Fluency with Information Technology INFO100 and CSE100 Katherine Deibel 2012-05-11Katherine Deibel, Fluency in Information Technology1.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Protect Our Students Protect Ourselves
 Q. Should we keep electronic records  Q. Do you purchase a software package  Q. Do you develop your own package  Q. What solution would be most cost.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, TRAINING /DATA PROTECTION LAW.
Protection of privacy for all Students!
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Data Protection.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
FERPA: Family Educational Rights and Privacy Act.
 Main Benefit: › The main benefit that is occurred by introducing a new system to work with or instead of the old system, is the forms of cost saving.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Test Your Tech The dangers of phishing include A. Sharp hooks and nightcrawlers. B. Credit-card fraud at a look-alike Web site that mimics your bank. C.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Investigating Rights and Responsibilities at work
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
MTTS Standard 3 By Sara Angell. Legal use of digital media.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Society & Computers PowerPoint
Protecting Your Assets By Preventing Identity Theft 1.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Unit 3 Seminar.  Used to predict acceptable or unacceptable behavior  Helps to assess level of skills/knowledge/ characteristics applicants have  Reduce.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Facebook privacy policy
Surveillance around the world
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Privacy principles Individual written policies
Privacy & Confidentiality
IT Applications Theory Slideshows
GDPR Overview Gydeline – October 2017
Data Protection Legislation
GDPR Overview Gydeline – October 2017
Protecting Your Credit
Employee Privacy and Privacy of Employee Information
Other Sources of Information
Privacy Issues part 4 Information/data privacy
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
INFO/CSE 100, Spring 2005 Fluency in Information Technology
IT and Society Week 2: Privacy.
Presentation transcript:

Fluency with Information Technology INFO100 and CSE100 Katherine Deibel Katherine Deibel, Fluency in Information Technology1

Privacy: controlling who has access to specific information Security:ensuring availability and privacy of access to specific information  This is all about data management  What is the data?  Where is it stored?  Who can access it?  How can you access it? Katherine Deibel, Fluency in Information Technology2

 Two aspects to security  Controlling who has access  Ensuring that they have access  Ensuring access is often overlooked  What would you do if you lost your cellphone and its phonebook?  What if your hard drive crashes? Katherine Deibel, Fluency in Information Technology3

 It is always a good idea to make backups of important data  Rules for backing up:  Do it frequently  Back up only recent changes (saves more space than copying everything)  Keep the backups physically separate from the originals  Choose mediums that you will continue to have technology access for Katherine Deibel, Fluency in Information Technology4

 The idea of the cloud  Move computation off of local machines to the Internet  Applications provided as web services by cloud providers  Provides access wherever and whenever one can get online Katherine Deibel, Fluency in Information Technology5

 Is the cloud a good place to store your personal data?  Is it secure?  Does it guarantee your privacy?  Is it reliable? Katherine Deibel, Fluency in Information Technology6 We will come back to these questions later

Shocking stories of Victorian intrigue! Katherine Deibel, Fluency in Information Technology7 Mother is secretly half-Welsh?!?

 We live in an information society  Easy to collect, store, search, and manipulate data on record scales  Every action we do generates information  Using a library  Purchasing from a store  Flying on a plane  Doing homework  Paying taxes Katherine Deibel, Fluency in Information Technology8

 Who owns the information?  What can you/they do with it?  How do you manage and protect your information?  Who and what are you protecting it from?  What needs to be protected?  What needs to be managed? Katherine Deibel, Fluency in Information Technology9

 You buy a book: Cooking with Red Meat, Cheese, Lard & Beer  The store has a record of the purchase  How they may use it:  Ignore it  Recommend books to you  Target advertising  Give this information to others (your health insurance company) Katherine Deibel, Fluency in Information Technology10

 What if the book was a gift?  Recommendations become poorer  Advertising will reach the wrong market  Interpretation of the book's meaning  Do I want to eat fatty foods?  Am I studying high fat-cuisines? Katherine Deibel, Fluency in Information Technology11

 Pizza Palace Katherine Deibel, Fluency in Information Technology12

 Did that video bother you?  Is it a realistic future?  If yes, do you want that future?  If no, how much do you think could become a reality and do you want it?  Most importantly, what do we mean when say we want some information to remain private? Katherine Deibel, Fluency in Information Technology13

 Cheaper cameras  Faster film speeds  Less sitting time Katherine Deibel, Fluency in Information Technology14

S. D. Warren & L. D. Brandeis (1890). The Right to Privacy. Harvard Law Review, 4(5), pp "The common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments and emotions shall be communicated to others. Under our system of government he can never be compelled to express them (except upon the witness stand); and even if he has chosen to give them expression, he generally retains the power to fix the limits of the publicity that shall be given them." Katherine Deibel, Fluency in Information Technology15

