Download presentation
Presentation is loading. Please wait.
Published byVanessa Norris Modified over 9 years ago
1
Privacy 2
2
Digital Dossier The data shadow The digital dossier Your own diary of recordable events
3
Persistence of Information Communication modes –Writing –Speech –Electronic forms E-mail V-mail IM –Images The presumption of truth
4
Information Trails The present The future Examples –DEA sweeps –Borked! Pervasive record keeping Data retention
5
Privacy Legislation The Video Protection Act –Is this a good law? Is it justified? –What caused it to be enacted? Free market and self regulation – Does this work for privacy? Government regulation –Enacting laws does not equal enforcing them
6
Building a Datasphere 1)Make data collectible 2)Make data machine readable 3)Build a big database
7
Check Digits VIN check digit http://www.home.planet.nl/~fransang/chec kdig.htmlhttp://www.home.planet.nl/~fransang/chec kdig.html
8
RFID Definition – Radio Frequency Identification, the use of radio waves to automatically identify individual items by means of a microchip capable of transmitting identifying information. Applications – product identification in stores, warehouses, medical facilities, warranties, identification of animals, people via implanted chips Privacy issues – tracking individuals through their product purchases and uses, scope creep, location tracking of individuals
9
One Big Happy Database Thomas Watson’s 1940s estimate on the need for computers joke What’s on the web? Search engines and their ilk Your defense
10
Data Quality Large databases and data accuracy –Credit Reporting data –NCIC The web
11
A Personal Question Would you run for public office if you knew that everything you had ever said or done could be held up for public scrutiny? What happens in Vegas stays in Vegas
12
Satellite Imagery Do satellite images violate privacy? Are they illegal? Resolution Applications –Tax collections –Political claims
13
Ground Surveillance Surveillance cameras –In malls –ATMs –“The End of Violence” –Traffic violation control
14
Bayes Theorem and Surveillance Facial identification systems – Tampa Superbowl Fingerprint ID systems http://members.aol.com/johnp71/bayes.ht mlhttp://members.aol.com/johnp71/bayes.ht ml
15
Personal Systems Webcam Nanny cam Steve Mann http://www.wearcam.org/students.htm Webcam Nanny cam Steve Mann http://www.wearcam.org/students.htm
16
Low Cost Personal Devices Tracking devices (location) Keystroke capturers Recording devices Tracking devices (location) Keystroke capturers Recording devices www.spyemporium.com http://www.asginvestigations.com/
17
Employee Monitoring Various means are being employed: e- mail, phone, video, drug testing, psychological profiling Is it legal? Is it ethical? Should Fair Information Practices be applied to employee monitoring?
18
Surveillance Systems What questions could be asked about them? –Should they be permitted or banned? –Are they effective? –Do they create additional problems? –What restrictions should be placed on their use? –What restrictions should be placed on the data they generate? –Who should watch the watchers?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.