Privacy and Information

Slides:



Advertisements
Similar presentations
Access is defined as physical access: The ability to receive, view, or discuss the Criminal History Record Information (CHRI) regardless of retrieval method.
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
HIPAA Privacy Rule Training
HIPAA Health Insurance Portability and Accountability Act.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Databases Chapter 11.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Protected Health Information (PHI). Privileged Communication An exchange of information between two individuals in a confidential relationship. (Examples:
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Chapter Eight Database Applications and Implications.
Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
BUSINESS B1 Information Security.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Privacy and Personal Information
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
This tool can be found in the Banker Tools section of BankersOnline.com. 1 Medical Rules Starting April 1, 2006 Can you deny a loan.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Teens lesson fourteen consumer privacy presentation slides 03/08.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
FICO Your Credit Score FICO is an acronym for the Fair Isaac Corporation, the creators of the FICO score.
HIPAA Privacy Rule Training
College lesson ten consumer privacy presentation slides 04/09.
privacy and information
Small Business and Personal Credit
Privacy and the Law.
Add video notes to lecture
Biometrics.
JP Morgan spends $500 million per year on cyber security
Computers and Data Collection
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Biometrics.
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
Teens lesson fourteen consumer privacy presentation slides 03/08.
Ethical Use of Computers
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy and Information Week 5

Computers and Government Thousands of government offices and departments exist All use computers in some manner

Most common uses Data collection and maintenance Research Code breaking Defense and?...

Big Brother More than 4000 government databases exist We leave many data trails to facilitate the collection of information Government pushes their rights to protect ours

Law Enforcement National Crime Information Center Help law-enforcement agencies share info to catch criminals Benefits any agency can access records lots of info available criminal histories info on existing warrants easy for intrastate usage Fingerprints DNA

Law Enforcement Problems lack of control of entry lack of control of usage ease of access by employees Abuse of power Invasion of privacy Inaccuracy Not every state is “in”

National ID Cards Multi-purpose cards Smart card - microprocessor and memory used when interacting with governments and banks, medical

Benefits Need to actuate the card to verify identity Harder to forge Carry only one card Reduces fraud Prevents illegal work

Civilian applications of government technologies Economic espionage Sharing of technology between law enforcement and other agencies Military surveillance technology used in civilian applications

Threats to Privacy Government has wide scope of activities large amount a data available power to require us to provide information ability to use and misuse databases

Computers have facilitated.... the collection of data analysis of data storage of data access of data distribution of data Reasons - speed and anonymity Internet has broadened access to information

Database Program to help you store, manage, search, analyze, and access large amounts of data records fields Tree structure for search

Common Databases Employee ID scanners Prescription drugs Bank machines Cellular phone calls Browsing on Net - cookies Sweepstakes Satellites Credit/Debit cards Supermarket scanners Electronic tolls Mail-order transactions E-mail

Public records Arrest records Postal address records DMV Voter registration Birth and death certificates Marriage certificates Divorce records Property records Court records Arrest records Postal address records

Confidential Records Social welfare information Tax information School records Public library records Criminal history Health records

Internet and data collection Cookies Search engines - quicker more available info open ended nature of net - no rules to define what is personal info newsgroup, chat rooms, e-mail remains available for years

Purposes of Record Systems Help agencies perform their functions efficiently Determine eligibility for government job Determine eligibility for benefits programs Detect fraud Recover payments of delinquent debt

Acquisition of Data Census Surveillance Identification Networking

Methods Used Computer matching Combining and comparing information from different databases Computer profiling using data in computer files to determine characteristics of people most likely to engage in a certain behavior

Data Mining Analyze to perform data profiles Create from customer files then matches are made Businesses and governments keep records and sell them

Data Mining Results Analysis of data for relationships that have not been discovered Associations one event can be correlated to another Sequences One event leads to another Classification Recognition of patterns resulting in new organizations

Data Mining Results Continued Clustering Finding and visualizing groups of facts not previously known Forcasting Discovering patterns in the data that can lead to predictions about the future

Data Mining Uses Target customers Advertise to current customers Manipulate markets Select, monitor, and control employees

Social security number Most common tool Social security number

Social Security Number Major use for identification Linked to banking data credit report driving record earnings history work history Reused?????

Credit Bureaus Provide a central storehouse of information used to evaluate applicants for credit data supplied by banks, stores, and other businesses Public records - lawsuits, liens, bankruptcies

Regulation of Credit Bureaus Regulated by federal government Fair Credit Reporting Act can give information to employers, government, and insurance companies, and those who need it for legitimate purposes involving customer VAGUE?

Changes Legal right to get a copy of their own report for free, and a list of those who have requested it Prohibit employers from obtaining reports without person’s permission or at all except for special kinds of jobs

Medical Records Data is personal and sensitive Can be used for marketing purposes Hard to restrict due to varying laws in different states Insurance benefits require that we tell all

Technical and Management Protections Each authorized user has unique ID code and password Restrict operations of different users in areas where they do not need to go Use audit trails to track usage by workers Computer records reduce handling and potential reading

Risks due to databases Unauthorized use by people who maintain them Access from intruders Mishandling Errors and potential problems Unintentional side-effects

Creep Phenomenon If information is collected, it will probably be used for many purposes that were not intended when the project started

Biometrics Verification through unique physical characteristics little fraud fingerprints DNA hand geometry facial recognition facial thermography Etc.