IS 376: Information Privacy Dr. Kapatamoyo October 23, 2014.

Slides:



Advertisements
Similar presentations
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Advertisements

HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
IS3350 Security Issues in Legal Context
Comm2315.wordpress.com.  On the Record – All statements are subject for use in the story. Everything a source says or s you is.
Right to Privacy: The Unwritten Right
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Ethics in a Computing Culture
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
2/16/2010 The Family Educational Records and Privacy Act.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Privacy & Personal Information -- Why do we care or do we?
Confidentiality… important facts to know and critical things to do!
Amendment: (noun) a change made to a law or document Founders wanted Constitution to be a “living document” (able to evolve with the nation) Making changes.
Security Services Constitutional Issues in Private Security.
+ Protecting Individual Liberties Section 1 Chapter 14.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Class 11 Internet Privacy Law Government Surveillance.
HIPAA PRIVACY AND SECURITY AWARENESS.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Information Management
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Chapter 7—Privacy Law and HIPAA
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
The Fourth Amendment and the Home By Laura Zajac.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Intro to Chapter 42 In small groups of 3 or 4 complete the following questions on chart paper. 1. Define Privacy in general 2. Define Privacy at - School.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
HIPAA Privacy What Every Staff Member Needs to Know.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Privacy and the Law.
Surveillance around the world
STATES AREN’T DUNN DISAGREEING ON THE FOURTH AMENDMENT
Data Protection GCSE ICT Mrs N Steventon-2005.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
HIPAA Administrative Simplification
Criminal Investigation and the Law
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
HIPAA Pros - Disclosures
Disability Services Agencies Briefing On HIPAA
The Surveillance State
Presentation transcript:

IS 376: Information Privacy Dr. Kapatamoyo October 23, 2014

Contemporary Major Factors  Amount : of personal information that can be gathered.  Speed: at which personal information can be transmitted.  Duration: of time that the information can be retained.  Kind: of information that can be acquired and exchanged. 2

Aspects of Privacy  Dictionary definition:  Seclusion  Freedom from surveillance  Concealment  Control of personal information  Freedom from intrusion (origins with Samuel Warren and Louis Brandeis)  Leave me alone 3

Perspectives on Privacy  Discussions of privacy revolve around the notion of ACCESS,  where access means either physical proximity to a person or  knowledge about that person.  There is conflict between a person that wants to restrict ACCESS to them by creating a “a zone of inaccessibility” (Edmund Byrne) and outsider who wants to gain access.  Privacy is a social arrangement that allows individuals to have some level of control over who is able to gain access to their physical selves and their personal information. 4

Harms and Benefits of Privacy Harms. Most wrong doing takes place under cover of privacy (Ferdinand Shoeman). Nuclear families cannot share personal issues hence too much pressure on some (Edmund Leach). Outsiders fail to acknowledge a dysfunctional family or abuse until someone is injured. Benefits. Socialization and individuation are both necessary steps for a person to reach maturity/blossom (Morton Levine). Privacy is recognition of each person's freedom (Jeffry Reiman, Stanley Benn). Privacy lets us be ourselves (Charles Sykes). Privacy lets us remove our public persona (Gini Graham). 5

Is There a Natural Right to Privacy?  Born out English Common Law tradition:  “a man’s home is his castle.” No one – not even the King – can enter without permission, unless there is PROBABLE CAUSE of criminal activity. 6

Listen to Posner  Posner’s view  Not a fundamental right  Pre-modern people didn’t need it; modern people don't care if they benefit  Only criminals care because they are doing something bad 7

Posner’s arguments  Judge Posner’s argument at its core is privacy as “concealment.” However,  Premodern peoples (living in small villages or tribal cultures) had no real ability to conceal anything about themselves, therefore no privacy. It is perfectly natural for people to live with little or no privacy.  Contemporary people are willing to give up their private information, and become transparent, in return for very small financial incentives or improvements in convenience. This proves that we do not need value individual privacy.  Concealment is mot useful to criminals, and least useful to honest people. Therefore privacy is mostly a social harm that reduces safety, not a social good. 8

