Privacy Policy Issues & Pages Amy Reese INF385E Information Architecture and Design 1 UT iSchool 21 September 2004.

Slides:



Advertisements
Similar presentations
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Part 2. QUEENSLAND INTERNATINOAL BUSINESS ACADAMY.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
Confidentiality and HIPAA
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
WELCOME Annual Meeting & Compliance Seminar. Code of Conduct - Impact on Corporate Culture by Andy Greenstein Knight Capital Group, Inc.
Managing Personal Information - Australian Companies Outsourcing to India and the Philippines Professor Margaret Jackson and Marita Shelly.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Employment Screening: CORI and Private Background Checks Presented by the Massachusetts Law Reform Institute 99 Chauncy St., Suite 500, Boston, MA
Per Anders Eriksson
Transborder dataflows Flow of information across national borders Much of this data involves personal information.
Anglican Province of Canada Privacy Policy. Commitment to Privacy The Privacy Policy, including the Web Privacy Statement, is the Anglican Province of.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
What Do You Mean, I’m a Credit Bureau? National Public Records Research Association 2010 Annual Conference October 9, 2010 New Orleans, Louisiana By John.
Internet regulation National limits of Internet Content.
Health Insurance Portability and Accountability Act (HIPAA)
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
LAW OF COMPUTER TECHNOLOGY FALL 2015 © 2015 MICHAEL I. SHAMOS Regulatory Law Michael I. Shamos, Ph.D., J.D. Institute for Software Research School of.
Federal Agencies and Laws for Consumer Rights
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
CHAPTER 38 CONSUMER PROTECTION DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Presented by: David Reid, DBA International
Privacy and the Law.
CREDIT REPORTING & THE CONSUMER
Federal Agencies and Laws for Consumer Rights
Chapter 10 Cyberlaw, Social Media, and Privacy
Privacy principles Individual written policies
CHAPTER 33 Cyberlaw.
Confidential Records and Protected Disclosures
Protecting Your Credit
is not secure is not secure..
Privacy Policy Issues & Pages
Current Privacy Issues That May Affect Your Credit Union
Privacy Policy Issues and Pages on the WWWeb
The Beast and All It Consumes
The Health Insurance Portability and Accountability Act
Presentation transcript:

Privacy Policy Issues & Pages Amy Reese INF385E Information Architecture and Design 1 UT iSchool 21 September 2004

Overview pri·va·cy (prī′ və sē; Brit. also prīv′ ə sē), n., pl –cies. The state of being private; retirement or seclusion. The state of being private; retirement or seclusion. The state of being free from intrusion or disturbance in one’s private life or affairs: the right to privacy. The state of being free from intrusion or disturbance in one’s private life or affairs: the right to privacy. Secrecy. Secrecy. Archaic. A private place. [ ; late ME privace. See private, -acy] Archaic. A private place. [ ; late ME privace. See private, -acy] Source: Webster’s New Universal Unabridged Dictionary © 1996 Barnes & Noble, Inc. by arrangement with Random House Value Publishing.

A Little Bit of History Federal Trade Commission Act (1914) Federal Trade Commission Act (1914) Privacy Act (1974) Privacy Act (1974) Electronic Communications Privacy Act (1986) Electronic Communications Privacy Act (1986) Children’s Online Privacy Protection Act (1988) Children’s Online Privacy Protection Act (1988) Gramm-Leach-Bliley Act (2000) Gramm-Leach-Bliley Act (2000) Report to Congress: Privacy Online (2000) Fair Credit Reporting Act (2002) Fair Credit Reporting Act (2002)

A Little Bit of History Federal Trade Commission Act (1914) Federal Trade Commission Act (1914) (15 U.S.C. §§ 41-58, as amended) prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce prevent unfair methods of competition, and unfair or deceptive acts or practices in or affecting commerce seek monetary redress and other relief for conduct injurious to consumers seek monetary redress and other relief for conduct injurious to consumers prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices prescribe trade regulation rules defining with specificity acts or practices that are unfair or deceptive, and establishing requirements designed to prevent such acts or practices conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce conduct investigations relating to the organization, business, practices, and management of entities engaged in commerce make reports and legislative recommendations to Congress make reports and legislative recommendations to Congress

