Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.

Slides:



Advertisements
Similar presentations
CHAPTER 4 E-ENVIRONMENT
Advertisements

Consumer Powers and Protections
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
PRIVACY A Consumer Reporting Agency Perspective. Collect and Sell Information on People Credit Bureaus – Equifax, Experian & TransUnion – are CRA’s But.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Information Security Policies Larry Conrad September 29, 2009.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
3 Ethics and Privacy.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Transborder dataflows Flow of information across national borders Much of this data involves personal information.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
Information Assurance and Information Sharing IMKS Public Sector Forum 7 February 2011 Clare Cowling, Senior Information Governance Adviser Transport for.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Privacy and Personal Information
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Microsoft 365 Get help with regulatory compliance
APP entities (organisations)
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
A Gift of Fire Third edition Sara Baase
Ethical questions on the use of big data in official statistics
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
GDPR enforcement begins
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Designs for Data Integrity, validations, security and controls
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Privacy Update John L. Wood – Egerton, McAfee, Armistead & Davis, P.C.
Presentation transcript:

Data Privacy and Security Prof Sunil Wattal

Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors of consumers  Generally with the intention to offer products and services in a targeted manner.

What could be wrong with that:  Target  Doubleclick  Facebook Beacon

 The dark side of data analytics

 List instances of information about you being collected and stored

Invisible Information Gathering  Examples:  800- or 900-number calls.  Loyalty cards.  Web-tracking data; cookies.  Warranty cards.  Purchasing records.  Membership lists.  Web activity.  Change-of-address forms.  GPS  Cell Phones  Smart Phones

Using Consumer Information  Data Mining & Targeted Marketing  Trading/buying customer lists.  Telemarketing.  Data Mining.  Mass-marketing.  Web ads.  Spam (unsolicited ).  Credit Records

Privacy What is privacy?  Freedom from intrusion (being left alone)  Control of information about oneself  Freedom from surveillance (being tracked, followed, watched)

Why are some things free?  If a service does not charge you money, then you are paying in other ways  Marketing and Advertising  Privacy  Facebook has 1 Billion monthly active users  Revenues for Q2’12: $1.18 Billion, 84% from ads  Linkedin Marketing Solutions: $63.1 Million  Twitter uses Promoted Tweets based on you

Consumer Protection  Costly and disruptive results of errors in databases  Ease with which personal information leaks out  Consumers need protection from their own lack of knowledge, judgment, or interest  Uses of personal information  Secondary Use  Using information for a purpose other than the one for which it was obtained. A few examples:  Sale (or trade) of consumer information to other businesses.  Credit check by a prospective employer.  Government agency use of consumer database.

Privacy Policies  Have you seen opt-in and opt-out choices? Where? How were they worded?  Were any of them deceptive?  What are some common elements of privacy policies you have read?

Self Regulation What are the roles of formal laws vs. free operation of the market? Supporters of self-regulation stress the private sector’s ability to identify and resolve problems. Critics argue that incentives for self-regulation are insufficiently compelling and true deterrence will not be achieved.

Analytics with global data Privacy Regulations in the European Union (EU):  Privacy is a fundamental right  Data Protection Directive  In Europe, there are strict rules about what companies can and can't do in terms of collecting, using, disclosing and storing personal information.  Governments are pushing to make the regulations even stronger.

EU Privacy Laws  Personal information cannot be collected without consumers’ permission, and they have the right to review the data and correct inaccuracies.  Companies that process data must register their activities with the government.  Employers cannot read workers’ private .  Personal information cannot be shared by companies or across borders without express permission from the data subject.  Checkout clerks cannot ask for shoppers’ phone numbers.

Data Security

Stolen and Lost Data  Hackers  Physical theft (laptops, thumb-drives, etc.)  Requesting information under false pretenses  Bribery of employees who have access  Have you heard of Thumbsucking??

 Furious Constituents  Negative Publicity  Tarnished Reputation  Public Embarrassment  Investigations  Lawsuits, Fines and Penalties  Financial Losses  Waste of Valuable Resources Implications for companies

Examples

Availability  Data needs to be available at all necessary times  Data needs to be available to only the appropriate users  Need to be able to track who has access to and who has accessed what data

Authenticity  Need to ensure that the data has been edited by an authorized source  Need to confirm that users accessing the system are who they say they are  Need to verify that all report requests are from authorized users  Need to verify that any outbound data is going to the expected receiver

Integrity  Need to verify that any external data has the correct formatting and other metadata  Need to verify that all input data is accurate and verifiable  Need to ensure that data is following the correct work flow rules for your institution/corporation  Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and privacy laws.

Confidentiality  Need to ensure that confidential data is only available to correct people  Need to ensure that entire database is security from external and internal system breaches  Need to provide for reporting on who has accessed what data and what they have done with it  Mission critical and Legal sensitive data must be highly security at the potential risk of lost business and litigation

 Implement Technological Solutions  Adopt “Soft” IT Security Approaches  Change the Corporate Culture  Can you think examples of these practices at Temple or elsewhere Approaches to Data Security

Next steps  Inclass Exercises