6 December Privacy. Presentations News: Tega Scott Peterson trial: Stephen.

Slides:



Advertisements
Similar presentations
Office of the Information and Privacy Commissioner, Ontario, Canada
Advertisements

International Privacy Laws Ashley Michele Green Sensitive Information in a Wired World October 30, 2003.
Citizens and Governance in a Knowledge-based Society Results of first call Presented by Henry Scott, EKT.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890.
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Internet Privacy Policies Presented by: Paul Frenken President, COLAIP.
The Legal and RIM Challenges Posed by Social Networking The Legal and RIM Challenges Posed by Social Networking ARMA Gaithersburg Chapter November 10,
Belgrade December With support from the European Union Progress Programme.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts:
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Displaying privacy information with icons Leif-Erik Holtz Marit Hansen PrimeLife / IFIP Summer School 2010 Helsingborg, August 6th, 2010.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
1 December Security and Privacy. Information Systems Security Systems Operating system, files, databases, accounting information, logs,... Issue if someone.
Copyright © 2006 Pearson Education, Inc. Slide 9-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Chapter 6 Security & Privacy Web servers continue to be attractive target for hacker for variety of reasons –Most easy target –Personal satisfaction –Political.
Privacy as an International Information Issue MD823 September 22, 2003.
E-Commerce: Regulatory, Ethical, and Social Environments
Getting to Privacy A Presentation to: Presented by: Mike Gurski.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Session 4. Panel session: How useful is the notion of “circle of trust” concept ? A vision for the future. Maurice Brandt Destatis Germany 2ND EUROPEAN.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
1 Privacy issues on pan-European White Pages service 4rd TF-LSD Meeting Amsterdam, Peter Gietz
Head of Bioethics Division
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
An XPath-based Preference Language for P3P IBM Almaden Research Center Rakesh Agrawal Jerry Kiernan Ramakrishnan Srikant Yirong Xu.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Starting the debate about privacy Borka Jerman-Blažič EIFFEL TT Meeting, Louvain La Neuve, March 9, 2010.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
Use of a P3P User Agent by Early Adopters Lorrie Faith Cranor Manjula Arjula Praven Guduru AT&T Labs November 2002.
“What’s Ethics Got To Do With It” Presentation to the Canberra Evaluation Forum Gary Kent Head Governance Australian Institute of Health and Welfare.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
© OECD A joint initiative of the OECD and the European Union, principally financed by the EU Introducing a New Concessions System – Latvian Experience.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Jurisprudence Prepared by: Aphrodite Smagadi Mariah Kennedy.
Legal aspects of Health Data protection Solvita Olsena Medical Law Institute Ltd.
17 April Reverse Engineering Ethics Privacy Introduction.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers due date Moved to Wednesday.
US laws and international laws on IT Accessibility Chapters 5 and 6.
PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory.
PROPRIETARY AND CONFIDENTIAL INFORMATION OF ADVERTISING.COM, INC. 1 ONLINE MARKETING SOLUTIONS FOR.
”Privacy is dead” Scott McNealy CEO Sun Microsystem Johan Fogel.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
European Legal Background of the Freedom of Information and the Privacy of the Public Figures in view of the Application of Data Protection Principles.
1 Information Technology, Millennials and Privacy, Can They Blend or will They Collide Aharon Yadin.
This course was developed in cooperation with the IUCN Academy of Environmental Law THE ROLE OF THE PUBLIC.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Final Joint Conference EQUI-HEALTH & ADAPT projects Lisbon, 11th May 2016 Preliminary report on MIPEX Health strand David Ingleby ADAPT network.
Final Exam Review Unit 2: International Economics.
International Legal Systems and Liability. When businesspeople conduct business in a country other than their own, they must observe the laws of the host.
Cyber Security and Georgia. New Challenges
Apple Privacy Policy As of: 12 September 2016
English law is the legal system of England and Wales, and is the basis of common law legal systems used in most Commonwealth countries and the United States.
E-Commerce: Regulatory, Ethical, and Social Environments
سياسة الإفصاح والشفافية ببنك التنمية الصناعية
Session 25 INST 301 Introduction to Information Science
Presentation transcript:

6 December Privacy

Presentations News: Tega Scott Peterson trial: Stephen

End of Class Discuss Attitudes survey Evaluation form

Privacy

What is privacy? The right to have information that you don’t expect to be available to others remain that way On many sites, you give up your right to privacy

Some Views on Privacy “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, former head of BT (British Telecom) Research “You have zero privacy anyway.” Scott McNealy, CEO Sun Microsystems “By 2010, privacy will become a meaningless concept in western society” Gartner report, 2000

Historical Basis of Privacy Justice of Peace Act (England 1361) Provides for arrest of Peeping Toms and eavesdroppers Universal Declaration of Human Rights (1948) European Convention on Human Rights (1970)

Legal Realities of Privacy Self-regulation approach in US, Japan Comprehensive laws in Europe, Canada, Australia European Union Limits data collection Requires comprehensive disclosures Prohibits data export to unsafe countries Or any country for some types of data

Aspects of Privacy Anonymity Security Transparency and Control: knowing what is being collected

Impediments to Privacy Surveillance Data collection and sharing Cookies Web site last year was discovered capturing cookies that it retained for 5 years Sniffing, Snarfing, Snorting All are forms of capturing packets as they pass through the network Differ by how much information is captured and what is done with it

P3P Platform for Privacy Preference Voluntary standard still in draft form Structures a web sites policies in a machine readable format Allows browsers to understand the policy and behave according to a user’s defined preferences