S. D. Warren & L. D. Brandeis (1890). The Right to Privacy. Harvard Law Review, 4(5), pp "The narrower doctrine [of privacy] may have satisfied the demands of society at a time when the abuse to be guarded against could barely have arisen without violating a contract or a special confidence; but modern devices afford abundant opportunities for the perpetration of wrongs without the participation of the injured party." Katherine Deibel, Fluency in Information Technology16

 Warren & Brandeis's argument is a critical observation about society and new technologies:  The adoption of new technologies affects the interactions of people in society and therefore necessitates reviewing laws and rights in regards to the new technologies Katherine Deibel, Fluency in Information Technology17

A historical diversion Katherine Deibel, Fluency in Information Technology18

 China, ≈1 CE: As eye protection  Italy, 1260s: For farsightedness  Europe, 1500s: For nearsightedness  Britain, 1725: Modern frame invented  U.S.A, 1780s: Bifocals invented  Britain, 1825: For astigmatisms Katherine Deibel, Fluency in Information Technology19

“Glasses are very disfiguring to women and girls.” From a 1901 optician journal  Glasses not for public use  Used only for brief moments  Led to quick use optics  monocle  lady’s lorgnette  pince-nez  scissor glasses Katherine Deibel, Fluency in Information Technology20

 Scholars and academics  The clergy  The Spanish T HUS … THE ASSOCIATION OF GLASSES WITH INTELLECTUAL PURSUITS !!! Katherine Deibel, Fluency in Information Technology21

 Glasses were popular  Higher classes wore larger lenses Katherine Deibel, Fluency in Information Technology22 Portrait of a Cardinal, Probably Cardinal Don Fernando Niño de Guevara (1541–1609) by El Greco

Clergy Member Poor Vision Reading Latin Texts +Eyeglasses Continuous Use Aristocrat Poor Vision Reading a Playbill +Eyeglasses Brief Use +In Spain Continuous Use +In Spain Continuous Use Katherine Deibel, Fluency in Information Technology23

 Technology usage shapes people’s perceptions of the users  Culture and society shapes how, when, and if a technology is used Katherine Deibel, Fluency in Information Technology24

I want to tell you but… Katherine Deibel, Fluency in Information Technology25

 What does “privacy” mean in the modern world?  The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others  Privacy is a right  You control when & how much is revealed  Point of this lecture: You can and should have a lot of privacy by using this control Katherine Deibel, Fluency in Information Technology26

 The collector can’t use after business purpose over  The collector can use it, if you approve (OPT-IN)  The collector can use it, unless you object (OPT-OUT)  The collector can use information no matter what Katherine Deibel, Fluency in Information Technology27

 Limited Collection  Quality  Purpose  Use Limitation  Security  Openness  Participation  Accountability Katherine Deibel, Fluency in Information Technology28  Organization for Economic Cooperation and Development (OECD) defined the “gold standard” for fair information practices  Principles

 There should be limits to the personal data collected about anyone  Collect data by fair and lawful means;  Collect data with the knowledge and consent of the person whenever appropriate and possible Katherine Deibel, Fluency in Information Technology29

 Personal data gathered should be  Relevant to the purposes for which it is used  Should be accurate, complete, and up-to-date Katherine Deibel, Fluency in Information Technology30

 The purposes for collecting personal data should be stated at the time it is collected  The uses should be limited to only those purposes Katherine Deibel, Fluency in Information Technology31

 Personal data should not be disclosed or used for purposes other than stated in the Purpose Principle  Exceptions:  With the consent of the individual  By the authority of law Katherine Deibel, Fluency in Information Technology32

 Personal data should be protected by reasonable security measures against  Risks of disclosure  Unauthorized access  Misuse  Modification  Destruction  Loss Katherine Deibel, Fluency in Information Technology33

 There should be a general openness of the policies and practices about personal data collection  Should be possible to know of its existence, kind, and purpose of use,  Should be able to identity and contact information for the data controller Katherine Deibel, Fluency in Information Technology34

 An individual should be able to  Determine whether the data controller has information about him or her,  Discover what it is in an understandable form, in a timely manner, and at a reasonable charge  Request data to erased, completed, or changed  If any of the inquiries above are denied, the individual should be able to  Learn about the reasons for the denial  Challenge the denial if so desired Katherine Deibel, Fluency in Information Technology35

 The data controller should be accountable for complying with these principles  Policies, legislation, and laws to back up the need to be held accountable Katherine Deibel, Fluency in Information Technology36

 EU, much of non-EU Europe, NZ, Hong Kong, Australia, and Canada use OECD  Both government and private purposes  U.S. privacy law does not use the OECD  U.S. privacy law for government information is generally strong  U.S. privacy law for business is “sectoral”, meaning it is limited to sectors and specific business practices Katherine Deibel, Fluency in Information Technology37

 Very few industries/practices have explicit privacy rules  Almost anything goes  Opting-out is the general approach  Recent federal law for medical data  HIPPA: Health Insurance Portability and Accountability Act of 1996  PSQIA: The Patient Safety and Quality Improvement Act of Katherine Deibel, Fluency in Information Technology38

