RISING DATA FLOW- OUT OF CONTROL? ARTHUR POBER, ED.D.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

1 e–Marketing Mr Ahmad. 2 Lesson Objectives By the end of this lesson you will all be able to:- Define the term ‘e – marketing’ Understand the emergence.
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Advertising and Sales Promotion ©2013 Cengage Learning. All Rights Reserved. Chapter 13.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
3 Ethics and Privacy.
Informed Consent and HIPAA Tim Noe Coordinating Center.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Supportive Services for Veteran Families (SSVF) Data HMIS Beyond Data Collection Updated 9/14.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
E-Business / E-Commerce Marketing in the Digital Age
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Challenges for Civil Liberties
6-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 3 rd edition by.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Labor-Management Relations l Federal legislation re: labor-management power »labor unions l Labor policies and legislation »wages and income maintenance.
Labor-Management Relations l Federal legislation re: labor-management power »labor unions l Labor policies and legislation »wages and income maintenance.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
Credit File and Reports By Eric, Maggie, Sarah, Jackson and Brooke.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Privacy Hot Topics Discussion August 18, 2011 The Corporate Privacy Forum Sharing practical solutions to today’s privacy challenges 1.
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Direct / Online marketing Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
Jurisdiction FTC Act: Unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful 15 U.S.C. § 45.
U.S. Self-Regulatory Principles for Online Behavioral Advertising – Status Update IAB Global Summit 2012: The Future of Public Policy First introduced.
Several Ways to Understand Digital Privacy Peter Eckersley, Senior Staff Technologist Electronic Frontier Foundation 1.
Current Law: Health Care Big Data Kirk J. Nahra Wiley Rein LLP Washington, D.C. (Dec. 8, 2014)
© Oklahoma State Department of Education, All rights reserved. 1 Standard 3. Finding Financial Services.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
Digital Communication and Networks. Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.
PROPRIETARY AND CONFIDENTIAL INFORMATION OF ADVERTISING.COM, INC. 1 ONLINE MARKETING SOLUTIONS FOR.
The Protection of Personal Information Bill 13 February
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Privacy Policy Issues & Pages Amy Reese INF385E Information Architecture and Design 1 UT iSchool 21 September 2004.
CHAPTER 5 ETHICS & PRIVACY.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Privacy and Employee Monitoring for the Employee and the Employer Linda Mellon-Hogan August 6, 2009.
TYLER GROUP
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Big Data Considerations
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Other Sources of Information
Personal Information and Companies
Being Aware of What You Share
Marketing Name _____________________ 5.2 Questions
18734: Foundations of Privacy
Legislative Response to Data Inferences
Presentation transcript:

RISING DATA FLOW- OUT OF CONTROL? ARTHUR POBER, ED.D.

ELECTRONIC INFORMATION IS COLLECTED,COMPILED AND SOLD…… ALL OF THIS IS DONE WITHOUT REASONABLE SAFEGUARDS….

COALITION  CENTER FOR DIGITAL DEMOCRACY  CONSUMER FEDERATION OF AMERICA  CONSUMERS UNION  CONSUMER WATCHDOG  ELECTRONIC FRONTIER FOUNDATION  PRIVACY LIVES  PRIVACY RIGHTS CLEARINGHOUSE  PRIVACY TIMES  U.S.PUBLIC INTEREST RESEARCH GROUP  THE WORLD PRIVACY FORUM

IN THE PAST…..  U.S. PRIVACY POLICIES HAVE BEEN BASED ON FAIR INFORMATION PRACTICES  COLLECTION LIMITATION  DATA QUALITY  PURPOSE SPECIFICATION  USE LIMITATION  SECURITY SAFEGUARDS  OPENNESS  INDIVIDUAL PARTICIPATION  ACCOUNTABILITY

IS IT ENOUGH? …NEED TO PROTECT CONSUMER PRIVACY FROM THE GROWING PRACTICES OF ONLINE BEHAVIORAL TRACKING AND TARGETING

CALL FOR ACTION….  SENSITIVE INFORMATION SHOULD NOT BE COLLECTED OR USED FOR BEHAVIOURAL TRACKING OR TARGETING  NO BEHAVIUORAL DATA SHOULD BE COLLECTED OR USED FROM ANYONE UNDER THE AGE OF 18 TO THE EXTENT THAT AGE CAN BE INFERRED

WHAT IS NEEDED TODAY…  WEB SITES AND AD NETWORKS SHOULDN’T BE ABLE TO COLLECT OR USE BEHAVIORAL DATA FOR MORE THAN 24 HOURS WITHOUT GETTING THE INDIVIDUAL’S AFFIRMATIVE CONSENT  BEHAVIORAL DATA SHOULDN’T BE USED TO UNFAIRLY DISCRIMINATE AGAINST PEOPLE OR IN ANY WAY THAT WOULD AFFECT AN INDIVIDIUAL’S CREDIT, EDUCATION, EMPLOYMENT, INSURANCE, OR ACCESS TO GOVERNMENT BENEFITS.

WHAT NEXT? …ARE THINGS OUT OF CONTROL?