SlideShare a Scribd company logo
1 of 22
CSE/ISE 312
Privacy
(Part 1)
What We Will Cover
• Privacy risks and principles
• 4th Amendment, expectations, and
surveillance
• Business and social sectors
• Government systems
• Protecting Privacy
• Communications
Privacy Risks and Principles
Three Key Aspects of Privacy:
• Freedom from intrusion - being left alone
• Control of information about oneself
• Freedom from surveillance (from being
tracked, followed, watched, eavesdropped on)
Privacy Threats
• Intentional, institutional use
• Insider access
• Theft of information
• Inadvertent leakage
• Personal actions
Definitions
• Personal information – any information
relating to, or traceable to, an individual
person
• Informed consent – users being aware of what
information is collected and how it is stored
• Invisible information gathering - collection of
personal information about someone without
the person’s knowledge
• Cookies - files that a website stores on a
visitor’s computer
New Technology, New Risks
• Government and private databases
• Sophisticated tools for surveillance and data
analysis
• Vulnerability of data
• Rapid decline in the cost of data storage
allows for massive databases
• Electronic data storage leads to a proliferation
of privacy threats
More Examples
Search query data
• Search engines collect many terabytes of data daily
• Data is analyzed to target ads and develop new
services
• Who gets to see this data? Why should we care?
Smartphones
• Location apps
• Data sometimes stored and sent without users’
knowledge
Summary of Privacy Issues (1)
• Almost everything we do online is recorded
• Huge amounts of data are stored
• People are often not aware of collection of personal
data
• Software is complex, not even sure which collects
data
• Leaks happen
• A collection of many small data items can provide a
detailed picture of person’s life
Summary of Privacy Issues (2)
• Re-identification – piecing together someone’s
identity - has become much easier than before
• Information available on the Internet will be found
by people for whom it was not intended
• Electronic data seems to last forever
• Data collected for one purpose will find other uses
• The government sometimes requests personal data
• We cannot directly protect information about
ourselves
Terminology
• Secondary use - use of personal information for a
purpose other than the one it was provided for
• Data mining - searching and analyzing masses of
data to find patterns and develop new information or
knowledge
• Computer matching - combining and comparing
information from different databases (using social
security number, for example) to match records
• Computer profiling - analyzing data in computer
files to determine characteristics of people most
likely to engage in a certain behavior
Stolen and Lost Data
• Examples:
– Spyware: software often downloaded from a
web site without user knowledge, collecting user
data and activity and sends to remote parties
– Business and government lose customer/citizen
information due to weak security
– Pretexting: pretend to be someone who is
legitimate to obtain data.
• One should be aware and consciously make
decisions; IT professionals should endeavor
to develop security systems
Principles for Data Collection and
Use
• Informed consent – informing people how
collected information is being used
• Opt-in and opt-out policies – people specify
an exception to the default condition (either
to not use information or use information by
default)
• Data retention
Forms of Informed Consent
Two common forms for providing informed consent are
opt in and opt out:
• opt in – The collector of the information may use
information only if person explicitly permits use
(usually by checking a box)
• opt out – Person must request (usually by checking a
box) that an organization not use information
• Under an opt in policy, more people are likely to be
“out”
• Under an opt out policy, more people are likely to be
“in”
Fair Information Principles (FIP)
• Recommendations from privacy experts
1. Inform people when you collection information,
what you collect and how you use it
2. Collect only the data needed
3. Offer opt-outs
4. Keep data only as long as needed
5. Maintain accuracy of data
6. Protect security of data
7. Develop policies for law enforcement requests
The Fourth Amendment
• Part of the US Bill of Rights
• “The right of the people to be secure in their
persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be seized.”
Key Problems Arise from New Tech.
• The US Constitution sets limits on government’s
rights to search our homes, businesses, and seize
docs and other personal effects. Requires
government to provide probable cause.
• Much of our information today is no longer located
in our homes; it resides in huge databases outside
our control
• New technologies allow the government to search
our homes without entering them and search our
persons from a distance without our knowledge
New Technologies
• Non-invasive but deeply revealing searches
– Particle sniffers
– Imaging systems
– Location trackers
• Modern surveillance techniques are
redefining expectation of privacy
• What restrictions should we place on their
use? When should we permit government
agencies to use them without a search
warrant?
Supreme Court Decisions and
Expectation of Privacy (1)
• Supreme court decisions continue to address
impact of new tech on 4th Amendment
protection
• Olmstead v. United States (1928)
– Supreme Court allowed the use of wiretaps on
telephone lines without a court order
– Interpreted the Fourth Amendment to apply only
to physical intrusion and only to the search or
seizure of material things, not conversations.
Supreme Court Decisions and
Expectation of Privacy (2)
• Katz v United States (1967)
– Supreme Court reversed its position and
ruled that the Fourth Amendment does apply to
conversations
– Court said that the Fourth Amendment protects
people, not places. To intrude in a place where
reasonable person has a reasonable expectation
of privacy requires a court order
Supreme Court Decisions and
Expectation of Privacy (3)
• Kylo v United States (2001)
– Supreme Court ruled that police could not use
thermal-imaging devices to search a home from
the outside without a search warrant.
– Court stated that where “government uses a
device that is not in general public use, to explore
details of the home that would previously have
been unknowable without physical intrusion, the
surveillance is a ‘search.’”
Search and Seizure of
Computers and Phones
• The 4th Amendment requires that search warrants
be specific about object to search
• If an officer with a warrant sees evidence of another
crime in plain view, the office may seize it
• How should we interpret “plain view” for search of
computer or smartphone files?
• Access by law enforcement agents to all data on a
computer device can be a serious threat to privacy,
liberty, and free speech
Video Surveillance and Face
Recognition
Security cameras
• Low accuracy rate may result in detention of
many innocent people
• Abuse by the operators
• Is the level of surveillance compatible with
privacy and a free society?
• What trade-offs between privacy and security
are we willing to make?

