C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.

Slides:



Advertisements
Similar presentations
Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
Advertisements

Agrobiodiversity and Intellectual Property Rights: Selected Issues under the FAO International Treaty on Plant Genetic Resources for Food and Agriculture.
San Mateo County, CA  FAST FACTS:  Founded: 1856  Size: 455 sq miles  Coastline: 57 miles  Population: 718,451  Cities: 20  County Employees: more.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
EU research on the use of SNS by Children Dr Leslie Haddon EU Kids Online Meeting on European Social Networking Taskforce, Brussels, 26 th June, 2008.
C MU U sable P rivacy and S ecurity Laboratory Sensor-Based Interactions Kami Vaniea.
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
McCarthy Tétrault McCarthy Tétrault LLP An Act respecting the protection of personal information in the private sector (Quebec): « Particularities of the.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Fair Information.
Privacy: Social Issues and Current Technologies Ian Graham Centre for Academic Technology Information Commons University of Toronto.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
CyLab Usable Privacy and Security Laboratory 1 C yLab U sable P rivacy and S ecurity Laboratory Laboratory.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Search Engines and Social Networks October.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Introduction to Privacy January.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Identity October 9, 2008.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Course Overview Conceptions of Privacy August.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Data Privacy October 30, 2008.
Privacy 1. Definitions of Privacy The right to be let alone – Harvard Law Review article by Brandeis and Chase in Abigail v. Franklin Mills.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
1 Privacy & Publicity 15 Minutes of Fame (or not) Steve Baron March 23, 2006.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy August 31 and.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 History and.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy September.
CyLab Usable Privacy and Security Laboratory 1 CyLab Usable Privacy and Security Laboratory Introduction.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 History and Philosophy Week.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Evidence based research in education Cathy Gunn University of Auckland.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 History and Philosophy Week.
Presents. Confidentiality Warning Confidentiality Warning: This document (including any attachments) is intended only for the use of the individual or.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Overview Week 1 - August.
Privacy and Personal Information
Privacy as contextual integrity Helen Nissenbaum New York University September 6, 2007 Ars Electronica, Linz Support.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff Gahyun Jeon.
2 3 26% of middle class workers have more than high school diploma 1970 Snapshot.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Ethics: The Challenges in International Research Prof Wendy Moyle, Deputy Director RCCCPI, Griffith University Asia-Pacific Research Symposium, Gold Coast.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Legal and Ethical Issues Counseling Children. Child and Adolescent Clients Counselors who work with children and adolescents under the age of 18 may experience.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Organizational and Legal Issues -- Developing organization and governance models for HIE Day 2 -Track 5 – SECOND SESSION – PRIVACY AND SECURITY CONNECTING.
Xypoint Position Paper Mario G. Tapia Will Cousins Xypoint 2200 Alaskan Way,
Types of privacy (Solove, Understanding Privacy)
CyLab Usable Privacy and Security Laboratory 1 C yLab U sable P rivacy and S ecurity Laboratory Location-sharing.
Privacy as Contextual Integrity Helen Nissenbaum Department of Culture & Communications, NYU
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 9, 2008.
Towards End-to-End Privacy Control in the Outsourcing of Marketing Activities: A Web Service Integration Patrick C. K. HungDickson K.W. Chiu W.W. FungWilliam.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
Balancing Privacy for Victims of Sexual Crimes with Opportunity for Support Chelly Byrne Hernando Romero LSTU E-120 Spring 2015.
Biomedical Informatics Research Network DATA SHARING HIPAA Compliance & IRB Approvals Martha Payne, Jeffrey Grethe October 10, nd Annual All Hands.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
Privacy Introduction Emerson Murphy-Hill. Why do we care about privacy? Much of what we do in today’s society involves information exchange e.g. government,
Definition: Privacy Psychology: Selective access to oneself or one’s group. Legal: The right to be left alone What is the difference between privacy and.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Jim Loter Director of Information Technology
Privacy, Data Protection and Lex Informatica -- lecture 1
The General Data Protection Regulation act (GDPR)
Librarians as Researchers within a University Setting
Privacy and confidentiality awareness
The Platform for Privacy Preferences Project
Presentation transcript:

C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007

C MU U sable P rivacy and S ecurity Laboratory You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 2 Concept versus right Privacy as concept What is it How and why it is valued Privacy as right How it is (or should be) protected  By law  By policy  By technology

C MU U sable P rivacy and S ecurity Laboratory You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 3 Hard to define “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J (2001).

C MU U sable P rivacy and S ecurity Laboratory You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 4 Some definitions from the academic literature Personhood Intimacy Secrecy Contextual integrity Limited access to the self Control over information

C MU U sable P rivacy and S ecurity Laboratory You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 5 Limited access to self “Being alone.” - Shane (age 4) “the right to be let alone” - Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890) “our concern over our accessibility to others: the extent to which we are known to others, the extent to which others have physical access to us, and the extent to which we are the subject of others attention. - Ruth Gavison, “Privacy and the Limits of the Law,” Yale Law Journal 89 (1980)

C MU U sable P rivacy and S ecurity Laboratory You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 6 Control over information “Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” “…each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication….” Alan Westin, Privacy and Freedom, 1967

C MU U sable P rivacy and S ecurity Laboratory You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 7 Realizing limited access and control Limited access Laws to prohibit or limit collection, disclosure, contact Technology to facilitate anonymous transactions, minimize disclosure Control Laws to mandate choice (opt-in/opt-out) Technology to facilitate informed consent, keep track of and enforce privacy preferences

C MU U sable P rivacy and S ecurity Laboratory

“You have to run faster and faster just to stay in the same place!” – The Red Queen, Alice in Wonderland Scott C. Forbes, Ph.D.

Black’s Law Dictionary, 1 st (1891) 10

Black’s Law Dictionary 2 nd (1910) 11 OED (2007): a state in which one is not observed or disturbed by others Webster’s (2007): the quality or state of being apart from company or observation