SlideShare a Scribd company logo
1 of 39
Chapter8:BigDataand
Privacy
The Social Cougars: Nick, Stephanie, Martina, Kevin,
and Bennett
Introduction
Privacy Development
Concept developed by Cooley (1888), who viewed privacy as
“an absolute protection.”
Warren and Brandeis challenged the right of newspapers to invade domestic
life through “words and flash photography.”
Brandeis’s theorized that the right of privacy should be left alone, and it was later
developed into law.
Privacy Development
In the 20th century, the main concern
was focused on news media disclosing
embarrassing fact, and notions of
respectable behavior in the community
In today’s day in age, with new
technologies like smartphones, aerial
photography and satellite imagery, it
sparked major concern.
At the same time, this “governmental
intrusion by law enforcement,” raised
more questions about the search and
seizure privacy law.
ImportantDocumentsonPrivacy
The Electronic Communications
Privacy Act of 1986 - criminalized
interception of computer data.
The PATRIOT Act - passed after
the September 11th Attacks; gave
law enforcement agencies the
right to monitor private personal
data, and share it with other
police powers trying to prevent
future attacks.
Health Insurance Portability and
Accountability Act of 1996 -
Provides the ability to transfer
and continue health insurance
coverage for millions of American
workers and their families when
they change or lose their jobs;
Reduces health care fraud and abuse;
Mandates industry-wide standards for
health care information on
electronic billing and other
processes; and
Requires the protection and
confidential handling of protected
health information
The Fourth Amendment
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated, and
no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the
persons or things to be seized.
Why is the Fourth Amendment so
Important?
It's one of the first and foremost securities that every American has - and takes for
granted.
The Constitutionally-guaranteed right to feel safe and secure in our homes... without ever
giving a second thought that our government will come bashing in our doors in the
middle of the night.
Many people all over the world actually live in regimes where this is common.
In America - it is part of the foundation of this country that this government will NEVER
have that power.
Edward Snowden and the NSA
Edward Snowden: former CIA employee
who copied and leaked classified
information from the National
Security Agency (NSA), revealing
that they were engaged in broad
surveillance of online
communication, including social
media practices.
Publication of this information
from news outlets like the New York
Times and the Washington Post
forced the Obama Administration to
defend its practices.
PrivacyPoliciesof
TopSocialMedia
Sites
Twitter
One of the most public social
media sites
Users must have a public profile
Anyone may follow a user, but can
also block users for spreading
spam
Twitter limits each tweet up to
140 characters, stating that,
“What you say on Twitter may be
viewed all around the world
instantly.”
Twitter users complained that if
they cannot block users, they
would feel unsafe to use it.
In late 2013, Twitter suspended
blocking users, which lead to
mass online protest with
#RestoreTheBlock
Changes to the block feature
would encourage online abuse
and harassment to the service.
Twitter broadly collects data, and has a right to use it.
TheTwitterdefaultispublicdata,unlesssomeonedeletesinformation, orlocksdowntheiraccountintheirprivacysettings.
Twitter also tracks your interactions to “help improve our service,” and “provide more
relevant advertising.”
LogData-mayinclude information suchasyourIPaddress,browsertype,operatingsystem(OS)etc.
Twitter users can delete their accounts, but the service holds your data for 30 days
Twitterusersmustbeatleast13yearsofage,andwilldelete dataifitfindsthattheuserisyounger.
Like Twitter, Facebook has also received user criticism
over changes to its default privacy settings over the
last couple of years.
Users may not want to share their personal information
outside of their friends list, however some data is
difficult to protect.
Examples: Being tag in photos, or uploading your contact information
Facebook closely tracks user behavior
Examples include looking at another person’s profile, sending and
receiving messages, or using the Facebook mobile app.
FacebookSocial media privacy concerns
mainly focus on data that has
commercial value. On Facebook,
their user data is tapped in
many ways:
Location accuracy and GPS to tell
you where there are nearby
friends or events.
Offer deals in which you might be
interested in.
When a user shares information to
the public, data can be used
with third party services and
others off Facebook.
Even though Facebook has access
to your information, you ALWAYS
own all of your information.
They will never share
information they receive about
you unless they have
Received your permission
Given you notice
Removed your name, and any other
personally identifying
information from it.
