3. Privacy Development
Concept developed by Cooley (1888), who viewed privacy as
âan absolute protection.â
Warren and Brandeis challenged the right of newspapers to invade domestic
life through âwords and flash photography.â
Brandeisâs theorized that the right of privacy should be left alone, and it was later
developed into law.
4. Privacy Development
In the 20th century, the main concern
was focused on news media disclosing
embarrassing fact, and notions of
respectable behavior in the community
In todayâs day in age, with new
technologies like smartphones, aerial
photography and satellite imagery, it
sparked major concern.
At the same time, this âgovernmental
intrusion by law enforcement,â raised
more questions about the search and
seizure privacy law.
5. ImportantDocumentsonPrivacy
The Electronic Communications
Privacy Act of 1986 - criminalized
interception of computer data.
The PATRIOT Act - passed after
the September 11th Attacks; gave
law enforcement agencies the
right to monitor private personal
data, and share it with other
police powers trying to prevent
future attacks.
Health Insurance Portability and
Accountability Act of 1996 -
Provides the ability to transfer
and continue health insurance
coverage for millions of American
workers and their families when
they change or lose their jobs;
Reduces health care fraud and abuse;
Mandates industry-wide standards for
health care information on
electronic billing and other
processes; and
Requires the protection and
confidential handling of protected
health information
6. The Fourth Amendment
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated, and
no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the
persons or things to be seized.
7. Why is the Fourth Amendment so
Important?
It's one of the first and foremost securities that every American has - and takes for
granted.
The Constitutionally-guaranteed right to feel safe and secure in our homes... without ever
giving a second thought that our government will come bashing in our doors in the
middle of the night.
Many people all over the world actually live in regimes where this is common.
In America - it is part of the foundation of this country that this government will NEVER
have that power.
8. Edward Snowden and the NSA
Edward Snowden: former CIA employee
who copied and leaked classified
information from the National
Security Agency (NSA), revealing
that they were engaged in broad
surveillance of online
communication, including social
media practices.
Publication of this information
from news outlets like the New York
Times and the Washington Post
forced the Obama Administration to
defend its practices.
11. Twitter
One of the most public social
media sites
Users must have a public profile
Anyone may follow a user, but can
also block users for spreading
spam
Twitter limits each tweet up to
140 characters, stating that,
âWhat you say on Twitter may be
viewed all around the world
instantly.â
Twitter users complained that if
they cannot block users, they
would feel unsafe to use it.
In late 2013, Twitter suspended
blocking users, which lead to
mass online protest with
#RestoreTheBlock
Changes to the block feature
would encourage online abuse
and harassment to the service.
12. Twitter broadly collects data, and has a right to use it.
TheTwitterdefaultispublicdata,unlesssomeonedeletesinformation, orlocksdowntheiraccountintheirprivacysettings.
Twitter also tracks your interactions to âhelp improve our service,â and âprovide more
relevant advertising.â
LogData-mayinclude information suchasyourIPaddress,browsertype,operatingsystem(OS)etc.
Twitter users can delete their accounts, but the service holds your data for 30 days
Twitterusersmustbeatleast13yearsofage,andwilldelete dataifitfindsthattheuserisyounger.
13.
14. Like Twitter, Facebook has also received user criticism
over changes to its default privacy settings over the
last couple of years.
Users may not want to share their personal information
outside of their friends list, however some data is
difficult to protect.
Examples: Being tag in photos, or uploading your contact information
Facebook closely tracks user behavior
Examples include looking at another personâs profile, sending and
receiving messages, or using the Facebook mobile app.
15. FacebookSocial media privacy concerns
mainly focus on data that has
commercial value. On Facebook,
their user data is tapped in
many ways:
Location accuracy and GPS to tell
you where there are nearby
friends or events.
Offer deals in which you might be
interested in.
When a user shares information to
the public, data can be used
with third party services and
others off Facebook.
Even though Facebook has access
to your information, you ALWAYS
own all of your information.
They will never share
information they receive about
you unless they have
Received your permission
Given you notice
Removed your name, and any other
personally identifying
information from it.
You can deactivate your account,
16.
