SlideShare a Scribd company logo
1 of 27
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 1
Social, Legal, and Ethical Issues for Computers and the Internet
Privacy & Personal Information
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 2
A Gift of Fire
Privacy and Personal Information
The Impact of Computer Technology
“Big Brother is Watching You”
Consumer Information
More Privacy Risks
Protecting Privacy: Education, Technology, and Markets
Protecting Privacy: Law and Regulation
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 3
The Impact of Computer Technology
Computers are not needed for the invasion of
privacy.
Computers simply make new threats possible
and old threats more potent.
Privacy can mean:
• Freedom from intrusion-being left alone.
• Control of information about oneself.
• Freedom from surveillance (followed, watched, eavesdropped upon).
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 4
The Impact of Computer Technology
Invisible Information Gathering
Examples:
• Satellite surveillance.
• Caller ID.
• 800- or 900-number calls. Or Pizza Hut!
• Web-tracking data; cookies. Peer-to-peer monitoring.
– Spyware such as Gator, BonziBUDDY, and Comet Cursor is often
surreptitiously bundled with freeware and shareware software that users
download from the Internet, and is commonly found in popular peer-to-
peer programs, such as KaZaa, BearShare, AudioGalaxy, and others. In
the most malicious cases, spyware can perform non-marketing
operations, all hidden to the user, including data collection for industrial
espionage purposes.
• Others…
Q: Recall an example of invisible information gathering about
you.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 5
The Impact of Computer Technology
Secondary Use
Using information for a purpose other than the one for which it
was obtained. A few examples:
• Sale (or trade) of consumer information to other businesses.
• Credit check by a prospective employer.
• Government agency use of consumer database.
Q: Recall an occasion when a secondary use of your personal information was
made.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 6
The Impact of Computer Technology
Computer Matching
Combining and comparing information from more than one
database (usually matching SS# to records). Some examples:
• Sharing of government agencies’ databases to detect fraud by recipients
of government programs.
• Creating consumer dossier from various business databases.
Q: Recall an example of computer matching that has appeared in the news.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 7
The Impact of Computer Technology
Profiling
Using data in computer files to predict likely behaviors of
people. Some examples:
• Businesses engage in profiling to determine consumer propensity
toward a product or service.
• Government agencies use profiling to create descriptions of possible
terrorists.
Q: How might profiling be used with your personal information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 8
The Impact of Computer Technology
Monitoring and Tracking
Examples:
• GPS (global positioning system).
• Cell-phones.
• Blackboxes in automobiles. (monitoring speed and where traveled)
• Other wireless appliances.
• Google Map….type your address in Google—see what happens
Q: What is the impact of GPS-equipped childrens’ wrist watches.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 9
“Big Brother is Watching You”
Federal Government Databases
Purpose:
• Determine eligibility for jobs and programs.
• Reduce waste.
• Detect fraud.
• Law enforcement.
Regulations:
• Privacy Act of 1974.
• Computer Matching and Privacy Protection Act of 1988.
Q: Which government databases contains your personal information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 10
“Big Brother is Watching You”
4th
Amendment
Expectation of Privacy:
• Government’s rights are limited.
• Government must have probable cause to search private premises or
seize documents.
Privacy Challenges:
• New sensing and surveillance technologies enable the government
access to private premises without physical entry.
• New technologies provide the government with access to huge amounts
of personal data in business databases.
• Courts allow some searches and seizures of computers without search
warrants.
Q: Has technology strengthened or weakened the spirit of the 4th
Amendment?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 11
Consumer Information
Consumer Databases
Gathering Information:
• Warranty cards.
• Purchasing records.
• Membership lists.
• Web activity.
• Change-of-address forms.
• Much more…
Q: Recall ways in which you have contributed to consumer databases.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 12
Consumer Information
Consumer Databases (cont’d)
Limiting Collection, Use, Sharing, and Sale of Personal Data:
• Consumers can take measures to restrict the use of their personal
information.
• Some information sharing is prohibited by law.
• Some information sharing is prohibited by published, privacy policies.
Q: What measures do you take to limit consumer information gathered
about you?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 13
Consumer Information
Marketing: Using Consumer Information
• Trading/buying customer lists.
• Telemarketing.
• Data Mining. (Spyware)
• Mass-marketing.
• Web ads.
• Spam (unsolicited e-mail).
Q: How are children affected by marketers using consumer information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 14
Consumer Information
Credit Bureaus
Uses of consumer information:
• Evaluate credit risk of applicant.
• Marketing.
Regulation:
• FCRA (Fair Credit Reporting Act)
• Self-regulated by privacy principles.
Q: If you are denied credit, what are your rights based on the FCRA?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 15
More Privacy Risks