You can deactivate your account,
Tumblr is a microblogging and social networking website founded by David
Karp in 2007. The site allows its users to post multimedia and other content
to a short- form blog. Users can follow other users blogs, as well as make
their blogs private. Much of the website's features are accessed from the
dashboard interface, where the option to post content and posts of followed
blogs appear. As of April 1, 2016 Tumblr has over 287.6 million blogs and
555 million monthly visitors. Yahoo purchased Tumblr in June of 2013
Tumblr
“When you use the Services, you are consenting
to the collection, transfer, manipulation,
storage, disclosure, and other uses of your
information as described in this Privacy Policy;
please read it carefully”
“We also allow users to look for their friends by e-mail
address; you can, however opt out of this feature
through your Account Settings page, we do not expose
your email address to the public or third parties,
except in the limited circumstances.”
“Whileyouarefreetoremovepublished
publishedpiecesofcontentfromordeleteyour
Account,becauseofthenatureofInternet
Sharing,thestrongpossibilityofReblogging
ofyourcontentbyothers,andtechnological
limitationsinherenttotheServices,copies
ofthatcontentmayexistelsewhereandbe
retainedindefinitely,includinginour
systems”
Instagram-InformationWeCollect
Information you provide us directly(Username,
Password, Email, Profile Information, Content &
Communication
Finding your Friends on IG (Social Media
Accounts, Device Contacts, Search
Friends
Analytics Info (Measures Traffic & Usage)
Cookies & Similar Technologies (Pixels, Web Beacons,
and Storage to Collect info on how you use IG and
Provide Features to You). [ADVERTISEMENTS]
Log File Info
Device Identifiers (Access Data from your device(s) and store
one or more “device identifiers”)
Metadata (Describes how, when, and by whom a piece of User
Content was collected and how that content is formatted)
Instagram
How We Use Your Info- Helps the
user access info after they login.
Remember Login info. Provides
Personalize Content. Improves
Service, Monitor Metrics, Diagnose
or Fix Tech Problems. Automatic
Updates
How We Store your Info- “Your information
collected through the Service may be stored and processed in
the United States or any other country in which Instagram, its
Affiliates or Service Providers maintain facilities.”
This also includes the transfer of Info to
Countries in which you travel.
Your Choices About your Info- Updates of
Account, Subscriptions, Termination of
Account etc.
Children’s Policy- Children under the Age
of 13 are not Allowed to use IG
How to Contact us About a Deceased User
How to Contact Us- IG HELP CENTER
Changes to Our Policy- Updates from Time
to Time
Sharing of your Info
“We will not rent or sell your information to third parties
outside Instagram (or the group of companies of which
Instagram is a part) without your consent, except as noted
in this Policy.”
Parties whom we may share your
info- Businesses that are
affiliates with IG, Service
Providers, & Third Party Ad
Networks. Mostly Cookies and Login
Info.
Parties whom you may Share Content-
Any Public Content based on your
Privacy Settings
What Happens in the event of a change of
Control- Your informations will be
giving to the new “HBIC” (lol) however
your content will remain yours.
Responding to legal request and preventing harm-
Your information will be shared. Also when
Fraud may be a concern as well as to prevent
death, body harm, or the violation of the terms
and policy.
LinkedIn
“With your approval, your connections may provide recommendations and endorsements of
you”
The goal of the site is to allow registered members to establish and document networks of
people they know and trust professionally.
Unlike facebook on LinkedIn you have connections instead of friends
With basic membership, a member can only establish connections with someone he has
worked with, knows professionally (online or offline) or has gone to school with.
LinkedIn
Top Priority is Maintaining Trust
We protect your personal information and will only provide it to third parties:
(1) with your consent;
(2) where it is necessary to carry out your instructions;
(3) as reasonably necessary in order to provide LinkedIn features and functionality
to you;
(4) as we reasonably believe is permitted by law or regulation;
(5) as necessary to enforce our User Agreement or protect the rights, property, or
safety of LinkedIn, its Members, and the public.
Owned by Twitter
Vine is very open about their
data collection
Receives your information through
mobile apps, email
notifications, websites, and
other interactions.
When using their services, you are
giving consent to the
collection, transfer,
manipulation, disclosure, and
other uses of your information
Vine also collects and stores
contact information by matching
the information you provide
with the contact information of
other Vine users.
They do not retain your address
book information after theses
matches.
Snapchat is designed to send “point-to-point brief videos
that appear to disappear after being viewed.”
