Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.

Slides:



Advertisements
Similar presentations
Owning a Wi-Fi TV TM Owning a Wi-Fi TV TM Channel.
Advertisements

1 drt 6455 eCommerce Law lesson 8 – IT and web 2.0 associate professor faculty of law university of montreal university of montreal chair in e-Security.
The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Privacy-preserving Services: Social Networks Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Personal Integrity and Björn Nilson Personal Integrity  Integrity vs Personal Integrity  Definition(s)  Physical and mental.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Facebook me! Online social networking as part of libraries’ web presence? This research is not affiliated with or sponsored by Facebook. Kim Holmberg Information.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
ISTEP Sping 2009 Brent Howard ESD 101 Technology Integration Specialist
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
ISIGN IMS Proximity Marketing Solution (IMS) iSIGN Media Corp Sales 1ATTRACT. TRANSACT. MEASURE.
The Internet and World Wide Web.  Understand how the Internet evolved  Describe common Internet communication methods and activities  Setting up your.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Internet.
E-business Environment ITU Spring Figure 2.1 The environment in which e-business services are provided E-business environment.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Cyber Ethics nU!. Words for the Day  Hegemony  Public Domain  Perpetuity.
What if I told you that a random stranger has access to…
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
E.halFILE 2.2 New Application Features Session II.
Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.
The Internet and E-Commerce Back to Table of Contents.
Chapter 3 – Electronic Business (E-Business) Systems
Internet Safety. The Now Generation! Cyber-bullying Why? “A day in the life of a student has changed”
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
Marketing Management Online marketing
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
IT in Business Essentials of the Internet and World Wide Web.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Use of Electronic and Internet advertising options Standard 3.4.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
Communication, Networks, The internet and the Worldwide Web.
Internet Research Tips Daniel Fack. Internet Research Tips The internet is a self publishing medium. It must be be analyzed for appropriateness of research.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Systems that support electronically executed business transactions.
Features Available Today :  Online Real-Estate Forms and Instructions  Online Approvals with RERA  User to User Discussion Forums  Complaint Capture.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Unit 12 The Internet.
WEB SERVER SOFTWARE FEATURE SETS
Social Networking and College Classrooms Some Thoughts for Instructors Kem Saichaie & Leighton Christiansen Des Moines Area Community College 27 February.
1st Technology Spontaneous and encrypted multimedia connections between users with dynamic IP addresses or ports, and visitors connecting through tunneled.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
Complete Ordering System for Promotional Literature and Samples Quick Reference and Training Guide.
The World of Customer Service, 2e Odgers 1 Chapter 13 Chapter 13 Customer Service Technologies Objectives Describe the use of web-based technologies in.
Using Technology to Solve Problems Unit 2 Mod 2 SO 7.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
A SSIGNMENT #3 Com tech. ANSL HTML Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink.
Chapter 9 E-Commerce 1 ©2008 Thomson/South-Western.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
How the internet works Notes for Computer Applications.
EULAs END USER LICENSE AGREEMENTS. What is a EULA?  a legal contract between a software application author or publisher and the user of that application.
The New NAP Members’ Area Development. Elgg What is elgg? –Elgg is an award-winning open source social networking platform.
COMMUNICATION AMONG YOUNG PEOPLE. History Word communication originally come Latin word "communicare". Word communication originally come Latin word "communicare".
Overview The promotion of products or brands via Digital media Digital Media  Search Engine Marketing Search Engine Marketing  Social Media Marketing.
Introduction to Networks
Unit# 5: Internet and Worldwide Web
Electronic Communication and the Internet
Presentation transcript:

Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy

Who Knows What About Whom? How Do They Know It? How Long Will They Remember It?

By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose, commercial, advertising, or otherwise, on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing.

Global Disk Storage per Person Latanya Sweeney

Father's birthplace (town/city, state, county) Father's occupation Typical Birth Certificate Fields, post 1925

Baby’s Sex 113Blood Type 121Born Here? 1340Place of Birth 141Facility Type Typical Electronic Birth Certificate Fields in starting fields 1-15

Typical Electronic Birth Certificate Fields in starting fields 16-30

Typical Electronic Birth Certificate Fields in starting fields 31-45

Typical Electronic Birth Certificate Fields in starting fields 46-60

Typical Electronic Birth Certificate Fields in starting fields 61-75

Typical Electronic Birth Certificate Fields in starting fields 76-90

Typical Electronic Birth Certificate Fields in starting fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

Typical Electronic Birth Certificate Fields in fields

De-identified records

Two separate data bases De-identified medical research database Voter registration list

Re-identification Find records with the same values in the overlapping fields

{date of birth, gender, 5-digit ZIP} uniquely identifies 87.1% of USA pop.

 8. The core component of the Program is Defendants ’ nationwide network of sophisticated communications surveillance devices, attached to the key facilities oftelecommunications companies such as AT&T that carry Americans ’ Internet and telephone communications.  9. Using this shadow network of surveillance devices, Defendants have acquired and continue to acquire the content of a significant portion of the phone calls, s, instant messages, text messages, web communications and other communications, both international and domestic, of practically every American who uses the phone system or the Internet, including Plaintiffs and class members, in an unprecedented suspicionless general search through the nation ’ s communications networks.  10. In addition to using surveillance devices to acquire the domestic and international communications content of millions of ordinary Americans, Defendants have unlawfully solicited and obtained from telecommunications companies such as AT&T the complete and ongoing disclosure of the private telephone and Internet transactional records of those companies ’ millions of customers (including communications records pertaining to Plaintiffs and class members), communications records indicating who the customers communicated with, when and for how long, among other sensitive information.  8. The core component of the Program is Defendants ’ nationwide network of sophisticated communications surveillance devices, attached to the key facilities oftelecommunications companies such as AT&T that carry Americans ’ Internet and telephone communications.  9. Using this shadow network of surveillance devices, Defendants have acquired and continue to acquire the content of a significant portion of the phone calls, s, instant messages, text messages, web communications and other communications, both international and domestic, of practically every American who uses the phone system or the Internet, including Plaintiffs and class members, in an unprecedented suspicionless general search through the nation ’ s communications networks.  10. In addition to using surveillance devices to acquire the domestic and international communications content of millions of ordinary Americans, Defendants have unlawfully solicited and obtained from telecommunications companies such as AT&T the complete and ongoing disclosure of the private telephone and Internet transactional records of those companies ’ millions of customers (including communications records pertaining to Plaintiffs and class members), communications records indicating who the customers communicated with, when and for how long, among other sensitive information.

RSightMaxMobile takes your real-time chat and monitoring capabilities to brand new level Rsupervise chats privately in real time to see what the mice are telling customers while the cats away, all from your mobile device! RThe moment a new visitor hits your site, you can see which page they are currently viewing. We even allow you to fully co- browse the session as if you were there. Our Co-Browse is a great way for operators to "peek" into a visitor's shopping cart or session. Rdisplays a map, pinpointing the visitor location RSightMaxMobile takes your real-time chat and monitoring capabilities to brand new level Rsupervise chats privately in real time to see what the mice are telling customers while the cats away, all from your mobile device! RThe moment a new visitor hits your site, you can see which page they are currently viewing. We even allow you to fully co- browse the session as if you were there. Our Co-Browse is a great way for operators to "peek" into a visitor's shopping cart or session. Rdisplays a map, pinpointing the visitor location

Source: