Download presentation
Presentation is loading. Please wait.
Published byElinor McDaniel Modified over 9 years ago
1
Privacy and Information Week 5
2
Computers and Government uThousands of government offices and departments exist uAll use computers in some manner
3
Most common uses uData collection and maintenance uResearch uCode breaking uDefense uand?...
4
Big Brother uMore than 2000 government databases exist uWe leave many data trails to facilitate the collection of information uGovernment pushes their rights to protect ours
5
Law Enforcement uNational Crime Information Center uHelp law-enforcement agencies share info to catch criminals uBenefits u any agency can access records u lots of info available u criminal histories u info on existing warrants u easy for intrastate usage
6
Law Enforcement uProblems u lack of control of entry u lack of control of usage u ease of access by employees uAbuse of power uInvasion of privacy uInaccuracy uNot every state is βinβ
7
National ID Cards uMulti-purpose cards uSmart card - microprocessor and memory uused when interacting with governments and banks, medical
8
Benefits uNeed to actual card to verify identity uHarder to forge uCarry only one card uReduces fraud uPrevents illegal work
9
Civilian applications of government technologies uEconomic espionage uSharing of technology between law enforcement and other agencies uMilitary surveillance technology used in civilian applications
10
Threats to Privacy uGovernment has u wide scope of activities u large amount a data available u power to require us to provide information u ability to use and misuse databases
11
Computers have facilitated.... uthe collection of data uanalysis of data ustorage of data uaccess of data udistribution of data uReasons - speed and anonymity uInternet has broadened access to information
12
Database uProgram to help you store, manage, search, analyze, and access large amounts of data urecords ufields uTree structure for search
13
Other Databases uEmployee ID scanners uPrescription drugs uBank machines uCellular phone calls uBrowsing on Net - cookies uSweepstakes uSatellites uCredit/Debit cards uSupermarket scanners uElectronic tolls uMail-order transactions uE-mail
14
Public records uDMV uVoter registration uBirth and death certificates uMarriage certificates uProperty records uCourt records uDivorce records uArrest records uPostal address records
15
Confidential Records uSocial welfare information uTax information uSchool records uPublic library records uCriminal history uHealth records
16
Internet and data collection uCookies uSearch engines - quicker more available info uopen ended nature of net - no rules to define what is personal info unewsgroup, chat rooms, e-mail remains available for years
17
Purposes of Record Systems uHelp agencies perform their functions efficiently uDetermine eligibility for government job uDetermine eligibility for benefits programs uDetect fraud uRecover payments of delinquent debt
18
Acquisition of Data uCensus uSurveillance uIdentification uNetworking
19
Methods Used uComputer matching u Combining and comparing information from different databases uComputer profiling u using data in computer files to determine characteristics of people most likely to engage in a certain behavior
20
Data Mining uAnalyze to perform data profiles uCreate from customer files then matches are made uBusinesses and governments keep records and sell them
21
Data Mining Results uAnalysis of data for relationships that have not been discovered u Associations u one event can be correlated to another u Sequences u One event leads to another u Classification u Recognition of patterns resulting in new organizations
22
Data Mining Results Continued uClustering u Finding and visualizing groups of facts not previously known uForcasting u Discovering patterns in the data that can lead to predictions about the future
23
Data Mining Uses uTarget customers uAdvertise to current customers uManipulate markets uSelect, monitor, and control employees
24
Most common tool Social security number
25
Social Security Number uMajor use for identification uLinked to u banking data u credit report u driving record u earnings history u work history u.......
26
Credit Bureaus uProvide a central storehouse of information used to evaluate applicants for credit udata supplied by banks, stores, and other businesses uPublic records - lawsuits, liens, bankruptcies
27
Regulation of Credit Bureaus uRegulated by federal government uFair Credit Reporting Act u can give information to employers, government, and insurance companies, and those who need it for legitimate purposes involving customer u VAGUE?
28
Changes uLegal right to get a copy of their own report for free, and a list of those who have requested it uProhibit employers from obtaining reports without personβs permission u or at all except for special kinds of jobs
29
Medical Records uData is personal and sensitive uCan be used for marketing purposes uHard to restrict due to varying laws in different states uInsurance benefits require that we tell all
30
Technical and Management Protections uEach authorized user has unique ID code and password uRestrict operations of different users in areas where they do not need to go uUse audit trails to track usage by workers uComputer records reduce handling and potential reading
31
Risks due to databases uUnauthorized use by people who maintain them uAccess from intruders uMishandling uErrors and potential problems uUnintentional side-effects
32
Creep Phenomenon If information is collected, it will probably be used for many purposes that were not intended when the project started
33
Biometrics uVerification through unique physical characteristics u little fraud u fingerprints u DNA u hand geometry u facial recognition u facial thermography u Etc.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.