A Skeptical Approach  to Online Privacy Sam Hogarth @samhogyWill Macdonald @PPUKScuzz
Privacy        “The right to be left alone”Samuel Warren, Louis Brandeis – The Right to Privacy (1890),      Olmstead v. U...
Privacy“Privacy, is the claim of individuals, groups,       or institutions to determine for     themselves when, how, and...
Privacy Is Dead“People have really gotten comfortable not      only sharing more information and  different kinds, but mor...
Digital Footprints   Metadata about a user,generated through the use of        technology.
Digital Footprints•   Log files•   Search history•   Browsing history•   Purchase history•   Location history•   “Likes”• ...
Collecting Footprints• Opt-in:  • Part of the service agreement / nature of    technology.  • User explicitly chooses to p...
Using Digital Footprints• Personalisation:  • Search results  • Web sites and content• Recommendations of:  • Products  • ...
Concerns•   There is a legitimate need for anonymity.•   Is the data secure?•   What story will the data tell in 10 years?...
Concerns                “The Filter Bubble Effect”Eli Parisier – Beware online Filter Bubbles (2011)ted.com/talks/eli_pari...
Moving the GoalpostsHow the use of user-generated      data is changing.
Semantic dataTurning likes into links
Semantic dataLinking events and photos to locations
Facebook: 2005 (Default Settings)Info available to all members of Facebook:• Name• Gender• Networks• Profile Picturehttp:/...
Facebook: 2010 (Default Settings)Info available to the entire Internet:• Name                   • Likes• Gender           ...
“Frictionless Sharing”Data is shared publicly by default.Facebook integrates with 3rd-party            applications.
“Ambient social networking”       Always-on services
Protecting PrivacyLaws and tools to protect your            data
Laws & RegulationsData Protection Directive (EU)  • Consumers must give “unambiguous”    consent.  • Data must only be use...
Upcoming Laws & Regulations• “The right to be forgotten” (EU)• Privacy Bill of Rights (US)  • Respect for context  • Trans...
ToolsFind out about web browser add-ons and  mobile phone apps which can restrict  access to sensitive data at:     samhog...
Conclusions
Conclusions         Data is a commodity.     It should be treated as such.Users should err on the side of caution.
Conclusions“New privacy laws should emphasize usage    restrictions to guard against unfair     discrimination based on pe...
Upcoming SlideShare
Loading in...5
×

A Skeptical Approach to Online Privacy

561

Published on

A skeptical look at the world of online privacy, including:
- What does privacy mean?
- How is data collected?
- What kind of data is collected?
- How is this data uses?
- Relevant laws
- Tools to protect privacy

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
561
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

A Skeptical Approach to Online Privacy

  1. 1. A Skeptical Approach to Online Privacy Sam Hogarth @samhogyWill Macdonald @PPUKScuzz
  2. 2. Privacy “The right to be left alone”Samuel Warren, Louis Brandeis – The Right to Privacy (1890), Olmstead v. United States, 277 U.S. 438 (1928)
  3. 3. Privacy“Privacy, is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” Alan Westin – Privacy and Freedom (1967)
  4. 4. Privacy Is Dead“People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time.”Mark Zuckerberg - http://crunchies2010.techcrunch.com (2010)
  5. 5. Digital Footprints Metadata about a user,generated through the use of technology.
  6. 6. Digital Footprints• Log files• Search history• Browsing history• Purchase history• Location history• “Likes”• User-generated content
  7. 7. Collecting Footprints• Opt-in: • Part of the service agreement / nature of technology. • User explicitly chooses to publish content.• Opt-out: • Gathered without a user’s explicit consent. Data collection is mandatory.
  8. 8. Using Digital Footprints• Personalisation: • Search results • Web sites and content• Recommendations of: • Products • Services• Improvement of services• Law enforcement and security
  9. 9. Concerns• There is a legitimate need for anonymity.• Is the data secure?• What story will the data tell in 10 years?• What story will the data tell that is not true, but backed up by facts?
  10. 10. Concerns “The Filter Bubble Effect”Eli Parisier – Beware online Filter Bubbles (2011)ted.com/talks/eli_pariser_beware_online_filter_bubbles.html
  11. 11. Moving the GoalpostsHow the use of user-generated data is changing.
  12. 12. Semantic dataTurning likes into links
  13. 13. Semantic dataLinking events and photos to locations
  14. 14. Facebook: 2005 (Default Settings)Info available to all members of Facebook:• Name• Gender• Networks• Profile Picturehttp://mattmckeon.com/facebook-privacy
  15. 15. Facebook: 2010 (Default Settings)Info available to the entire Internet:• Name • Likes• Gender • Profile Data• Networks • Friends• Profile Picture • Photos• Wall Postshttp://mattmckeon.com/facebook-privacy
  16. 16. “Frictionless Sharing”Data is shared publicly by default.Facebook integrates with 3rd-party applications.
  17. 17. “Ambient social networking” Always-on services
  18. 18. Protecting PrivacyLaws and tools to protect your data
  19. 19. Laws & RegulationsData Protection Directive (EU) • Consumers must give “unambiguous” consent. • Data must only be used for the purposes stated during collection, and not redirected to other purposes. • Data collected must have a reasonable relationship to the purposes for which it is collected.
  20. 20. Upcoming Laws & Regulations• “The right to be forgotten” (EU)• Privacy Bill of Rights (US) • Respect for context • Transparency in privacy policies • Don’t collect more information than is needed
  21. 21. ToolsFind out about web browser add-ons and mobile phone apps which can restrict access to sensitive data at: samhogy.co.uk/privacy-toolkit
  22. 22. Conclusions
  23. 23. Conclusions Data is a commodity. It should be treated as such.Users should err on the side of caution.
  24. 24. Conclusions“New privacy laws should emphasize usage restrictions to guard against unfair discrimination based on personal information, even if it is publicly available.”Daniel Weitzman – Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces (2007)

×