A Little Bit of History Privacy Act (1974) Privacy Act (1974) developed with the intent to regulate the collection and use of personal information by federal executive branch agencies developed with the intent to regulate the collection and use of personal information by federal executive branch agencies problems with the dispute of outdated regulatory guidelines and misinterpretation problems with the dispute of outdated regulatory guidelines and misinterpretation unresolved issues defy attempts at clarification unresolved issues defy attempts at clarification

A Little Bit of History Electronic Communications Privacy Act (1986) Electronic Communications Privacy Act (1986) sets out provisions for disclosure and privacy protections of electronic communications sets out provisions for disclosure and privacy protections of electronic communications this refers to is any signals, data or intelligence transmitted via wire, radio waves, photo electronic, etc. that affects interstate commerce this refers to is any signals, data or intelligence transmitted via wire, radio waves, photo electronic, etc. that affects interstate commerce the EPCA prohibits any unlawful access of electronic communication and prevents government entities from requiring disclosure of this communication from a provider without proper procedure the EPCA prohibits any unlawful access of electronic communication and prevents government entities from requiring disclosure of this communication from a provider without proper procedure

A Little Bit of History Children's Online Privacy Protection Act (1988) Children's Online Privacy Protection Act (1988) gives parents control over what information is collected from children under age 13 online and how that information is used gives parents control over what information is collected from children under age 13 online and how that information is used applies to operators of web sites directed to children or that collect personal information from children applies to operators of web sites directed to children or that collect personal information from children The Rule requires operators to: The Rule requires operators to: Post a privacy policy on the page and provide a link to the policy everywhere personal information is collected Post a privacy policy on the page and provide a link to the policy everywhere personal information is collected Provide notice to parents about collection practices and obtain verifiable parental consent before collecting personal information Provide notice to parents about collection practices and obtain verifiable parental consent before collecting personal information Give parents a choice as to whether their child’s personal information will be disclosed to third parties Give parents a choice as to whether their child’s personal information will be disclosed to third parties Provide parents to access or delete their child’s personal information, or opt-out of future information collection or use Provide parents to access or delete their child’s personal information, or opt-out of future information collection or use Allow activity access without disclosing more personal information than is reasonably necessary Allow activity access without disclosing more personal information than is reasonably necessary Maintain the confidentiality, security and integrity of personal information collected from children Maintain the confidentiality, security and integrity of personal information collected from children

A Little Bit of History Gramm-Leach-Bliley Act (2000) Gramm-Leach-Bliley Act (2000) requires companies to provide their consumers with privacy notices, explaining the institutions’ information-sharing process requires companies to provide their consumers with privacy notices, explaining the institutions’ information-sharing process consumers are given the right to limit some sharing of their information consumers are given the right to limit some sharing of their information companies have the right to share the consumers’ information within the organization, but not with outside sources, such as telemarketers. companies have the right to share the consumers’ information within the organization, but not with outside sources, such as telemarketers. Legislation.htm Legislation.htm Legislation.htm Legislation.htm

A Little Bit of History Report to Congress: Privacy Online (2000) commercial Web sites that collect personal identifying information (Pii) from or about consumers online would be required to comply with the four widely-accepted fair information practices: commercial Web sites that collect personal identifying information (Pii) from or about consumers online would be required to comply with the four widely-accepted fair information practices: Notice Notice Choice Choice Access Access Security Security

A Little Bit of History Fair Credit Reporting Act (2002) Fair Credit Reporting Act (2002) Accuracy and fairness of credit reporting Accuracy and fairness of credit reporting the banking system is dependent upon fair and accurate credit reporting the banking system is dependent upon fair and accurate credit reporting investigate and evaluate the credit worthiness, standing, capacity, character, and reputation investigate and evaluate the credit worthiness, standing, capacity, character, and reputation consumer reporting agencies are vital in assembling and evaluating consumer credit and other information consumer reporting agencies are vital in assembling and evaluating consumer credit and other information insure that consumer reporting agencies exercise their responsibilities with fairness, impartiality, and respect for the right to privacy insure that consumer reporting agencies exercise their responsibilities with fairness, impartiality, and respect for the right to privacy Reasonable procedures Reasonable procedures adopt reasonable procedures for meeting the needs of information in a fair and equitable manner, with regard to the confidentiality, accuracy, relevancy, and proper utilization adopt reasonable procedures for meeting the needs of information in a fair and equitable manner, with regard to the confidentiality, accuracy, relevancy, and proper utilization 418summary.asp 418summary.asp 418summary.asp 418summary.asp

What Information is Out There? Information Mining Information Mining Government & Private Sectors differ vastly Government & Private Sectors differ vastly What information do businesses collect? What information do businesses collect? Corporate liability? Corporate liability? What do they do with it? What do they do with it? How secure is the information out there? How secure is the information out there? What can I do to control my information? What can I do to control my information?

