Privacy and User Generated Content Lauren Gelman Center for Internet and Society Stanford Law School cyberlaw.stanford.edu.

Slides:



Advertisements
Similar presentations
E-Business and e-Commerce. e-commerce and e-business e-commerce refers to aspects of online business involving exchanges among customers, business partners.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
What is MySpace MySpace is a free online community composed of personal profiles aimed foremostly at a younger membership. A MySpace profile typically.
Business Development Suit Presented by Thomas Mathews.
Our Digital World Second Edition
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
Digital Marketing Franchise Advertising Marketing Tools.
Netiquette Rules.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
An Integration Platform of Social Networking Applications to Support Life Long Learning in Rural Territories: the “SoRuraLL Virtual Learning World” Environment.
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
3 Ethics and Privacy.
Online communities 1 Theory revision Complete some of the activities in this powerpoint and use the revision book to answer questions.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Lecturer: Ghadah Aldehim
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
AVI/Psych 358/IE 340: Human Factors Web 2.0 November
E-Commerce and the Entrepreneur
Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Do You Have a Web Site?. Everyone does, don’t they?
Keeping on Top of Technological Trends and Uses of Existing Technology Daniel L. Appelman Heller Ehrman LLP.
Support.ebsco.com My EBSCOhost Tutorial Tutorial.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
E-P RAGUE AND THE P ROSPECTS OF E-G OVERNMENT : D ISCUSSION P ANELS James Melitski, PhD and Tony Carrizales, PhD E-governance Institute National Center.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
WIPO – IP and Creative SMEs in the Digital Environment Copyright and the Participative Web Prof. Dr. Martin Senftleben VU University Amsterdam Geneva,
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
1 comedycentral.com in the world of contextual advertising Don Steele Search Engine Strategies Conference Chicago, 12/5/06.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
© Cseng Lim All Rights Reserved | | Social Media Outsourcing and Coaching ONLINE BRANDING.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Raising Digitally Literate Citizens Curbar Primary School March 2016.
Online Marketing: Industry Innovation and Government Enforcement Actions Privacy Symposium Wednesday, August 22, 2007 Christine Varney Partner, Hogan &
I-NAMES Corporation Database Privacy Policy Database Policy SIG, APNIC Meeting at Taipei, Taiwan Lee, Seung-Min.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
ONLINE BRANDING © Cseng Lim All Rights Reserved | | Social Media Outsourcing and Coaching.
Facebook privacy policy
A.M. Mustehsan E Commerce: Chapter-1
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
SETTING UP OF E-COMMERCE WEBSITE
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
UNIT 15 Webpage Creator.
Data Protection Legislation
Big Data Considerations
Interactive and Alternative Media
Google Privacy Policy Karen Tao.
New Mexico Broadband Program Internet Tools for Small Business
Michael R Nelson Senior Researcher
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presentation transcript:

Privacy and User Generated Content Lauren Gelman Center for Internet and Society Stanford Law School cyberlaw.stanford.edu

“Web 2.0 Is About Controlling Data” -Tim O'Reilly, Wired News, [Web 2.0] It's really about data and who owns and controls, or gives the best access to, a class of data. As far as I'm concerned, web 2.0 is still in it's really early stages, and the reason is because the data isn't all owned yet.

Overview User’s privacy experience is a combination of law and technology Nothing inherently bad for privacy in providing services that people want Concern is deployment Development of “user expectation”

Defining the Privacy issue for Web 2.0 Use of PI information you provide to one entity for one purpose by another entity for another purpose. –Commodification of digital dossier –Webcrawlers, search, and sales Permanence of the data. –User generated or company collected Link between online and offline identity Market demand is not be best way to evaluate user privacy concerns absent adequate notice.

Massive Change in the nature of advertising “Ad networks and search engines such as Google can now target banner ads to customers who have demonstrated an interest in content related to the ad, even if the page has nothing to do with the advertiser's product.” -Businessweek.com

Massive Societal Change Distorts boundary between –public and private spaces –Intimate and extended networks –Public and private time What we do is influenced by who else knows what we’re doing. Eliminates opportunity to experiment while young (myspace vs. basement/diary) Loss of Control (who owns transactional data) Pecuniary harm (identity theft)

The Law Constitutional- “expectation of privacy” Statutory- “silo approach” treats different kinds of information differently –Medical (HIPPA) –Financial (GLB) –Video (VPPA) –Cable (Cable Act) Policy- privacy and other policies –Dmca notice and takedown –CDA limitation on liability

Top-Level Privacy Questions What information do you collect, is it PII, how long is it held for? Who do you share it with and under what circumstances? Do you augment this information with data from other sources? What internal protections do you have to prevent disclosures?

Building Privacy In Interface –How do you know if you’re “live” –Opt in/opt out Collection of information –Who holds it –How long is it kept –Is it personalized –Third party access –In what country?

Think about these things early! –What does the user want? –What do your partners “really” need? –What might third parties come looking for? –What kind of press can you look forward to? –Where might the law go? –Innovate in privacy!

Privacy Policy Generator Internet-based application Features: –Enables web companies to create Privacy Policies –Informes user about requirements –Gives background about the privacy landscape

Part of a Joint Project Generator for –Terms of Service –Privacy Policies Participants –David Hornik, August Capital –Cyberlaw Clinic at Stanford Law School –Berkman Center at Harvard Law School

Previous initiatives P3P ( Privacy Bird ( OECD - Privacy Statement Generator ( Others (see

Improvements informed choice –educational explanations –explanations of the provisions which may be chosen graphical tags –Creative commons model –Technical architecture –„EFF approved“

Potential Useful tool to reduce repetitive work Educational benefit Point of reference to learn about best practice Retrievability (chicken and egg problem with privacy bird) Data about companies‘ preferences

Example

What is your default? What preferences do you give to users who register? Do you collect identifying details from users who do not register, such as IP address? If so, your privacy policy will reflect this because your users should know their participation is not anonymous. Someone can connect the IP address you collect, with PII from the users ISP to unmask the user.

Example (cont‘d)

Privacy Policy will contain customized language: „ orgname may collect Personally Identifiable Information through online forms, such as forms to register, order, contact us, sign up for a Newsletter, or the like, through your user profile or through your posts in blogs, on a bulletin board or on a comparable experience space on orgname ’ s web site. ”

Example (cont‘d) Privacy Policy will also contain boilerplate language: „ When you register with orgname or submit information to orgname, a temporary copy of that information may routinely and repeatedly be made to prevent accidental loss of your information through a computer malfunction or human error. Besides, orgname may keep your account information stored in a database. ”

Conclusion There is a lot of good in this space, coupled with both positive and negative externalities. Who is the party best able to address them? –Government(s)? –Lawyers? –Technologists? –-innovators?

Privacy and User Generated Content Lauren Gelman Center for Internet and Society Stanford Law School cyberlaw.stanford.edu