Privacy as an International Information Issue MD823 October 18, 2004.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

Acquire foundational knowledge of marketing-information management to understand its nature and scope Marketing Indicator 1.05.
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Marketing 1.05 MIM.
BUSINESS B2 Ethics.
CHAPTER 4 E-ENVIRONMENT
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
Back to Table of Contents
Consumer Privacy and Information Access Professor Matt Thatcher.
Chapter 11 Privacy Policies and Behavioral Marketing.
IS3350 Security Issues in Legal Context
PRIVACY A Consumer Reporting Agency Perspective. Collect and Sell Information on People Credit Bureaus – Equifax, Experian & TransUnion – are CRA’s But.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
The Internet industry’s privacy seal program Silicon Valley Web Guild.
Internet Privacy Policies Presented by: Paul Frenken President, COLAIP.
Data Protection and Records Management
Business Plug-In B7 Ethics.
3 Ethics and Privacy.
Privacy as an International Information Issue MD823 September 22, 2003.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Per Anders Eriksson
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Class 13 Internet Privacy Law European Privacy.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
C4- Social, Legal, and Ethical Issues in the Digital Firm
This work was supported by the TRUST Center (NSF award number CCF ) Introduction In 1995 Mary J. Culnan stated that ‘fair information practices.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Marketing 1.05 MIM Three types of information used in marketing decision making Customer Marketing mix Business Environment.
Acquire foundational knowledge of marketing-information management to understand its nature and scope Marketing Marketing Indicator 1.05 Indicator 1.05.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Data Protection Act AS Module Heathcote Ch. 12.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Issues Related to Global Information Systems A business can’t just worry about its home- country laws, rules and regulations. If a business has global.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Protection of Personal Information Act An Analysis on the impact.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Data Protection Officer’s Overview of the GDPR
5th Edition.
Privacy and the Law.
MGMT 452 Corporate Social Responsibility
Managing your Donors and the need for a Stewardship Programme
Employee Privacy and Privacy of Employee Information
GDPR enforcement begins
Privacy Principles Melinda Clarke.
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy as an International Information Issue MD823 October 18, 2004

Privacy in a networked society: An oxymoron? Have you: –Changed your address? –Made a credit card purchase? –Opened a commercial account? –Surfed the web? There is a record of your activities in a database and probably on the Net too You don’t own it or control who uses it (if you are a US citizen)

What Is Privacy? Definitions differ depending on national and individual perspective US legal perspective “The right to be left alone” (Justice Brandeis, 1890) Consumer perspective: Individual control over whether and how to share information EU perspective: Explicit and informed consent about how any personal information is collected and how it will be used –Legal protection to prevent unwanted transfer or re-use of personal data files Your definition?

International Privacy Issues Global networks enable/require regular trans-border data flows Different countries have different norms and laws governing privacy US generally supports corporate self-regulation within broad privacy protection guidelines Europe and some Asia/Pacific countries have enacted stricter privacy regulations Common Internet/web and wireless practices raise constant new borderline practices and enforcement issues

European Union Regulations Restrict These Practices--For All EU Citizen Data Overview of EU Regulations –Notice up front about the purpose of data gathering, active consent, right to correct, restrictions on re-use, and other protections Enforcement provisions Impact on US companies Attempts at compromise (Safe Harbor provisions)

Highlights of the EU Provisions  Notice: each data collector must disclose what personal information is collected and how it is going to be used  Choice: user must explicitly agree to every specific reuse of information for different purposes or any sharing with 3rd parties  Access: user may request to see all collected information and be able to correct errors  Security/Integrity: collector must protect info from errors and unauthorized access  Extra protection is required for “sensitive” info  There must be a recourse for users who feel that these directives are not being followed; enforcement provisions in the law of each country

US Privacy Guidelines Basic principles are similar: –notice, consent, access, data integrity Key difference is enforcement--government vs. self-regulation by industry and voluntary compliance by individual companies –“Seal programs” TrustE, BBBonline, etc. encourage model web privacy practices Economic interests and competitive advantage in E-Commerce are at stake and many companies are in violation of guidelines

Three Different Approaches Protecting Privacy Government: Regulation backed by legal rules for enforcement Self-Regulation: Establish privacy “best practices” Each industry polices itself; companies may elect to demonstrate compliance by participation in a recognized third party association (TrustE, BBB Online, etc.) Markets: Assume that if consumers refuse to do business with firms that have poor privacy policies (or no privacy policy) then over time those companies will suffer declining market share What are the pros and cons of each approach?

Tracking Voluntary Privacy Efforts in the US: A Mixed Record Random sample of 335 Web sites from top 5000 Web sites (Nielsen Net Ratings) 88% had at least one privacy disclosure and 62% posted a privacy policy But only 20% of total have a policy that specifically addresses at least one element of fair information practices (FTC Study June 2000) Increased membership and support for third party “good practice” privacy programs Compliance with EU regulations by largest companies But FTC studies show practice is not in line with rhetoric of privacy protection online

Profiling the dog AND its owner  Cartoon by Peter Steiner. Reproduced from page 61, July 5, 1993 issue of The New Yorker, (Vol. 69 (LXIX) no. 20) only for academic discussion, evaluation, and research. Customer Name Street Address & Zip Phone Number SSN / Drivers License Number Age Income Family Size and Ages Stated Product Preferences Family Interests Number & Types of Pets Frequency of Visits Total Purchase Volume Purchase History - Categories Purchase History - Items Purchase History Brands Slide Courtesy Ernst & Young LLP Typical Customer Database

A Deep Well of Online Customer Information That Keeps Filling Up With New Data Common Web Practices: –Collecting personal information for one site or application, then using it for other purposes or selling it to a third party –Tracking online behavior (clickstreams) on a large number of popular web sites and pooling that data to design targeted advertising –Aggregating and analyzing individual data across media--from storefronts, direct mail and phone responses, and online sources –“Profiling” desirable customers in terms of online and offline buying behavior

Along With A Global Sales Channel….

Possible Privacy Gate Keepers: Whom Do We Trust? Government roles –Monitor for security and law enforcement record keeper, tax collector, largest data owner –Privacy protector or big brother? Corporate roles –For customers prospecting, tracking, and marketing opportunities individual and aggregated info as a commercial product –For employees Maintaining HR, payroll, health & other records Monitoring online behavior and employee s Third party roles

Balancing Privacy and Security in the Workplace Is your privacy protected at work? Monitoring of and web browsing Has your company published a policy spelling out appropriate use of and the Internet at work? –What does it say? Best practices for employee privacy