Privacy and Personal Information

Slides:



Advertisements
Similar presentations
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Advertisements

Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
VassilevaCMPT Privacy 1 Privacy - Objectives 1.Define the right of privacy. 2.Why can IT be a threat? 3.Outline what information is collected by.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Privacy Chris Kelly iLaw July 5, 2002.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
3 Ethics and Privacy.
Privacy as an International Information Issue MD823 October 18, 2004.
Privacy as an International Information Issue MD823 September 22, 2003.
Privacy & Personal Information -- Why do we care or do we?
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Class Discussion Notes MKT April 10, 2001.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy 2.4 CptS 401 Adam Carter. Discuss position paper rubric.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Teens lesson fourteen consumer privacy presentation slides 03/08.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Understanding Privacy An Overview of our Responsibilities.
College lesson ten consumer privacy presentation slides 04/09.
privacy and information
Privacy and the Law.
E&O Risk Management: Meeting the Challenge of Change
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Computers and Data Collection
A Gift of Fire Third edition Sara Baase
Privacy and Information
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Teens lesson fourteen consumer privacy presentation slides 03/08.
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy and Personal Information The Impact of Computer Technology “Big Brother is Watching You” Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation

The Impact of Computer Technology Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: Freedom from intrusion. Control of information about oneself. Freedom from surveillance.

The Impact of Computer Technology Invisible Information Gathering Examples: Satellite surveillance. Caller ID. 800- or 900-number calls. Loyalty cards. Web-tracking data; cookies. Peer-to-peer monitoring. Others… Q: Recall an example of invisible information gathering about you.

The Impact of Computer Technology Secondary Use Using information for a purpose other than the one for which it was obtained. A few examples: Sale (or trade) of consumer information to other businesses. Credit check by a prospective employer. Government agency use of consumer database. Q: Recall an occasion when a secondary use of your personal information was made.

The Impact of Computer Technology Computer Matching Combining and comparing information from more than one database. Some examples: Sharing of government agencies’ databases to detect fraud by recipients of government programs. Creating consumer dossiers from various business databases. Q: Recall an example of computer matching that has appeared in the news.

The Impact of Computer Technology Profiling Using data in computer files to predict likely behaviors of people. Some examples: Businesses engage in profiling to determine consumer propensity toward a product or service. Government agencies use profiling to create descriptions of possible terrorists. Q: How might profiling be used with your personal information?

The Impact of Computer Technology Monitoring and Tracking Examples: GPS (global positioning system). Cell-phones. Blackboxes in automobiles. Other wireless appliances. Q: What is the impact of GPS-equipped childrens’ wrist watches.

“Big Brother is Watching You” Federal Government Databases Purpose: Determine eligibility for jobs and programs. Reduce waste. Detect fraud. Law enforcement. Regulations: Privacy Act of 1974. Computer Matching and Privacy Protection Act of 1988. Q: Which government databases contains your personal information?

“Big Brother is Watching You” 4th Amendment Expectation of Privacy: Government’s rights are limited. Government must have probable cause to search private premises or seize documents. Privacy Challenges: New sensing and surveillance technologies enable the government access to private premises without physical entry. New technologies provide the government with access to huge amounts of personal data in business databases. Courts allow some searches and seizures of computers without search warrants. Q: Has technology strengthened or weakened the spirit of the 4th Amendment?

Consumer Information Consumer Databases Gathering Information: Warranty cards. Purchasing records. Membership lists. Web activity. Change-of-address forms. Much more… Q: Recall ways in which you have contributed to consumer databases.

Consumer Information Consumer Databases (cont’d) Limiting Collection, Use, Sharing, and Sale of Personal Data: Consumers can take measures to restrict the use of their personal information. Some information sharing is prohibited by law. Some information sharing is prohibited by published, privacy policies. Q: What measures do you take to limit consumer information gathered about you?

Consumer Information Marketing: Using Consumer Information Trading/buying customer lists. Telemarketing. Data Mining. Mass-marketing. Web ads. Spam (unsolicited e-mail). Q: How are children affected by marketers using consumer information?

