1 Privacy Online Jane Turk, Ph.D. CIS 610 Summer 2003.

Slides:



Advertisements
Similar presentations
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
Advertisements

10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Consumer Privacy and Information Access Professor Matt Thatcher.
Chapter 11 Privacy Policies and Behavioral Marketing.
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
IS3350 Security Issues in Legal Context
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
Health & The Internet Ian Rose Computer Science 99 Winter 2000 Dartmouth College.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Privacy as an International Information Issue MD823 October 18, 2004.
Privacy as an International Information Issue MD823 September 22, 2003.
E-Commerce: Regulatory, Ethical, and Social Environments
Patricia Section 06 For Children’s Online Privacy Protection Act (COPPA)
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Privacy Self-Regulation.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Consumer Behavior, Market Research
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Marketing Systems Group Southern California MRA Education Seminar Presentation September 17, 2005 Privacy and Current Issues.
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
CYBERLAW Cyberlaw Meets Family Law: The Children’s Online Privacy Protection Act of 1998 (COPPA) Class of Nov. 11, 2002 Professor Susanna Fischer.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Federal Agencies and Laws for Consumer Rights
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Marketing on the Web.
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
E-Commerce: Regulatory, Ethical, and Social Environments
Healthcare Privacy: The Perspective of a Privacy Advocate
The E-Commerce Act and the Right to Privacy
INFS 452 – Computer Ethics & Society
IT and Society Week 2: Privacy.
Presentation transcript:

1 Privacy Online Jane Turk, Ph.D. CIS 610 Summer 2003

2 Outline background & perspectives surveys of current Internet use children’s online privacy consumer online privacy possible solution routes

3 Business Perspective Direct Marketing: > $176 billion a year over 10,000 compiled & publicly traded databases on market today private databases, with little or no regulation except in financial industry ability to capture info about users on Web target marketing

4 Privacy Perspective protecting privacy of consumer info is “very” important to consumers consumers don’t know scope of data maintained on them strong privacy standards develop trust in users encourage development of online commerce

5 Major Concerns of Consumers companies they patronize will provide their information to other companies without their permission (75%) their transactions may not be secure (70%) hackers will steal their personal data (69%) source: Harris survey, Nov 2001

6 Most Important Elements to be Verified security measures are adequate (90%) company does not release customer personal data without permission (89%) access within the company is limited (84%) company is only collecting info that its privacy policies dictate (84%) info use or sharing follows stated privacy policies (81%) source: Harris survey, Nov 2001

7 Suggested Remedy verify privacy policy by a third party (and 91% would do more business) online seal of approval does not necessarily verify BBBOnLine and Truste audit by major accounting firm PricewaterhouseCoopers source: Harris survey, Nov 2001

8 Fair Information Principles consumers be given: notice of entity’s info practices choice/consent with respect to secondary use & dissemination of info collected from or about them access to info about them collector assure security & integrity of info provide enforcement mechanism

9 Public Records Online NYC voter registration site NJ info on those licensed by state registries of sex offenders federal judges’ recommendation to put most civil proceedings online but to restrict criminal proceedings good source:

10 Children’s Privacy Federal Trade Commission: children are avid consumers and influence spending information collection targets are ages business goal: microtarget individual child CME 1996 study exposed the issues

11 FTC “Kids Privacy Surf Day” “snapshot’, not comprehensive survey 126 sites listed by Yahooligans! results announced Dec % of sites surveyed were collecting personally identifiable info on children fewer than 30% of sites had privacy policy another review March 1998

12 FTC 1998 Report: Children’s Sites of 212 sites directed at children 89% collect personally identifiable info directly from children 54% disclose info collection practices fewer than 10% provide for some form of parental control

13 Children’s Online Privacy Protection Act (1998) parental consent required for collection, use, disclosure of personal information from children under 13 parents may prevent further use or collection parents may review information