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” 9 The Fourth Amendment

So What is “Information Privacy”? The rights and responsibilities that govern the ACQUISITION, DISCLOSURE, and USE OF PERSONAL INFORMATION. Acquisition - from the individual, third party, legally or illegally, with or without the individual’s awareness. Dataveillance (Roger Clarke): surveillance, data monitoring and data recording techniques by use of computer technologies. Disclosure - to other people or entities Use - storing, manipulating or evaluating personal information 10

Kinds of Information Privacy Different aspects: Information privacy: collection, use and disclosure of personally identifiable information (PII). Communications privacy: private information should be safely delivered to the intended party. Privacy in public (and work) places: electronic profiling (i.e., collecting a variety of in-depth information about an individual electronically) Critical question: Is there Home/work distinction & public space/private space distinction? 11

Describe Personal Information  Any type of information that is related to a person’s private life or concerns, recorded in any form.  Can also be personally identifiable information (PII), which can be used to uniquely identify, locate or contact a person.  Not just content - but also events (a transaction) that may implicate a person’s privacy. 12

Privacy-implicating Activities: An Incomplete List Health and Medical Records Financial transactions of all types - tax, banking, etc. Subscriber Information - Telephones, Cable TV, Video Rentals, etc. Communications of all kinds - Telephone Calls, s, etc. Credit History Purchasing History – Direct, Phone, Internet Records Student Insurance Employment Records “Judicial History” - Driving record, civil and criminal cases, etc. Internet Activities 13

Reasonable Expectation of Privacy Over the years, court rulings has set the precedent that the key to understanding privacy issues is reasonable “ Expectation of Privacy.” These are the general criteria: General legal principles : no privacy if behaviors or communications are knowingly exposed to public view. Vantage point : a point where anyone can see or hear what is going on. Certain buildings or pieces of land : so most public places come with no expectation of privacy (some exceptions are public phone booths and restrooms). Technological sophistication : laws are constantly updated to adapt to new technological innovations. 14

Informed Consent  A process in which an individual agrees to participate after being given detailed information about the benefits and potential risks of his or her action.  The person must be advised about:  Nature of information collected  Why and how it is going to be used  Risks  Freedom to withdraw 15

Opt-in vs. Opt-out  Opt-in:  Potential customer to self-select the information (services) they wish to subscribe to, and how the information can be used.  Opt-out:  Information can be sent to customers without prior permission. But customers must be provided with the option to ask to be removed from the list. 16

Some Important Federal Privacy Laws  2004: Fair Education Rights and Privacy Act  2001: USA Patriot Act (USAPA) [reauthorized in 2006 with amendments]  Authorizes Feds to subpoena records from providers.  2000: Children’s Online Privacy Protection Act  1998: Children’s Online Privacy Protection Act  1998: Telephone Anti-Spamming Amendments Act  1994: Communications Assistance for Law Enforcement (CALEA)  1974: Privacy Act 17

Privacy Act of 1974  “No AGENCY shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains....”  Data records should be “relevant and necessary” to the purpose for which they are collected  Establish procedures to allow individuals to see, copy and amend records about themselves  Requires publishing notices describing all systems of records (no secret records)  Agency is required to make reasonable efforts to maintain accurate, relevant, timely and complete records about individuals  Information collected for one purpose MAY NOT be used for another purpose without notice to or the consent of the subject of record 18

USA Patriot Act 2001 Four principal categories:  Provides feds. and Intel. agencies greater authority to monitor communications.  Gives Sec. of Treasury greater powers to regulate banks, preventing money laundering.  Makes it more difficult for terrorists to enter USA.  Defines new crimes and penalties for terrorist activity. Does this by:  Extends jurisdiction of court-ordered “wiretaps” to entire country.  Allows for roving surveillance/dataveillance.  Law enforcement do not need a warranty to intercept communications if they have permission from owner of computer systems (e.g. ISP). 19