Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.

Similar presentations


Presentation on theme: " Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion."— Presentation transcript:

1  Nick Michalak & Kelsey Bretz

2  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion

3  Freedom from intrusion (being left alone)  Control of information about oneself  Freedom from surveillance (from being followed, tracked, watched, and eavesdropped

4  Invisible information gathering – Collecting personal information without their knowledge  Secondary Use – Using personal information for a purpose other than which it was supplied  Informed Consent – User Awareness  Computer Profiling – Analyzing computer files to determine characteristics of people most likely to engage in a certain behavior

5  “The right of people to secure in their persons, housing, paper, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -Fourth Amendment, U.S. Constitution

6  Increased speed of data, more easily accessible  Distribution of huge amounts of data and images  Thousands of new databases  Surveillance o Location Tracking o Video Surveillance o Telephone Wiretapping

7  Faster and easier access to data  Better data organization  Makes daily activities easier  Ease of communication  Better protection against criminals

8  More ways for personal information to be stolen  Information could be wrong or misleading  Costly to protect information o Out of personal control  Information is basically permanent  Secondary Use of information  Overall decrease in privacy

9  2 Main Reasons 1. Personal information is no longer safe, even within our homes 2. New technology allows the government to reach information from a distance without our knowledge  “Most people have figured out by now you can’t do anything on the web without leaving a record” -Holman W. Jenkins Jr.

10  The Electronic Communications Privacy Act (ECPA)  The USA PATRIOT Act (Right after 9/11) o Allows FBI the right to “Invisible Information Gathering”  Children’s Online Privacy Protection Act (COPPA)  National Security Agency o Monitors communication between the U.S and other countries

11  We willingly provide personal information o YouTube o Facebook o Twitter o Instagram o Pintrest o Blogs o Emails  “Polls show that people care about privacy, why don’t they act that way?” -Ian Kerr

12  Video Surveillance o ATMs/Banks o Busy intersections/Stop lights o Laptops  Wiretapping  Location Tracking  Would you consider these types of surveillances an invasion of privacy?

13  Provides business organizations in your area  Navigation Aid  Stolen Property relocation  Alerting you if your friends are near by  Instantly provides location during a 911 call  Tracking children or students

14  Let’s suppose we being tracking elementary school students during school hours.  Administrations could use data to: o Keep track of tardiness or absences o Make sure students are in appropriate class o Keep track of how often student leaves the class room Ex. to use the restroom, library, nurses office, etc. o Make sure children get on the right bus and make it home o Etc.

15  Who are the possible stake holders?  Can you give an example of a positive or negative right one of these stake holders may have?  Do you believe any of these possible uses are ethically right? o If so which ones are and which ones aren’t?  Do your opinions change if we apply this scenario to high school or college aged students?

16  Verizon is beginning to collect information concerning customers: o Web browsing history o Cell phone location o Application usage  Will supply information to third-party marking companies o Age o Gender o Etc.  Verizon promises they will not sell any identifiable information o SSN o Names o Etc.

17 What will Actually Happen

18  Notifies customers through Email o One Month to Opt out  If you agree to terms or after one month: o Begin seeing personally relatable ads Verizon FiOS Internet DSL/Other dial up services Mobile devices

19  Customers  Verizon  Businesses  Competing businesses

20  Customer o Negative right to use their device without interruptions o Positive right to deny access to their information  Verizon o Negative right to make money, sell advertising, conduct any actions agreed to in their contracts o Positive right to honor their contracts  Businesses o Negative right to buy information about people from whoever is willing to sell it

21 1.3 Be honest and trustworthy 1.7 Respect the privacy of others 1.8 Honor confidentiality 2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks

22 2.7 Improve public understanding of computing and its consequences 2.8 Access computing and communication resources only when authorized to do so 3.5 Articulate and support policies that protect the dignity of users and others affected by a computing system.

23  Can you think of any examples where you could say that the government is watching you? (Proven or speculation) o The government possibly using cell phones even while they are turned off to listen in on your conversation. o Eagle Eye, Truman Show, or 1984  Do you have a problem with any of these examples? o Even if they could protect you?  Would you say any of these examples ultimately support fascism?

24  Discussed the weakening of the Fourth Amendment Rights  How new technologies relates  Different surveillance technologies  Changes to legislation  Case Studies

25  http://www.pcmag.com/article2/0,2817,2394625,00.asp  A Gift of Fire


Download ppt " Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion."

Similar presentations


Ads by Google