Privacy 2.4 CptS 401 Adam Carter. Discuss position paper rubric.

Slides:



Advertisements
Similar presentations
CptS 401, Spring2011 2/3/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
Advertisements

US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Chapter 3 Tort Law.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Privacy 2.3 CptS 401 Adam Carter. Quiz Question 1 Which of the three aspects of privacy discussed in the book does so-called targeted marketing potentially.
Legal and Ethical Issues: Privacy and Security Chapter Five.
CptS 401, Spring2011 2/7/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
CptS 401, Spring /25/2011 Chapter : Privacy I See Dilbert cartoons about privacy:
STUDY SESSION 1. Illegitimate Debt: Perspectives and General Definitions Great degree of consensus --General Definition of Illegitimate Debt and the issues.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
CptS 401 Adam Carter. For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class!
CptS 401, Spring /10/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
PowerPoint® Slides to Accompany
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
1 © 2015 Fidelity National Title Group. 2 What is the CFPB?  CFPB Stands for the CONSUMER FINANCIAL PROTECTION BUREAU  It is an Independent Bureau within.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Why You Can’t Win, Break Even, or Get Out of the Game... WATCHING THE DIGITAL DEMOLITION OF OUR FOURTH AMENDMENT RIGHTS IDEAS & INTERSECTIONS: DIGITAL.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Chapter 7—Privacy Law and HIPAA
Privacy Section 2.2 CptS 401 Adam Carter. Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: A.It requires.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
How Your Customers Will Pay Online & by Phone
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
An Introduction to the CFPB
Privacy and the Law.
Ethical, Social, and Political Issues in E-commerce
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
A Parent Guide to creating a student (under 13) Apple ID
A Gift of Fire Third edition Sara Baase
Preparing for Negotiation & Drafting Business Contracts
Who Uses Encryption? Module 7 Section 3.
Current Privacy Issues That May Affect Your Credit Union
Employee Privacy and Privacy of Employee Information
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy 2.4 CptS 401 Adam Carter

Discuss position paper rubric

Question 9 The following is unique about public-key cryptography: A.it is the only encryption technique that eliminates the need to transmit a secret encryption key between two parties. B.It is the only encryption technique to have entered the public domain. C.It is the only encryption technique that requires both parties to know the secret key. D.All of the above E.None of the above 3

Quiz Question 9 Answer A. See gray box on p. 102 Encryption protects the privacy of our financial transactions on the web Banks can’t link the payer and recipient of funds Credit card numbers and account numbers are difficult to steal* 4

Question 10 Which of the following authors argues that laws against slander, libel, defamation, and other wrongs do not sufficiently address all possible violations of privacy? A.Warren and Brandeis B.Judith Jarvis Thomson C.Martin Hellman D.Hollman Jenkins 5

Question 10 Answer A. See p. 106, 3 rd paragraph Contrast with the view of Judith Jarvis Thomson: “I suggest it is a useful heuristic device in the case of any purported violation of the right to privacy to ask whether or not the act is a violation of any other right, and if not whether the act really violates a right at all” (p. 107) But there is common ground between the two: “There is no privacy violation if a person consented to the collection and use of the information” (p. 108) 6

Question 11 The following is a key difference between the “free market” and “consumer protection” views of privacy: A.The free market view sees privacy as a right, whereas the consumer protection view sees privacy as something we bargain about. B.The free market view believes companies should be legally liable for violating contracts, whereas the consumer protection view does not. C.The consumer protection view sees privacy as a right, whereas the free market view sees privacy as something we bargain about. D.None of the above 7

Quiz Question 11 Answer C. See the last paragraph of p. 116 How would you characterize these two different views of privacy? (see. pp ) 8

Let’s Reexamine our Toolbox When debating a topic, consider: – What do the ethical frameworks say? – Is there any prior legal precedence? – What are the underlying assumptions of a given position?

Revisiting Yesterday’s Question: Is Google’s Street View a privacy violation? 10

Arriving at an Answer: Baase’s Principles (p. 54) Questions for Protecting Personal Information Q1: Informed consent? Q2: Collect only data needed? Q3: Opt out option? Q4: Opt in for sensitive data? Q5: Keep data only as long as needed? Q6: Maintain accuracy of data? Q7: Protect security of data? Q8: Policies for responding to law enforcement? 16

Arriving at an Answer: Fourth Amendment Implications (Clicker) Can the presence of a person’s home on Google Maps Street View be considered a “search?” A.Yes B.No C.Not sure 17

Arriving at an Answer: Warren & Brandeis People have right to prohibit publication of facts about and photos of themselves – Does this extend to their homes? (Are they of general interest?) How will information on Google Maps Street View be used? 18

Arriving at an Answer: Warren & Brandeis vs. Thomson W&B: People have right to prohibit publication of facts about and photos of themselves – Does this extend to their homes? (Are they of general interest?) – How will information on Google Maps Street View be used? Thomson: Is another right being violated (e.g., control of one’s property or person?) 19

Arriving at an Answer: Free Market vs. Consumer Protection View Free Market – What contracts are in place here? Are people able to enter into agreements freely? Consumer Protection – How can having one’s house on Google Maps harm an individual? – What restrictions could be put into place to protect individuals? 20

Question (Clicker) Is Google’s Street View a privacy violation? A.Yes B.No 21

Which matches your view of privacy? A.Warren and Brandeis B.Judith Jarvis Thomson

How should privacy be regulated? A.Free market B.Consumer protection

Whose approach do you like more? A.US B.EU