SlideShare a Scribd company logo
1 of 50
Chapter 2:
Privacy
Based on slides prepared by Cyndi Chie,
Sarah Frye and Sharon Gray.
Fifth edition updated by Timothy Henry
 Privacy Risks and Principles
 The Fourth Amendment, Expectation of
Privacy, and Surveillance Technologies
 The Business and Social Sectors
 Government Systems
 Protecting Privacy: Technology, Markets,
Rights, and Laws
 Communications
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Key Aspects of Privacy:
 Freedom from intrusion (being left alone)
 Control of information about oneself
 Freedom from surveillance (from being
tracked, followed, watched)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Privacy threats come in several categories:
 Intentional, institutional uses of personal
information
 Unauthorized use or release by “insiders”
 Theft of information
 Inadvertent leakage of information
 Our own actions
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
New Technology, New Risks:
 Government and private databases
 Sophisticated tools for surveillance and data
analysis
 Vulnerability of data
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
New Technology, New Risks – Examples:
Search query data
 Search engines collect many terabytes of data
daily.
 Data is analyzed to target advertising and
develop new services.
 Who gets to see this data? Why should we
care?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
New Technology, New Risks – Examples:
Smartphones
 Location apps
 Data sometimes stored and sent without
user’s knowledge
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
New Technology, New Risks – Summary of Risks:
 Anything we do in cyberspace is recorded.
 Huge amounts of data are stored.
 People are not aware of collection of data.
 Software is complex.
 Leaks happen.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
New Technology, New Risks – Summary of Risks
(cont.):
 A collection of small items can provide a
detailed picture.
 Re-identification has become much easier due
to the quantity of information and power of
data search and analysis tools.
 If information is on a public Web site, it is
available to everyone.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
New Technology, New Risks – Summary of Risks
(cont.):
 Information on the Internet seems to last forever.
 Data collected for one purpose will find other
uses.
 Government can request sensitive personal data
held by businesses or organizations.
 We cannot directly protect information about
ourselves. We depend upon businesses and
organizations to protect it.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Terminology:
 Personal information – any information
relating to an individual person.
 Informed consent – users being aware of what
information is collected and how it is used.
 Invisible information gathering - collection of
personal information about a user without the
user’s knowledge.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Terminology:
 Cookies – Files a Web site stores on a visitor’s
computer.
 Secondary use – Use of personal information
for a purpose other than the purpose for
which it was provided.
 Data mining – Searching and analyzing
masses of data to find patterns and develop
new information or knowledge.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Terminology:
 Computer matching – Combining and
comparing information from different
databases (using social security number, for
example) to match records.
 Computer profiling – Analyzing data to
determine characteristics of people most
likely to engage in a certain behavior.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Two common forms for providing informed
consent are opt out and opt in:
 opt out – Person must request (usually by
checking a box) that an organization not use
information.
 opt in – The collector of the information may
use information only if person explicitly
permits use (usually by checking a box).
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 Have you seen opt-in and opt-out choices?
Where? How were they worded?
 Were any of them deceptive?
 What are some common elements of privacy
policies you have read?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Fair information principles
1. Inform people when you collect information.
2. Collect only the data needed.
3. Offer a way for people to opt out.
4. Keep data only as long as needed.
5. Maintain accuracy of data.
6. Protect security of data.
7. Develop policies for responding to law
enforcement requests for data.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
The right of the people to be secure in their person, houses,
papers, and effects, against unreasonable searches and
seizures, shall not be violated, and no Warrants shall issue,
but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the
persons or things to be seized.
—4th Amendment, U.S. Constitution
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Sets limits on government’s rights to search our
homes and businesses and seize documents and
other personal effects. Requires government
provide probable cause.
 Two key problems arise from new technologies:
 Much of our personal information is no longer
safe in our homes; it resides in huge databases
outside our control.
 New technologies allow the government to
search our homes without entering them and
search our persons from a distance without our
knowledge.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Make possible “noninvasive but deeply
revealing” searches
 particle sniffers, imaging systems, location
trackers
 What restrictions should we place on their
use? When should we permit government
agencies to use them without a search
warrant?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Olmstead v. United States (1928)
 Supreme Court allowed the use of wiretaps
on telephone lines without a court order.
 Interpreted the Fourth Amendment to apply
only to physical intrusion and only to the
search or seizure of material things, not
conversations.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Katz v United States (1967)
 Supreme Court reversed its position and
ruled that the Fourth Amendment does apply
to conversations.
 Court said that the Fourth Amendment
protects people, not places. To intrude in a
place where reasonable person has a
reasonable expectation of privacy requires a
court order.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Kyllo v United States (2001)