Snapchat’s privacy policies explain that the data is stored
for viewing before messages are even opened.
Most of Snapchat’s infrastructure is hosted on App Engine,
Google’s cloud computing service.
Most of the data are kept in App Engine’s datastore until
they are deleted.
Data Retrieval
Capable of retrieving unopened snaps from the datastore
Does not manually retrieve and look at Snaps under ordinary circumstance.
If Snaps are on their servers, they must comply with the
Electronic Communication Privacy Act (ECPA).
If law enforcement gets involved, they must produce and
hand over unopened snaps to help the investigation.
Google+
It integrates all Google services and displays a new Google+ menu bar on other Google services when you're
logged into a Google account.
Circles is just a way of setting up personalized social circles, whether they be centered around work or personal
activities.
Huddle is a group chat for phones. Rather than individually sending SMS messages, Huddle can pool them together
to make a group chat which is still private to outside viewers, unlike Twitter.
Hangouts is just video chat and instant messaging.With Hangout, you can signal availability to some or all of your
circles.
Sparks is a suggestion engine that finds interesting Web items based on your interests. You can pick from
categories of interest and share items you find with others in your stream.
Google says it uses data to “make those services even better— to show you more relevant search results and ads, to
Google+
“We may collect information about the services that you use and how you use them, like when you
visit a website that uses our advertising services or you view and interact with our ads and
content”
Collects Location data from Mobile phones and wifi hotspots.
Collects data through cookies
“Wewillsharepersonalinformationwithcompanies,organizationsorindividualsoutsideof
Googlewhenwehaveyourconsenttodoso”
Overall Conclusion on Analysis
1.Social media communication
tends to be public, except
where sites allow users to dial
back and opt out of specific
features.
2.Social Media Sites (SMS) track
user data for system
improvement, user direction,
and advertising.
3.Data tend to be retrievable,
and copied, which makes
deleting the content time
consuming.
4. Users need to understand
the implications of privacy
policies, opt out of what is
possible and not use social media
if they desire privacy.
5. User should consider “site
purpose and context” when deciding
to participate.
6. When it comes to privacy,
the rule of thumb is “buyer
beware.”
Activity
http://www.buzzfeed.com/farrahnicole/we-know-what-your-
social-media-habits-say-about-yo-14ow5#.roWvB78eq
Big Data and Privacy
Big data definition is not clear, but it is related to predictive analytics, data mining and
trends
For Example:Facebook and Advertising
Over all people continue to give intimate information over social medias for different
reasons which could be self-interested, altruistic, or civil minded reasons.
Allen (2013) believes that assertive consumers do not give social media business and
government a pass on privacy and ethics, but rather create the potential for a stronger
system of safeguards.
Germany and Privacy
Leader in online data privacy protection since 1970’s
Avoid ABUSE of personal data which citizens had experienced
under Hitler and saw in the east, before the fall of the
Berlin Wall.
The U.S. NSA PRISM spy Program was not legal in Germany’s
Terms
The BDN is not allowed to register and store communications
data on a wide scale or randomly tap phone conversations.
However the German Government cannot protects people's’
privacy from social medias because sites like facebook and
other media sites locate their European operations in
Ireland, who have weaker data privacy laws.
Google and many large companies use their size and power to
ignore concerns.
Suspension of SAFE HARBOR rules that allow sharing of
European Union banking information with companies in the U.S.
FTC Regulation
In the U.S., the strongest privacy protections for social media consumers come from
the Federal Trade Commission regulation, and have called upon Congress to create
laws that would address data security measures.
FTC identified 3 critical areas to address
1. Privacy by Design - companies should build in consumers’ privacy protection at every stage in
developing their products
2. Simplified Choice for Businesses and Consumers - companies should give consumers the
option to decide on what information is shared about them,and with whom.
3. Greater Transparency - companies should give details about their collection and use of consumers’
information, and provide the consumers access to the data collected about them.
DiscussionQuestions
1.How have your expectations for personal privacy changed,
if at all, in the age of social media? What are your most
important concerns
2.What do you think can be done to align United States
privacy policies with those in the European Union? What
are the advantages and disadvantages of global policies?
3.What are the significant implications for privacy based
upon use of mobile smartphones and tablets to access
social media sites? Which areas might lead to litigation
or changes in law?

