The DoubleClick controversy and other related issues pertaining to privacy on the Internet.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Advertisements

Spyware: Legislative Responses Jody Blanke Mercer University ALSB, Ottawa August 20, 2004.
Back to Table of Contents
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
On-Line Privacy: A Study of the DoubleClick Case Mark Banner Computer Science 99 February 23, 2000.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Amount of daily searches on Google 150 million searches per day from 100 different countries 150 million searches per day from 100 different countries.
E-Commerce: Regulatory, Ethical, and Social Environments
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
Online Advertising Innovations & The Illusion of Anonymity.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Name of presenter(s) or subtitle Privacy laws and their impact on research David W. Stark MRIA B.C. Chapter November 2, 2005.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Ethics.
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2014 by The University of Kansas Organizing Audits of Consumer Services.
Organizing Audits of Consumer Services. What is an audit of services? An audit is a formal inspection; conducted by someone from outside the entity being.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Marketing / Law / Digital Keith Arrowsmith. Court ActionPress Complaints CommissionTrading StandardsGambling Commission.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
Security Privacy Relationship Which FIPs may be relevant to security breaches of customer privacy information? –Must be accountable for all PII in its.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
The Internet Industry Week Two.
Legal and Ethical Issues in E-Commerce
Importance of Privacy Internet Safety
Network and Internet Security and Privacy
Chapter 10: Privacy, Security, and Ethics
Privacy Issues part 4 Information/data privacy
The Ethics of Selling User Data
Presentation transcript:

The DoubleClick controversy and other related issues pertaining to privacy on the Internet

Overview Privacy DoubleClick Other Privacy Issues and Incidents Stakeholders Ethical Implications Summary

Privacy Accessibility to others Form of control Amount of information known Physical access When does private information become public? Information as property

DoubleClick and Privacy Collecting personal information about people without their knowledge –Acquiring companies which have large databases of personal information (eg. Abacus, Opt-In .com) –Collecting information from web-sites that claimed such info was not being shared –The “invisible” third party

DoubleClick’s Privacy Policy Information Collected in Ad Recovery –“ In the course of delivering an ad to you, DoubleClick does not collect any personally-identifiable information about you, such as your name, address, phone number or address. DoubleClick does, however, collect non-personally identifiable information about you, such as the server your computer is logged onto, your browser type (for example, Netscape or Internet Explorer), and whether you responded to the ad delivered.”

Merger with Abacus Nov. 13, Merged with Abacus Direct Corporation Merged databases - Information about where people live, how much money they make, where they travel, entertainment, health information, recreational web-sites they visit (eg. etc. Contrary to privacy policy

Opt-In .com Dec. 1, DoubleClick announced acquisition of Opt-In .com Opt-In .com gathers demographic information like name, gender, age, occupation Merging of databases again Web-based

“Invisible” Third Party

Complaints against DoubleClick Target of six private lawsuits Several privacy advocacy groups Electronic Privacy Information Center (EPIC) –Accused DoubleClick of building massive databases on consumers’ buying habits and identities

Complaints against DoubleClick Federal Trade Commission (FTC) conducting inquiry New York Attorney General inquiry Michigan Attorney General files notice against DoubleClick –Accused of violating Michigan’s consumer protection laws

DoubleClick’s Response Moves to quell privacy debate Internet Privacy Education Program Allows users to block its “cookies” Educate consumers on how to protect themselves when browsing and shopping online

DoubleClick’s Response Privacy Officer Privacy Advisory Board Pricewaterhouse Coopers, L.L.P to perform periodic privacy audits Refer users to EPIC calls its “feeble attempt at crisis management”

Other Privacy Incidents Lawsuit against Yahoo “E-stalking” –“Cookies” act as surveillance cameras that illegally monitor and stalk web-users without their full knowledge or consent –Yahoo accused of theft, trespassing and other related wrongs.

Other Privacy Incidents Health sites violate their own privacy standards Accidental violations –Unaware that third-party advertisers have access to personal information they are collecting

New Privacy Laws? DoubleClick controversy has ignited demand for legislation regarding privacy on the Internet Legal system struggling to keep pace with technological change Cannot rely on self-policing industry

Good side of DoubleClick Not clear if DoubleClick is causing harm to anyone User has option to opt-out Increased profiling may lead to web-surfers actually finding something they like

Stakeholders Joe Shmo DoubleClick Clients of DoubleClick (sending end) Clients of DoubleClick (receiving end) Government (Clinton administration)

Stakeholders

Ethical Implications Breach of privacy (personal info becoming public) Anonymity Responsibility and fault fall on all stakeholders to varying degrees Deliberate misrepresentation on privacy policies

Summary Breach of privacy laws as theft of property DoubleClick merging databases with other companies, accumulating personal info; channeling private info from one client to another Need for new privacy laws Conclusion: –“Government, industry, and privacy advocates will have to decide where to draw the line on how much information one company can maintain”

Main Sources New York Times Archives – Wall Street Journal – DoubleClick – Computers, Ethics & Social Values –CS 99 Textbook