INFO/CSE 100, Spring 2005 Fluency in Information Technology

Slides:



Advertisements
Similar presentations
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Advertisements

Fluency with Information Technology INFO100 and CSE100 Katherine Deibel Katherine Deibel, Fluency in Information Technology1.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Confidentiality and HIPAA
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
Privacy & Personal Information -- Why do we care or do we?
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
FERPA Family Educational Rights and Privacy Act A Tutorial.
0 Managing Student Records Legally and Effectively Tiffany Hogue Provost’s Office Spring 2009.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Society & Computers PowerPoint
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
The Right to Privacy: Rethinking the “right most valued by civilized men.” Susan E. Gallagher, UMass Lowell.
Trialog, Atos, Trilateral, Inria, AUP, Gradiant, UPM, UUlm, Fraunhofer SIT, WIT, KU Leuven Privacy Motivation and Introduction Claudia Roda (AUP) PRIPARE.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Jim Loter Director of Information Technology
The Apple Privacy Policy zakiya mitchell
HIPAA Privacy Rule Training
Screening for Patients’ Health Insurance and Confidentiality Needs
Chapter 5 – E-commerce and Enterprise Systems
Facebook privacy policy
Referral to Community Support Services
Student Privacy in an Ever-Changing Digital World
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
SETTING UP OF E-COMMERCE WEBSITE
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Privacy & Confidentiality
Florida Information Protection Act of 2014 (FIPA)
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
FERPA (Oops, can I say that?)
Virtual Private Networks (VPN)
Florida Information Protection Act of 2014 (FIPA)
CHAPTER 4 Information Management in Pharmacy.
FERPA (Oops, can I say that?)
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Big Data Considerations
Protecting Your Credit
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
18 Consumer Credit 18-1 Credit Fundamentals 18-2 Cost of Credit
Disability Services Agencies Briefing On HIPAA
Move this to online module slides 11-56
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
Data Access and Stewardship
Understanding Back-End Systems
Ethical and Social Issues in Information Systems
Digital Citizen.
18734: Foundations of Privacy
The Dark Side of the Internet
Colorado “Protections For Consumer Data Privacy” Law
How to Get the Most from your Health Insurance
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

INFO/CSE 100, Spring 2005 Fluency in Information Technology Privacy INFO/CSE 100, Spring 2005 Fluency in Information Technology http://www.cs.washington.edu/100 5/7/2019 fit100-25-privacy © 2005 University of Washington

Readings and References Fluency with Information Technology Chapter 17, Privacy and Digital Security References Harvard Law Review The Right to Privacy. Samuel Warren and Louis Brandeis. Vol. IV, December 15, 1890, No. 5 Hall Health Center Release of Information Questions http://www.hallhealthcenter.com/article-detail.asp?ArticleID=176&ClinicID=1 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington What is Privacy? The common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others. Under our system of government, he can never be compelled to express them (except when upon the witness stand); and even if he has chosen to give them expression, he generally retains the power to fix the limits of the publicity which shall be given them. Warren and Brandeis 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington What is Privacy? Recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right "to be let alone". Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops." Warren and Brandeis 5/7/2019 fit100-25-privacy © 2005 University of Washington

“proclaimed from the housetops” How long does this cycle take? 5/7/2019 fit100-25-privacy © 2005 University of Washington

Are these privacy issues? Personal records grades, transcript payment history, personal evaluations medical exams, prescription drugs Buying patterns Bought airplane ticket, new skis, gasoline Browsing patterns Visited airline schedule page, searched for currency exchange rate for Canada 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington UW Privacy Family Educational Rights and Privacy Act “As a general rule the University will not release a student's education records to a third party without written consent of the student. This includes tuition account information.” UW Libraries Privacy Statement “The University of Washington Libraries values the privacy of library users. The Libraries seeks to minimize the collection and retention of personally identifiable information.” 5/7/2019 fit100-25-privacy © 2005 University of Washington

Medical Records Questions Who owns my medical record? Your health record is the physical property of the healthcare provider/facility but you have a right to: a. Review and/or have a copy of that record. b. Ask to have your medical record corrected. c. Not have your medical information disclosed to others unless you direct us to do so or unless the law authorizes or compels us to do so. Hall Health 5/7/2019 fit100-25-privacy © 2005 University of Washington

Medical Records Questions Can my medical record be disclosed without my authorization? Yes, there are state laws, which provide disclosure without patient authorization but every effort is made to get a written authorization from the patient prior to release. Refer to: Revised Code of Washington (RCW) 70.02.050 Examples: referrals to another provider, court orders, and insurance companies for billing purposes. Hall Health 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Purchasing patterns We pledge that QFC will not release your name to any list service or manufacturer, and that such information will be held in the strictest of confidence–even within our company. Kroger and its affiliates may use personal customer information to create merchandising and promotional programs tailored around specific purchases, the frequency of store visits, volume of purchases, and other data. Kroger also may use the data it collects to investigate and respond to customer requests, concerns, and claims. We may share personal customer information with our subsidiaries, affiliates, agents, representatives and trusted business partners for the limited purpose of providing services or information to Kroger or our customers at our direction. 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Digital Privacy How private is your information online? Reputable online business post Privacy Statements The statement should understandable to you and say what info they collect, what they will do with it, how to “opt-out”, etc. But, there is little policing & few penalties Real Networks in 1999 secretly gathered data on people’s personal music tastes, encrypted the info so no one would know, didn’t mention it in their privacy statement, and used TRUSTe auditor -- the day after getting caught, they improved their privacy statement … should we ever trust them??? 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Cookies Cookie: a record stored by a Web server on a client (your computer) The cookie is usually a unique ID that allows the server to remember who you are This is a well known web design idea that improves Web the web experience Client Client: DWJ Client Client Cart Items Server display Client Client printer Client 5/7/2019 fit100-25-privacy © 2005 University of Washington

A Holiday Shopping Cart I wish! 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Cookies: Good Cookies are used by many sites and they make Web usage much better Many sites, e.g. Oxford English Dictionary use cookies Banking and credit card applications cannot be secure enough without cookies If privacy laws were truly strong and enforced, cookies would be all good and no one but computer scientists would know about them But there are some problems … 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Cookies: Bad Cookies can be stored in your computer by sites you have not visited: 3rd party 3rd Party Cookies come from a site in business with the site you visit, e.g. for ads 3rd party cookies allow info to be correlated Server ABC 123 Cookie:210465 Client 123 ABC site:210465 DEF site:4491027 3rdParty:666-666 Server 3rd 123 Cookie:666-666 Server DEF 123 Cookie:4491027 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Correlating Cookies The 3rd party cookie becomes the key (literally, in the database sense) to join the info held by separate companies Company ABC Database Customer Cookie Ad Agcy Data1 Data 2 ... 123 210465 666-666 Nextel 360 Company DEF Database Customer Cookie Ad Agcy Data1 Data 2 ... 123 4491027 666-666 Dell Samsung 5/7/2019 fit100-25-privacy © 2005 University of Washington

fit100-25-privacy © 2005 University of Washington Managing Cookies You control whether your computer accepts cookies -- look in browser If you don’t care about privacy, accept all cookies If you greatly value your privacy, accept no cookies If you want some privacy AND benefit from the useful stuff on the Web, accept cookies but reject 3rd party cookies 5/7/2019 fit100-25-privacy © 2005 University of Washington

Setting cookie control in IE 5/7/2019 fit100-25-privacy © 2005 University of Washington