Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online Privacy at Work Five Fair Information Practices Important Federal Privacy Laws
Objectives Privacy and Cyberspace Kaizen Explain terms used in privacy and cyberspace. 2.Identify hidden information technologies used in the Internet. 3.Explain issues regarding privacy at work and things to remember at work. 4.Identify existing legislation and laws regarding privacy.
COMPUTERS IN YOUR FUTURE 2004 COMPUTERS IN YOUR FUTURE 2004 by Bryan Pfaffenberger and Bill Daley TThe threat of privacy due to the sale of sensitive personal information on the Internet DDefinition of anonymity and how it is abused by users TTechnological developments and how they are eroding privacy and anonymity RReasons why employers are monitoring employees’ computer usage HHow public-key encryption threatens U.S. security, both foreign and domestic TThe U.S. government’s proposed key recovery plan and how it threatens the growth of Internet commerce Kaizen Privacy and Cyberspace
Identity Theft Identity theft is one of the fastest growing crimes in the United States and Canada. Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account. Examples of information needed are name, address, social security number, and other personal information. Laws limit liability to $50 for each fraudulent charge. An individual’s credit report is affected by identity theft. Kaizen Privacy and Cyberspace
Privacy in Cyberspace Privacy refers to an individual’s ability to restrict the collection, use, and sale of confidential personal information. The Internet is eroding privacy through the selling of information collected through registration forms on Web sites. Few laws regulate selling personal information. Technology is not only making it easier to invade someone’s privacy, but it is also providing a means to protect against privacy invasion. Kaizen Privacy and Cyberspace
Encryption Encryption refers to the coding of information so that it is only readable by the intended recipient. It is used in electronic commerce transactions and . Encryption provides a way to use the Internet in a safe, secure way. It could be used misused by criminals and terrorists. Kaizen Privacy and Cyberspace
Anonymity Anonymity is the ability to convey a message without disclosing one’s identity. It can be abused because it frees people from accountability. Defamation is the act of injuring someone’s reputation by making false statements. Libel occurs when malicious statements are made in writing. Kaizen Privacy and Cyberspace
How Is Technology Eroding Privacy and Anonymity? Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view. Hidden information technologies used on the Internet are: – Cookies – Global Unique Identifiers (GUIDs) Kaizen Privacy and Cyberspace
Cookies Cookies are small files that are written to an individual’s hard drive whenever a Web site is visited. Legitimate purposes of cookies include recording information for future use. Example: retail sites using “shopping carts.” Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on Web sites based on those actions. Kaizen Privacy and Cyberspace
Example of Cookies Kaizen Privacy and Cyberspace
Global Unique Identifiers (GUIDs) Kaizen A GUID is a unique identification number generated by hardware or a program. It is used to send user information back to the site that created it. Privacy and Cyberspace
Protecting Your Privacy Online Kaizen Browse anonymously– Use Web sites such as or Disable cookies on your Web browser. 3.Use free addresses for information placed on Web sites. 4.Don’t divulge personal information to online strangers. 5.Make sure registration forms have a privacy policy statement. Privacy and Cyberspace
Privacy at Work Kaizen Employees are given and Internet access at work. Companies are concerned about employees’ wasting time surfing the net and sending personal . Three-quarters of large corporations monitor employees’ phone calls, , Web browsing habits, and computer files. Laws do not protect employees from being monitored. Privacy and Cyberspace
Things to Remember at Work Kaizen Do not use the employer’s phone for personal calls. 2.Do not use the employer’s e- mail for personal messages. 3.Assume everything you do at work is being monitored. Privacy and Cyberspace
The Five Fair Information and Important Federal Privacy Laws Kaizen The Fair Information Practices were developed by the U.S. Department of Health, Education, and Welfare in the early 1970s. They have been adopted by many public and private organizations since Privacy and Cyberspace
Fair Information Practices Kaizen There must be no personal data record-keeping systems whose existence is a secret from the general public. 2.People have the right to access, inspect, review, and amend data about them that is kept in an information system. Privacy and Cyberspace
Fair Information Practices Kaizen There must be no use of personal information for purposes other than those for which it was gathered without prior consent. 4. Managers of systems are responsible and should be held accountable and liable for the reliability and security of the systems under their control, as well as for many damage done by those systems. Privacy and Cyberspace
Fair Information Practices Kaizen Governments have the right to intervene in the information relationships among private parties to protect the privacy of individuals. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Freedom of Information Act (1970): Gives you the right to look at data concerning you that is stored by the federal government. A drawback is that sometimes a lawsuit is necessary to pry it loose. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Fair Credit Reporting Act (1970): Bars credit agencies from sharing credit information with anyone but authorized customers. Gives you the right to review and correct your records and to be notified of credit investigations for insurance employment. A drawback is that credit agencies may share information with anyone that reasonably believe has a “legitimate business need.” Legitimate is not defined. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Privacy Act (1974): Prohibits federal information collected about you for one purpose from being used for a different purpose. Allows the right to inspect and correct records. A drawback is that exceptions written into the law allow federal agencies to share information anyway. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Family Educational Rights and Privacy Act (1978): Sets strict procedures that federal agencies must follow when seeking to examine customer records in bank; regulates financial industry’s use of personal financial records. A drawback is that the law does not cover state and local governments. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Privacy Protection Act (1980): Prohibits agents of federal government from making unannounced searches of press offices if no one there is suspected of a crime. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Cable Communication Policy Act (1984): Restricts cable companies in the collection and sharing of information about their customers. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Computer Fraud and Abuse Act (1986): Makes eavesdropping on private conversations illegal without a court order. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Computer Security Act (1987): Makes actions that affect the security of computer files and telecommunications illegal. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Computer Matching and Privacy Protection Act (1998): Regulates computer matching of federal data; allows individual a chance to respond before government takes adverse actions against them. A drawback is that many possible computer matches are not affected, such as those done for law-enforcement or tax reasons. Privacy and Cyberspace
Important Federal Privacy Laws Kaizen Video Privacy Protection Act (1988): Prevents retailers from disclosing video-rental records without the customer’s consent or a court order. Privacy and Cyberspace
Summary Kaizen Sensitive personal information is for sale on the Internet. 2.Web sites collect personal information without informing their visitors. 3.Anonymity is the ability to convey a message without disclosing one’s identity. 4.Cookies provide a way for Web sites to record one’s browsing activities. 5.GUIDs make anonymous usage of the Internet difficult. 6.Many employers monitor their employees phone calls, , Web browsing habits, and computer files. Privacy and Cyberspace
Evaluation What does Big Brother term mean? What are other pre-cautionary measures to keep one’s privacy? What can you say about Global Positioning System or the GPS? Case Analysis Kaizen Privacy and Cyberspace