SlideShare a Scribd company logo
1 of 24
Download to read offline
Chapter 2
Privacy
FC • KS • 09.30.2015
Overview
2.1 Privacy Risks and Principles
2.2 The Fourth Amendment, Expectation
of Privacy, and Surveillance Technologies
2.3 The Business and Social Sectors
2.4 Government Systems
2.5 Protecting Privacy: Technology,
Markets, Rights, and Law
2.6 Communications
Conclusion
2.1 - Privacy Risks and Principles
Key Aspects
● Freedom from intrusion
● Control of information about oneself
● Freedom from surveillance
Possible Threats
● Intentional, institutional uses of
personal information
● Unauthorized use/release by
“insiders”
● Information theft and leakage
● Our own actions
● search query data
● smartphones
● government surveillance
2.1
How Data Can
Be Collected
2.1
Summary of Risks
with New Tech
● Anything we do in cyberspace is
recorded.
● Huge amounts of data are
stored.
● People are not aware of
collection of data.
● Software is complex.
● Leaks happen.
● A collection of small items can
provide a detailed picture.
● Re-identification has become
much easier.
● If information is on a public
Web site, it is available to
everyone.
2.2 - The Fourth Amendment, Expectation of
Privacy, and Surveillance Technologies
The 4th
amendment
states...
“The right of the people to be secure in
their person, houses, papers, and effects,
against unreasonable searches and
seizures, shall not be violated, and no
Warrants shall issue, but upon probable
cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be
seized.”
2.2
What It Means
● Sets limits on government’
s rights to search our
homes and businesses and
seize documents and other
personal effects.
● Requires that the
government provides
probable cause for search
and seizure.
● Much of our personal information is no longer
safe in our homes.
○ The data resides in huge databases outside
our control.
● New surveillance technologies allows the
government to search our homes without even
entering them or search us from a distance
without our knowledge
2.2
Why It Doesn’t
Matter
1928
Olmstead vs United States
Supreme Court allows use of wiretaps
on telephone lines without a court
order.
1967
Katz vs United States
Reversed position and says 4th amendment
DOES apply to phone conversations
2001
Kyllo vs United States
Ruled police could not use thermal-imaging to
search homes even if they’re outside
2.3 - The Business and Social Sectors
Marketing
● Data mining
● Targeted ads
● Paying for consumer info.
● “Do Not Track” browser option
2.3
Social Networks
● Terms and Conditions May
Apply
● New services with
unexpected privacy
settings
● Do you have the right to be
forgotten?
Most of the time, these networks
keep everything and even if you
think you’ve deleted something,
it’s still exists in their database
but has simply been removed
from display.
2.3
The Cloud
● convenient
● data mine your info
○ i.e. Google Photos
2.3
Location Tracking
● GPS (Global Positioning
System) used primarily by
mobile phones to track
user location
● Can be used as a tool for
protection by parents
● Can also be used by
pedophiles to locate
children
2.4 - Government Systems
Databases
● agencies maintain many databases which
holds personal information
● ex. arrest records, travel, voter registration,
etc
● use and misuse of personal information
can pose threats to liberty and personal
liberty
Privacy Act of 1974
● main law about government use of
personal information
○ restricts data to”relevant and
necessary”
○ allows people to access their
records and correct inaccurate info
○ requires agencies to publish notice
of records
2.4 Government Systems
Database example
● Tracing college students
○ US Dep Of Education established a
database to contain records of every
student in college or university
○ name, gender SS number, loans, etc
○ help evaluate student ID programs and
possibly improve
Pros
● provide accurate data on graduation rates and
college cost
● track number of future professionals
● can help shape better economic planning
Cons
● privacy risks; identity theft
2.4 Public Records
● Public records: available to general public
ex. bankruptcy records, divorce
proceedings
● can include sensitive information like SS
numbers, address
● ease of access depends on making some
data accessible to public
2.4 National ID Systems
● identification systems began with Social
Security cards in 1936
● originally exclusive for SS program
● 1943 - President Roosevelt required
federal agencies to use SSN for records
● 1961 - IRS used as taxpayer ID number
● 1988 - federal law requires that parent
provide SSN to receive birth certificate
● used for ID for credit and many other
services
● insecurity of this number can cause fraud,
identity theft, etc
2.5 - Protecting Privacy: Technology,
Markets, Rights, and Law
Encryption
● transform data into a form that is
meaningless
● data like email, credit card numbers,
medical records
● ensures privacy of messages and
data sent through computer
networks
How does it work?
● the software handles it automatically
● decodes encrypted data so the recipient
can view
● software encrypts credit card numbers
when sent to online merchants
2.5 Rights and Law
● the Fourth Amendment protects the
negative of against intrusion and
interference by government
● Problems when using Property Rights for
Personal Information:
a. some information does not appear to be a
transaction but there can still be problems
assigning ownership
b. ownership of facts would impair the flow
of information in society
c. whether or not we can own our profiles
2.6 - Communications
● Law enforcement agencies intercept
communications to collect criminal
activities
● Intelligence agencies intercept
communications to collect
information about activities of
terrorists, etc
2.6 Wiretapping and Email Protection
Telephone
● the legal status of tapping phones were
debated most of the 20th century
● 1928- Supreme Court ruled it was not
unconstitutional
● 1934- Communications Act: unless
authorized by sender, no person could
intercept and divulge a message; no
exceptions
● 1937 - Supreme Court ruled wiretapping
violated Communications Act
2.6 Wiretapping and Email Protection
Email & new Communications
● ECPA of 1986: wiretapping restrictions to
electronic communications, including
electronic mail, cordless and cellular
telephones, and paging devices.
● protects privacy in cyberspace
● USA Patriot Act of 2001: weakened ECPA
and loosened restrictions on government
surveillance and wiretapping
● allowed law enforcement to get
information easier
● some may argue that the Fourth
Amendment is being violated
Conclusion
● Computers are not needed for the invasion of
privacy.
● Computers simply make new threats possible
and old threats more potent.
● Privacy can mean:
○ Freedom from intrusion.
○ Control of information about oneself.
○ Freedom from surveillance.
Thank you.
Questions, comments, or
concerns?

