Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
What is data privacy?
1. What is Data Privacy?
Quick HealTechnologies Private Limited
2. Topics of Discussion:
• What is Data Privacy?
• Types Of Information Under Privacy Concerns
• Common Sources Of Data Information
• The Most Brutal Data Breaches Of 2014
• Indian Scenario
• The InformationTechnology Amendment Act, 2008
• The Do's and Don’ts To ProtectYour Data Privacy
• How can Quick Heal help?
3. What is Data Privacy?
• The relationship between collection and dissemination of data
technology, the public expectation of privacy.
• Privacy concerns exist wherever personally identifiable information
or other sensitive information is collected and stored – in digital
form or otherwise.
http://en.wikipedia.org/wiki/Information_security
5. http://en.wikipedia.org/wiki/Information_security
Information Under Privacy Concerns
• Internet Data - e-mail id's, passwords, browsing history
• Medical Records - Insurance Policies, PsychologicalConditions, Medical History
• Financial Data -Transactions,Credit Card Numbers, Stocks Held,Total Assets, Debts, etc.
• Locational Data - salesforce movements, travel locations, banks visited
• CableTelevision, Educational & Political Data
6. Common Sources Of Data Information
• Healthcare & Hospital Records
• Financial Institutions &Transactions
• Residence & Geographic Records
• Location Based Services
• Mobile & Desktop Applications, Browsers
• TelevisionViewing Records
http://en.wikipedia.org/wiki/Information_security
10. http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html
JP Morgan Chase - July 2014
• The biggest bank in the US, JP Morgan Chase’s systems were breached by hackers in July.
• JPMorgan apparently neglected to upgrade one of its network servers with the dual password
scheme
• Hackers stole the login credentials for a JPMorgan employee
• Financial information of over 76 million households and 7 million small businesses
compromised.
• Information included physical addresses and email addresses.
12. http://www.livemint.com/Consumer/hzIpAmEXr2aDFymILJFB6J/The-most-brutal-cyber-attacks-and-data-breaches-of-2014.html
Other Major Data Breaches in 2014
• Snapchat - 98,000 files (13gb of photos and videos) stolen and posted on file sharing channels.
• Home Depot - 53 million email addresses and 56 million credit card accounts were
compromised from the retailers data
• iCloud - Over 500 images of Hollywood celebrities were stolen from Apple's data sync service
and later made their way on popular social networks
• NVIDIACorporation: NVIDIACorporation suffered a data breach when hackers infiltrated their
network and stole employee usernames and passwords.
13. https://www.privacyrights.org/data-breach/new
Other Major Data Breaches in 2014
• Emcor Services Mesa Energy Systems - Emcor Services Mesa Energy Systems notified
individuals of a data breach when a company laptop was stolen that contained customers
personal information that included names, Social Security numbers, date of birth, date of hire,
addresses, salaries, gender and ethnicity.
• Morgan Stanley : An employee stole customer information on 350,000 clients including
account numbers.
• Lokai informed customers of a data breach to their system from July 18, 2014 to October 28,
2014 by hackers who gained access to their server that hosts their website.
15. India Scenario
• India is a key threat frontier, ranking as the third highest source of overall malicious activity.
• 69 percent of targeted attacks in India focus on large enterprises
• Nearly four in 10 attacks in India were carried out on non-traditional services industries like
hospitality, business and personal services
• India is the spam capital of the world with 9.8 percent of spam zombie
• 96,383 security incidents including phishing, scanning, spam, malicious code, website
intrusions etc. were reported to the Indian Computer Emergency ResponseTeam (CERT-In) in the year
2014 (Till September)
http://www.informationweek.in/informationweek/news-analysis/295599/69-percent-targeted-attacks-india-focus-enterprises-s
16. The InformationTechnologyAmendment
Act, 2008
• The InformationTechnology Amendment Act, 2008 addresses the intricacies of data protection in the
country
• Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a
computer resource which it owns, shall be liable to compensate the person so affected via privacy
breaches.
• The data protection provisions do not extend beyond the territories of India.
• The data outsourced to India is under the protection provisions under the act.
http://www.gala-marketlaw.com/77-gala-gazette/gala-gazette/261-india-data-protection-and-the-it-act-india
20. The Do's and Don’ts In-depth
• Be thoughtful about what you post online about yourself or your friends
• Share your full name, date of birth, phone number, address, etc., only if necessary
• Passwords must have a mix of uppercase and lowercase letters, numbers, & special
characters.
• Always ignore any unknown or unexpected communication (email, call, SMS, etc.) that
requires you to act immediately and asks for your personal information
• Always use 2-step verification for your online accounts
21. The Do's and Don’ts In-depth
• Banking or shopping online using free, publicWiFi networks can allow hackers to steal your
personal and financial information
• Before installing any mobile app, review its permissions carefully.
• Always password protect your mobile device, tablet, and laptop
• Protect your important data by taking regular backups.
• Always log out/sign out of websites once you are done