2. Overview
2.1 Privacy Risks and Principles
2.2 The Fourth Amendment, Expectation
of Privacy, and Surveillance Technologies
2.3 The Business and Social Sectors
2.4 Government Systems
2.5 Protecting Privacy: Technology,
Markets, Rights, and Law
2.6 Communications
Conclusion
3. 2.1 - Privacy Risks and Principles
Key Aspects
● Freedom from intrusion
● Control of information about oneself
● Freedom from surveillance
Possible Threats
● Intentional, institutional uses of
personal information
● Unauthorized use/release by
“insiders”
● Information theft and leakage
● Our own actions
4. ● search query data
● smartphones
● government surveillance
2.1
How Data Can
Be Collected
5. 2.1
Summary of Risks
with New Tech
● Anything we do in cyberspace is
recorded.
● Huge amounts of data are
stored.
● People are not aware of
collection of data.
● Software is complex.
● Leaks happen.
● A collection of small items can
provide a detailed picture.
● Re-identification has become
much easier.
● If information is on a public
Web site, it is available to
everyone.
6. 2.2 - The Fourth Amendment, Expectation of
Privacy, and Surveillance Technologies
The 4th
amendment
states...
“The right of the people to be secure in
their person, houses, papers, and effects,
against unreasonable searches and
seizures, shall not be violated, and no
Warrants shall issue, but upon probable
cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be
seized.”
7. 2.2
What It Means
● Sets limits on government’
s rights to search our
homes and businesses and
seize documents and other
personal effects.
● Requires that the
government provides
probable cause for search
and seizure.
8. ● Much of our personal information is no longer
safe in our homes.
○ The data resides in huge databases outside
our control.
● New surveillance technologies allows the
government to search our homes without even
entering them or search us from a distance
without our knowledge
2.2
Why It Doesn’t
Matter
9. 1928
Olmstead vs United States
Supreme Court allows use of wiretaps
on telephone lines without a court
order.
1967
Katz vs United States
Reversed position and says 4th amendment
DOES apply to phone conversations
2001
Kyllo vs United States
Ruled police could not use thermal-imaging to
search homes even if they’re outside
10. 2.3 - The Business and Social Sectors
Marketing
● Data mining
● Targeted ads
● Paying for consumer info.
● “Do Not Track” browser option
11. 2.3
Social Networks
● Terms and Conditions May
Apply
● New services with
unexpected privacy
settings
● Do you have the right to be
forgotten?
Most of the time, these networks
keep everything and even if you
think you’ve deleted something,
it’s still exists in their database
but has simply been removed
from display.
13. 2.3
Location Tracking
● GPS (Global Positioning
System) used primarily by
mobile phones to track
user location
● Can be used as a tool for
protection by parents
● Can also be used by
pedophiles to locate
children
14. 2.4 - Government Systems
Databases
● agencies maintain many databases which
holds personal information
● ex. arrest records, travel, voter registration,
etc
● use and misuse of personal information
can pose threats to liberty and personal
liberty
Privacy Act of 1974
● main law about government use of
personal information
○ restricts data to”relevant and
necessary”
○ allows people to access their
records and correct inaccurate info
○ requires agencies to publish notice
of records
15. 2.4 Government Systems
Database example
● Tracing college students
○ US Dep Of Education established a
database to contain records of every
student in college or university
○ name, gender SS number, loans, etc
○ help evaluate student ID programs and
possibly improve
Pros
● provide accurate data on graduation rates and
college cost
● track number of future professionals
● can help shape better economic planning
Cons
● privacy risks; identity theft
16. 2.4 Public Records
● Public records: available to general public
ex. bankruptcy records, divorce
proceedings
● can include sensitive information like SS
numbers, address
● ease of access depends on making some
data accessible to public
17. 2.4 National ID Systems
● identification systems began with Social
Security cards in 1936
● originally exclusive for SS program
● 1943 - President Roosevelt required
federal agencies to use SSN for records
● 1961 - IRS used as taxpayer ID number
● 1988 - federal law requires that parent
provide SSN to receive birth certificate
● used for ID for credit and many other
services
● insecurity of this number can cause fraud,
identity theft, etc
18. 2.5 - Protecting Privacy: Technology,
Markets, Rights, and Law
Encryption
● transform data into a form that is
meaningless
● data like email, credit card numbers,
medical records
● ensures privacy of messages and
data sent through computer
networks
How does it work?
● the software handles it automatically
● decodes encrypted data so the recipient
can view
● software encrypts credit card numbers
when sent to online merchants
19. 2.5 Rights and Law
● the Fourth Amendment protects the
negative of against intrusion and
interference by government
● Problems when using Property Rights for
Personal Information:
a. some information does not appear to be a
transaction but there can still be problems
assigning ownership
b. ownership of facts would impair the flow
of information in society
c. whether or not we can own our profiles
20. 2.6 - Communications
● Law enforcement agencies intercept
communications to collect criminal
activities
● Intelligence agencies intercept
communications to collect
information about activities of
terrorists, etc
21. 2.6 Wiretapping and Email Protection
Telephone
● the legal status of tapping phones were
debated most of the 20th century
● 1928- Supreme Court ruled it was not
unconstitutional
● 1934- Communications Act: unless
authorized by sender, no person could
intercept and divulge a message; no
exceptions
● 1937 - Supreme Court ruled wiretapping
violated Communications Act
22. 2.6 Wiretapping and Email Protection
Email & new Communications
● ECPA of 1986: wiretapping restrictions to
electronic communications, including
electronic mail, cordless and cellular
telephones, and paging devices.
● protects privacy in cyberspace
● USA Patriot Act of 2001: weakened ECPA
and loosened restrictions on government
surveillance and wiretapping
● allowed law enforcement to get
information easier
● some may argue that the Fourth
Amendment is being violated
23. Conclusion
● Computers are not needed for the invasion of
privacy.
● Computers simply make new threats possible
and old threats more potent.
● Privacy can mean:
○ Freedom from intrusion.
○ Control of information about oneself.
○ Freedom from surveillance.