More Related Content

What's hot

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEEDGDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEEDJoe Orlando
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsBenjamin Ang
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowBenjamin Ang
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)EmilyDShaw
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 

What's hot (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEEDGDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
GDPR KickOff Presentation - Getting EVERYONE UP TO SPEED
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
Cyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation AspectsCyber Security Attacks - Critical Legal and Investigation Aspects
Cyber Security Attacks - Critical Legal and Investigation Aspects
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must knowCybersecurity attacks critical legal and investigation aspects you must know
Cybersecurity attacks critical legal and investigation aspects you must know
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Chapter2
Chapter2Chapter2
Chapter2
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
MAIA Panel Big Event
MAIA Panel Big EventMAIA Panel Big Event
MAIA Panel Big Event
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 

Similar to Ethics in Technology - Privacy

Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxJaeKim165097
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxmckerliejonelle
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy Laurent Liscia
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationAltheimPrivacy
 
data privacy in digital technology .pptx
data privacy in digital technology  .pptxdata privacy in digital technology  .pptx
data privacy in digital technology .pptxafruafrid5
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 

Similar to Ethics in Technology - Privacy (20)

04 privacy
04 privacy04 privacy
04 privacy
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUD
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy
 
PC213.L3.pdf
PC213.L3.pdfPC213.L3.pdf
PC213.L3.pdf
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentation
 
data privacy in digital technology .pptx
data privacy in digital technology  .pptxdata privacy in digital technology  .pptx
data privacy in digital technology .pptx
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 

More from Frances Coronel

Conexión y Cultura con Asana
Conexión y Cultura con AsanaConexión y Cultura con Asana
Conexión y Cultura con AsanaFrances Coronel
 
Stories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinStories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinFrances Coronel
 
Uncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechUncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechFrances Coronel
 
Pride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechPride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechFrances Coronel
 
My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020Frances Coronel
 
Engineering Mentorship with Asana
Engineering Mentorship with AsanaEngineering Mentorship with Asana
Engineering Mentorship with AsanaFrances Coronel
 
Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Frances Coronel
 
Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Frances Coronel
 
RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101Frances Coronel
 
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornJSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornFrances Coronel
 
Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Frances Coronel
 
Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Frances Coronel
 
Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Frances Coronel
 
Side Hustle: Techqueria.org
Side Hustle: Techqueria.orgSide Hustle: Techqueria.org
Side Hustle: Techqueria.orgFrances Coronel
 
General Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardGeneral Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardFrances Coronel
 
GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101Frances Coronel
 
Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Frances Coronel
 
Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Frances Coronel
 
GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101Frances Coronel
 

More from Frances Coronel (20)

Conexión y Cultura con Asana
Conexión y Cultura con AsanaConexión y Cultura con Asana
Conexión y Cultura con Asana
 
Stories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckinStories from Latinas in Engineering with KeepTruckin
Stories from Latinas in Engineering with KeepTruckin
 
Uncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in TechUncharted Territories: On Being the First in Tech
Uncharted Territories: On Being the First in Tech
 
Pride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in TechPride Month Event with Blend: Intersecting Identities in Tech
Pride Month Event with Blend: Intersecting Identities in Tech
 
My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020My State of Work | MS&E 184 - Spring 2020
My State of Work | MS&E 184 - Spring 2020
 
Engineering Mentorship with Asana
Engineering Mentorship with AsanaEngineering Mentorship with Asana
Engineering Mentorship with Asana
 
Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101Pluralsight LIVE 2019 | Progressive Web Apps 101
Pluralsight LIVE 2019 | Progressive Web Apps 101
 
Welcome to Slack, Mindot!
Welcome to Slack, Mindot!Welcome to Slack, Mindot!
Welcome to Slack, Mindot!
 
RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101RevolutionConf 2019 - Progressive Web Apps 101
RevolutionConf 2019 - Progressive Web Apps 101
 
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another UnicornJSConf EU 2019 - Being a Unicorn Working for Another Unicorn
JSConf EU 2019 - Being a Unicorn Working for Another Unicorn
 
Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!Welcome to Slack, Diablo Valley College!
Welcome to Slack, Diablo Valley College!
 
Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!Welcome to Slack, Coro Fellows!
Welcome to Slack, Coro Fellows!
 
Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101Telegraph Track - Progressive Web Apps 101
Telegraph Track - Progressive Web Apps 101
 
JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019JSConf Hawaiʻi 2019
JSConf Hawaiʻi 2019
 
Side Hustle: Techqueria.org
Side Hustle: Techqueria.orgSide Hustle: Techqueria.org
Side Hustle: Techqueria.org
 
General Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A WizardGeneral Assembly - So You Want To Be A Wizard
General Assembly - So You Want To Be A Wizard
 
GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101GDG DevFest 2018 - Progressive Web Apps 101
GDG DevFest 2018 - Progressive Web Apps 101
 
Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101Scenic City Summit 2018 - Progressive Web Apps 101
Scenic City Summit 2018 - Progressive Web Apps 101
 
Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101Scenic City Summit 2018 - TypeScript 101
Scenic City Summit 2018 - TypeScript 101
 
GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101GDG SF Meetup - Progressive Web Apps 101
GDG SF Meetup - Progressive Web Apps 101
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Ethics in Technology - Privacy