Do We Really Have Privacy? Legislative Measures Legislative Measures Is enough being done to insure our privacy? Is enough being done to insure our privacy? Is all privacy legislation in our best interests? Is all privacy legislation in our best interests? California’s Spyware Bill California’s Spyware Bill How can I help? How can I help? Personal Privacy & Freedom of Information Personal Privacy & Freedom of Information “Mommy, can I have a cookie?” “Mommy, can I have a cookie?” “Mommy, where does spam come from?” “Mommy, where does spam come from?” Identity Theft Identity Theft Corporations vs. the Individual Corporations vs. the Individual

Legislative Measures

Legislative Measures

Do We Really Have Privacy? Legislative Measures Legislative Measures Is enough being done to insure our privacy? Is enough being done to insure our privacy? Is all privacy legislation in our best interests? Is all privacy legislation in our best interests? California’s Spyware Bill California’s Spyware Bill How can I help? How can I help? Personal Privacy & Freedom of Information Personal Privacy & Freedom of Information “Mommy, can I have a cookie?” “Mommy, can I have a cookie?” “Mommy, where does spam come from?” “Mommy, where does spam come from?” Identity Theft Identity Theft Corporations vs. the Individual Corporations vs. the Individual

Personal Privacy & Freedom of Information “ Essentially, cookies make use of user-specific information transmitted by the Web server onto the user's computer so that the information might be available for later access by itself or other servers. In most cases, not only does the storage of personal information into a cookie go unnoticed, so does access to it. Web servers automatically gain access to relevant cookies whenever the user establishes a connection to them, usually in the form of Web requests.”

Personal Privacy & Freedom of Information “Cookies are based on a two-stage process. First the cookie is stored in the user's computer without their consent or knowledge. During the second stage, the cookie is clandestinely and automatically transferred from the user's machine to a Web server.”

Personal Privacy & Freedom of Information

How savvy are you? Take the Privacy Rights Clearinghouse Identity Theft Quiz!

Identity Theft Identity Theft If you live in California, you have the right to put a "security freeze" on your credit file. A security freeze means that your file cannot be shared with potential creditors. A security freeze can help prevent identity theft. Most businesses will not open credit accounts without checking a consumer's credit history first. If your credit file is frozen, even someone who has your name and Social Security number would probably not be able to get credit in your name. For more information on security freezes, If you live in California, you have the right to put a "security freeze" on your credit file. A security freeze means that your file cannot be shared with potential creditors. A security freeze can help prevent identity theft. Most businesses will not open credit accounts without checking a consumer's credit history first. If your credit file is frozen, even someone who has your name and Social Security number would probably not be able to get credit in your name. For more information on security freezes, Personal Privacy & Freedom of Information

Do We Really Have Privacy? Legislative Measures Legislative Measures Is enough being done to insure our privacy? Is enough being done to insure our privacy? Is all privacy legislation in our best interests? Is all privacy legislation in our best interests? California’s Spyware Bill California’s Spyware Bill How can I help? How can I help? Personal Privacy & Freedom of Information Personal Privacy & Freedom of Information “Mommy, can I have a cookie?” “Mommy, can I have a cookie?” “Mommy, where does spam come from?” “Mommy, where does spam come from?” Identity Theft Identity Theft Corporations vs. the Individual Corporations vs. the Individual

Do We Really Have Privacy? Controlling Required Information Controlling Required Information Sites must provide opt-out measures Sites must provide opt-out measures Once given, can information be controlled? Once given, can information be controlled? Background Checks & Employment Background Checks & Employment Are they really necessary? Are they really necessary? Can we opt out? Can we opt out? Can I move beyond my past? Can I move beyond my past?

Do We Really Have Privacy? Privacy Policies Privacy Policies What do these policies cover? What do these policies cover? Do I have recourse when they fail? Do I have recourse when they fail? What do they really do for you? What do they really do for you? Software Software How secure are the programs I’m using? How secure are the programs I’m using? Accidental security leaks Accidental security leaks Mixing software is like mixing medicine Mixing software is like mixing medicine

Do We Really Have Privacy? Be afraid, be very afraid….

Feeling Secure? Questions? Fears?