Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.

Similar presentations


Presentation on theme: "Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet."— Presentation transcript:

1 Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet Insurance and Information Hiding

2 Protecting Privacy: Free Market View Privacy as a “ personal good ” Freedom of consumers to make voluntary agreements Freedom of consumers to make voluntary agreements Diversity of individual tastes and values Diversity of individual tastes and values Response of the market to consumer preferences Response of the market to consumer preferences Flaws of regulatory solutions: expensive to follow and enforce, good laws hard to write. Flaws of regulatory solutions: expensive to follow and enforce, good laws hard to write.

3 Protecting Privacy: Consumer Protection View Secondary uses of personal information are too common and easy. Secondary uses of personal information are too common and easy. Consumers often not really in a position to “ negotiate ” privacy terms. e.g., want a job. Consumers often not really in a position to “ negotiate ” privacy terms. e.g., want a job. Costly and disruptive results of errors in databases Costly and disruptive results of errors in databases Ease with which personal information leaks out Ease with which personal information leaks out Consumers need protection from their own lack of knowledge, judgment, or interest - paternalism? Consumers need protection from their own lack of knowledge, judgment, or interest - paternalism?

4 Protecting Privacy: Technology and Market Solutions Privacy enhancing-technologies for consumers: anonymization, digital cash, access control for databases. Privacy enhancing-technologies for consumers: anonymization, digital cash, access control for databases. Encryption Encryption –Public-key cryptography Business tools and policies for protecting data Business tools and policies for protecting data –Privacy officer –Trusted 3rd party

5 Privacy topics to discuss: Targeted marketing Targeted marketing –Data mining –Paying for consumer information –Data firms and consumer profiles Credit records Credit records

6 Privacy topics to discuss: Location Tracking: (Pros and cons) Location Tracking: (Pros and cons) - Global Positioning Systems (GPS), computer or communication services that know exactly where a person is at a particular time - Cell phones and other devices are used for location tracking

7 Privacy topics to discuss: Stolen and Lost Data: What are the counter measures? Stolen and Lost Data: What are the counter measures? - Hackers, physically stealing (laptops and devices), requesting information under false pretenses and Bribery of employees who have access.

8 Privacy topics to discuss: Careless management of personal data: Careless management of personal data: What We Do Ourselves: –Personal information in blogs and online profiles –Pictures of ourselves and our families –File sharing and storing –Is privacy old-fashioned? Do we understand the risks really?

9 Privacy topics to discuss: * Children using the internet: The Internet The Internet –Not able to make decisions on when to provide information –Vulnerable to online predators Parental monitoring Parental monitoring –Software to monitor Web usage –Web cams to monitor children while parents are at work –GPS tracking via cell phones or RFID

10 Privacy topics to discuss: Access vs. Privacy: Public Records: Public Records: - records available to general public (bankruptcy, property, and arrest records, salaries of government employees, etc.)

11 Privacy Principles Collect only the data needed. Collect only the data needed. Inform the user about data collection, and how it will be used. Inform the user about data collection, and how it will be used. Offer a way to opt out. Offer a way to opt out. Stronger protection for sensitive data (e.g., use opt in). Stronger protection for sensitive data (e.g., use opt in). Keep data only as long as needed. Keep data only as long as needed. Maintain accuracy and security of data; provide a way for people to access and correct their record. Maintain accuracy and security of data; provide a way for people to access and correct their record.

12 Communication Privacy Telephone Telephone –1934 Communications Act prohibited interception of messages –1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order). –2009 decision: international call tapping without warrant ok. E-mail and other new communications E-mail and other new communications –Electronic Communications Privacy Act of 1986 (ECPA) extended the 1968 wiretapping laws to include electronic communications, restricts government access to e-mail

13 Communication Privacy The USA Patriot Act and national security letters The USA Patriot Act and national security letters –No court order or court oversight needed –2003-2005 report found "widespread and serious misuse" of the FBIs national security letter authorities

14 Communication Privacy Designing Communications Systems for Interception: Communications Assistance for Law Enforcement Act of 1994 (CALEA) Communications Assistance for Law Enforcement Act of 1994 (CALEA) –Telecommunications equipment must be designed to ensure government can intercept telephone calls –Rules and requirements written by Federal Communications Commission (FCC)

15 Communication Privacy Secret Intelligence Gathering Secret Intelligence Gathering - The National Security Agency (NSA)

16 Communication Discussion Questions What type of electronic communications do you use on a regular basis? Are you worried about the government or other groups tapping into them? What type of electronic communications do you use on a regular basis? Are you worried about the government or other groups tapping into them?


Download ppt "Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet."

Similar presentations


Ads by Google