Privacy Culture V 2
Upcoming SlideShare
Loading in...5
×
 

Privacy Culture V 2

on

  • 281 views

Seattle Cyber Security Summint

Seattle Cyber Security Summint

Statistics

Views

Total Views
281
Slideshare-icon Views on SlideShare
281
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Privacy Culture V 2 Privacy Culture V 2 Presentation Transcript

    • Brian Rowe J.D.Adjunct ProfessorUniversity of Washington Information SchoolSeattle University LawLSNAP.org @ Northwest Justice ProjectDigitalRightsNorthwest.orgTheWLA.orgCreating Privacy Culture
    • You Cant Be Neutral on a Moving Train
    • Informationis a lifeform.Information Wants toBe Free
    • III. The justice system has the dual responsibilityof being open to the public and protecting personalprivacy. Its technology should be designed andused to meet both responsibilities.
    • Background
    • The Issue
    • /=
    • Transactional Cost v. Right
    • The Internet & New Technology
    • The Solutions
    • V.
    • Make Policies Readable
    • Make Policies Readable
    • Offer an Amnesty Period
    • Theatre
    • Involve the 20 SomethingsCyborg Boy by ~Gryz at Deviant Art
    • Diverse User Groups
    • Diverse User Groups
    • Educate Employees
    • Breach of confidentiality & accidental breach of confidentialityThis email and any files transmitted with it are confidential and intended solely for the use of theindividual or entity to whom they are addressed. If you have received this email in error please notifythe system manager. This message contains confidential information and is intended only for theindividual named. If you are not the named addressee you should not disseminate, distribute or copythis e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistakeand delete this e-mail from your system. If you are not the intended recipient you are notified thatdisclosing, copying, distributing or taking any action in reliance on the contents of this information isstrictly prohibited.Email Signatures
    • DiscussionPoints
    • V.
    • CreditsTips For Building A Privacy Culture, No Good Idea is Too Small ByMarianne Kolbasuk McGeeJohn Perry Barlow - Economy ideas 1993Schneier on Security A blog covering security and security technology.January 25, 2007 In Praise of Security TheaterCover Image by By g4ll4is CC-BY-SA, John Perry Barlow image By JoiIto - CC BYOther images often used under fair use
    • More From Brian:LSNTAP.orgBrian@BrianRowe.orgDigitalRightsNW.org