Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with.

Slides:



Advertisements
Similar presentations
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Advertisements

FERPA: Family Educational Rights and Privacy Act
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
Privacy of Communications: Snail Mail to Telephones.
Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
FERPA: Family Educational Rights and Privacy Act.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Business Plug-In B7 Ethics.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Data Protection Overview
Chapter Two Ethical & Legal Issues.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Epilogue The Future of Knowledge Management.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Citigroup Confidential Portia Workshop on Sensitive Data in Medical, Financial and Content Distribution Systems A Financial Services Viewpoint Dan Schutzer,
The Privacy Symposium – Summer 2008 Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach © Aug 2007.
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 7 Invasion of Privacy: Appropriation and Intrusion McGraw-Hill/Irwin © 2013 McGraw-Hill Companies.
Social and Ethical Issues Overview of strand 1. Topics of strand 1 1. Reliability and integrity 2. Security 3. Privacy and anonymity 4. Intellectual property.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Drill: What is a human right? What is the most important human right?
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
The Right to Privacy: Rethinking the “right most valued by civilized men.” Susan E. Gallagher, UMass Lowell.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Topic : Privacy and Anonymity. Definition Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information.
Recognizing the Client
Privacy and Public Policy Implications of IoT
Surveillance around the world
Protection of CONSUMER information
Employee Privacy and Privacy of Employee Information
CompTIA Security+ Study Guide (SY0-401)
Chapter 10: Privacy, Security, and Ethics
Chapter 1: Information Security Fundamentals
IS4680 Security Auditing for Compliance
Presentation transcript:

Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.

Physical Physical privacy could be defined as preventing "intrusions into one's physical space or solitude“. This would include such concerns as: preventing intimate acts or hiding one's body from others for the purpose of modesty preventing unwelcome searching of one's personal possessions preventing unauthorized access to one's home, vehicle or man-cave medical privacy, the right to make fundamental medical decisions without governmental coercion or third party review, most widely applied to questions of contraception Organizational Governments agencies, corporations, groups/societies and other organizations may desire to keep their activities or secrets from being revealed to other organizations or individuals, adopting various security practices and controls in order to prevent this. Organizations may seek legal protection for their secrets. For example, a government administration may be able to invoke executive privilege or declares certain information to be classified, or a corporation might attempt to protect valuable proprietary information as trade secrets. Spiritual and intellectual The earliest legislative development of privacy rights began under British common law, which protected "only the physical interference of life and property." Its development from then on became "one of the most significant chapters in the history of privacy law." Privacy rights gradually expanded to include a "recognition of man's spiritual nature, of his feelings and his intellect." Eventually, the scope of those rights broadened even further to include a basic "right to be let alone," and the former definition of "property" would then comprise "every form of possession -- intangible, as well as tangible." By the late 19th century, interest in a "right to privacy" grew as a response to the growth of print media, especially newspapers.

Informational Information or data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of privacy in the collection and sharing of data about one's self. Financial privacy, in which information about a person's financial transactions is guarded, is important for the avoidance of fraud including identity theft. Information about a person's purchases, for instance, can reveal a great deal about their preferences, places they have visited, their contacts, products (such as medications) they use, their activities and habits etc. Internet privacy is the ability to determine what information one reveals or withholds about oneself over the Internet, who has access to such information, and for what purposes one's information may or may not be used. For example, web users may be concerned to discover that many of the web sites which they visit collect, store, and possibly share personally identifiable information about them. Similarly, Internet users generally consider their s to be private and hence would be concerned if their was being accessed, read, stored or forwarded by third parties without their consent. Tools used to protect privacy on the Internet include encryption tools and anonymising services. Medical privacy allows a person to withhold their medical records and other information from others, perhaps because of fears that it might affect their insurance coverage or employment, or to avoid the embarrassment caused by revealing medical conditions or treatments. Political privacy has been a concern since voting systems emerged in ancient times. The secret ballot helps to ensure that voters cannot be coerced into voting in certain ways, since they can allocate their vote as they wish in the privacy and security of the voting booth while maintaining the anonymity of the vote. Secret ballots are nearly universal in modern democracy, and considered a basic right of citizenship, despite the difficulties that they cause (for example the inability to trace votes back to the corresponding voters increases the risk of someone stuffing additional fraudulent votes into the system: additional security controls are needed to minimize such risks).

Privacy uses the theory of natural rights, and generally responds to new information and communication technologies. In North America, Samuel D. Warren and Louis D. Brandeis wrote that privacy is the "right to be let alone" (Warren & Brandeis, 1890) focuses on protecting individuals. This citation was a response to recent technological developments, such as photography, and sensationalist journalism, also known as yellow journalism. Warren and Brandeis declared that information which was previously hidden and private could now be "shouted from the rooftops." Privacy rights are inherently intertwined with information technology. In his widely cited dissenting opinion in Olmstead v. United States (1928), Brandeis relied on thoughts he developed in his Harvard Law Review article in But in his dissent, he now changed the focus whereby he urged making personal privacy matters more relevant to constitutional law, going so far as saying "the government [was] identified... as a potential privacy invader." He writes, "Discovery and invention have made it possible for the Government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet." At that time, telephones were often community assets, with shared party lines and the potentially nosey human operators. By the time of Katz, in 1967, telephones had become personal devices with lines not shared across homes and switching was electro-mechanical. In the 1970s, new computing and recording technologies began to raise concerns about privacy, resulting in the Fair Information Practice Principles.

Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries. Privacy on the Internet There are many means to protect one's privacy on the internet. For example s can be encrypted and anonymizing proxies or anonymizing networks like I2P and Tor can be used to prevent the internet service providers from knowing which sites one visits and with whom one communicates. Privacy by Design The principle of Privacy by Design states that privacy and data protection are embedded throughout the entire life cycle of technologies, from the early design stage to their deployment, use and ultimate disposal.