Social Security Numbers (SSNs)
Appear in:
• Employer records.
• Government databases.
• School records.
• Credit reports.
• Consumer applications.
• Many other databases.
Be careful giving out your SSN…identity theft problems.
Q: What are the risks of using SSNs as identifiers?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 16
More Privacy Risks
National ID Card System
If implemented, the card could contain your:
• Name.
• Address.
• Telephone number(s).
• Photo.
• SSN.
Q: What other personal information should a national ID card contain?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 17
More Privacy Risks
National ID Card System
If implemented, the system could allow access to your:
• Medical information.
• Tax records.
• Citizenship.
• Credit history.
• Much more…
Kind of scary…”Let me see your papers.”
Q: Are the benefits of a national ID system greater than the risks?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 18
More Privacy Risks
Personal Health and Medical Information
Data can include:
• History of substance abuse.
• Treatment for sexually transmitted disease.
• Extent of psychiatric help received.
• Any suicide attempt(s).
• Diagnosis of diseases (diabetes, angina, cancer, etc.).
• Use of prescribed medicines.
• Much more…
Q: Why would marketers want access to your medical information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 19
More Privacy Risks
Public Records
Available in paper form and/or online:
• Bankruptcy.
• Arrest.
• Marriage-license application.
• Divorce proceedings.
• Property ownership.
• Salary (if employed by state or federal government).
• Wills and Trusts.
• Much more…
Q: How should access to public records be controlled?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 20
Protecting Privacy: Education,
Technology, and Markets
Education
Must include awareness of:
• How the technology works.
• How the technology is being used.
• The risks brought on by the technology.
• How to limit unwanted use of personal information.
• Applicable state and federal laws and regulations.
Q: How do you limit unwanted use of your personal information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 21
Protecting Privacy: Education,
Technology, and Markets
Technology
Enhance privacy using:
• Cookie (files a web site; stores it on each visitor’s computer) disablers.
• Opt-in (Consumer must check if they want info)/opt-out (consumer
must check if they don’t want info) options.
• Anonymous Web services. Anonymizer.com…surf the web
anonymously
• P3P (Platform for Privacy Preferences). (automatically protect people’s
privacy when they use the web…users choose the amount of info to give
out)
Audit trails-keep track of who sees what. (system keeps track of each user
that accesses each type of data)
Q: What privacy-enhancing technology do you use regularly?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 22
Protecting Privacy: Education,
Technology, and Markets
Market Response
Markets can protect your privacy by:
• Using trusted third parties.
• Adhering to established privacy policies.
• Purchasing consumer information directly from the consumer.
• Developing and selling privacy-enhancing technologies and services.
Q: Have you read the privacy policies at Web sites you frequent?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 23
Protecting Privacy: Law and Regulation
Philosophical Views
Samuel Warren & Louis Brandeis:
• Individuals have the right to prohibit publication of personal facts and
photos.
Judith Jarvis Thompson:
• No distinct right to privacy.
• Privacy rights result from rights to our property, body, and contracts.
Transactions:
• Transactions have two parties, often with conflicting preferences about
privacy.
Q: How should rights to information about transactions between two parties
be assigned?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 24
Protecting Privacy: Law and Regulation
Contrasting Views
Free-market View
• The parties of a transaction are viewed as equal.
• Truth in information gathering.
• Strong reliance on contracts.
• Freedom of speech and commerce.
Consumer-Protection View
• The parties of a transaction are viewed differently.
• More stringent consent requirements required by law.
• Strong limitations on secondary uses of information required by law.
• Legal restrictions on consumer profiling.
Q: How should the privacy of consumer transactions be regulated?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 25
Protecting Privacy: Law and Regulation
Contracts and Regulations
Basic Legal Framework:
• Enforce agreements and contracts.
• Publish privacy policies.
• Set defaults for situations not in contract.
Requiring Specific Consent policies:
• Adhere to informed consumer consent.
• Use opt-in policies. (not opt-out)
Q: Recall a situation where you exchanged personal information for some
benefit.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 26
Protecting Privacy: Law and Regulation
Contracts and Regulations (cont’d)
Ownership of personal data. Can an individual own:
• Facts (e.g. marriage license in public records)?
• Personal information (e.g. your date of birth)?
Freedom of speech
• Prohibiting communication of information may violate the 1st
Amendment.
Q: When does protecting privacy conflict with freedom of speech?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 27
Protecting Privacy: Law and Regulation
EU (European Union) Privacy Regulation
Key points:
• Limited collection of personal data.
• Data must be up-to-date and destroyed when no longer needed.
• Consent for sharing data is required.
• Sensitive data (e.g. religion) can only be provided with consent.
• Notify consumers about the collection and intended purpose of data.
• Restricted access and sharing of criminal conviction.
Q: Can the EU’s privacy regulations work in the US?

