Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.

Similar presentations


Presentation on theme: "Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner."β€” Presentation transcript:

1 Privacy and Information Week 5

2 Computers and Government uThousands of government offices and departments exist uAll use computers in some manner

3 Most common uses uData collection and maintenance uResearch uCode breaking uDefense uand?...

4 Big Brother uMore than 2000 government databases exist uWe leave many data trails to facilitate the collection of information uGovernment pushes their rights to protect ours

5 Law Enforcement uNational Crime Information Center uHelp law-enforcement agencies share info to catch criminals uBenefits u any agency can access records u lots of info available u criminal histories u info on existing warrants u easy for intrastate usage

6 Law Enforcement uProblems u lack of control of entry u lack of control of usage u ease of access by employees uAbuse of power uInvasion of privacy uInaccuracy uNot every state is β€œin”

7 National ID Cards uMulti-purpose cards uSmart card - microprocessor and memory uused when interacting with governments and banks, medical

8 Benefits uNeed to actual card to verify identity uHarder to forge uCarry only one card uReduces fraud uPrevents illegal work

9 Civilian applications of government technologies uEconomic espionage uSharing of technology between law enforcement and other agencies uMilitary surveillance technology used in civilian applications

10 Threats to Privacy uGovernment has u wide scope of activities u large amount a data available u power to require us to provide information u ability to use and misuse databases

11 Computers have facilitated.... uthe collection of data uanalysis of data ustorage of data uaccess of data udistribution of data uReasons - speed and anonymity uInternet has broadened access to information

12 Database uProgram to help you store, manage, search, analyze, and access large amounts of data urecords ufields uTree structure for search

13 Other Databases uEmployee ID scanners uPrescription drugs uBank machines uCellular phone calls uBrowsing on Net - cookies uSweepstakes uSatellites uCredit/Debit cards uSupermarket scanners uElectronic tolls uMail-order transactions uE-mail

14 Public records uDMV uVoter registration uBirth and death certificates uMarriage certificates uProperty records uCourt records uDivorce records uArrest records uPostal address records

15 Confidential Records uSocial welfare information uTax information uSchool records uPublic library records uCriminal history uHealth records

16 Internet and data collection uCookies uSearch engines - quicker more available info uopen ended nature of net - no rules to define what is personal info unewsgroup, chat rooms, e-mail remains available for years

17 Purposes of Record Systems uHelp agencies perform their functions efficiently uDetermine eligibility for government job uDetermine eligibility for benefits programs uDetect fraud uRecover payments of delinquent debt

18 Acquisition of Data uCensus uSurveillance uIdentification uNetworking

19 Methods Used uComputer matching u Combining and comparing information from different databases uComputer profiling u using data in computer files to determine characteristics of people most likely to engage in a certain behavior

20 Data Mining uAnalyze to perform data profiles uCreate from customer files then matches are made uBusinesses and governments keep records and sell them

21 Data Mining Results uAnalysis of data for relationships that have not been discovered u Associations u one event can be correlated to another u Sequences u One event leads to another u Classification u Recognition of patterns resulting in new organizations

22 Data Mining Results Continued uClustering u Finding and visualizing groups of facts not previously known uForcasting u Discovering patterns in the data that can lead to predictions about the future

23 Data Mining Uses uTarget customers uAdvertise to current customers uManipulate markets uSelect, monitor, and control employees

24 Most common tool Social security number

25 Social Security Number uMajor use for identification uLinked to u banking data u credit report u driving record u earnings history u work history u.......

26 Credit Bureaus uProvide a central storehouse of information used to evaluate applicants for credit udata supplied by banks, stores, and other businesses uPublic records - lawsuits, liens, bankruptcies

27 Regulation of Credit Bureaus uRegulated by federal government uFair Credit Reporting Act u can give information to employers, government, and insurance companies, and those who need it for legitimate purposes involving customer u VAGUE?

28 Changes uLegal right to get a copy of their own report for free, and a list of those who have requested it uProhibit employers from obtaining reports without person’s permission u or at all except for special kinds of jobs

29 Medical Records uData is personal and sensitive uCan be used for marketing purposes uHard to restrict due to varying laws in different states uInsurance benefits require that we tell all

30 Technical and Management Protections uEach authorized user has unique ID code and password uRestrict operations of different users in areas where they do not need to go uUse audit trails to track usage by workers uComputer records reduce handling and potential reading

31 Risks due to databases uUnauthorized use by people who maintain them uAccess from intruders uMishandling uErrors and potential problems uUnintentional side-effects

32 Creep Phenomenon If information is collected, it will probably be used for many purposes that were not intended when the project started

33 Biometrics uVerification through unique physical characteristics u little fraud u fingerprints u DNA u hand geometry u facial recognition u facial thermography u Etc.


Download ppt "Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner."

Similar presentations


Ads by Google