More Related Content

Similar to CSE/ISE 312 Privacy Risks and Principles (Part 1

ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesKarl Larson
 
How to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policeHow to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policePaul Bradshaw
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityARDC
 
Data Protection and Privacy Laws
Data Protection and Privacy LawsData Protection and Privacy Laws
Data Protection and Privacy Lawsahlawatassociates
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)schermerbw
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Ethisphere
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsGabriella Razzano
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 

Similar to CSE/ISE 312 Privacy Risks and Principles (Part 1 (20)

ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Cross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property IssuesCross Border Privacy : Intellectual Property Issues
Cross Border Privacy : Intellectual Property Issues
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
How to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy policeHow to use FOI: from absentee football fans to tazer-happy police
How to use FOI: from absentee football fans to tazer-happy police
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Data Protection and Privacy Laws
Data Protection and Privacy LawsData Protection and Privacy Laws
Data Protection and Privacy Laws
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
FOIL
FOILFOIL
FOIL
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

CSE/ISE 312 Privacy Risks and Principles (Part 1

  • 2. What We Will Cover • Privacy risks and principles • 4th Amendment, expectations, and surveillance • Business and social sectors • Government systems • Protecting Privacy • Communications
  • 3. Privacy Risks and Principles Three Key Aspects of Privacy: • Freedom from intrusion - being left alone • Control of information about oneself • Freedom from surveillance (from being tracked, followed, watched, eavesdropped on)
  • 4. Privacy Threats • Intentional, institutional use • Insider access • Theft of information • Inadvertent leakage • Personal actions
  • 5. Definitions • Personal information – any information relating to, or traceable to, an individual person • Informed consent – users being aware of what information is collected and how it is stored • Invisible information gathering - collection of personal information about someone without the person’s knowledge • Cookies - files that a website stores on a visitor’s computer
  • 6. New Technology, New Risks • Government and private databases • Sophisticated tools for surveillance and data analysis • Vulnerability of data • Rapid decline in the cost of data storage allows for massive databases • Electronic data storage leads to a proliferation of privacy threats
  • 7. More Examples Search query data • Search engines collect many terabytes of data daily • Data is analyzed to target ads and develop new services • Who gets to see this data? Why should we care? Smartphones • Location apps • Data sometimes stored and sent without users’ knowledge
  • 8. Summary of Privacy Issues (1) • Almost everything we do online is recorded • Huge amounts of data are stored • People are often not aware of collection of personal data • Software is complex, not even sure which collects data • Leaks happen • A collection of many small data items can provide a detailed picture of person’s life
  • 9. Summary of Privacy Issues (2) • Re-identification – piecing together someone’s identity - has become much easier than before • Information available on the Internet will be found by people for whom it was not intended • Electronic data seems to last forever • Data collected for one purpose will find other uses • The government sometimes requests personal data • We cannot directly protect information about ourselves
  • 10. Terminology • Secondary use - use of personal information for a purpose other than the one it was provided for • Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge • Computer matching - combining and comparing information from different databases (using social security number, for example) to match records • Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in a certain behavior