More Related Content

What's hot

Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
SaimaRafiq
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 

What's hot (20)

Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Viewers also liked

Viewers also liked (6)

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linux
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Manual de Buenas Prácticas en Movilidad Virtual
Manual de Buenas Prácticas en Movilidad VirtualManual de Buenas Prácticas en Movilidad Virtual
Manual de Buenas Prácticas en Movilidad Virtual
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 

Similar to Privacy and personal information

Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
mckerliejonelle
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 

Similar to Privacy and personal information (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
04 privacy
04 privacy04 privacy
04 privacy
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Chapter2
Chapter2Chapter2
Chapter2
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 

More from Uc Man

Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
Uc Man
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)
Uc Man
 

More from Uc Man (20)

Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 
Digital divide
Digital divideDigital divide
Digital divide
 
Course outline pp
Course outline ppCourse outline pp
Course outline pp
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practice
 
Time management
Time managementTime management
Time management
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritization
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)
 
Personal effectiveness
Personal effectivenessPersonal effectiveness
Personal effectiveness
 
Professional context of ICT (Need of professionalism)
Professional context of ICT (Need of professionalism) Professional context of ICT (Need of professionalism)
Professional context of ICT (Need of professionalism)
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalism
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 

Recently uploaded

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 

Recently uploaded (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

Privacy and personal information

  • 1. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 1 Social, Legal, and Ethical Issues for Computers and the Internet Privacy & Personal Information
  • 2. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology “Big Brother is Watching You” Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation
  • 3. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 3 The Impact of Computer Technology Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: • Freedom from intrusion-being left alone. • Control of information about oneself. • Freedom from surveillance (followed, watched, eavesdropped upon).
  • 4. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 4 The Impact of Computer Technology Invisible Information Gathering Examples: • Satellite surveillance. • Caller ID. • 800- or 900-number calls. Or Pizza Hut! • Web-tracking data; cookies. Peer-to-peer monitoring. – Spyware such as Gator, BonziBUDDY, and Comet Cursor is often surreptitiously bundled with freeware and shareware software that users download from the Internet, and is commonly found in popular peer-to- peer programs, such as KaZaa, BearShare, AudioGalaxy, and others. In the most malicious cases, spyware can perform non-marketing operations, all hidden to the user, including data collection for industrial espionage purposes. • Others… Q: Recall an example of invisible information gathering about you.
  • 5. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 5 The Impact of Computer Technology Secondary Use Using information for a purpose other than the one for which it was obtained. A few examples: • Sale (or trade) of consumer information to other businesses. • Credit check by a prospective employer. • Government agency use of consumer database. Q: Recall an occasion when a secondary use of your personal information was made.
  • 6. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 6 The Impact of Computer Technology Computer Matching Combining and comparing information from more than one database (usually matching SS# to records). Some examples: • Sharing of government agencies’ databases to detect fraud by recipients of government programs. • Creating consumer dossier from various business databases. Q: Recall an example of computer matching that has appeared in the news.