Consumer Information Credit Bureaus Uses of consumer information: Evaluate credit risk of applicant. Marketing. Regulation: FCRA (Fair Credit Reporting Act) Self-regulated by privacy principles. Q: If you are denied credit, what are your rights based on the FCRA?

More Privacy Risks Social Security Numbers (SSNs) Appear in: Employer records. Government databases. School records. Credit reports. Consumer applications. Many other databases. Q: What are the risks of using SSNs as identifiers?

More Privacy Risks National ID Card System If implemented, the card could contain your: Name. Address. Telephone number(s). Photo. SSN. Q: What other personal information should a national ID card contain?

More Privacy Risks National ID Card System If implemented, the system could allow access to your: Medical information. Tax records. Citizenship. Credit history. Much more… Q: Are the benefits of a national ID system greater than the risks?

More Privacy Risks Personal Health and Medical Information Data can include: History of substance abuse. Treatment for sexually transmitted disease. Extent of psychiatric help received. Any suicide attempt(s). Diagnosis of diseases (diabetes, angina, cancer, etc.). Use of prescribed medicines. Much more… Q: Why would marketers want access to your medical information?

More Privacy Risks Public Records Available in paper form and/or online: Bankruptcy. Arrest. Marriage-license application. Divorce proceedings. Property ownership. Salary (if employed by state or federal government). Wills and Trusts. Much more… Q: How should access to public records be controlled?

Protecting Privacy: Education, Technology, and Markets Must include awareness of: How the technology works. How the technology is being used. The risks brought on by the technology. How to limit unwanted use of personal information. Applicable state and federal laws and regulations. Q: How do you limit unwanted use of your personal information?

Protecting Privacy: Education, Technology, and Markets Enhance privacy using: Cookie disablers. Opt-in/opt-out options. Anonymous Web services. P3P (Platform for Privacy Preferences). ‘Good’ passwords. Audit trails. Q: What privacy-enhancing technology do you use regularly?

Protecting Privacy: Education, Technology, and Markets Market Response Markets can protect your privacy by: Using trusted third parties. Adhering to established privacy policies. Purchasing consumer information directly from the consumer. Developing and selling privacy-enhancing technologies and services. Q: Have you read the privacy policies at Web sites you frequent?

Protecting Privacy: Law and Regulation Philosophical Views Samuel Warren & Louis Brandeis: Individuals have the right to prohibit publication of personal facts and photos. Judith Jarvis Thompson: No distinct right to privacy. Privacy rights result from rights to our property, body, and contracts. Transactions: Transactions have two parties, often with conflicting preferences about privacy. Q: How should rights to information about transactions between two parties be assigned?

Protecting Privacy: Law and Regulation Contrasting Views Free-market View The parties of a transaction are viewed as equal. Truth in information gathering. Strong reliance on contracts. Freedom of speech and commerce. Consumer-Protection View The parties of a transaction are viewed differently. More stringent consent requirements required by law. Strong limitations on secondary uses of information required by law. Legal restrictions on consumer profiling. Q: How should the privacy of consumer transactions be regulated?

Protecting Privacy: Law and Regulation Contracts and Regulations Basic Legal Framework: Enforce agreements and contracts. Publish privacy policies. Set defaults for situations not in contract. Requiring Specific Consent policies: Adhere to informed consumer consent. Use opt-in policies. Legal Regulations: Determine effectiveness, direct and hidden costs, and any loss of services or inconvenience. Q: Recall a situation where you exchanged personal information for some benefit.

Protecting Privacy: Law and Regulation Contracts and Regulations (cont’d) Ownership of personal data. Can an individual own: Facts (e.g. marriage license in public records)? Personal information (e.g. your date of birth)? Freedom of speech Prohibiting communication of information may violate the 1st Amendment. Q: When does protecting privacy conflict with freedom of speech?

Protecting Privacy: Law and Regulation EU (European Union) Privacy Regulation Key points: Limited collection of personal data. Data must be up-to-date and destroyed when no longer needed. Consent for sharing data is required. Sensitive data (e.g. religion) can only be provided with consent. Notify consumers about the collection and intended purpose of data. Restricted access and sharing of criminal convictions. Q: Can the EU’s privacy regulations work in the US?