Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.

Slides:



Advertisements
Similar presentations
HIPAA Training – Part I Health Insurance Portability and Accountability Act.
Advertisements

Red Flag Rules: What they are? & What you need to do
Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Springfield Technical Community College Security Awareness Training.
The Internet.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Chapter 10 Privacy and Security McGraw-Hill
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
The Data Protection Act
Internet safety By Lydia Snowden.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Florida Information Protection Act of 2014 (FIPA).
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Data Protection Act AS Module Heathcote Ch. 12.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
Internet Safety Internet Safety LPM
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
COASPTD Social and Ethical Issues. Collecting Data needs to be free from bias. Bias means that data is unfairly skewed or gives too much weight to a particular.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
BIS 220 MASTER Leading through innovation/bis220masterdotcom.
Florida Information Protection Act of 2014 (FIPA)
Biometrics.
A Gift of Fire Third edition Sara Baase
Florida Information Protection Act of 2014 (FIPA)
Data Protection Legislation
Privacy and the Laws Governing It
Societal Issues in Computing (COMP466)
Biometrics.
Privacy and Information
A Gift of Fire Third edition Sara Baase
CompTIA Security+ Study Guide (SY0-401)
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Computers in Society Week 5: Privacy

Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten her address through the motor vehicles department (such information is no longer sold). It was recently revealed that iPhone and Android apps were downloading users’ address books without telling them. Other apps on these devices were downloading photographs without notice.

More Stories In Britain, a tabloid newspaper secretly accessed the voice mail of a missing girl without permission. This access falsely gave the girl’s family hope that she was still alive. In Britain, many public areas are watched by hundreds of surveillance cameras. There are numerous examples where the lives of celebrities or politicians have been invaded by the press.

Privacy All of these examples illustrate privacy issues. What do you think about the situations? Are you concerned or unconcerned about them? What is privacy, and what privacy rights should an individual have?

Privacy Definition 18 th century British philosopher Edmund Burke specified that there is a “zone of inaccessibility” surrounding a person. A person has privacy to the extent that he or she controls access to that zone. Important question: How big should that zone be, and what control should an individual have over access to it?

Privacy Pros and Cons Positive aspects of privacy: Privacy allows one to express oneself freely outside the public sphere. It provides protection from harassment by the government and by other individuals. Negative aspects of privacy: Privacy can be used to cover crimes and antisocial behavior.

Threats to Privacy Information collection: individuals and organizations can gather information that can be used for other purposes Information processing: activities such as data mining can be used to draw conclusions about collected data. Information dissemination: collected data can be distributed to harass or embarrass one Invasion: individuals or organizations can interfere in one’s life

Types of Information Public Information: information provided to an organization with a right to share (for example, directory information); may be limited Personal Information: information an individual does not want to share (account numbers, facts such as religious affiliation) Public Records: birth/death certificates, marriage licenses, criminal records, motor vehicle records; not always public information

Examples of Privacy Concerns Here is a list of some privacy concerns that people have expressed. What do you think about these issues? customer loyalty programs security scanners automobile “black boxes” web browser cookies RFID cards and similar technology computer spyware social networks (e.g., data shared with apps) DVRs

What is the Role of Government? The US has many laws governing privacy. There are many that protect privacy, but some may go too far. For example, HIPAA (Health Insurance Portability and Accountability Act) included provisions to insure that an individual’s medical information would be kept private. As a result it became difficult, for example, for spouses to get information, or for parents to get information about children over 18.

Role of Government? (2) On the other hand, the US government has passed many laws to limit privacy. These are usually created to increase security: Security screening PATRIOT (Providing Appropriate Tools Required to Intercept and Obstruct Terrorists) Act Crime information databases.

Data Mining Recent development in data mining have made it a more effective tools for analyzing patterns in individual behavior. It is used for marketing, financial (e.g., credit reports), and law enforcement purposes. People have objected because of revelation of personal information in the marketing case, and because of incorrect conclusions in financial and law enforcement cases.

Identity Theft Identity theft involves impersonation of another for malicious purposes. The most common form of identity theft is credit card fraud. The US has no standard identity document, so it is relatively easy to get minimal information that allows one to secure other documents (including credit cards) under another’s name.