Are they exceeding their powers and threatening people’s privacy rights?

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
The Internet.
Consumer Powers and Protections
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Unit 1 By Oscar Ramsden. Contents This power point will be about the social impact of ICT on society, this power point will be on the subjects below on.
Social Effects of ICT. AT WORK computers have Removed boring repetitive tasks in factories – now done by robots… Removed the need to do lots of calculations.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Scams Stevie's Scam School videos
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
The Social Effect of Information System
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Cyber Crimes.
(Edited) WORKPLACE PRIVACY.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
Data and You. Computer Crime Less Cash money Credit cards types credit, debit, cash cards, and checks ATMs.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CYBER CRIME.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Essential Standard 2.00 Understand the nature of business. 1.
Internet Safety Internet Safety LPM
By: Asfa Khan and Huda Mukhtar
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
GCSE ICT Social effects of information systems. Is ICT a good thing? Many of the old boring jobs can now be done by a computer, which leaves workers to.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Societal Issues in Computing (COMP466)
HOW DO I KEEP MY COMPUTER SAFE?
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
INFS 452 – Computer Ethics & Society
Presentation transcript:

Are they exceeding their powers and threatening people’s privacy rights?

 Surveillance capitol of the world  Over 4 million public/private cameras in use  London- avg. citizen appears on camera 300 times a day

 Closed-circuit TV  Use of video cameras to transmit a signal to specific, limited amnt. of monitors  “smart cameras”  Recognizes individuals through “face recognition” software  Exploits info. from gov’t. & private databases to find matches (of criminal or terrorists)

 Berwick: burglaries dropped 69%  Northampton: overall crime decreased by 57%  Glasgow, Scotland: overall crime fell by 68%

 Baltimore: 90 cams in Inner Harbour tourist area and high-crime neighborhoods  Chicago: adding 250 cams in high-crime areas  Cams can hear gunshots and aim at the sound  Linking 2,000 cams so feeds can be watched at emergency operations center

 Pros  Crime reduction  Increased safety  Evidence for investigations  Cons  Invasion of privacy  Misuse of images

 What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection, but what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected

 When [an individual] traveled over the public streets he voluntarily conveyed to anyone who wanted to look the fact that he was traveling over particular roads in a particular direction, and the fact of his final destination when he exited from public roads onto private property

 Truman Show Truman Show  Traffic Cam Traffic Cam

Marketing Surveillance

Several different way to collect information: Credit Cards Loyalty Cards (e.g. Giant Eagle and Finish Line) Surveillance Cameras Electronic Web Forms Cookies - small data structures used by websites or servers to store and retrieve information on the user’s side of the Internet connection

Ways to protect your personal information: Using Cash at all time (Good Luck) Use public computers Do no fill out any webs forms using personal information Delete history pages on your computer Delete cookies from your computer

“We are living in a surveillance society but our data protection laws are not up to the job” (Mayo, Ed) Basically this means that with today’s technologies we are under constant surveillance and the laws we have now do not let us choose how we want our private information handled.

Surveillance can be harmful Can lead to: Inferior products (not new and improved) Poorer Service Reinforcement of existing economic inequalities

Not all surveillance is bad surveillance Improvements of technology Customize goods and services Channel investment more efficiently Tackle fraud Improves competitiveness

Information marketing companies InfoUSA, formerly known as Donnelly Marketing Keeps dossiers on 90% of American households Collects and manages massive files that keeps information on family preferences ranging from pets to politics Database of over 210 million US consumers Pays over $50 million a year to keep their database updated

InfoUSA MarketZone Platinum Service that provides you with decision support, customer and market segmentation and analysis, campaign planning, execution, as well as record updating and matching. Helps understand the market Better ways to market their products Allows companies to reach customers more effectively

Being under surveillance does not only mean in the physical sense Where does your personal information go when you buy items, with say your credit card? The answer is most people do not know This information depending on how it is used can either hurt people or help people

 Conducted a survey that said:  78% of Companies surveillance their employees  63% monitor internet use  47% review stored s  15% monitor by video surveillance  12% record phone calls  8% review voice messages

 Employers can look at information in stored databases or in real time and by using computer software.  Examples  Webroot WinGuardian  Captures every key stroke (even deleted ones)  eSniff  Surveillances every activity made on the computer or internet

 Surveillance can effect employees negatively, it can cause:  Decreased morale  Decreased dignity  Increased stress  Worry of being terminated on false information  If an employee accidently clicked on something or if they went to a web site they thought was something else

 1986  First federal statute protecting privacy  Bars intentional interception of:  Wire/Oral Communication  Unauthorized stored information  Businesses allowed to monitor business-related phone and/or with consent from the employee

 January 1999 in Kentucky  Four ex-employees awarded $20 million for being wrongfully terminated  Management under the impression they were stealing  Set up hidden cameras that picked up audio from private conversations  Employees were just eating damaged food  Which was allowed in the unwritten policy

 California attempted to limit surveillance in the workplace  Making a bill to prevent monitoring of s  It was vetoed  Developed a bill to prevent identity theft  Prevents employers from printing Social Security Numbers on health plans and bank statements