  • 1. Chapter 2 Privacy FC • KS • 09.30.2015
  • 2. Overview 2.1 Privacy Risks and Principles 2.2 The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies 2.3 The Business and Social Sectors 2.4 Government Systems 2.5 Protecting Privacy: Technology, Markets, Rights, and Law 2.6 Communications Conclusion
  • 3. 2.1 - Privacy Risks and Principles Key Aspects ● Freedom from intrusion ● Control of information about oneself ● Freedom from surveillance Possible Threats ● Intentional, institutional uses of personal information ● Unauthorized use/release by “insiders” ● Information theft and leakage ● Our own actions
  • 4. ● search query data ● smartphones ● government surveillance 2.1 How Data Can Be Collected
  • 5. 2.1 Summary of Risks with New Tech ● Anything we do in cyberspace is recorded. ● Huge amounts of data are stored. ● People are not aware of collection of data. ● Software is complex. ● Leaks happen. ● A collection of small items can provide a detailed picture. ● Re-identification has become much easier. ● If information is on a public Web site, it is available to everyone.
  • 6. 2.2 - The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies The 4th amendment states... “The right of the people to be secure in their person, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
  • 7. 2.2 What It Means ● Sets limits on government’ s rights to search our homes and businesses and seize documents and other personal effects. ● Requires that the government provides probable cause for search and seizure.
  • 8. ● Much of our personal information is no longer safe in our homes. ○ The data resides in huge databases outside our control. ● New surveillance technologies allows the government to search our homes without even entering them or search us from a distance without our knowledge 2.2 Why It Doesn’t Matter
  • 9. 1928 Olmstead vs United States Supreme Court allows use of wiretaps on telephone lines without a court order. 1967 Katz vs United States Reversed position and says 4th amendment DOES apply to phone conversations 2001 Kyllo vs United States Ruled police could not use thermal-imaging to search homes even if they’re outside
  • 10. 2.3 - The Business and Social Sectors Marketing ● Data mining ● Targeted ads ● Paying for consumer info. ● “Do Not Track” browser option
  • 11. 2.3 Social Networks ● Terms and Conditions May Apply ● New services with unexpected privacy settings ● Do you have the right to be forgotten? Most of the time, these networks keep everything and even if you think you’ve deleted something, it’s still exists in their database but has simply been removed from display.
  • 12. 2.3 The Cloud ● convenient ● data mine your info ○ i.e. Google Photos
  • 13. 2.3 Location Tracking ● GPS (Global Positioning System) used primarily by mobile phones to track user location ● Can be used as a tool for protection by parents ● Can also be used by pedophiles to locate children
  • 14. 2.4 - Government Systems Databases ● agencies maintain many databases which holds personal information ● ex. arrest records, travel, voter registration, etc ● use and misuse of personal information can pose threats to liberty and personal liberty Privacy Act of 1974 ● main law about government use of personal information ○ restricts data to”relevant and necessary” ○ allows people to access their records and correct inaccurate info ○ requires agencies to publish notice of records
  • 15. 2.4 Government Systems Database example ● Tracing college students ○ US Dep Of Education established a database to contain records of every student in college or university ○ name, gender SS number, loans, etc ○ help evaluate student ID programs and possibly improve Pros ● provide accurate data on graduation rates and college cost ● track number of future professionals ● can help shape better economic planning Cons ● privacy risks; identity theft
  • 16. 2.4 Public Records ● Public records: available to general public ex. bankruptcy records, divorce proceedings ● can include sensitive information like SS numbers, address ● ease of access depends on making some data accessible to public
  • 17. 2.4 National ID Systems ● identification systems began with Social Security cards in 1936 ● originally exclusive for SS program ● 1943 - President Roosevelt required federal agencies to use SSN for records ● 1961 - IRS used as taxpayer ID number ● 1988 - federal law requires that parent provide SSN to receive birth certificate ● used for ID for credit and many other services ● insecurity of this number can cause fraud, identity theft, etc
  • 18. 2.5 - Protecting Privacy: Technology, Markets, Rights, and Law Encryption ● transform data into a form that is meaningless ● data like email, credit card numbers, medical records ● ensures privacy of messages and data sent through computer networks How does it work? ● the software handles it automatically ● decodes encrypted data so the recipient can view ● software encrypts credit card numbers when sent to online merchants
  • 19. 2.5 Rights and Law ● the Fourth Amendment protects the negative of against intrusion and interference by government ● Problems when using Property Rights for Personal Information: a. some information does not appear to be a transaction but there can still be problems assigning ownership b. ownership of facts would impair the flow of information in society c. whether or not we can own our profiles
  • 20. 2.6 - Communications ● Law enforcement agencies intercept communications to collect criminal activities ● Intelligence agencies intercept communications to collect information about activities of terrorists, etc
  • 21. 2.6 Wiretapping and Email Protection Telephone ● the legal status of tapping phones were debated most of the 20th century ● 1928- Supreme Court ruled it was not unconstitutional ● 1934- Communications Act: unless authorized by sender, no person could intercept and divulge a message; no exceptions ● 1937 - Supreme Court ruled wiretapping violated Communications Act
  • 22. 2.6 Wiretapping and Email Protection Email & new Communications ● ECPA of 1986: wiretapping restrictions to electronic communications, including electronic mail, cordless and cellular telephones, and paging devices. ● protects privacy in cyberspace ● USA Patriot Act of 2001: weakened ECPA and loosened restrictions on government surveillance and wiretapping ● allowed law enforcement to get information easier ● some may argue that the Fourth Amendment is being violated
  • 23. Conclusion ● Computers are not needed for the invasion of privacy. ● Computers simply make new threats possible and old threats more potent. ● Privacy can mean: ○ Freedom from intrusion. ○ Control of information about oneself. ○ Freedom from surveillance.