Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.

Slides:



Advertisements
Similar presentations
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
Advertisements

Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
CHAPTER 4 E-ENVIRONMENT
Consumer Powers and Protections
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Consumer Privacy and Information Access Professor Matt Thatcher.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
IS3350 Security Issues in Legal Context
Netiquette Rules.
Week 12 - Friday.  What did we talk about last time?  Modeling cybersecurity  Block cipher modes.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Business Plug-In B7 Ethics.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Staying Safe Online Keep your Information Secure.
RISING DATA FLOW- OUT OF CONTROL? ARTHUR POBER, ED.D.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Sears Privacy Policy & Security information Shaina Lacher.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Chap 10: Privacy in Computing.  Privacy as an aspect of security  Authentication effects on privacy  Privacy and the Internet  Privacy implications.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Privacy, Security and Ethics
Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Chapter 5 Electronic Commerce | Security
CHAPTER 33 Cyberlaw.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Chapter 5 Electronic Commerce | Security
A Gift of Fire Third edition Sara Baase
Chapter 10: Privacy, Security, and Ethics
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Security in Computing, Fifth Edition
Presentation transcript:

Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.

What is privacy? How would you define it? What do you think its aspects are? –Three key aspects: Controlled disclosure. Sensitive data Affected subject.

Computer Related Privacy Problems Data collection: what issue do you see? No informed consent: –Examples: real age. Loss of control: class discussion. –Example: posting on a blog. What are the ramifications vs. writing a letter? Ownership of data.

Computer Related Privacy Problems Data collection: what issue do you see? No informed consent: –Examples: real age. Loss of control: class discussion. –Example: posting on a blog. What are the ramifications vs. writing a letter? Ownership of data.

Protections provided Privacy Policies; –First step: fair information policies: Regulate these; –Collection of information. –Data quality. –Purpose specification (use of information) –Use limitation. –Security safeguards. –Openness. –Individual participation. –Accountability.

U.S privacy laws –Are usually applied to individual data types: –HIPAA –Financial organizations: Gramm-Leach-Bliley Act (GLBA) –Important in Radford: Federal Educational Rights and Privacy Act (FERPA). Somethings are not clear: example class discussion.

U.S govt. websites. Privacy laws controlled by the FTC. Address 5 factors: –Notice (must be informed) –Choice –Access (contest accuracy of data collected) –Security. (data collectors must secure against unauthorized use). –Enforcement (sanctions on noncompliance) In 2002, the US e-government act.

What about commercial websites? Federal trade comission can prosecute for deceptive practices. (e.g., false advertising) –E.g., JetBlue and the DOD.

Other issues with Privacy. Anonymity. –Issues with anonymity. Multiple identities (online id)

How to protect against privacy loss?

Get/give as little data as possible. Data anonymization. Audit trail: record who has accessed what data. Security and controlled access Training, quality, Restricted usage, data left in place. Policy.

Issues in Computer Security: Data mining and privacy. Government data mining. Privacy preserving data mining: –Data mining is “extracting hidden patterns from large amounts of data” –Solutions to preserve privacy: Remove id information. Doesn’t work. –E.g., Sweeney’s report: > 87% US population can be identified by: 5 digit zip code, gender and date of birth. Data perturbation. Example. Needs to be done carefully.

Privacy on the web Think about this: –On the web: every word you speak (blog) can be read –Someone selling something may have ads on their site for something else. –Identity of the other person may not be known! Some issues on the web are protected. –Can you name them?

Privacy on the web Credit card payments are protected. –But not necessarily private. –Paypal etc.. May solve the privacy issues. Site and portal registrations: –Beware of “we will enhance your browsing experience” –Using as id on some sites. Issues? Third party ads. Contests and offers: Free Iphones!

Privacy issues Cookies: –Be-aware Third party cookies. E.g., Double Click and online profiling. Adware Web-bug. Spyware: keystroke loggers.

security Interception of . –Can be encrypted using PGP or S/MIME – monitored legallly. Anonymous and r ers –Sending anonymous s. Spoofing and spamming.

Impact on Emerging technologies RFID tags –RFID and privacy issues: Consumer products. How can this be exploited? –RFID in individuals. Electronic voting –Privacy issues. VoIP and Skype –Privacy issues.