14 Privacy Journal Recommendations parent approve kid’s giving address totally involved in kid’s giving physical address order products in parent’s name kid can use (false) nickname never use name and address to buy

15 Annenberg 2000 Study 29% of parents would give identifying info in exchange for a free gift worth $100 45% of kids ages would 39% of girls, 54% of boys  parents need help

16 Cookies passive files stored on hard drives of Netscape & Microsoft IE users store a customer ID number for site/network used by online advertisers to track a user’s movements profiling, preferences issue: transparency

17 Why Cookies? HTTP is stateless: keeps no information from a connection with cookies, a Web page can “remember” you from your last visit enable much of interactivity customization, shopping baskets

18 Online Profiling: How and Where cookies, web bugs, URLs, info you provide anonymous, unless you identify yourself in customer database of the site/network pages/sites visited DoubleClick tracks movement on 1500 sites

19 Online Profiling: Pros and Cons : deliver desired content to user : provide information about interests of individual : aggregate info about site  info collected often without knowledge or consent

20 Spyware conducts surveillance on a computer usually placed without knowledge or consent of computer owner violates basic FIPS e.g., “phone home” programs, Web bugs, home web monitoring

21 Web Bugs clear GIFs, embedded images transmit info when page is viewed: where, when designed to monitor who is viewing page e.g., HTML mail recent SW enables detection

22 The Net NEVER Forgets Internet Archive scoops up the Web postings to Usenet groups are saved in Deja News now posts to forums and chat services are searchable è public record

23 Costs to Business of Not Protecting Privacy sales lost may be $18 billion older business models may be less effective than privacy-friendly models lost opportunities and higher costs for imported personal data “safe harbor” includes complying with FIPS source: Robert Gellman, “Privacy, Consumers, and Costs”

24 Costs to Consumers When Privacy Is Not Protected higher prices stopping junk mail and telemarketing calls avoiding identity theft protecting privacy on the Internet source: Robert Gellman, “Privacy, Consumers, and Costs”

25 Solution Routes education, including fair information principles best business practices industry self-regulation technology legislation

26 Industry Self-Regulation for privacy depends on posted privacy policies coming: integrated suites of tools online privacy seal programs e.g., TRUSTe, BBBOnLine implement some FIPS and monitor compliance public audit of privacy policies e.g.,

27 FTC Action Against Toysmart privacy policy promised never to divulge customer information certified by TRUSTe FTC could intervene bankrupt company advertised “databases and customer lists” for sale FTC sued to prevent sale of customer info

28 Privacy Enhancing Technologies (PETs) seek to eliminate use of personal data from transactions or give direct control for disclosure of personal information to individual concerned standard format for ratings systems: Platform for Internet Content Selection machine-to-machine protocol for data exchange: P3P (Platform for Privacy Preferences) anonymous use

29 Proposed Online Personal Privacy Act (S in 107th) opt-in for sensitive personally identifiable info opt-out for less sensitive info follows most FIPS preempts state legislation on online privacy

30 Sources Adkinson, William et al. “Privacy Online: A report on the information practices and policies of commercial web sites,” March The Progress and Freedom Foundation. Center for Democracy and Technology. “Guide to Online Privacy,” Electronic Privacy Information Center. "Surfer Beware III: Privacy Policies Without Privacy Protection." Dec. 1999

31 Federal Trade Commission. “Privacy Online: Fair Information Practices in the Electronic Marketplace,” May 2000,  Gellman, Robert. “Privacy, Consumers, and Costs: how the lack of privacy costs consumers and why business studies of privacy costs are biased and incomplete,” March

32 Goldman, Janlori and Zoe Hudson and Richard M. Smith. “Privacy Report on the Privacy Policies and practices of Health Web Sites”. Sponsored by California HealthCare Foundation, January 2000, report.pdf Pew Internet and American Life Project. “Trust and Privacy Online: Why Americans Want to Rewrite the Rules,” Aug 2000, _Report.pdf