 EU law says, “Info on EU citizens must comply with OECD on leaving EU”  U.S. privacy is so bad, EU information cannot come here  U.S.-EU are in constant negotiations Katherine Deibel, Fluency in Information Technology39

Family Educational Rights & Privacy Act  As a general rule the University will not release a student’s educational records to a third party without written consent of the student. This includes tuition account information.  Even includes practices of returning homework and reporting grades Katherine Deibel, Fluency in Information Technology40

 UW Libraries Privacy Policy  The University of Washington Libraries values the privacy of library users. The Libraries seeks to minimize the collection and retention of personally identifiable information.  When information is not kept, it cannot be abused Katherine Deibel, Fluency in Information Technology41

 Most reputable online business post privacy statements on their sites  Should be understandable to you  Say what info they collect,  Say what they will do with it  How to "opt-out" or "opt-in" Katherine Deibel, Fluency in Information Technology42

 Unfortunately, there is  Little if any government policing  Lack of resources for filing complaints  Few penalties for violations Katherine Deibel, Fluency in Information Technology43

 Private firms organizations monitor and report privacy violations  TRU.S.Te  Better Business Bureau  Social networking and public opinion can force companies to comply Katherine Deibel, Fluency in Information Technology44

 What they did:  Secretly gathered data on people’s personal music tastes  Encrypted the info so no one would know  Didn’t mention it in their privacy statement  They were caught  Changed privacy statement  Major loss in usage  Permanent marring of public trust Katherine Deibel, Fluency in Information Technology45

Cookies and grocery shopping Katherine Deibel, Fluency in Information Technology46

 A cookie is a record stored on your computer by a Web Server  The cookie is usually a unique ID that allows the server to remember who you are  Improves Web experience Server Client : : Chris, Dating for Total Dummies Client: Name: Book: ChrisDating Katherine Deibel, Fluency in Information Technology47

 Cookies are used by many sites and they make Web usage much better  Many sites use cookies for history and logins  Banking and credit card applications cannot be secure enough without cookies  If all privacy laws met OECD standards  Cookies would be all good  No one but computer scientists would know about them Katherine Deibel, Fluency in Information Technology48

 Cookies can be stored in your computer by sites you have not visited: 3rd party ▪ 3rd Party Cookies come from a site in business with the site you visit, e.g. for ads ▪ 3rd party cookies allow info to be correlated Client Chris ABC site: DEF site: rdParty: Server ABC Chirs Cookie: Server DEF Chirs Cookie: Server 3rd 123 Cookie: Katherine Deibel, Fluency in Information Technology49

 The 3rd party cookie becomes the key (literally, in DB sense) to join (in DB sense) the info held by separate co.s Company ABC Database Customer Cookie Ad Agcy Data1 Data 2... Chris val 1 val 2 Company DEF Database Customer Cookie Ad Agcy Data1 Data 2... Chris val 3 val 4 It’s the same Chris!!! Katherine Deibel, Fluency in Information Technology50

 You control whether your computer accepts cookies -- look in browser  If you don’t care about privacy, Accept all cookies  If you greatly value your privacy, Accept no cookies  If you want some privacy AND benefit from the useful stuff on the Web, Accept cookies but reject 3rd party cookies Katherine Deibel, Fluency in Information Technology51

 Easy to collect information about a customer's eating habits  Identity can be validated by credit card  Some privacy experts fear that this knowledge will be passed to health insurance companies  Debatable if useful for actuarial purposes  What does the privacy statement say? Katherine Deibel, Fluency in Information Technology52

 QFC Privacy Statement: The information gathered by QFC will be used to give you, our valued customer, our very best. You have our word on that! We pledge that QFC will not release your name to any list service or manufacturer, and that such information will be held in the strictest of confidence–even within our company Katherine Deibel, Fluency in Information Technology53

 Kroger's Privacy Statement: Kroger and its affiliates may use personal customer information to create merchandising and promotional programs tailored around specific purchases, the frequency of store visits, volume of purchases, and other data…We may share personal customer information with our subsidiaries, affiliates, agents, representatives and trusted partners for the limited purpose of providing services or information to Kroger or our customers at our direction Katherine Deibel, Fluency in Information Technology54

 Yes  But…  It is all legal in the United States  We have grown accustomed to the idea that our information is being used  The U.S. is an opt-out society Katherine Deibel, Fluency in Information Technology55

Are you there, Google? It's me, Kate Katherine Deibel, Fluency in Information Technology56

 Is the cloud a good place to store your personal data?  The answer depends on the privacy and security policies of the cloud service  Keep this in mind:  Privacy policies may and do change  Some services go away (e.g., MobileMe)  Will you have network access Katherine Deibel, Fluency in Information Technology57

 You may not think about privacy much, but maybe you should …  You should have a say in whether or not records of your information can be linked to you The U.S. needs better laws, and why not?  Do you care whether Google or Facebook can deliver an ad to you based on your private information? Katherine Deibel, Fluency in Information Technology58