Privacy issues By: Joshua Junious Date: December 4, 2012 Course: CpSc 420 Instructor: Dr. Grossman.

Slides:



Advertisements
Similar presentations
Data Protection & Privacy in the Information Age COMNET – Legal Frameworks for ICTs Malta 2013 Dr Antonio Ghio Dr Jeanine Rizzo.
Advertisements

FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
ONLINE PRIVACY & DATA PROTECTION VERINE ETSEBETH.
Country-Of-Destination In international e-commerce many countries use a "country-of- destination" approach for governing cyberspace. Country-of- destination.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Google’s Privacy Infringements Kurt Ladendorf. Google’s Mantra “Don’t be evil”
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Fair Debt Collection Practices Act (FDCPA). Log into Quia and complete the FDCPA pre-assessment quiz. 2 FDCPA - How much do you know about this law?
Signature (unit, name, etc.) Introduction to biometrics from a legal perspective Yue Liu Mar NRCCL, UIO.
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
Maryland’s Security Integration Initiative Sometimes the most common sense solutions drive success Virginia Geckler Ron Brothers.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Privacy Policy Workshop M. Ryan Calo, Center for Internet and Society, Stanford Law School Mali Friedman, Covington & Burling LLP, San Francisco Office.
2/16/2010 The Family Educational Records and Privacy Act.
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
Privacy Safety on the Internet. Tips on Prevention  Check to see if website is secure  A padlock icon in the corner indicates a security certificate.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
By Kelvin Canela FACIAL RECOGNITION. Facebook Online social networking site. Launched on February 2004 and founded by Mark Zuckerberg, Eduardo Saverin,
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Per Anders Eriksson
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
How To Protect Your Privacy and Avoid Identity Theft Online.
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
THE CHOICES WE MAKE THAT MATTER – International Data Privacy/Protection JILL L. UREY, ASSISTANT GENERAL COUNSEL MID-ATLANTIC CIO FORUM NOVEMBER 20, 2014.
BY IVAN ZELIĆ Visa Information System EU Migration Law and Policy Jean Monnet Modul prof. dr. sc. Iris Goldner Lang.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Sales and Consumer Issues Objective Interpret sales contracts and warranties within the rights and law of consumers. REGULATION OF SALES.
What the government does A2 Economics and Business Unit 4B By Mrs Hilton for revisionstation.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Seven: Confessions and the 5 th Amendment This multimedia product and its contents are protected.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Page 1 Keep Your Company Out of the Media Workshop Rachel Verdugo March 23, 2011 Reno, Nevada Protect and Control Your Data.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
1 SAFE HARBOR FRAMEWORK Barbara S. Wellbery Morrison & Foerster LLP 2000 Pennsylvania Avenue Washington, DC /
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
European Standards on Confidentiality and Privacy in Healthcare Dr Colin M Harper Division of Psychiatry & Neuroscience Queen’s University.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
FACEBOOK PRIVACY CONCERNS Presenter: Anquin C. Cooper Based on the Article: Facebook In Privacy Breach By: Geoffrey A. Fowler.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
SDI-policy and law By Jaap Zevenbergen and adapted by Arnold Bregt.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Recent Privacy Developments ISACA January 12, 2012 Keith A. Cheresko and Robert L. Rothman Principals, Privacy Associates International LLC.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Targeted Behavioral Advertising Ariel Pierre Section 001.
May l Washington, DC l Omni Shoreham Web Hosting Potentials and Pitfalls David Snead Attorney W. David Snead, P.C.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
How Much Privacy Can We Really Expect? Terence Craig & Mary Ludloff, Co-Authors.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Facebook privacy policy
Privacy principles Individual written policies
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
General Data Protection Regulation
General Date Protection Regulation
Legal Issues in Podcasting: What Broadcasters Need to Know
General Data Protection Regulation
Presentation transcript:

Privacy issues By: Joshua Junious Date: December 4, 2012 Course: CpSc 420 Instructor: Dr. Grossman

Privacy Act of 1974  “The Privacy Act of 1974, as amended at 5 U.S.C. 552a, protects records that can be retrieved from a system of records by personal identifiers such as a name, social security number, or other identifying number or symbol” (  “The Privacy Act prohibits disclosure of these records without written individual consent unless one of the twelve disclosure exceptions enumerated in the Act applies” (

I see you  “New Scientist reports that the FBI is spending $1 billion to add facial recognition technology to its national fingerprint database as part of a broad upgrade aimed at making it easier to identify alleged criminals” (Reed, 2012).  According to the FBI, the facial recognition database will only include official mug shots of known criminals.  The database upgrade will also add biometrics such as iris scans, DNA analysis and voice identification.  The Next Generation Identification (NGI) System  Nationwide database of mug shots, iris scans, DNA records, voice samples and other biometrics.

Sharing is caring  Google plans to replace dozens of separate privacy policies with a unified policy.  “But while the new policy does not expand the personal information it collects, it introduces new ways for Google to combine and share data across its own services” (Gideon and Losey, 2012).  The users’ data will be shared across different Google services such as Google Docs within Gmail and Google Maps within Google+.  “Forcibly bridging services without the choice of a partial opt-out is an attempt by Google to leverage user dependency on some services to increase the usage of others – most notably Google+” (Gideon and Losey, 2012).

Time to face the music  “Accusing Facebook of engaging in “unfair and deceptive” practices, the federal government announced a broad settlement that requires the company to respect the privacy wishes of its users and subjects it to regular privacy audits for the next 20 years” (Sengupta, 2011).  “The order, announced by the Federal Trade Commission in Washington, stems largely from changes that Facebook made to the way it handled its users’ information in  The commission contended that Facebook, without warning its users or seeking consent, made public information that users had deemed to be private on their Facebook pages.  The order also said that Facebook, which has more than 800 million users worldwide, in some cases had allowed advertisers to glean personally identifiable information when a Facebook user clicked on an advertisement on his or her Facebook page” (Sengupta, 2011).

Europe says no!!!  Google  “European privacy regulators have found flaws in Google’s privacy policy, which may breach EU data protection laws” (Whittaker, 2012).  European data and privacy watchdog, the Article 29 Working Party, asked Google to put their new privacy policy on ice.  Facebook  “Facebook has come under fire in the EU for using facial recognition software to identify the people in users’ photos and suggest friends to tag in those photos” (Brodkin, 2012).

Conclusion  Privacy Act of 1974  FBI’s new Facial Recognition Technology  Google’s Privacy Policy  Facebook’s Privacy Policy  Europe vs. Google and Facebook

Questions

References Reed, B. (2012, September 7). Fbi plugs $1 billion into facial recognition tech to turn america into its own game of ‘where’s waldo?’.. Retrieved from dollars/ dollars/ Gideon, T., & Losey, J. (2012, February 10). The real problem with google’s new privacy policy.. Retrieved from _the_missing_opt_out_isn_t_the_only_problem_.html _the_missing_opt_out_isn_t_the_only_problem_.html Sengupta, S. (2012, November 29). F.T.C. settles privacy issue at facebook.. Retrieved from settlement-on-privacy.htmlhttp:// settlement-on-privacy.html Whittaker, Z. (2012, October 15). EU regulators find legal problems in google privacy policy.. Retrieved from google-privacy-policy / google-privacy-policy / Brodkin, J. (2012, September 21). Facebook bends to Europe's will, disables facial recognition (for now).. Retrieved from policy/2012/09/facebook-bends-to-europes-will-disables-facial-recognition-for-now/ policy/2012/09/facebook-bends-to-europes-will-disables-facial-recognition-for-now/