Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy MGMT 661 - Summer 2012, Dannelly Night 3, Lecture Part 2.

Similar presentations


Presentation on theme: "Privacy MGMT 661 - Summer 2012, Dannelly Night 3, Lecture Part 2."— Presentation transcript:

1 Privacy MGMT 661 - Summer 2012, Dannelly Night 3, Lecture Part 2

2 Outline for Tonight Legal Topics - Part 1  SPAM  Software Warranties  Software Copyrights and Patents  Intellectual Property Laws Privacy - Part 2  privacy from your employer  privacy from businesses  privacy from the government

3 Initial Questions Is privacy a right?  inalienable right? e.g. life, liberty, pursuit of happiness  legal (civil) right? e.g. right to vote, no taxation without representation  not a right What do privacy rights have to do with business?

4 Types of Privacy Freedom from Unwarranted Intrusion Freedom from Interference in One's Personal Affairs Control over the Flow of Personal Information

5 Tech's Impact on Privacy duration of data storage variety of data that can be shared amount of data gathered speed of data movement

6 Workplace Privacy you don't have many workplace privacy rights City of Ontario, California v. Quon et al.  US Supreme Court, June 17, 2010  supervisors of public employees can read their employees' text messages on government issues devices

7 Is online shopping different from in-store shopping? Q: Does online shopping give you more or less privacy? more privacy - your neighbors will not see you less privacy - online shopping gives the company much more info about you Q: Is the data the company gathers different? online, they know every item you looked at, how long you spent looking, etc

8 Sources of Personal Data phone book public records credit card statements web cookies rewards programs spyware TiVo RFID …

9 Data Mining definition: searching through databases to discover patterns and relationships usually used for prediction example:  company XYZ operates toll booths and collects data about which car IDs pass and when  company ABC buys XYZ's data and data from credit card companies. ABC now knows the addresses of frequent drivers along with credit limits  ABC sells this secondary data to banks "We see that your car has 100,000 miles. Need a car loan?"

10 Info Security How safe is that cookie data? Example: Toysmart.com  privacy statement said that the personal info of users would not be sold or exchanged  the company went bankrupt in 2000  Toysmart sold its assets, including the customer database

11 DoubleClick.com gathers data from cookies from banners placed on a large number of web sites DC can cross-reference data to build profiles of individual users cookie data can be used to manage which ads individuals see and how many times the ads are seen.  For example, using frequency capping, as I surf from website to website they can make sure I only see the same car ad 10 times per day

12 In 1999, DC announced that it planned to purchase Abacus Direct for $1.7B, a consumer database company containing the names, addresses, phone numbers, etc of 90% of American Households. Google bought DoubleClick for $3.1B in cash in April 2007.  congress held hearings to investigate the privacy and monopoly implications of the merger  Microsoft complained about this creating a monopoly

13 ChoicePoint to pay $15M to settle charges The data warehouser will settle charges that it failed to protect consumers' personal financial information, the FTC says. January 26, 2006 WASHINGTON (Reuters) - ChoicePoint Inc. has agreed to pay $15 million to settle charges that it failed to adequately protect consumers' personal financial information, the Federal Trade Commission said Thursday. The company has agreed to pay a $10 million civil penalty, provide $5 million to compensate consumers, and take steps to better safeguard personal information so it is used only for legitimate purposes, the agency said. The company last year admitted that more than 163,000 personal records had been compromised, the agency said. The FTC charged ChoicePoint illegally gave credit histories to people who were not authorized to obtain them and failed to have reasonable procedures to verify the identities of those who requested the information and how the data was to be used. The company also made false and misleading statements about its privacy policies, the FTC charged.

14 Is your right to privacy protected by the U.S. Constitution? No. Well, maybe.... 1 st Amendment  Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or … 14 th Amendment  No State shall deprive any person of life, liberty, or property, without due process of law. 9 th Amendment  The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.

15 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

16 Katz v United States without a warrant, police placed a bug on the outside of a public phone booth used by Katz to make illegal bets In 1967, the US Supreme Court ruled Katz's rights were violated.  Katz reasonably thought his conversation was private, hence the recording was an illegal search and seizure  the 4 th amendment protects people, not places  the 4 th amendment governs seizure of tangible items, as well as recording of oral statements

17 Electronic Communications Privacy Act enacted in 1986 ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which was primarily designed to prevent unauthorized government access to private electronic communications.  Title I of ECPA protects electronic communications while in transit.  Title II of the ECPA, protects messages stored on computers.  Title III prohibits the use of pen register and/or trap and trace devices to record dialing, routing, addressing, and signaling information used in the process of transmitting wire or electronic communications. http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act

18 NSA and FISA Foreign Intelligence Surveillance Act of 1978 (FISA)  warrant required with 72 hours if "US person" involved  amended by Patriot Act in 2001 to include terrorism warrantless wiretaps of US citizens ended in 2007  replaced by Protect America Act of 2007, which expired  replaced by FISA Amendments Act of 2008 granted immunity to telecoms that had helped the NSA

19 Patriot Act allows officials to track emails without showing probable cause allows roving surveillance for intelligence (not just crime investigation), tapped device does not have to be owned by the suspect search warrants no longer have to be served warrants for records do not require probable cause … Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT)

20 Summary of Privacy http://imaginingtheinternet.wordpress.com/2011/04/25/opening-up-the-privacy-of-cyberspace/


Download ppt "Privacy MGMT 661 - Summer 2012, Dannelly Night 3, Lecture Part 2."

Similar presentations


Ads by Google