More Related Content

What's hot

What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
Phil Cryer
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
Digital-identity
 

What's hot (20)

Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
DOI Social Media Guidebook
DOI Social Media GuidebookDOI Social Media Guidebook
DOI Social Media Guidebook
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Social media and intellectual property
Social media and intellectual propertySocial media and intellectual property
Social media and intellectual property
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Ifa fbn july 2014 social media and franchising legal aspects
Ifa fbn july 2014 social media and franchising   legal aspectsIfa fbn july 2014 social media and franchising   legal aspects
Ifa fbn july 2014 social media and franchising legal aspects
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy
 

Similar to Chapter 8 Big Data and Privacy

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
STO STRATEGY
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
STO STRATEGY
 

Similar to Chapter 8 Big Data and Privacy (20)

Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy Primer
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
pragatimahajan3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Chapter 8 Big Data and Privacy

  • 1. Chapter8:BigDataand Privacy The Social Cougars: Nick, Stephanie, Martina, Kevin, and Bennett
  • 3. Privacy Development Concept developed by Cooley (1888), who viewed privacy as “an absolute protection.” Warren and Brandeis challenged the right of newspapers to invade domestic life through “words and flash photography.” Brandeis’s theorized that the right of privacy should be left alone, and it was later developed into law.
  • 4. Privacy Development In the 20th century, the main concern was focused on news media disclosing embarrassing fact, and notions of respectable behavior in the community In today’s day in age, with new technologies like smartphones, aerial photography and satellite imagery, it sparked major concern. At the same time, this “governmental intrusion by law enforcement,” raised more questions about the search and seizure privacy law.
  • 5. ImportantDocumentsonPrivacy The Electronic Communications Privacy Act of 1986 - criminalized interception of computer data. The PATRIOT Act - passed after the September 11th Attacks; gave law enforcement agencies the right to monitor private personal data, and share it with other police powers trying to prevent future attacks. Health Insurance Portability and Accountability Act of 1996 - Provides the ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose their jobs; Reduces health care fraud and abuse; Mandates industry-wide standards for health care information on electronic billing and other processes; and Requires the protection and confidential handling of protected health information
  • 6. The Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
  • 7. Why is the Fourth Amendment so Important? It's one of the first and foremost securities that every American has - and takes for granted. The Constitutionally-guaranteed right to feel safe and secure in our homes... without ever giving a second thought that our government will come bashing in our doors in the middle of the night. Many people all over the world actually live in regimes where this is common. In America - it is part of the foundation of this country that this government will NEVER have that power.
  • 8. Edward Snowden and the NSA Edward Snowden: former CIA employee who copied and leaked classified information from the National Security Agency (NSA), revealing that they were engaged in broad surveillance of online communication, including social media practices. Publication of this information from news outlets like the New York Times and the Washington Post forced the Obama Administration to defend its practices.
  • 10.
  • 11. Twitter One of the most public social media sites Users must have a public profile Anyone may follow a user, but can also block users for spreading spam Twitter limits each tweet up to 140 characters, stating that, “What you say on Twitter may be viewed all around the world instantly.” Twitter users complained that if they cannot block users, they would feel unsafe to use it. In late 2013, Twitter suspended blocking users, which lead to mass online protest with #RestoreTheBlock Changes to the block feature would encourage online abuse and harassment to the service.
  • 12. Twitter broadly collects data, and has a right to use it. TheTwitterdefaultispublicdata,unlesssomeonedeletesinformation, orlocksdowntheiraccountintheirprivacysettings. Twitter also tracks your interactions to “help improve our service,” and “provide more relevant advertising.” LogData-mayinclude information suchasyourIPaddress,browsertype,operatingsystem(OS)etc. Twitter users can delete their accounts, but the service holds your data for 30 days Twitterusersmustbeatleast13yearsofage,andwilldelete dataifitfindsthattheuserisyounger.
  • 13.
  • 14. Like Twitter, Facebook has also received user criticism over changes to its default privacy settings over the last couple of years. Users may not want to share their personal information outside of their friends list, however some data is difficult to protect. Examples: Being tag in photos, or uploading your contact information Facebook closely tracks user behavior Examples include looking at another person’s profile, sending and receiving messages, or using the Facebook mobile app.