17. Tumblr is a microblogging and social networking website founded by David
Karp in 2007. The site allows its users to post multimedia and other content
to a short- form blog. Users can follow other users blogs, as well as make
their blogs private. Much of the website's features are accessed from the
dashboard interface, where the option to post content and posts of followed
blogs appear. As of April 1, 2016 Tumblr has over 287.6 million blogs and
555 million monthly visitors. Yahoo purchased Tumblr in June of 2013
18. Tumblr
âWhen you use the Services, you are consenting
to the collection, transfer, manipulation,
storage, disclosure, and other uses of your
information as described in this Privacy Policy;
please read it carefullyâ
âWe also allow users to look for their friends by e-mail
address; you can, however opt out of this feature
through your Account Settings page, we do not expose
your email address to the public or third parties,
except in the limited circumstances.â
âWhileyouarefreetoremovepublished
publishedpiecesofcontentfromordeleteyour
Account,becauseofthenatureofInternet
Sharing,thestrongpossibilityofReblogging
ofyourcontentbyothers,andtechnological
limitationsinherenttotheServices,copies
ofthatcontentmayexistelsewhereandbe
retainedindefinitely,includinginour
systemsâ
19.
20. Instagram-InformationWeCollect
Information you provide us directly(Username,
Password, Email, Profile Information, Content &
Communication
Finding your Friends on IG (Social Media
Accounts, Device Contacts, Search
Friends
Analytics Info (Measures Traffic & Usage)
Cookies & Similar Technologies (Pixels, Web Beacons,
and Storage to Collect info on how you use IG and
Provide Features to You). [ADVERTISEMENTS]
Log File Info
Device Identifiers (Access Data from your device(s) and store
one or more âdevice identifiersâ)
Metadata (Describes how, when, and by whom a piece of User
Content was collected and how that content is formatted)
21. Instagram
How We Use Your Info- Helps the
user access info after they login.
Remember Login info. Provides
Personalize Content. Improves
Service, Monitor Metrics, Diagnose
or Fix Tech Problems. Automatic
Updates
How We Store your Info- âYour information
collected through the Service may be stored and processed in
the United States or any other country in which Instagram, its
Affiliates or Service Providers maintain facilities.â
This also includes the transfer of Info to
Countries in which you travel.
Your Choices About your Info- Updates of
Account, Subscriptions, Termination of
Account etc.
Childrenâs Policy- Children under the Age
of 13 are not Allowed to use IG
How to Contact us About a Deceased User
How to Contact Us- IG HELP CENTER
Changes to Our Policy- Updates from Time
to Time
22. Sharing of your Info
âWe will not rent or sell your information to third parties
outside Instagram (or the group of companies of which
Instagram is a part) without your consent, except as noted
in this Policy.â
Parties whom we may share your
info- Businesses that are
affiliates with IG, Service
Providers, & Third Party Ad
Networks. Mostly Cookies and Login
Info.
Parties whom you may Share Content-
Any Public Content based on your
Privacy Settings
What Happens in the event of a change of
Control- Your informations will be
giving to the new âHBICâ (lol) however
your content will remain yours.
Responding to legal request and preventing harm-
Your information will be shared. Also when
Fraud may be a concern as well as to prevent
death, body harm, or the violation of the terms
and policy.
23. LinkedIn
âWith your approval, your connections may provide recommendations and endorsements of
youâ
The goal of the site is to allow registered members to establish and document networks of
people they know and trust professionally.
Unlike facebook on LinkedIn you have connections instead of friends
With basic membership, a member can only establish connections with someone he has
worked with, knows professionally (online or offline) or has gone to school with.
24. LinkedIn
Top Priority is Maintaining Trust
We protect your personal information and will only provide it to third parties:
(1) with your consent;
(2) where it is necessary to carry out your instructions;
(3) as reasonably necessary in order to provide LinkedIn features and functionality
to you;
(4) as we reasonably believe is permitted by law or regulation;
(5) as necessary to enforce our User Agreement or protect the rights, property, or
safety of LinkedIn, its Members, and the public.
25.
26. Owned by Twitter
Vine is very open about their
data collection
Receives your information through
mobile apps, email
notifications, websites, and
other interactions.
When using their services, you are
giving consent to the
collection, transfer,
manipulation, disclosure, and
other uses of your information
Vine also collects and stores
contact information by matching
the information you provide
with the contact information of
other Vine users.
They do not retain your address
book information after theses
matches.
27.
