Download presentation
Presentation is loading. Please wait.
Published byAlison Byrd Modified over 8 years ago
1
Nick Michalak & Kelsey Bretz
2
Introduction Amendment Rights New Technologies Surveillance New Legislation Case Studies Conclusion
3
Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (from being followed, tracked, watched, and eavesdropped
4
Invisible information gathering – Collecting personal information without their knowledge Secondary Use – Using personal information for a purpose other than which it was supplied Informed Consent – User Awareness Computer Profiling – Analyzing computer files to determine characteristics of people most likely to engage in a certain behavior
5
“The right of people to secure in their persons, housing, paper, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -Fourth Amendment, U.S. Constitution
6
Increased speed of data, more easily accessible Distribution of huge amounts of data and images Thousands of new databases Surveillance o Location Tracking o Video Surveillance o Telephone Wiretapping
7
Faster and easier access to data Better data organization Makes daily activities easier Ease of communication Better protection against criminals
8
More ways for personal information to be stolen Information could be wrong or misleading Costly to protect information o Out of personal control Information is basically permanent Secondary Use of information Overall decrease in privacy
9
2 Main Reasons 1. Personal information is no longer safe, even within our homes 2. New technology allows the government to reach information from a distance without our knowledge “Most people have figured out by now you can’t do anything on the web without leaving a record” -Holman W. Jenkins Jr.
10
The Electronic Communications Privacy Act (ECPA) The USA PATRIOT Act (Right after 9/11) o Allows FBI the right to “Invisible Information Gathering” Children’s Online Privacy Protection Act (COPPA) National Security Agency o Monitors communication between the U.S and other countries
11
We willingly provide personal information o YouTube o Facebook o Twitter o Instagram o Pintrest o Blogs o Emails “Polls show that people care about privacy, why don’t they act that way?” -Ian Kerr
12
Video Surveillance o ATMs/Banks o Busy intersections/Stop lights o Laptops Wiretapping Location Tracking Would you consider these types of surveillances an invasion of privacy?
13
Provides business organizations in your area Navigation Aid Stolen Property relocation Alerting you if your friends are near by Instantly provides location during a 911 call Tracking children or students
14
Let’s suppose we being tracking elementary school students during school hours. Administrations could use data to: o Keep track of tardiness or absences o Make sure students are in appropriate class o Keep track of how often student leaves the class room Ex. to use the restroom, library, nurses office, etc. o Make sure children get on the right bus and make it home o Etc.
15
Who are the possible stake holders? Can you give an example of a positive or negative right one of these stake holders may have? Do you believe any of these possible uses are ethically right? o If so which ones are and which ones aren’t? Do your opinions change if we apply this scenario to high school or college aged students?
16
Verizon is beginning to collect information concerning customers: o Web browsing history o Cell phone location o Application usage Will supply information to third-party marking companies o Age o Gender o Etc. Verizon promises they will not sell any identifiable information o SSN o Names o Etc.
17
What will Actually Happen
18
Notifies customers through Email o One Month to Opt out If you agree to terms or after one month: o Begin seeing personally relatable ads Verizon FiOS Internet DSL/Other dial up services Mobile devices
19
Customers Verizon Businesses Competing businesses
20
Customer o Negative right to use their device without interruptions o Positive right to deny access to their information Verizon o Negative right to make money, sell advertising, conduct any actions agreed to in their contracts o Positive right to honor their contracts Businesses o Negative right to buy information about people from whoever is willing to sell it
21
1.3 Be honest and trustworthy 1.7 Respect the privacy of others 1.8 Honor confidentiality 2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks
22
2.7 Improve public understanding of computing and its consequences 2.8 Access computing and communication resources only when authorized to do so 3.5 Articulate and support policies that protect the dignity of users and others affected by a computing system.
23
Can you think of any examples where you could say that the government is watching you? (Proven or speculation) o The government possibly using cell phones even while they are turned off to listen in on your conversation. o Eagle Eye, Truman Show, or 1984 Do you have a problem with any of these examples? o Even if they could protect you? Would you say any of these examples ultimately support fascism?
24
Discussed the weakening of the Fourth Amendment Rights How new technologies relates Different surveillance technologies Changes to legislation Case Studies
25
http://www.pcmag.com/article2/0,2817,2394625,00.asp A Gift of Fire
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.