Privacy Issues (set 3) CS 340 Spring 2015. Lotame: Data Management Intelligence management-tutorials.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Back to Table of Contents
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Netiquette Rules.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Ethics in a Computing Culture
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
What Google Privacy issues?. Concerns with Google & Privacy Google Street View It turns out that Google was obtaining a large amount of data from Wi-Fi.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
How To Protect Your Privacy and Avoid Identity Theft Online.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Yes No Yes No Yes No Yes No Yes No Yes No Yes No.
Behavior Tracking Dhaval Patel.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Cyber Crimes.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Social Media Safety Manchester Township Middle School Guidance Department
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Day 2 – Marketing Research…
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Facebook privacy policy
Legal and Ethical Issues
Societal Issues in Computing (COMP466)
Chapter 10: Privacy, Security, and Ethics
Privacy Issues part 4 Information/data privacy
Being Aware of What You Share
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy Issues (set 3) CS 340 Spring 2015

Lotame: Data Management Intelligence management-tutorials

Online tracking devices Cookies: small text file that stores information Stored client side, on hard drive Cookie creator: Lou Montulli Originally To allow for shopping cart functionality (online memory) Effort made to not allow the sharing of these between sites Now Third party cookies: site to site Behavioral Targeting: ad network; relationship with same advertiser cookies-to-track-you/92E525EB-9E4A D- 8C4E6EF68F93.html#!92E525EB-9E4A D- 8C4E6EF68F93

Third Party tracking files “The first time a site is visited, it installs a tracking file, which assigns the computer a unique ID number. Later, when the user visits another site affiliated with the same tracking company, it can take note of where that user was before, and where he is now. This way, over time the company can build a robust profile.”

Online tracking devices cont’d Beacons a.k.a. pixel tag, web bug Invisible image embedded in webpage Image is not place there by website, but by other company for ad tracking Potentials: Capture of what is typed on a website Bundles into a profile

WSJ article: “The Web's New Gold Mine: Your Secrets” ews/articles/SB ews/articles/SB Info on Ashley Hayes- Beaty: 4c812db e541 6a323e79bd37 Valued at $0.001

The WSJ study findings Surreptitious installation of tracking technology Not just cookies, but real time logging Buying and selling of profiles Advertisers: No longer paying for ad placement on a site Paying instead to follow users around Internet with personalized marketing messages

Online advertiser tracking companies “considered anonymous because it identifies web browsers, not individuals.” What is tracked: Opt out options: BlueKai Lotame

Taking control of the tracking Tracking blockers like Ghostery

Which tracking technology is a transparent 1x1 pixel used to surreptitiously gather what people type? A.Cookie B.Beacon C.Third Party Cookie D.Ghostery

Privacy As consumers: Most European countries have specific laws and regulations aimed at protecting an individual’s (consumer) privacy. In the US, historically consumer privacy has relied on social norms and market forces laws are typically a last resort or response to an event highly reactive and unsystematic

Misc. Privacy Laws Fair Credit Reporting Act, 1970 Right to Financial Privacy Act, 1978 Cable Communications Policy Act, 1984 Video Protection Privacy Act, 1988 Driver’s Protection Privacy Act, 1994 Children’s Online Privacy Protection Act (COPPA), 1998 Info on kids under 13 Financial Services Modernization Act, 1999 Health Insurance Portability and Accountability Act (HIPAA), 2001

Texas Infant DNA collection program, p Routine and often mandatory blood samples collected after birth. Reason? What happens to the samples after processed? Discarded OR Stored indefinitely See Motivations? Detect important health problems Later identification Are parents informed? Not always. Raises ethical issues This is not limited to Texas… Recent issue in Indiana Alabama policy:

Texas’ use of the newborn blood test cards to catalogue information unrelated to that infant’s direct health care is an example of a secondary use of information. A.True B.False

Opinion: Suppose a public school provides students with laptops. Should that school be able to turn on a web cam on the laptop to check on a student’s off campus behavior? A.Yes B.Maybe C.No

Robbins v. Lower Merion School District, p US District Court PA (2010) School district surreptitiously activated webcams using LANrev on laptops provided to students while students were off campus Video: 10k-settlement-in-school- webcam-spy-case/ 10k-settlement-in-school- webcam-spy-case Settlement: $610,000

European Union’s Right to be Forgotten Check out Google’s page “European privacy requests for search removals”“European privacy requests for search removals” FAQs Totals Examples Sites most impacted

Encryption on phones can make it impossible to comply with court orders FBI director Coney’s criticism: Apple can no longer bypass smartphone user passwords with iOS 8 Cannot comply with court orders See video privacy/index.htmlhttp:// privacy/index.html

Opinion: Do you expect that this inability will create serious problems for law enforcement? A.Yes, frequently B.Yes, sometimes C.Yes, but rarely D.Never

Google’s Street view issues 1.What is captured by the cameras 2.Other information was recorded too Info gathered about surrounding Wi-Fi War driving

Google’s Street View Issue: does it violate privacy when photos are taken that show people engaged in activities visible from public property? General rule: No, but there are some exceptions Dept of Defense: no content from military bases. Complied Homeland Security: delay with Baltimore-Washington Metropolitan area

Street view - Is the elevated camera a problem?

Opinion: The height of the street view camera is too tall. A.Yes B.No

International views on Google Street View Some European countries prohibit filming w/o consent even if done on public property if the filming is for the purpose of public display Japan: required lowering cameras to 2.05 meters (6.73 ft) from 3 meters (9.8 feet)

The other problem of Street View: “war driving” Collecting data from unsecure networks as the street view car drives by: “Snippets of s, photographs, passwords, chat messages, postings on Web sites and social networks” privacy-inquiries-get-little-cooperation.html privacy-inquiries-get-little-cooperation.html In April 2013, Germany fined Google $189,225 in April for Street View’s privacy violation Amount google makes in 2 minutes..002% of its $10.7 B profit last year. See article punishment-for-google.htmlhttp:// punishment-for-google.html

Google v. Joffe 22 plaintiffs suing google for violating their privacy from war driving during Street View mapping Google argued that the Wi-Fi info is accessible to anyone and as such does not constitute wiretapping 9 th Circuit rejected Google’s argument In June 2014, the US Supreme Court denied certiorari so class actions against Google for war driving can continue privacy-lawsuit.html privacy-lawsuit.html

Opinion: Do you agree with this statement. Since unsecure Wi-Fi is accessible to many Google did not violate privacy with its war driving. A.I agree, no violation by Google B.I disagree, this is a privacy violation by Google

Research study: “Experimental evidence of massive-scale emotional contagion through social networks”“Experimental evidence of massive-scale emotional contagion through social networks” On 689,003 Facebook users Manipulated News Feed Ethical breach? study-breached-ethical-guidelines-researchers-say study-breached-ethical-guidelines-researchers-say research-experiments-on-users/ / research-experiments-on-users/ /

August 2014 iCloud photo hack Targeted attack on specific celebrity accounts, not a software or system vulnerability. Guessed passwords Researched and answered security questions Found nude photos in celebrities’ iCloud accounts & posted nude photos on sites like 4chann Could have been prevented with two factor authentication. Requiring two of: Something user knows Something user has Something user is

Supplying a username and password constitutes two factor authentication. A.True B.False