28. Snapchat is designed to send âpoint-to-point brief videos
that appear to disappear after being viewed.â
Snapchatâs privacy policies explain that the data is stored
for viewing before messages are even opened.
Most of Snapchatâs infrastructure is hosted on App Engine,
Googleâs cloud computing service.
Most of the data are kept in App Engineâs datastore until
they are deleted.
29. Data Retrieval
Capable of retrieving unopened snaps from the datastore
Does not manually retrieve and look at Snaps under ordinary circumstance.
If Snaps are on their servers, they must comply with the
Electronic Communication Privacy Act (ECPA).
If law enforcement gets involved, they must produce and
hand over unopened snaps to help the investigation.
30.
31. Google+
It integrates all Google services and displays a new Google+ menu bar on other Google services when you're
logged into a Google account.
Circles is just a way of setting up personalized social circles, whether they be centered around work or personal
activities.
Huddle is a group chat for phones. Rather than individually sending SMS messages, Huddle can pool them together
to make a group chat which is still private to outside viewers, unlike Twitter.
Hangouts is just video chat and instant messaging.With Hangout, you can signal availability to some or all of your
circles.
Sparks is a suggestion engine that finds interesting Web items based on your interests. You can pick from
categories of interest and share items you find with others in your stream.
Google says it uses data to âmake those services even betterâ to show you more relevant search results and ads, to
32. Google+
âWe may collect information about the services that you use and how you use them, like when you
visit a website that uses our advertising services or you view and interact with our ads and
contentâ
Collects Location data from Mobile phones and wifi hotspots.
Collects data through cookies
âWewillsharepersonalinformationwithcompanies,organizationsorindividualsoutsideof
Googlewhenwehaveyourconsenttodosoâ
33. Overall Conclusion on Analysis
1.Social media communication
tends to be public, except
where sites allow users to dial
back and opt out of specific
features.
2.Social Media Sites (SMS) track
user data for system
improvement, user direction,
and advertising.
3.Data tend to be retrievable,
and copied, which makes
deleting the content time
consuming.
4. Users need to understand
the implications of privacy
policies, opt out of what is
possible and not use social media
if they desire privacy.
5. User should consider âsite
purpose and contextâ when deciding
to participate.
6. When it comes to privacy,
the rule of thumb is âbuyer
beware.â
35. Big Data and Privacy
Big data definition is not clear, but it is related to predictive analytics, data mining and
trends
For Example:Facebook and Advertising
Over all people continue to give intimate information over social medias for different
reasons which could be self-interested, altruistic, or civil minded reasons.
Allen (2013) believes that assertive consumers do not give social media business and
government a pass on privacy and ethics, but rather create the potential for a stronger
system of safeguards.
36. Germany and Privacy
Leader in online data privacy protection since 1970âs
Avoid ABUSE of personal data which citizens had experienced
under Hitler and saw in the east, before the fall of the
Berlin Wall.
The U.S. NSA PRISM spy Program was not legal in Germanyâs
Terms
The BDN is not allowed to register and store communications
data on a wide scale or randomly tap phone conversations.
37. However the German Government cannot protects people'sâ
privacy from social medias because sites like facebook and
other media sites locate their European operations in
Ireland, who have weaker data privacy laws.
Google and many large companies use their size and power to
ignore concerns.
Suspension of SAFE HARBOR rules that allow sharing of
European Union banking information with companies in the U.S.
38. FTC Regulation
In the U.S., the strongest privacy protections for social media consumers come from
the Federal Trade Commission regulation, and have called upon Congress to create
laws that would address data security measures.
FTC identified 3 critical areas to address
1. Privacy by Design - companies should build in consumersâ privacy protection at every stage in
developing their products
2. Simplified Choice for Businesses and Consumers - companies should give consumers the
option to decide on what information is shared about them,and with whom.
3. Greater Transparency - companies should give details about their collection and use of consumersâ
information, and provide the consumers access to the data collected about them.
39. DiscussionQuestions
1.How have your expectations for personal privacy changed,
if at all, in the age of social media? What are your most
important concerns
2.What do you think can be done to align United States
privacy policies with those in the European Union? What
are the advantages and disadvantages of global policies?
3.What are the significant implications for privacy based
upon use of mobile smartphones and tablets to access
social media sites? Which areas might lead to litigation
or changes in law?