Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.

Slides:



Advertisements
Similar presentations
Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
Advertisements

Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Confidentiality and HIPAA
Consumer Powers and Protections
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Chapter 9 Credit Problems and Laws
Copyright 2007 Thomson South-Western Chapter 9 Credit Problems and Laws.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
CONSUMER CREDIT LEGISLATION Carl Johnson Financial Literacy Jenks High School.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Laws and Agencies that Provide Financial Safeguards Consumer Protection.
Social Responsibility of Business and Government
MONEY MANAGEMENT II Credit Reports. What We’re Covering Today What a credit report is and why it’s important Credit bureau basics What is actually on.
Chapter Three The Contemporary Law Enforcement Industry
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. Police in America Chapter Three The Contemporary Law Enforcement Industry.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Consumer Reports & Scores Quiz Game Test your knowledge A Consumer Action Training Game © 2010.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Consumer Protection. How Does Government Protect Consumers Through Legislation: – Consumer laws are a form of government regulation which protects the.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Competencies Define consumer terms. Define agencies and publications that deal with consumer protection. Recognize what it means to be a “wise consumer.”
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CREDIT REPORT PODCAST Marion Davis What is a Credit Report?  A credit report is information compiled by a credit bureau from merchants, utility companies,
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Back to Table of Contents pp Chapter 27 Your Credit and the Law.
Federal Agencies and Laws for Consumer Rights
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Consumer Protection How can citizens take steps to protect themselves financially? How does the government try to protect citizens?
Consumer Protection How can citizens take steps to protect themselves financially? How does the government try to protect citizens?
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Teens lesson fourteen consumer privacy presentation slides 03/08.
Chapter 6 legal and ethical issues Section 6.1 Government and Laws
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Chapter 9 Objectives 1.Explain how to dispute errors on billing statements 2. Explain the purposes and types of bankruptcy and list strategies for avoiding.
College lesson ten consumer privacy presentation slides 04/09.
Identity Theft It’s a crime!
privacy and information
Small Business and Personal Credit
Privacy and the Law.
Add video notes to lecture
ALL ABOUT THE FTC By: Brandon Baldwin.
Consumer Protection How can citizens take steps to protect themselves financially? How does the government try to protect citizens?
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Privacy and Information
Other Sources of Information
Teens lesson fourteen consumer privacy presentation slides 03/08.
Protecting Yourself from Fraud including Identity Theft
Introduction to Health Privacy
Protecting Yourself from Fraud including Identity Theft
IT and Society Week 2: Privacy.
Presentation transcript:

Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen

Introduction Steve Ayers

Every computer should come with a label that reads: WARNING! USE OF THIS DEVISE CAN RESULT IN LOSS OF PRIVACY

Steve Ayers “With dossiers being compiled by commercial bureaus, state and local law enforcement agencies, the CIA, the FBI, the Armed Services, and the Census Bureau, we live in an Orwellian age in which the computer has become the heart of a surveillance system that will turn society into a transparent world.” Supreme Court Justice William Douglas 1974

Steve Ayers ORWELL’s 1984 Fact or fiction

Steve Ayers The big questions Where does the individual fit? Where is the real power? Is it our information? How important is personal access? How do we amend false information? What sort of technology is needed? Can control be brought to the system? Does the system offer protection and safeguards? Who’s responsible?

Steve Ayers THE HISTORICAL PERSPECTIVE Records started with writing In early America the church did most of the personal record keeping The US Census Federal Income Tax The Social Security System Expanding Government role in personal lives Consumers and computers

Steve Ayers THE DATABASE BUSINESS 550 companies $3 Billion Each individual is in an average of 50 databases

Steve Ayers THE HEAVYWIEGHTS : Catalina Marketing: 30 million American’s buying habits particularly from supermarkets Aristotle Industries: Specializes in voter records Donnelley Marketing Info Svcs: Operates a demographic database service on 125 million Americans Willard Services: Database on 215 million Americans

Steve Ayers THE CREDIT REPORTING COMAPNIES THE REST OF THE GUYS: THE CABLE COMPANY VIDEO STORES THE PHONE COMPANY TRAVEL AGENCIES DOCTORS OFFICES STUDENT RECORDS ETC. ETC. ETC. THE LIST GOES ON

Steve Ayers THE LAW THE PRIVACY ACT OF 1974 : Applies only to public records FERPA : Addresses student records CCPA : Applies to cable TV operators ECPA : Covers electronic transmissions VVPA : Limits video rental information

Steve Ayers THE LAW Drivers License Protection Act of 1994 HIPPA : The all encompassing healthcare record act Gramm-Leach-Bailey Act : An example of a worthless law

Steve Ayers WHERE IS ALL THIS INFORMATION GOING AND HOW IS IT BEING USED CREDIT CARD COMPANIES SUPERMARKETS ATM CARDS PHONE CALLING CARDS MEDICAL RECORDS CREDIT REPORTING COMPANIES THE CENSUS BUREAU

Pros Michelle Peterson

Data System Structure Where information stored: One database Separate databases Who has access: Individuals Individuals & Authorized Entities

Michelle Peterson Each person can access all data about themselves held by anyone.

Michelle Peterson Types of Records Medical Legal Work history Company Held Data Financial Scholastic Political

Michelle Peterson Medical

Michelle Peterson Financial

Michelle Peterson Legal

Michelle Peterson Why does this matter?

Michelle Peterson Errors Planning Security

Michelle Peterson Collected data is used by authorized personnel.

Michelle Peterson Medical Personnel Remote Care Emergent Care

Michelle Peterson Financial Agencies Credit Information

Michelle Peterson Legal Agencies Historical data

It is an achievable goal!

Cons Christie Christman

Free or for a Fee? Accessing our own information

Christie Christman Inaccurate Reports Effects of errors

Christie Christman Hackers & Crackers Identity Theft Impact of all information in one database Malicious or False entries

Christie Christman Are we willing to trade that much info about our identity to one business/entity? Do we get a say in how our info is used?

Christie Christman Who else has access to our files? Will our files be sold? - Direct marketing Who will maintain the system?

Conclusion: Consumer Privacy vs. Legitimate Duties Audrey Clausen

Consumer Privacy Access to private databases Who shares the costs? Who owns the information? Hackers & Crackers? Illegitimate use of data

Audrey Clausen Legitimate Duties Track Federal Tax debtors Dept Collection Act Parents Delinquent in Child Support Child Support Enforcement Act Foreign Counterterrorism Investigations ChoicePoint’s Database

Audrey Clausen Letter to Federal Trade Commission in 1996

Audrey Clausen Is the non-consensual compilation, sale and usage of the database a violation of private citizens civil rights? Are the databases subject to unlawful usage? Do they create an undue potential for fraud on consumers?

Audrey Clausen Are the compilation, sale, and usage of consumers' personal data consistent with the Fair Credit Reporting Act and federal telemarketing regulations? Are there ways consumers can prevent data-based service companies from including their personal background information in commercial data bases absent their content?

Steve Ayers, Michelle Peterson, Christie Christman, Audrey Clausen The End