Download presentation
Presentation is loading. Please wait.
Published byAlban Lawrence Modified over 9 years ago
1
Privacy ECT 582 Robin Burke
2
Outline Homework #6 Privacy basics relationship to security privacy policies and requirements
3
Homework #6
4
Privacy Privacy is the interest that individuals have in sustaining a 'personal space', free from interference by other people and organizations. – Roger Clarke
5
Forms of privacy privacy of the person privacy of personal behavior privacy of personal communications privacy of personal data
6
Person Bodily privacy Issues compulsory immunization compulsory drug testing compulsory sterilisation abortion
7
Behavior Issues sexual orientation political activism religion I-Pass Related media privacy
8
Communication Issues wiretapping encryption
9
Data Information privacy Issues availability of personal data control over collected information
10
Competing interests intra-personal information privacy vs access to credit inter-personal behavior privacy vs health risk organizational body privacy vs insurance risk
11
Privacy protection Balancing privacy interest other interests Context parties interests issues
12
Privacy in E-Commerce Means data privacy Questions what information is collected about visitors to a site? what is done with that information? how are users informed of possible uses of their data?
13
Surveillance Personal surveillance tracking an individual Mass surveillance tracking a large group When using personal data dataveillance
14
E-commerce data Transactions Site registration info often included email address Site visitations Browsing history Platform info from browser headers
15
Dataveillance techniques Front-end verification linking data in an application form against data in other systems Computer matching merging of data from separate information systems creating a merged profile Profiling identifying characteristics of "interesting" individuals in advance searching databases for matches
16
Identification weaker than authentication relationship between a system and an individual to be recognized An entity may have many identities same business multiple contacts same business multiple brandnames same individual multiple email addresses same individual different user ids
17
Identity Anonymous data is not associated with any individual Personally-identified data is associated with identifying user information
18
Spectrum Totally private site accepts only e-cash delivers goods to pre-arranged dropoff points Totally invasive site installs trojan horse which downloads sensitive data data correlated with user's activites online and offline data sold to anybody and everybody
19
Issues Need to know the system shouldn't collect more information than is necessary for a transaction Third parties disclosure to one organization should not mean disclosure to the world Technical disclosure interaction leaks technical information
20
Anonymization Services exist to "anonymize" web interactions ssl connection to proxy server proxy server emits web requests proxy server gets responses and encrypts back to user proxy server may alter content handling cookies & web bugs modifying request headers
21
The data trail Personal data transaction records are essential to business relationships especially to next-generation e-commerce services like personalization also evaluating web site quality and features Problem these records have to most potential for privacy problem
22
Psuedonymity Pseudonomous data is associated with a consistent persona not directly linked to an individual Examples chat-room persona eBay user name
23
Benefits Provide stable identity removed by anonymizers Allow for personalized services Good fit for "multi-role" lives Lower privacy risk But idea not widely supported in e- commerce
24
Legal framework for privacy Children's privacy COPPA Self-regulation privacy seal
25
Fair information practices Guidelines from the FTC Notice Choice Access Security
26
Notice Consumers should be given clear and conspicuous notice of an entity's information practices before any personal information is collected from them Should consist of what data will be collected who is collecting data who will get the data how the data will be collected how the data will be used how the data will be protected whether data is mandatory or optional
27
Choice Consumers should be given options as to how any personal information collected from them may be used for purposes beyond those necessary to complete a contemplated transaction. Secondary uses placement on a (e)mailing list transfer to third party usability evaluation
28
Access An individual's ability both to access data about him or herself and to contest that data's accuracy and completeness. Difficult to implement esp. authentication Least popular
29
Security Protection of personal information against unauthorized access, use, or disclosure, and against loss or destruction.
30
COPPA Guidelines become mandatory for children under 13 Required posted privacy policy parental consent except for email addresses in some conditions re-verify consent when policy changes allow parental review of collected data allow parent opt-out
31
Privacy seals TRUSTe BBBOnLine Privacy CPA WebTrust Entertainment Software Ratings Board
32
TRUSTe Non-profit consortium Process privacy policy self-assessment http://www.truste.org/webpublishers/Self_ Assessment_v8.html remote audit of web site annual review
33
BBBOnLine Privacy Offered by Better Business Bureau Must be a BBB member Similar process to TRUSTe
34
CPA WebTrust Franchise available to CPAs licensed by WebTrust Differences on-site audit semi-annual review (They also do Certification Authorities)
35
ESRB Privacy For game sites Process similar to TRUSTe on-site audit quarterly anonymous review quarterly anonymous spot-checks
36
Final exam Submit via COL 9 pm 11/20 No late exams!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.