading to calls for legal reforms to address the issue of online harassment and the unauthorized dissemination of intimate images
  • What the Olimpia Law prosecutes

    The unauthorized dissemination of intimate images, commonly known as "revenge porn," criminalizing the non-consensual sharing of intimate images or videos with the intent to cause harm, embarrassment, or distress to the person depicted
  • Olimpia Law

    Officially referred to as a set of reforms incorporated into Mexico's Federal Criminal Code (Código Penal Federal), a larger law encompassing various criminal offenses and penalties at the federal level
  • What can happen to entities that violate COPPA regulations?
    civil penalties of up to $42,530 per violation. Additionally, the Federal Trade Commission (FTC), which enforces COPPA, can bring enforcement actions against violators, which may result in injunctions, monetary fines, and other remedies.
  • What ARCO stands for
    1. Access
    2. Rectification
    3. Cancellation
    4. Opposition
  • How can phishing enable certain cybercrimes?
    Phishing can enable certain cybercrimes by tricking individuals into divulging sensitive information such as usernames, passwords, or financial details.
  • What is cyberstalking? How can we combat it?
    Type of hacking where scammers attempt to extract sensitive personal data by impersonating a trusted source and then providing the victim a link that contains malware or leads to an illegitimate website.
  • CYBERCRIME
    It can be carried out by individuals or organizations.
    Individuals can be highly skilled or complete novices.