  • 11. Stolen and Lost Data • Examples: – Spyware: software often downloaded from a web site without user knowledge, collecting user data and activity and sends to remote parties – Business and government lose customer/citizen information due to weak security – Pretexting: pretend to be someone who is legitimate to obtain data. • One should be aware and consciously make decisions; IT professionals should endeavor to develop security systems
  • 12. Principles for Data Collection and Use • Informed consent – informing people how collected information is being used • Opt-in and opt-out policies – people specify an exception to the default condition (either to not use information or use information by default) • Data retention
  • 13. Forms of Informed Consent Two common forms for providing informed consent are opt in and opt out: • opt in – The collector of the information may use information only if person explicitly permits use (usually by checking a box) • opt out – Person must request (usually by checking a box) that an organization not use information • Under an opt in policy, more people are likely to be “out” • Under an opt out policy, more people are likely to be “in”
  • 14. Fair Information Principles (FIP) • Recommendations from privacy experts 1. Inform people when you collection information, what you collect and how you use it 2. Collect only the data needed 3. Offer opt-outs 4. Keep data only as long as needed 5. Maintain accuracy of data 6. Protect security of data 7. Develop policies for law enforcement requests
  • 15. The Fourth Amendment • Part of the US Bill of Rights • “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
  • 16. Key Problems Arise from New Tech. • The US Constitution sets limits on government’s rights to search our homes, businesses, and seize docs and other personal effects. Requires government to provide probable cause. • Much of our information today is no longer located in our homes; it resides in huge databases outside our control • New technologies allow the government to search our homes without entering them and search our persons from a distance without our knowledge
  • 17. New Technologies • Non-invasive but deeply revealing searches – Particle sniffers – Imaging systems – Location trackers • Modern surveillance techniques are redefining expectation of privacy • What restrictions should we place on their use? When should we permit government agencies to use them without a search warrant?
  • 18. Supreme Court Decisions and Expectation of Privacy (1) • Supreme court decisions continue to address impact of new tech on 4th Amendment protection • Olmstead v. United States (1928) – Supreme Court allowed the use of wiretaps on telephone lines without a court order – Interpreted the Fourth Amendment to apply only to physical intrusion and only to the search or seizure of material things, not conversations.
  • 19. Supreme Court Decisions and Expectation of Privacy (2) • Katz v United States (1967) – Supreme Court reversed its position and ruled that the Fourth Amendment does apply to conversations – Court said that the Fourth Amendment protects people, not places. To intrude in a place where reasonable person has a reasonable expectation of privacy requires a court order
  • 20. Supreme Court Decisions and Expectation of Privacy (3) • Kylo v United States (2001) – Supreme Court ruled that police could not use thermal-imaging devices to search a home from the outside without a search warrant. – Court stated that where “government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a ‘search.’”
  • 21. Search and Seizure of Computers and Phones • The 4th Amendment requires that search warrants be specific about object to search • If an officer with a warrant sees evidence of another crime in plain view, the office may seize it • How should we interpret “plain view” for search of computer or smartphone files? • Access by law enforcement agents to all data on a computer device can be a serious threat to privacy, liberty, and free speech
  • 22. Video Surveillance and Face Recognition Security cameras • Low accuracy rate may result in detention of many innocent people • Abuse by the operators • Is the level of surveillance compatible with privacy and a free society? • What trade-offs between privacy and security are we willing to make?