  • 7. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 7 The Impact of Computer Technology Profiling Using data in computer files to predict likely behaviors of people. Some examples: • Businesses engage in profiling to determine consumer propensity toward a product or service. • Government agencies use profiling to create descriptions of possible terrorists. Q: How might profiling be used with your personal information?
  • 8. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 8 The Impact of Computer Technology Monitoring and Tracking Examples: • GPS (global positioning system). • Cell-phones. • Blackboxes in automobiles. (monitoring speed and where traveled) • Other wireless appliances. • Google Map….type your address in Google—see what happens Q: What is the impact of GPS-equipped childrens’ wrist watches.
  • 9. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 9 “Big Brother is Watching You” Federal Government Databases Purpose: • Determine eligibility for jobs and programs. • Reduce waste. • Detect fraud. • Law enforcement. Regulations: • Privacy Act of 1974. • Computer Matching and Privacy Protection Act of 1988. Q: Which government databases contains your personal information?
  • 10. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 10 “Big Brother is Watching You” 4th Amendment Expectation of Privacy: • Government’s rights are limited. • Government must have probable cause to search private premises or seize documents. Privacy Challenges: • New sensing and surveillance technologies enable the government access to private premises without physical entry. • New technologies provide the government with access to huge amounts of personal data in business databases. • Courts allow some searches and seizures of computers without search warrants. Q: Has technology strengthened or weakened the spirit of the 4th Amendment?
  • 11. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 11 Consumer Information Consumer Databases Gathering Information: • Warranty cards. • Purchasing records. • Membership lists. • Web activity. • Change-of-address forms. • Much more… Q: Recall ways in which you have contributed to consumer databases.
  • 12. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 12 Consumer Information Consumer Databases (cont’d) Limiting Collection, Use, Sharing, and Sale of Personal Data: • Consumers can take measures to restrict the use of their personal information. • Some information sharing is prohibited by law. • Some information sharing is prohibited by published, privacy policies. Q: What measures do you take to limit consumer information gathered about you?
  • 13. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 13 Consumer Information Marketing: Using Consumer Information • Trading/buying customer lists. • Telemarketing. • Data Mining. (Spyware) • Mass-marketing. • Web ads. • Spam (unsolicited e-mail). Q: How are children affected by marketers using consumer information?
  • 14. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 14 Consumer Information Credit Bureaus Uses of consumer information: • Evaluate credit risk of applicant. • Marketing. Regulation: • FCRA (Fair Credit Reporting Act) • Self-regulated by privacy principles. Q: If you are denied credit, what are your rights based on the FCRA?
  • 15. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 15 More Privacy Risks Social Security Numbers (SSNs) Appear in: • Employer records. • Government databases. • School records. • Credit reports. • Consumer applications. • Many other databases. Be careful giving out your SSN…identity theft problems. Q: What are the risks of using SSNs as identifiers?
  • 16. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 16 More Privacy Risks National ID Card System If implemented, the card could contain your: • Name. • Address. • Telephone number(s). • Photo. • SSN. Q: What other personal information should a national ID card contain?
  • 17. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 17 More Privacy Risks National ID Card System If implemented, the system could allow access to your: • Medical information. • Tax records. • Citizenship. • Credit history. • Much more… Kind of scary…”Let me see your papers.” Q: Are the benefits of a national ID system greater than the risks?
  • 18. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 18 More Privacy Risks Personal Health and Medical Information Data can include: • History of substance abuse. • Treatment for sexually transmitted disease. • Extent of psychiatric help received. • Any suicide attempt(s). • Diagnosis of diseases (diabetes, angina, cancer, etc.). • Use of prescribed medicines. • Much more… Q: Why would marketers want access to your medical information?
