Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Participation in Renardus - business issues Michael Day UKOLN Renardus Workshop, Lyngby, 16 November 2001.
What Anyone Can Know The Privacy Risks of Social Networking Sites. Thelma Ameyaw TEL2813.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Big Data Privacy Issues in Public Social Media Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Your Interactive Guide to the Digital World Discovering Computers Fundamentals, 2012 Edition.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
Overview of Utah’s Online Eligibility Resource: ‘myCase’ and ‘Content Manager’ Barbara Hollister, Senior Business Analyst.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
Security Services Constitutional Issues in Private Security.
The Social Effect of Information System
Similarities of surveillance tactics in 1984 compared to the 21 st century. By: Insia Raza ENG 4UI Mrs.Galasso.
General Purpose Packages
C4- Social, Legal, and Ethical Issues in the Digital Firm
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Privacy Framework for Monitoring Social Media Professor Peter Swire Ohio State University & Future of Privacy Forum National Academy of Sciences Public.
Computer Legislation The need for computer laws Go to Contents.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Legal Issues. Overview Standard Contract Terms of Social Networking Sites Government Content on a Third-Party Site Competitive Procurement Issues First.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Search Engine Present by Team 3 Thursday, March 16, 2006.
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
Course : Study of Digital Convergence. Name : Srijana Acharya. Student ID : Date : 11/28/2014. Big Data Analytics and the Telco : How Telcos.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Kelsey Bretz. FBI history Authorization Apple UDIDs Acceptable use of information? Conclusion References.
WELCOME TO YAHOO CUSTOMER CARE We sit here to help you 24/7 as third party Yahoo customer care. Through Yahoo customer care number at that.
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Jan 2017 Single.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
Facebook privacy policy
Chapter 9: Internet Law, Social Media, and Privacy
Social networks: Advantages and disadvantages
Opportunity Recognition Project Copyright 2008 by Luong & Lau
Ethical, Social, and Political Issues in E-commerce
Cloud computing and government surveillance
Privacy principles Individual written policies
Role of Service Providers in Cybercrime Investigations
Social Networking Script - PHP Social Network Script | Open Source Social Networking Script | Open source social network PHP | Social community script.
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
We are third party technical support team because Facebook have no any customer center. We have the best suggestion for your problem which you.
Introduction to GDPR 09/11/2018.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Other Sources of Information
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation

Contents History of Regulations 1 Government Regulations 2 Surveillance Cameras 3 Social Networks 4

History of Regulations   4 th Amendment of the Bill of Rights (1791): protects against unreasonable searches and seizures by the government  Started in the beginning of 1970s  After that, many additions and enhancements

Government Regulations  Partial regulations, overlapping web of federal laws, regulations, state laws, industry standards and guidelines  Laissez fair approach  Highly regulated by law (Directive 95/46/EC)  Processing of data is not allowed apart from certain exceptions

Risks and Problems Condition of the systemPassword policiesTeleworkersErasure of data

Public Surveillance Cameras Total number increased from 40,000 (2002) to 4.2m (2008) 500,000 in London In Europe, UK has the highest number of public cameras Chicago plans to extend its public surveillance for the Olympic Games in 2016 In the US, New York and Chicago have the most cameras

Data Collection 24 hours per day Data is kept for 31 days Longer if it is important for further investigations People can not really avoid the cameras Government collects the data

Use of Data Studies show only little impact Crime gets displaced to areas without cameras Prevent Crimes / Terroristic activities Video material helped with the recent terroristic attacks in London 2005 Investigate Crimes / Terroristic activities

Potential Risks and Problems Who controls the government? Government has a lot of control UK stores digital passport pictures UK stores a lot of video material Face Recognition / Traceability Positive effects not clear Very expensive method

Social Networks Important part of the societyData privacy is crucial Has approx. 200 million active users Users maintain their profiles carefully Upload 850 million pictures per month Upload 8 million videos per month Facebook example Holds a huge amount of private data

Technical Environment Number of servers between 10k and 14k Costs for server hardware approx. $9m Traffic costs approx. $8m Technology has to be very scalable

Data Collection User itself enters the data Personal facts Pictures Videos First party data The “Wall” Links to other users pictures Third Party data

Data Authorization Who has access ?Facebook Use the data from the user profile Third Party Applications User has some options to decide who has access Facebook contacts

Use of Data Advertisement to finance its complimentary services Terms of service define the degree of data usage Change in terms of service caused a lot of trouble Sublicense data Long-term usage of data Facebook

Use of Data Three different types of data needs No need for data (9%) Need public data (82%) Need private data (9%) Facebook does not distinguish between those data needs Third-Party Applications

Potential Risks and Problems Terms of Service change Hacking into user accounts SPAM Mails Police Employers External institutions Interesting for advertising agencies Facebook recognized the potential Selling of user data