Privacy Introduction Emerson Murphy-Hill. Why do we care about privacy? Much of what we do in today’s society involves information exchange e.g. government,

Slides:



Advertisements
Similar presentations
Conference on Accelerating Global Commerce Through Technology and Policy Elliot E. Maxwell September 20, 2002 The E-Commerce Policy Landscape.
Advertisements

HIPAA and Beyond: Privacy and Confidentiality Legislative and Ethical Issues within Health Sciences Special Collections Judith A. Wiener, MA, MLIS, Assistant.
CHAPTER 4 E-ENVIRONMENT
Privacy. Privacy Quotes Search my house with a fine tooth comb Turn over everything ’cause I won’t be at home Set up your microscope and tell me what.
Unit 3 Option 2 Stop and Search & Search of Premises
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
PowerPoint® Slides to Accompany
Privacy 1. Definitions of Privacy The right to be let alone – Harvard Law Review article by Brandeis and Chase in Abigail v. Franklin Mills.
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
September 2001Chapter 16: Public policy: Regulation1 Chapter 16. Public Policy: Regulation  Questions Answered in this Chapter: –How is the Internet currently.
1 Privacy & Publicity 15 Minutes of Fame (or not) Steve Baron March 23, 2006.
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Economic Systems.
Perceptions of Behavioral Advertising among CMU Community Ashwini Rao April 21, 2014.
PROTECTION OF CONSUMER & PROPERTY RIGHTS CE.13E. Question What is the role of the United States government in protecting consumer rights and property.
PRIVACY LAW JOUR3060 Communication Law & Regulation.
Laissez-Faire Economics
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Characteristics of a Market Economy
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
Privacy and Personal Information
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Understanding: The Key to Protecting Highly Sensitive Personally Identifiable Information Timothy J. Brueggemann, Ph.D.
WE THE PEOPLE ASSIGNMENT THE FOUNDATION OF AMERICAN GOVERNMENT.
Philosophical Topic That Arises Frequently. Obligations as a citizen: I must not break the law Benefits: citizenship, protection of constitutional rights,
Powers to stop and Search of Premises POLICE POWERS STOP & SEARCH and SEARCH OF PREMISES.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Chapter 1 Principals of Government
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Health System Reform Bringing the Consumer Back into the Health Care Equation.
Legal and Ethical Issues Counseling Children. Child and Adolescent Clients Counselors who work with children and adolescents under the age of 18 may experience.
© 2003 Spoke Software, Inc. Privacy – California Dreamin’? A Brief Look at the Privacy Landscape in California.
Advantages of the Free Enterprise System
1 Activity 5.3 – Statement 2, page 135 Lise Auffray Ray Reid and Lee Purves.
Fundamentals Part 3 Economic Systems SSEF4.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
Digital Access Digital Commerce Digital Communication Digital Literacy Digital Etiquette Digital Law Digital Rights and Responsibilities Digital Health.
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
Author(s): Paul Conway, PhD, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution.
2007 Youth Risk Behavior Survey Results Alaska High School Survey Grades 9-12 Alaska Division of Public Health Weighted Data Connectedness.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
PHDSC Privacy, Security, and Data Sharing Committee Letter to Governors.
Chapter 3:The American Free Enterprise System Advantages of the Free Enterprise System.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Lesson Two: Free Enterprise in the United States.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Trialog, Atos, Trilateral, Inria, AUP, Gradiant, UPM, UUlm, Fraunhofer SIT, WIT, KU Leuven Privacy Motivation and Introduction Claudia Roda (AUP) PRIPARE.
Introduction to Health Policy and Law Jody Blanke Distinguished Professor of Computer Information Systems and Law Mercer University.
Social Justice Post Survey Results May Social Justice & Technology Post-SurveyPlease answer all of the questions in the survey.: Please rate your.
Introduction to Process Models Emerson Murphy-Hill.
PPA 403 Week 2 DQ 1 Constitutional Limits on Agencies Check this A+ tutorial guideline at ASH/PPA-403-Week-2-DQ-1-Constitutional-
LAW 421 Week 2 DQ 2 To purchase this material link 421-Week-2-DQ-2 For more courses visit our website
Privacy and the Law.
Ethical, Social, and Political Issues in E-commerce
English Philosophers Philosopher Writings (year) Concepts/beliefs
E-Commerce: Doing Business on the Internet
The introduction and the essential elements of E- Commerce.
Consumer Empowerment through Education
Privacy=Secret CHIHUA WANG.
Chapter 9 Internet Law and Intellectual Property
Ethical Use of Computers
The right to be let alone … by yourself
Introduction to Health Privacy
Ethical and Legal Issues
Ethical, Social and Political Issues
Cyber Law and E-Commerce
Presentation transcript:

Privacy Introduction Emerson Murphy-Hill

Why do we care about privacy? Much of what we do in today’s society involves information exchange e.g. government, commerce, healthcare For people to be comfortable and willing to take full advantage of IT services we need to: Safeguard their privacy Let them understand we’re safeguarding their privacy “91% of adults in the survey “agree” or “strongly agree” that consumers have lost control over how personal information is collected and used by companies.” Pew Internet Poll, 2014

Why is privacy important? Privacy helps us maintain our: Individuality Autonomy Freedom of choice Anonymity is one form of protection of our privacy Once lost it can seldom be fully recovered

Historical Perspective – Privacy Not New “The Right to Privacy” Samuel Warren & Louis Brandeis (Harvard Law Review) Responded to the threats to privacy posed by new technologies photographs and newspapers Unauthorized circulation of portraits of private persons Argued that privacy was, in itself, a right belonging to the individual -- apart from property rights, contract rights, and other considerations. “Right to be let alone” Still not recognized (e.g., telemarketing calls) “Right to be forgotten” forgiven/2014/11/21/ c-669a-11e4-9fdc-d43b053ecb4d_story.html