Safer Internet: Develop a Privacy Strategy

Summary | Policy/Law | Planning | Behavior | Technology |
References: General | Policy/Law | Plan | Behavior | Technology


Summary

  • This course will provide both...
  • Parts of a possible strategy:
  • Policy & Law, e.g., read privacy policies, lobby government representatives
  • Planning, e.g., important services/features vs. privacy & security? tradeoffs; cost? risks?
  • Behavior, e.g., strong passwords; backup; update; think before you click or post (or signup)
  • Technology, e.g., password manager, encryption
  • (References)

Policy / Law

  • "Relying on the government to protect your privacy is like...
  • "Privacy policies" specify how your information will be used / shared -- no guarantee of protection or enforcement;
    if you have some time, peruse -- rather than blindly accept
  • Privacy policies and settings may protect you against other users, but not against misuse or carelessness by the company itself or its advertising/business partners
  • Most companies do not provide details about robustness of their security practices (because they're clueless, embarassed?)
  • Terms & Conditions and Privacy Policies can change without notice, usually not for the benefit of users
  • e.g., Linkedin: (link is external)User Agreement (T&C), (link is external)Privacy Policy; also: Ad Choices; Community Guidelines; Cookie Policy; Copyright Policy
  • (link is external)My Data Request summarizes/links to privacy policies at over 100 different companies
  • Government regulations & laws usually lag the technology;
    if they exist, they often favor corporate donors, lobbyists and surveillance agencies over consumers

Planning

  • "Anything that can go wrong,...
  • from (link is external)EFF: Assessing Your Risks: Threat Modeling:
  • "What do you want to protect?"
  • "Who do you want to protect it from?"
  • "How likely is it that you will need to protect it?"
  • "How bad are the consequences if you fail?"
  • "How much trouble are you willing to go through in order to try to prevent those?"
  • Consider risks & needs by:
  • location: home, school, work, vacation
  • task: banking, searching, communicating, entertainment
  • device: phone, tablet, computer, etc.
  • type of information: required, optional, sensitive, personal
  • convenience: all mail, calendar, search, payments, passwords with one trusted provider, or different places?
  • What is the business product model of companies you use?
  • e.g., Facebook, Google (advertising) vs. Apple (hardware)
  • How "free" are their services? Do they track you, and sell/share your info?
  • How does company respond to mistakes? Do you trust them?
  • Will they admit and fix a problem, or deny and repeat?
  • If their privacy settings don't protect your data, delete account and/or switch providers?
  • Cost of your time & attention: would you rather be doing something else with your life vs. fake news/gossip, cute videos, tweaking settings, ...?

Behavior

  • "The only people who like change...
  • "Just because you can't do everything...
  • "Hoaxes use weaknesses in human behavior...
  • "We are all robots when...
  • "Denial...
  • Accept that some changes are necessary; to get the most out of this class, some homework is required.
  • Invest attention and energy upfront to be proactive before problems occur.
  • Since it would overwhelming to do everything that we'll discuss immediately, be selective and phase in gradually over months
    -- maybe even take the class again next year!
  • Learn good habits, such as backing up regularly, updating software, choosing strong passwords, storing passwords securely,
    logging out when not using your computer; connecting to known, encrypted WiFi networks, etc.
  • TV / movies often unrealistic when portraying security threats / practices
  • Consider eliminating certain sites altogether, e.g., social media
  • Before: minimize personal information that you provide / volunteer, e.g., Facebook
  • After: inspect companies' data about you -- see What, e.g., Apple, Facebook, Google
  • [2] After: purge info from data brokers
  • Avoid installing malware inadvertently, e.g., clicking on links in suspicious emails, panicking & responding to scary popups
  • "Social Engineering" can often defeat many otherwise secure systems -- especially if request comes from harried "boss",
    desperate "friend", incarcerated "grandchild", irate "customer", e.g., phishing, fake sites
  • (link is external)Quiz: What's Your Privacy Personality? Are You a Believer, Realist or Shrugger? (scroll to bottom)
  • PICNIC: "Problem In Chair, Not In Computer",
    or
    PEBKAC: "Problem Exists Between Keyboard And Chair"

    the "Pledge": don't do anything stupid! {TCYOP-4: 48-50; TCYOP-3: 36-38;}

  • [3] Cyberinsurance? Hire Security Consultant? Pray?
Non-expert Online Practices
1. Use Antivirus Software
2. Use Strong Passwords
3. Change Passwords Frequently
4. Only Visit Websites They Know
5. Don't Share Personal Info
(link is external)Expert Online Practices
1. Install Software Updates
2. Use Unique Passwords
3. Use Multi-Factor Authentication
4. Use Strong Passwords
5. Use a Password Manager

Technology

  • "If you think technology can solve your security problems,...
  • "Technology is...
  • "1) Everything that's already in the world when you're born is just normal;...
  • "1) When a distinguished but elderly scientist states that something is possible,...
  • A single technology fix may not be adequate: multiple technologies and/or behavior changes may be needed.
  • Start by making one-time changes, such as more secure passwords, system & browser settings, privacy options on social networking sites, etc.
  • Advice & tools change over time -- security is akin to game of "whack-a-mole"
  • Ongoing: check vendor sites for updates; refer back here to course summaries & reference articles

summaryReferences

Policy/Law

Plan

Behavior

Technology