  • 15. FacebookSocial media privacy concerns mainly focus on data that has commercial value. On Facebook, their user data is tapped in many ways: Location accuracy and GPS to tell you where there are nearby friends or events. Offer deals in which you might be interested in. When a user shares information to the public, data can be used with third party services and others off Facebook. Even though Facebook has access to your information, you ALWAYS own all of your information. They will never share information they receive about you unless they have Received your permission Given you notice Removed your name, and any other personally identifying information from it. You can deactivate your account,
  • 16.
  • 17. Tumblr is a microblogging and social networking website founded by David Karp in 2007. The site allows its users to post multimedia and other content to a short- form blog. Users can follow other users blogs, as well as make their blogs private. Much of the website's features are accessed from the dashboard interface, where the option to post content and posts of followed blogs appear. As of April 1, 2016 Tumblr has over 287.6 million blogs and 555 million monthly visitors. Yahoo purchased Tumblr in June of 2013
  • 18. Tumblr “When you use the Services, you are consenting to the collection, transfer, manipulation, storage, disclosure, and other uses of your information as described in this Privacy Policy; please read it carefully” “We also allow users to look for their friends by e-mail address; you can, however opt out of this feature through your Account Settings page, we do not expose your email address to the public or third parties, except in the limited circumstances.” “Whileyouarefreetoremovepublished publishedpiecesofcontentfromordeleteyour Account,becauseofthenatureofInternet Sharing,thestrongpossibilityofReblogging ofyourcontentbyothers,andtechnological limitationsinherenttotheServices,copies ofthatcontentmayexistelsewhereandbe retainedindefinitely,includinginour systems”
  • 19.
  • 20. Instagram-InformationWeCollect Information you provide us directly(Username, Password, Email, Profile Information, Content & Communication Finding your Friends on IG (Social Media Accounts, Device Contacts, Search Friends Analytics Info (Measures Traffic & Usage) Cookies & Similar Technologies (Pixels, Web Beacons, and Storage to Collect info on how you use IG and Provide Features to You). [ADVERTISEMENTS] Log File Info Device Identifiers (Access Data from your device(s) and store one or more “device identifiers”) Metadata (Describes how, when, and by whom a piece of User Content was collected and how that content is formatted)
  • 21. Instagram How We Use Your Info- Helps the user access info after they login. Remember Login info. Provides Personalize Content. Improves Service, Monitor Metrics, Diagnose or Fix Tech Problems. Automatic Updates How We Store your Info- “Your information collected through the Service may be stored and processed in the United States or any other country in which Instagram, its Affiliates or Service Providers maintain facilities.” This also includes the transfer of Info to Countries in which you travel. Your Choices About your Info- Updates of Account, Subscriptions, Termination of Account etc. Children’s Policy- Children under the Age of 13 are not Allowed to use IG How to Contact us About a Deceased User How to Contact Us- IG HELP CENTER Changes to Our Policy- Updates from Time to Time
  • 22. Sharing of your Info “We will not rent or sell your information to third parties outside Instagram (or the group of companies of which Instagram is a part) without your consent, except as noted in this Policy.” Parties whom we may share your info- Businesses that are affiliates with IG, Service Providers, & Third Party Ad Networks. Mostly Cookies and Login Info. Parties whom you may Share Content- Any Public Content based on your Privacy Settings What Happens in the event of a change of Control- Your informations will be giving to the new “HBIC” (lol) however your content will remain yours. Responding to legal request and preventing harm- Your information will be shared. Also when Fraud may be a concern as well as to prevent death, body harm, or the violation of the terms and policy.
  • 23. LinkedIn “With your approval, your connections may provide recommendations and endorsements of you” The goal of the site is to allow registered members to establish and document networks of people they know and trust professionally. Unlike facebook on LinkedIn you have connections instead of friends With basic membership, a member can only establish connections with someone he has worked with, knows professionally (online or offline) or has gone to school with.
  • 24. LinkedIn Top Priority is Maintaining Trust We protect your personal information and will only provide it to third parties: (1) with your consent; (2) where it is necessary to carry out your instructions; (3) as reasonably necessary in order to provide LinkedIn features and functionality to you; (4) as we reasonably believe is permitted by law or regulation; (5) as necessary to enforce our User Agreement or protect the rights, property, or safety of LinkedIn, its Members, and the public.
  • 25.
