Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.

Slides:



Advertisements
Similar presentations
Fluency with Information Technology INFO100 and CSE100 Katherine Deibel Katherine Deibel, Fluency in Information Technology1.
Advertisements

Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
FDIC Money Smart for Young Adults
WEB ART GALLERIES Dissemination Research Project Spring semester 2005 Group 5: YanNinaJahongirUlugbekSambeg.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Privacy and Digital Security Shhh, It’s a Secret lawrence snyder c h a p.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
DATA PRIVACY DAY JANUARY 28, 2014 ONLINE SAFETY. From January newsletter – Tips and Tricks Get help on how to identify,
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Test Your Tech The dangers of phishing include A. Sharp hooks and nightcrawlers. B. Credit-card fraud at a look-alike Web site that mimics your bank. C.
Shhh, It's a Secret: Privacy and Digital Security
Chapter 17 Shhh, It's a Secret: Privacy and Digital Security.
C4- Social, Legal, and Ethical Issues in the Digital Firm
© Oklahoma State Department of Education. All rights reserved.1 Credit Cards: More Than Plastic Standard 8. 1 Credit Cards and Online Shopping.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Internet Security for Small & Medium Business Week 6
Spring Term 2011 Washington College Professor Suydam Week 13 Final Project Preparation & Privacy.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Privacy 2.4 CptS 401 Adam Carter. Discuss position paper rubric.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Society & Computers PowerPoint
CHAPTER 5 ETHICS & PRIVACY.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Privacy and Digital Security Shhh, It’s a Secret lawrence snyder c h a p.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
TYLER GROUP
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Computer Security Fundamentals
Credit Cards: More Than Plastic
Protecting Your Credit
Chapter 13: Shhh, It's a Secret: Privacy and Digital Security
Other Sources of Information
INFO/CSE 100, Spring 2005 Fluency in Information Technology
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder

Dating For Total Dummies When you buy a book, the transaction creates information … who owns it? Is the information yours or the business’s?

Dating For Total Dummies When you buy a book, the transaction creates information … who owns it? Is the information yours or the business’s? Four options on how to use it -- Store can’t use after business purpose over Store can use it, if you approve Store can use it, unless you object Store can use information no matter what

What Is Privacy? Justices Brandeis & Warren wrote … The narrower doctrine [of privacy] may have satisfied the demands of society at a time when the abuse to be guarded against could barely have arisen without violating a contract or a special confidence; but modern devices afford abundant opportunities for the perpetration of wrongs without the participation of the injured party

What Is Privacy? Brandeis & Warren wrote … The narrower doctrine [of privacy] may have satisfied the demands of society at a time when the abuse to be guarded against could barely have arisen without violating a contract or a special confidence; but modern devices afford abundant opportunities for the perpetration of wrongs without the participation of the injured party Portable cameras and faster film … 1890

What Is Privacy? Brandeis & Warren wrote … The narrower doctrine [of privacy] may have satisfied the demands of society at a time when the abuse to be guarded against could barely have arisen without violating a contract or a special confidence; but modern devices afford abundant opportunities for the perpetration of wrongs without the participation of the injured party Modern devices mean we need a new definition of privacy

A Definition What does “privacy” mean in the modern world? Privacy, the right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others Privacy is a right You control when & how much is revealed

Fair Information Practices To “protect privacy” in IT, HEW created “fair Info practices”; OECD expanded OECD principles are the “gold standard” Defined in 1980 Business & Government are separate cases Limited Collection Principle Security Principle Quality Principle Openness Principle Purpose Principle Participation Principle Use Limitation Principle Accountability Principle

Europe vs America EU, much of non-EU Europe, NZ, Hong Kong, Australia, Canada use OECD US privacy law for government is (has been?) strong US privacy law for business is “sectoral”, meaning it is limited to sectors and specific business practices –Very few industries/practices covered –Almost anything goes, e.g. identity theft –US has no fed law protecting med info

Think About It EU law says, “Info on EU citizens must comply with OECD on leaving EU” US privacy is so bad, EU information cannot come here US-EU negotiations

Think About It EU law says, “Info on EU citizens must comply with OECD on leaving EU” US privacy is so bad, EU information cannot come here US-EU negotiations stalled over - Opt-in/Opt-out - Enforcement Person decides to “allow” or must “prohibit” use Who checks compliance and imposes penalties? Think about it for SPAM

Digital Privacy How private is your information online? Reputable online business post Privacy Stmt The statement should understandable to you and say what info they collect, what they will do with it, how to “opt-out”, etc. But, there is little policing & few penalties Real Networks in 1999 secretly gathered data on people’s personal music tastes, encrypted the info so no one would know, didn’t mention it in their privacy statement, and used TRUSTe auditor -- the day after getting caught, they improved their privacy statement … should we ever trust them???

Cookies Cookie: a record stored by a Web server on a client (your computer) The cookie is usually a unique ID that allows the server to remember who you are Well known CS idea that improves Web use Server Client :210465: Chris, Dating for Total Dummies Client: Name: Book: ChrisDating

Cookies: Good Cookies are used by many sites and they make Web usage much better Many sites, e.g. Oxford English Dictionary use cookies Banking and credit card applications cannot be secure enough without cookies If there privacy laws met OECD standards, cookies would be all good and no one but computer scientists would know about them But there is a problem

Cookies: Bad Cookies can be stored in your computer by sites you have not visited: 3rd party 3rd Party Cookies come from a site in business with the site you visit, e.g. for ads 3rd party cookies allow info to be correlated Client 123 ABC site: DEF site: rdParty: Server ABC 123 Cookie: Server DEF 123 Cookie: Server 3rd 123 Cookie:

Correlating Cookies The 3rd party cookie becomes the key (literally, in DB sense) to join (in DB sense) the info held by separate co.s Company ABC Database Customer Cookie Ad Agcy Data1 Data val 1 val 2 Company DEF Database Customer Cookie Ad Agcy Data1 Data val 1 val 2

Managing Cookies You control whether your computer accepts cookies -- look in browser If you don’t care about privacy, accept all cookies If you greatly value your privacy, accept no cookies If you want some privacy AND benefit from the useful stuff on the Web, accept cookies but reject 3rd party cookies Reputable companies tell you their cookie policy