Privacy _____________________________________________ _____________________________________________.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

Marketing Research 4.06 Acquire foundational knowledge of marketing-information management to understand its nature and scope.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
CHAPTER 4 E-ENVIRONMENT
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Consumer Privacy and Information Access Professor Matt Thatcher.
Signature (unit, name, etc.) Introduction to biometrics from a legal perspective Yue Liu Mar NRCCL, UIO.
Privacy: Accountability and Enforceability Jamie Yoo April 11, 2006 CPSC 457: Sensitive Information in a Wired World.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Chapter 20 Additional Assurance Services: Other Information
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Privacy Chris Kelly iLaw July 5, 2002.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Copyright © 2006 Pearson Education, Inc. Slide 9-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Privacy as an International Information Issue MD823 October 18, 2004.
Privacy as an International Information Issue MD823 September 22, 2003.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Transborder dataflows Flow of information across national borders Much of this data involves personal information.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
C4- Social, Legal, and Ethical Issues in the Digital Firm
© 2007 The MITRE Corporation. MITRE Privacy Practice W3C Government Linked Data Working Group Michael Aisenberg, Esq. 29 June 2011 Predicate for Privacy.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Compliance with IOSCO requirements AMEDA Leadership Forum Alexandria Egypt Monday 27 th April 2009 by Dr. Ashraf EL Sharkawy Senior Advisor to the CMA.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Privacy ECT 582 Robin Burke. Outline Homework #6 Privacy basics relationship to security privacy policies and requirements.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
6 Ethics and Privacy.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
RFID and Public Policy Elliot Maxwell Fellow, Communications Program, Johns Hopkins University and Distinguished Research Fellow, Pennsylvania State University.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Data protection—training materials [Name and details of speaker]
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Surveillance around the world
6th Asian Roundtable on Corporate Governance Theme II, Session 2 Ensuring Capacity, Integrity and Accountability of Regulators and Supervisors Jaweria.
Data Protection: EU & International
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Analysis of Privacy and Data Protection Laws and Directives
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy _____________________________________________ _____________________________________________

What is “Privacy”? Too many meanings? Constitutional Government surveillance Security/encryption Privacy in ecommerce transactional data collection and processing Spam, identity theft etc. Specific technologies Cookies RFID _____________________________________________ _____________________________________________

What is “Privacy”? Function: permit individuals to control information flows about them What values are served by preventing or limiting the flow of true information? _____________________________________________ _____________________________________________

What is “Privacy”? Function: permit individuals to control information flows about them What values are served by preventing or limiting the flow of true information? Sphere of freedom from law Even legitimate law? _____________________________________________ _____________________________________________

What is “Privacy”? Function: permit individuals to control information flows about them What values are served by preventing or limiting the flow of true information? Sphere of freedom from law Sphere of freedom from social norms Regulation by gossip and censure _____________________________________________ _____________________________________________

What is “Privacy”? Function: permit individuals to control information flows about them What values are served by preventing or limiting the flow of true information? Sphere of freedom from law Sphere of freedom from social norms Sphere of freedom from regulation by market decisions of others How constrained or efficient are market behaviors constrained by competition and rationality? _____________________________________________ _____________________________________________

What is “Privacy”? Function: permit individuals to control information flows about them What values are served by preventing or limiting the flow of true information? Sphere of freedom from law Sphere of freedom from social norms Sphere of freedom from markets Power of self-definition Profiling and data-mining: being construed by another control over information received: being limited by another _____________________________________________ _____________________________________________

What is “Privacy”? The practical inefficiencies of older information processing and communications technologies created a practical sphere of freedom “Internet privacy” represents a cluster of problems that result from increased efficiency of information collection and processing that shrinks that sphere Parallels to Photography & yellow journalism Wiretaps _____________________________________________ _____________________________________________

