Google’s Privacy Infringements Kurt Ladendorf. Google’s Mantra “Don’t be evil”

Slides:



Advertisements
Similar presentations
Data Mining and Text Analytics Advertising Laura Quinn.
Advertisements

Country-Of-Destination In international e-commerce many countries use a "country-of- destination" approach for governing cyberspace. Country-of- destination.
UNIVERSITÀ DEGLI STUDI DI PAVIA
Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme.
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
Google Chrome Parks Brown Google Chrome 1  Chrome is the largest web browser service in the entire world  Used in 45% of the web browser market, with.
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Carolyn Hodge, VP of Communications, TRUSTe David W. Stark CIPP, VP & North America.
Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Chatura Atapattu [cpa2116].  Grew 17% from Q3 of 2009 to 2010  $6.4 billion  1 trillion ad impressions  2 nd biggest advertising market  1 st is.
Privacy Safety on the Internet. Tips on Prevention  Check to see if website is secure  A padlock icon in the corner indicates a security certificate.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
What Google Privacy issues?. Concerns with Google & Privacy Google Street View It turns out that Google was obtaining a large amount of data from Wi-Fi.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Big Brother, Is Thy Name Google? Dunwoody Campus Symposium “Privacy in the Global Digital Age” Julia Benson-Slaughter March 24, 2011.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Online Advertising Innovations & The Illusion of Anonymity.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Blogger Advertising & the Federal Trade Commission Meredith Lowry Wright Lindsey Jennings
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
The Internet {By Quinn Franklin 10BB}. What is the Internet? O The internet is an international network that links computers worldwide to eachother. O.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
FTC: Anatomy of a Data Security/Privacy Investigation and the Future of Privacy John Jay College of Criminal Justice Center for Cybercrime Studies November.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
By Michael Fuhrman. Mission Statement To organize the world's information and make it universally accessible and useful.
Privacy issues By: Joshua Junious Date: December 4, 2012 Course: CpSc 420 Instructor: Dr. Grossman.
Phishing: Trends and Countermeasures Blaine Wilson.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
WIFI INSTRUCTIONS SIA is using this conference as a pilot program to conduct a feasibility study into the online distribution of materials For the first.
Michael Pawlowski Steven Ritchie
State Board of Elections Computers
Security Standard: “reasonable security”
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
The Internet Industry Week Two.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
BA 625: Privacy Law and Policy
Information Security Session October 24, 2005
الانترنت والبريد الإلكتروني
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
HOW DO I KEEP MY COMPUTER SAFE?
All About the Internet.
The Rapid Loss of Privacy in the Era of the Internet
Revision PowerPoint By Nicole Davidson.
Presentation transcript:

Google’s Privacy Infringements Kurt Ladendorf

Google’s Mantra “Don’t be evil”

Buzz Social network attempt Automatic enrollment Default setting to publicize recipients Caused a class action lawsuit – Results in Google putting $8.5 million towards privacy education Federal Trade Commission involvement

Safari Google placed cookies on Safari browsers and presented targeted ads Google had explicitly stated they would not Federal Trade Commission fined Google $22.5 million Broke the agreement with the FTC from the Buzz incident

Gmail Microsoft’s “Scroogled” campaign Google uses keywords from to sell ads Google does not show tailored ads “…based on race, religion, sexual orientation or health” Google allows some control over ad settings

Street View Google collected geographical locations of Wi-Fi routers – Used for location of devices Google collected 600gb of network traffic Google blames experimental software in 2010 Google knew about the data collection in 2007

Street View Google created a way to opt-out – Adding “_nomap” to router’s SSID Multistate investigation resulted in – $7 million settlement – Employee privacy education – Google must fund a public campaign for privacy awareness

New Privacy Policy Combines 60+ policies European Union has concerns er_embedded&v=KGghlPmebCY er_embedded&v=KGghlPmebCY

Can Google ever be trusted again?

Sources “Google Will Pay $22.5 Million to Settle FTC Charges it Misrepresented Privacy Assurances to Users of Apple’s Safari Internet Browser” Federal Trade Commission, 8/9/ Web. Accessed: 4/26/ “Code of Conduct” Google 4/25/ Web. Accessed: 4/26/2013http://investor.google.com/corporate/code-of-conduct.html “Our history in depth” Google No publish date given. Web. Accessed: 4/26/ “Privacy Policy” Google 7/27/ Web. Accessed: 4/26/2013http:// “Don’t get Scroogled by Gmail” Microsoft 2/6/ us/news/press/2013/feb13/02-06Gmail.aspx Web Accessed: 4/26/2013http:// us/news/press/2013/feb13/02-06Gmail.aspx “Ads in Gmail” Google 3/29/ Web. Accessed 4/26/2013http://support.google.com/mail/answer/6603?hl=en Ducklin, Paul “Australian Privacy Commissioner lays the hard word on Google as WiFi data capture saga continues” Naked Security 8/8/ privacy-commissioner-lays-the-hard-word-on-google/ Web. Accessed 4/26/2013http://nakedsecurity.sophos.com/2012/08/08/aussie- privacy-commissioner-lays-the-hard-word-on-google/ Fleischer, Peter “Greater choice for wireless access point owners” Google 11/14/ Web. Accessed: 4/26/ “Attorney General Announces $7 Million Multistate Settlement With Google Over Street View Collection of WiFi Data” Connecticut Attorney General 3/12/ Web. Accessed: 4/26/2013

Sources Liedtke, Michael “Google grabs personal info off of Wi-Fi netwroks” Associated Press 5/14/ personal-info-apf html?x=0 Web. Accessed 4/26/ personal-info-apf html?x=0 Vaas, Lisa “Google controversially forces users to opt-out of Wi-Fi snooping” Naked Security 11/17/ Web. Accessed: 4/26/2013http://nakedsecurity.sophos.com/2011/11/17/google-forces-opt-out-wi-fi-snooping/ Vaas, Lisa “EU tells Google to make its new privacy policy clearer and to give users easier opt-out” Naked Security 10/16/ its-new-privacy-policy-clearer-and-to-give-users-easier-opt-out/ Web. Accessed: 4/26/2013http://nakedsecurity.sophos.com/2012/10/16/eu-tells-google-to-make- its-new-privacy-policy-clearer-and-to-give-users-easier-opt-out/ Pfanner, Eric “Google Faces More Inquiries in Europe Over Privacy Policy” The New York Times 4/2/ over-privacy-policy.html Web. Accessed: 4/26/2013http:// over-privacy-policy.html “FTC Charges Deceptive Privacy Practices in Google’s Rollout of Its Buzz Social Network” Federal Trade Commission 3/30/ Web. Accessed: 4/26/2013http:// Ducklin, Paul “Buzz over Google’s $8.5 million lawsuit settlement” Naked Security 11/3/ Web. Accessed: 4/26/ “Google to Acquire YouTube for $1.65 Billion in Stock” Google 10/9/ Web. Accessed: 4/28/2013