Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.

Slides:



Advertisements
Similar presentations
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Advertisements

Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Social Implications of a Computerized Society Lecture 2 Instructor: Oliver Schulte Simon Fraser University.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
A Gift of Fire Fourth edition Sara Baase
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
A Gift of Fire Third edition Sara Baase
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Security considerations for mobile devices in GoRTT
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Privacy.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Corresponding page number: The objective of this presentation is to establish the following privacy topics:  Privacy Risks and Principles  The Fourth.
Privacy and the Law.
Surveillance around the world
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Intercepting Communications
Confidentiality October 14, 2005.
Societal Issues in Computing (COMP466)
Wiretapping and Encryption
A Gift of Fire Third edition Sara Baase
Privacy L. Grewe CS4020.
PowerPoint® Slides to Accompany
Digital $$ Quiz Test your knowledge.
A Gift of Fire Third edition Sara Baase
CompTIA Security+ Study Guide (SY0-401)
Computer Programming I
A Gift of Fire Third edition Sara Baase
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet Insurance and Information Hiding

Protecting Privacy: Free Market View Privacy as a “ personal good ” Freedom of consumers to make voluntary agreements Freedom of consumers to make voluntary agreements Diversity of individual tastes and values Diversity of individual tastes and values Response of the market to consumer preferences Response of the market to consumer preferences Flaws of regulatory solutions: expensive to follow and enforce, good laws hard to write. Flaws of regulatory solutions: expensive to follow and enforce, good laws hard to write.

Protecting Privacy: Consumer Protection View Secondary uses of personal information are too common and easy. Secondary uses of personal information are too common and easy. Consumers often not really in a position to “ negotiate ” privacy terms. e.g., want a job. Consumers often not really in a position to “ negotiate ” privacy terms. e.g., want a job. Costly and disruptive results of errors in databases Costly and disruptive results of errors in databases Ease with which personal information leaks out Ease with which personal information leaks out Consumers need protection from their own lack of knowledge, judgment, or interest - paternalism? Consumers need protection from their own lack of knowledge, judgment, or interest - paternalism?

Protecting Privacy: Technology and Market Solutions Privacy enhancing-technologies for consumers: anonymization, digital cash, access control for databases. Privacy enhancing-technologies for consumers: anonymization, digital cash, access control for databases. Encryption Encryption –Public-key cryptography Business tools and policies for protecting data Business tools and policies for protecting data –Privacy officer –Trusted 3rd party

Privacy topics to discuss: Targeted marketing Targeted marketing –Data mining –Paying for consumer information –Data firms and consumer profiles Credit records Credit records

Privacy topics to discuss: Location Tracking: (Pros and cons) Location Tracking: (Pros and cons) - Global Positioning Systems (GPS), computer or communication services that know exactly where a person is at a particular time - Cell phones and other devices are used for location tracking

Privacy topics to discuss: Stolen and Lost Data: What are the counter measures? Stolen and Lost Data: What are the counter measures? - Hackers, physically stealing (laptops and devices), requesting information under false pretenses and Bribery of employees who have access.

Privacy topics to discuss: Careless management of personal data: Careless management of personal data: What We Do Ourselves: –Personal information in blogs and online profiles –Pictures of ourselves and our families –File sharing and storing –Is privacy old-fashioned? Do we understand the risks really?

Privacy topics to discuss: * Children using the internet: The Internet The Internet –Not able to make decisions on when to provide information –Vulnerable to online predators Parental monitoring Parental monitoring –Software to monitor Web usage –Web cams to monitor children while parents are at work –GPS tracking via cell phones or RFID

Privacy topics to discuss: Access vs. Privacy: Public Records: Public Records: - records available to general public (bankruptcy, property, and arrest records, salaries of government employees, etc.)

Privacy Principles Collect only the data needed. Collect only the data needed. Inform the user about data collection, and how it will be used. Inform the user about data collection, and how it will be used. Offer a way to opt out. Offer a way to opt out. Stronger protection for sensitive data (e.g., use opt in). Stronger protection for sensitive data (e.g., use opt in). Keep data only as long as needed. Keep data only as long as needed. Maintain accuracy and security of data; provide a way for people to access and correct their record. Maintain accuracy and security of data; provide a way for people to access and correct their record.

Communication Privacy Telephone Telephone –1934 Communications Act prohibited interception of messages –1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order). –2009 decision: international call tapping without warrant ok. and other new communications and other new communications –Electronic Communications Privacy Act of 1986 (ECPA) extended the 1968 wiretapping laws to include electronic communications, restricts government access to

Communication Privacy The USA Patriot Act and national security letters The USA Patriot Act and national security letters –No court order or court oversight needed – report found "widespread and serious misuse" of the FBIs national security letter authorities

Communication Privacy Designing Communications Systems for Interception: Communications Assistance for Law Enforcement Act of 1994 (CALEA) Communications Assistance for Law Enforcement Act of 1994 (CALEA) –Telecommunications equipment must be designed to ensure government can intercept telephone calls –Rules and requirements written by Federal Communications Commission (FCC)

Communication Privacy Secret Intelligence Gathering Secret Intelligence Gathering - The National Security Agency (NSA)

Communication Discussion Questions What type of electronic communications do you use on a regular basis? Are you worried about the government or other groups tapping into them? What type of electronic communications do you use on a regular basis? Are you worried about the government or other groups tapping into them?