Privacy ECT 582 Robin Burke. Outline Homework #6 Privacy basics relationship to security privacy policies and requirements.

Slides:



Advertisements
Similar presentations
CHAPTER 4 E-ENVIRONMENT
Advertisements

Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Internet Privacy Policies Presented by: Paul Frenken President, COLAIP.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
HIPAA Security Standards What’s happening in your office?
Information Security Policies and Standards
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
Microsoft Passport Waldemar Swiercz.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
Conceptual Design of an E- commerce System Min Ding Smeal College of Business Administration Pennsylvania State University.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
HIPAA PRIVACY AND SECURITY AWARENESS.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
DOC Web Policies & Best Practices Jennifer Hammond NOAA Research WebShop 2002 August 7, 2002.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
CHAPTER 5 ETHICS & PRIVACY.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Jim Loter Director of Information Technology
The Apple Privacy Policy zakiya mitchell
Chapter 5 Electronic Commerce | Security
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 5 Electronic Commerce | Security
Current Privacy Issues That May Affect Your Credit Union
Privacy and Information
Other Sources of Information
The E-Commerce Act and the Right to Privacy
Designing IIS Security (IIS – Internet Information Service)
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy ECT 582 Robin Burke

Outline Homework #6 Privacy basics relationship to security privacy policies and requirements

Homework #6

Privacy Privacy is the interest that individuals have in sustaining a 'personal space', free from interference by other people and organizations. – Roger Clarke

Forms of privacy privacy of the person privacy of personal behavior privacy of personal communications privacy of personal data

Person Bodily privacy Issues compulsory immunization compulsory drug testing compulsory sterilisation abortion

Behavior Issues sexual orientation political activism religion I-Pass Related media privacy

Communication Issues wiretapping encryption

Data Information privacy Issues availability of personal data control over collected information

Competing interests intra-personal information privacy vs access to credit inter-personal behavior privacy vs health risk organizational body privacy vs insurance risk

Privacy protection Balancing privacy interest other interests Context parties interests issues

Privacy in E-Commerce Means data privacy Questions what information is collected about visitors to a site? what is done with that information? how are users informed of possible uses of their data?

Surveillance Personal surveillance tracking an individual Mass surveillance tracking a large group When using personal data dataveillance

E-commerce data Transactions Site registration info often included address Site visitations Browsing history Platform info from browser headers

Dataveillance techniques Front-end verification linking data in an application form against data in other systems Computer matching merging of data from separate information systems creating a merged profile Profiling identifying characteristics of "interesting" individuals in advance searching databases for matches

Identification weaker than authentication relationship between a system and an individual to be recognized An entity may have many identities same business  multiple contacts same business  multiple brandnames same individual  multiple addresses same individual  different user ids

Identity Anonymous data is not associated with any individual Personally-identified data is associated with identifying user information

Spectrum Totally private site accepts only e-cash delivers goods to pre-arranged dropoff points Totally invasive site installs trojan horse which downloads sensitive data data correlated with user's activites online and offline data sold to anybody and everybody

Issues Need to know the system shouldn't collect more information than is necessary for a transaction Third parties disclosure to one organization should not mean disclosure to the world Technical disclosure interaction leaks technical information

Anonymization Services exist to "anonymize" web interactions ssl connection to proxy server proxy server emits web requests proxy server gets responses and encrypts back to user proxy server may alter content handling cookies & web bugs modifying request headers

The data trail Personal data transaction records are essential to business relationships especially to next-generation e-commerce services like personalization also evaluating web site quality and features Problem these records have to most potential for privacy problem

Psuedonymity Pseudonomous data is associated with a consistent persona not directly linked to an individual Examples chat-room persona eBay user name

Benefits Provide stable identity removed by anonymizers Allow for personalized services Good fit for "multi-role" lives Lower privacy risk But idea not widely supported in e- commerce

Legal framework for privacy Children's privacy COPPA Self-regulation privacy seal

Fair information practices Guidelines from the FTC Notice Choice Access Security

Notice Consumers should be given clear and conspicuous notice of an entity's information practices before any personal information is collected from them Should consist of what data will be collected who is collecting data who will get the data how the data will be collected how the data will be used how the data will be protected whether data is mandatory or optional

Choice Consumers should be given options as to how any personal information collected from them may be used for purposes beyond those necessary to complete a contemplated transaction. Secondary uses placement on a (e)mailing list transfer to third party usability evaluation

Access An individual's ability both to access data about him or herself and to contest that data's accuracy and completeness. Difficult to implement esp. authentication Least popular

Security Protection of personal information against unauthorized access, use, or disclosure, and against loss or destruction.

COPPA Guidelines become mandatory for children under 13 Required posted privacy policy parental consent except for addresses in some conditions re-verify consent when policy changes allow parental review of collected data allow parent opt-out

Privacy seals TRUSTe BBBOnLine Privacy CPA WebTrust Entertainment Software Ratings Board

TRUSTe Non-profit consortium Process privacy policy self-assessment Assessment_v8.html remote audit of web site annual review

BBBOnLine Privacy Offered by Better Business Bureau Must be a BBB member Similar process to TRUSTe

CPA WebTrust Franchise available to CPAs licensed by WebTrust Differences on-site audit semi-annual review (They also do Certification Authorities)

ESRB Privacy For game sites Process similar to TRUSTe on-site audit quarterly anonymous review quarterly anonymous spot-checks

Final exam Submit via COL 9 pm 11/20 No late exams!