  • 26. Owned by Twitter Vine is very open about their data collection Receives your information through mobile apps, email notifications, websites, and other interactions. When using their services, you are giving consent to the collection, transfer, manipulation, disclosure, and other uses of your information Vine also collects and stores contact information by matching the information you provide with the contact information of other Vine users. They do not retain your address book information after theses matches.
  • 27.
  • 28. Snapchat is designed to send “point-to-point brief videos that appear to disappear after being viewed.” Snapchat’s privacy policies explain that the data is stored for viewing before messages are even opened. Most of Snapchat’s infrastructure is hosted on App Engine, Google’s cloud computing service. Most of the data are kept in App Engine’s datastore until they are deleted.
  • 29. Data Retrieval Capable of retrieving unopened snaps from the datastore Does not manually retrieve and look at Snaps under ordinary circumstance. If Snaps are on their servers, they must comply with the Electronic Communication Privacy Act (ECPA). If law enforcement gets involved, they must produce and hand over unopened snaps to help the investigation.
  • 30.
  • 31. Google+ It integrates all Google services and displays a new Google+ menu bar on other Google services when you're logged into a Google account. Circles is just a way of setting up personalized social circles, whether they be centered around work or personal activities. Huddle is a group chat for phones. Rather than individually sending SMS messages, Huddle can pool them together to make a group chat which is still private to outside viewers, unlike Twitter. Hangouts is just video chat and instant messaging.With Hangout, you can signal availability to some or all of your circles. Sparks is a suggestion engine that finds interesting Web items based on your interests. You can pick from categories of interest and share items you find with others in your stream. Google says it uses data to “make those services even better— to show you more relevant search results and ads, to
  • 32. Google+ “We may collect information about the services that you use and how you use them, like when you visit a website that uses our advertising services or you view and interact with our ads and content” Collects Location data from Mobile phones and wifi hotspots. Collects data through cookies “Wewillsharepersonalinformationwithcompanies,organizationsorindividualsoutsideof Googlewhenwehaveyourconsenttodoso”
  • 33. Overall Conclusion on Analysis 1.Social media communication tends to be public, except where sites allow users to dial back and opt out of specific features. 2.Social Media Sites (SMS) track user data for system improvement, user direction, and advertising. 3.Data tend to be retrievable, and copied, which makes deleting the content time consuming. 4. Users need to understand the implications of privacy policies, opt out of what is possible and not use social media if they desire privacy. 5. User should consider “site purpose and context” when deciding to participate. 6. When it comes to privacy, the rule of thumb is “buyer beware.”
  • 35. Big Data and Privacy Big data definition is not clear, but it is related to predictive analytics, data mining and trends For Example:Facebook and Advertising Over all people continue to give intimate information over social medias for different reasons which could be self-interested, altruistic, or civil minded reasons. Allen (2013) believes that assertive consumers do not give social media business and government a pass on privacy and ethics, but rather create the potential for a stronger system of safeguards.
  • 36. Germany and Privacy Leader in online data privacy protection since 1970’s Avoid ABUSE of personal data which citizens had experienced under Hitler and saw in the east, before the fall of the Berlin Wall. The U.S. NSA PRISM spy Program was not legal in Germany’s Terms The BDN is not allowed to register and store communications data on a wide scale or randomly tap phone conversations.
  • 37. However the German Government cannot protects people's’ privacy from social medias because sites like facebook and other media sites locate their European operations in Ireland, who have weaker data privacy laws. Google and many large companies use their size and power to ignore concerns. Suspension of SAFE HARBOR rules that allow sharing of European Union banking information with companies in the U.S.
  • 38. FTC Regulation In the U.S., the strongest privacy protections for social media consumers come from the Federal Trade Commission regulation, and have called upon Congress to create laws that would address data security measures. FTC identified 3 critical areas to address 1. Privacy by Design - companies should build in consumers’ privacy protection at every stage in developing their products 2. Simplified Choice for Businesses and Consumers - companies should give consumers the option to decide on what information is shared about them,and with whom. 3. Greater Transparency - companies should give details about their collection and use of consumers’ information, and provide the consumers access to the data collected about them.
  • 39. DiscussionQuestions 1.How have your expectations for personal privacy changed, if at all, in the age of social media? What are your most important concerns 2.What do you think can be done to align United States privacy policies with those in the European Union? What are the advantages and disadvantages of global policies? 3.What are the significant implications for privacy based upon use of mobile smartphones and tablets to access social media sites? Which areas might lead to litigation or changes in law?