Destabilizing Factors: Technology Ubiquitous communications capacity Walls evaporate for reading, viewing transactions can be observed anywhere Extensive processing capacity Inefficiency & cost protect privacy Aggregating and access Data-mining – analysis algorithms Communications + processing Transactional data collection Profiling Data mining _____________________________________________ _____________________________________________

Destabilizing Factors: Business Information as competitive tool Customized preference formation: advertising Customized service/goods delivered Customized price/price discrimination Customer’s life-long consumption as primary asset of firm Proprietary information fends off competitive pressures _____________________________________________ _____________________________________________

Destabilizing Factors: Politics U.S. & other governments highly sophisticated information gatherers 1990s saw the encryption wars, US Government partially lost September 11 th released the leash Government back into an explicit role of extensive information collection and processing Including by access to market-actor collected information _____________________________________________ _____________________________________________

Fair Information Practices Minimal standards imposed by law with a supporting regulatory framework As opposed to “privacy preferences” U.S.: Government & sector specific Privacy Act 1974 Video rental, HIPPA, COPPA EU Data protection OECD Guidelines _____________________________________________ _____________________________________________

Fair Information Practices Collection Limitation Data Quality Purpose Specification Use Limitation Security Safeguards Openness Individual Participation Accountability _____________________________________________ _____________________________________________

Common Concerns Openness/Notice precondition to subject’s control act of collection purposes of collection intended disclosures to third parties contacts and means of limiting use or disclosure of the information _____________________________________________ _____________________________________________

Permission opt-out or opt-in EU, opt-in for sensitive information COPPA; HIPPA Rule Reflects assumptions about knowledge, consent, responsibility, collective action cost of exercising option cost of communication loss of service for refusal to give non- necessary info Common Concerns _____________________________________________ _____________________________________________

Common Concerns Post-permission processing e.g., profiling must comply with permission must permission be given separately for each later processing? Third-party disclosure part of initial or subsequent authorization re-purposing must be authorized Security, integrity, accuracy independent duty Access for subjects to correct information in the database _____________________________________________ _____________________________________________

Regulatory approaches Mandatory law defines collection & processing practices EU Directive U.S sector-specific laws like video rental, HIPPA, COPPA _____________________________________________ _____________________________________________

Regulatory approaches Self-regulation with threat of regulation if fails U.S. approach to e-commerce e.g., TRUSTe, BBBOnline will it ever graduate to NASD? Self-regulation with teeth US/EU safe harbor? FTC enforcement of company policies adopted to come under safe harbor _____________________________________________ _____________________________________________

Regulatory approaches Technology Practice enforcing or preference negotiating? Anonymizers & encryption (client- or service-provider server-based) P3P, DRM-style models Who bears the burden, collectors or subjects? What are the defaults? Is the default minimal collection necessary, or whatever is possible? Limited use or multiple uses? _____________________________________________ _____________________________________________

RFID Story Clothing manufacturers sew RFID into cloth. Include garment characteristics, cloth batch etc for recalls & quality control Stores, malls, etc. install readers to limit pilfering & for inventory management _____________________________________________ _____________________________________________

RFID Story Clothing manufacturers sew RFID into cloth. Include garment characteristics, cloth batch etc for recalls & quality control Stores, malls, etc. install readers to limit pilfering & for inventory management Question Mall owners use the information to dynamically change the advertisements they project on billboards in the Mall _____________________________________________ _____________________________________________

RFID Story Clothing manufacturers sew RFID into cloth. Include garment characteristics, cloth batch etc for recalls & quality control Stores, malls, etc. install readers to limit pilfering & for inventory management Questions Police officers use the information to track the location of cloths that match crime scene evidence _____________________________________________ _____________________________________________

Hypothetical Amazon Story Collects information to tailor offerings Provides good recommendations for books to read Suggests music you like Offers good advice when you seem to need it, usually guesses right what you need How far would you go with this? Buying a car or furniture Financing/loan services Physician referral service _____________________________________________ _____________________________________________