  • 19. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 19 More Privacy Risks Public Records Available in paper form and/or online: • Bankruptcy. • Arrest. • Marriage-license application. • Divorce proceedings. • Property ownership. • Salary (if employed by state or federal government). • Wills and Trusts. • Much more… Q: How should access to public records be controlled?
  • 20. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 20 Protecting Privacy: Education, Technology, and Markets Education Must include awareness of: • How the technology works. • How the technology is being used. • The risks brought on by the technology. • How to limit unwanted use of personal information. • Applicable state and federal laws and regulations. Q: How do you limit unwanted use of your personal information?
  • 21. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 21 Protecting Privacy: Education, Technology, and Markets Technology Enhance privacy using: • Cookie (files a web site; stores it on each visitor’s computer) disablers. • Opt-in (Consumer must check if they want info)/opt-out (consumer must check if they don’t want info) options. • Anonymous Web services. Anonymizer.com…surf the web anonymously • P3P (Platform for Privacy Preferences). (automatically protect people’s privacy when they use the web…users choose the amount of info to give out) Audit trails-keep track of who sees what. (system keeps track of each user that accesses each type of data) Q: What privacy-enhancing technology do you use regularly?
  • 22. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 22 Protecting Privacy: Education, Technology, and Markets Market Response Markets can protect your privacy by: • Using trusted third parties. • Adhering to established privacy policies. • Purchasing consumer information directly from the consumer. • Developing and selling privacy-enhancing technologies and services. Q: Have you read the privacy policies at Web sites you frequent?
  • 23. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 23 Protecting Privacy: Law and Regulation Philosophical Views Samuel Warren & Louis Brandeis: • Individuals have the right to prohibit publication of personal facts and photos. Judith Jarvis Thompson: • No distinct right to privacy. • Privacy rights result from rights to our property, body, and contracts. Transactions: • Transactions have two parties, often with conflicting preferences about privacy. Q: How should rights to information about transactions between two parties be assigned?
  • 24. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 24 Protecting Privacy: Law and Regulation Contrasting Views Free-market View • The parties of a transaction are viewed as equal. • Truth in information gathering. • Strong reliance on contracts. • Freedom of speech and commerce. Consumer-Protection View • The parties of a transaction are viewed differently. • More stringent consent requirements required by law. • Strong limitations on secondary uses of information required by law. • Legal restrictions on consumer profiling. Q: How should the privacy of consumer transactions be regulated?
  • 25. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 25 Protecting Privacy: Law and Regulation Contracts and Regulations Basic Legal Framework: • Enforce agreements and contracts. • Publish privacy policies. • Set defaults for situations not in contract. Requiring Specific Consent policies: • Adhere to informed consumer consent. • Use opt-in policies. (not opt-out) Q: Recall a situation where you exchanged personal information for some benefit.
  • 26. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 26 Protecting Privacy: Law and Regulation Contracts and Regulations (cont’d) Ownership of personal data. Can an individual own: • Facts (e.g. marriage license in public records)? • Personal information (e.g. your date of birth)? Freedom of speech • Prohibiting communication of information may violate the 1st Amendment. Q: When does protecting privacy conflict with freedom of speech?
  • 27. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 27 Protecting Privacy: Law and Regulation EU (European Union) Privacy Regulation Key points: • Limited collection of personal data. • Data must be up-to-date and destroyed when no longer needed. • Consent for sharing data is required. • Sensitive data (e.g. religion) can only be provided with consent. • Notify consumers about the collection and intended purpose of data. • Restricted access and sharing of criminal conviction. Q: Can the EU’s privacy regulations work in the US?