 Supreme Court ruled that police could not use
thermal-imaging devices to search a home
from the outside without a search warrant.
 Court stated that where “government uses a
device that is not in general public use, to
explore details of the home that would
previously have been unknowable without
physical intrusion, the surveillance is a
‘search.’”
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 How should we interpret “plain view” for
search of computer or smartphone files?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Security cameras
 Increased security
 Decreased privacy
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion questions:
 Should organizers at events which are
possible terrorist targets use such systems?
 Should we allow them to screen for people
with unpaid parking tickets?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Data mining
 Targeted ads
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Informed consent
 “Do Not Track” button in browsers
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Paying for consumer information
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 What we do
 Post opinions, gossip, pictures, “away from
home” status
 What they do
 New services with unexpected privacy settings
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 Is there information that you have posted to
the Web that you later removed? Why did you
remove it? Were there consequences to
posting the information?
 Have you seen information that others have
posted about themselves that you would not
reveal about yourself?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Security of online data
 Convenience
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Global Positioning Systems (GPS) – computer
or communication services that know exactly
where a person is at a particular time
 Cell phones and other devices are used for
location tracking
 Pros and cons
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Tools for parents
 GPS tracking via cell phones or RFID
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 The right to have material removed.
 negative right (a liberty)
 positive right (a claim right)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Databases:
 Government Accountability Office (GAO) -
monitors government's privacy policies
 Burden of proof and "fishing expeditions"
 Data mining and computer matching to fight
terrorism
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Public Records: Access vs. Privacy:
 Public Records – records available to general
public (bankruptcy, property, and arrest records,
salaries of government employees, etc.)
 Identity theft can arise when public records are
accessed
 How should we control access to sensitive public
records?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions:
 What data does the government have about
you?
 Who has access to the data?
 How is your data protected?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Social Security Numbers
 Too widely used
 Easy to falsify
 Various new proposals would require
citizenship, employment, health, tax,
financial, or other data, as well as biometric
information. In many proposals, the cards
would also access a variety of databases for
additional information.
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 A new national ID system - Pros
 would require the card
 harder to forge
 have to carry only one card
 A new national ID system - Cons
 Threat to freedom and privacy
 Increased potential for abuse
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Technology and Markets:
 Privacy enhancing-technologies for
consumers
 Encryption
 Public-key cryptography
 Business tools and policies for protecting data
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Government ban on export of strong
encryption software in the 1990s
(removed in 2000)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Warren and Brandeis: The inviolate personality
 Judith Jarvis Thomson: Is there a right to privacy?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Transactions
 Ownership of personal data
 A basic legal framework: Enforcement of
agreements and contracts
 Regulation
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Free Market View
 Freedom of consumers to make voluntary
agreements
 Diversity of individual tastes and values
 Response of the market to consumer
preferences
 Usefulness of contracts
 Flaws of regulatory solutions
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 Consumer Protection View
 Uses of personal information
 Costly and disruptive results of errors in
databases
 Ease with which personal information leaks
out
 Consumers need protection from their own
lack of knowledge, judgment, or interest
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Discussion Questions
 How would the free market view and the
consumer protection view differ on errors in
Credit Bureau databases?
 Who is the consumer in this situation?
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 EU’s rules are more strict than U.S. regulations
 EU Data Privacy Directive
 Prohibits transfer of personal information to
countries outside the EU that do not have an
adequate system of privacy protection.
 “Safe Harbor” plan
 Abuses still occur
 Puts requirements on businesses outside the
EU
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Wiretapping and Email Protection:
 Telephone
 1934 Communications Act prohibited interception of
messages
 1968 Omnibus Crime Control and Safe Streets Act
allowed wiretapping and electronic surveillance by
law-enforcement (with court order)
 Email and other new communications
 Electronic Communications Privacy Act of 1986 (ECPA)
extended the 1968 wiretapping laws to include
electronic communications, restricts government
access to email
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 The Communications Assistance for Law
Enforcement Act (CALEA)
 Passed in 1994
 Requires telecommunications equipment be
designed to ensure that the government can
intercept telephone calls (with a court order
or other authorization).
 Rules and requirements written by Federal
Communications Commission (FCC)
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
 The National Security Agency (NSA)
 Foreign Intelligence Surveillance Act (FISA)
established oversight rules for the NSA
 Secret access to communications records
Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved

More Related Content

Similar to Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics

Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?ANSItunCERT
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CityPeter Waher
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTSyazwaniYa
 
Does Synthetic Data Hold The Secret To Artificial Intelligence?
Does Synthetic Data Hold The Secret To Artificial Intelligence?Does Synthetic Data Hold The Secret To Artificial Intelligence?
Does Synthetic Data Hold The Secret To Artificial Intelligence?Bernard Marr
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science Alexandra Giannopoulou
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersTravis Greene
 
The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical IssuesRichard Austin
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES.eu
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)Faidepro
 

Similar to Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics (20)

Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Review questions
Review questionsReview questions
Review questions
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Chapter2
Chapter2Chapter2
Chapter2
 
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
 
Does Synthetic Data Hold The Secret To Artificial Intelligence?
Does Synthetic Data Hold The Secret To Artificial Intelligence?Does Synthetic Data Hold The Secret To Artificial Intelligence?
Does Synthetic Data Hold The Secret To Artificial Intelligence?
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
To share or not to share? machine generated data for science
To share or not to share? machine generated data for science To share or not to share? machine generated data for science
To share or not to share? machine generated data for science
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
 
The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical Issues
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics

  • 1. Chapter 2: Privacy Based on slides prepared by Cyndi Chie, Sarah Frye and Sharon Gray. Fifth edition updated by Timothy Henry
  • 2.  Privacy Risks and Principles  The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies  The Business and Social Sectors  Government Systems  Protecting Privacy: Technology, Markets, Rights, and Laws  Communications Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 3. Key Aspects of Privacy:  Freedom from intrusion (being left alone)  Control of information about oneself  Freedom from surveillance (from being tracked, followed, watched) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 4. Privacy threats come in several categories:  Intentional, institutional uses of personal information  Unauthorized use or release by “insiders”  Theft of information  Inadvertent leakage of information  Our own actions Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 5. New Technology, New Risks:  Government and private databases  Sophisticated tools for surveillance and data analysis  Vulnerability of data Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 6. New Technology, New Risks – Examples: Search query data  Search engines collect many terabytes of data daily.  Data is analyzed to target advertising and develop new services.  Who gets to see this data? Why should we care? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 7. New Technology, New Risks – Examples: Smartphones  Location apps  Data sometimes stored and sent without user’s knowledge Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 8. New Technology, New Risks – Summary of Risks:  Anything we do in cyberspace is recorded.  Huge amounts of data are stored.  People are not aware of collection of data.  Software is complex.  Leaks happen. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 9. New Technology, New Risks – Summary of Risks (cont.):  A collection of small items can provide a detailed picture.  Re-identification has become much easier due to the quantity of information and power of data search and analysis tools.  If information is on a public Web site, it is available to everyone. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 10. New Technology, New Risks – Summary of Risks (cont.):  Information on the Internet seems to last forever.  Data collected for one purpose will find other uses.  Government can request sensitive personal data held by businesses or organizations.  We cannot directly protect information about ourselves. We depend upon businesses and organizations to protect it. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 11. Terminology:  Personal information – any information relating to an individual person.  Informed consent – users being aware of what information is collected and how it is used.  Invisible information gathering - collection of personal information about a user without the user’s knowledge. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 12. Terminology:  Cookies – Files a Web site stores on a visitor’s computer.  Secondary use – Use of personal information for a purpose other than the purpose for which it was provided.  Data mining – Searching and analyzing masses of data to find patterns and develop new information or knowledge. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 13. Terminology:  Computer matching – Combining and comparing information from different databases (using social security number, for example) to match records.  Computer profiling – Analyzing data to determine characteristics of people most likely to engage in a certain behavior. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 14. Two common forms for providing informed consent are opt out and opt in:  opt out – Person must request (usually by checking a box) that an organization not use information.  opt in – The collector of the information may use information only if person explicitly permits use (usually by checking a box). Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 15. Discussion Questions  Have you seen opt-in and opt-out choices? Where? How were they worded?  Were any of them deceptive?  What are some common elements of privacy policies you have read? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 16. Fair information principles 1. Inform people when you collect information. 2. Collect only the data needed. 3. Offer a way for people to opt out. 4. Keep data only as long as needed. 5. Maintain accuracy of data. 6. Protect security of data. 7. Develop policies for responding to law enforcement requests for data. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 17. The right of the people to be secure in their person, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. —4th Amendment, U.S. Constitution Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 18.  Sets limits on government’s rights to search our homes and businesses and seize documents and other personal effects. Requires government provide probable cause.  Two key problems arise from new technologies:  Much of our personal information is no longer safe in our homes; it resides in huge databases outside our control.  New technologies allow the government to search our homes without entering them and search our persons from a distance without our knowledge. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 19.  Make possible “noninvasive but deeply revealing” searches  particle sniffers, imaging systems, location trackers  What restrictions should we place on their use? When should we permit government agencies to use them without a search warrant? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 20.  Olmstead v. United States (1928)  Supreme Court allowed the use of wiretaps on telephone lines without a court order.  Interpreted the Fourth Amendment to apply only to physical intrusion and only to the search or seizure of material things, not conversations. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 21.  Katz v United States (1967)  Supreme Court reversed its position and ruled that the Fourth Amendment does apply to conversations.  Court said that the Fourth Amendment protects people, not places. To intrude in a place where reasonable person has a reasonable expectation of privacy requires a court order. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 22.  Kyllo v United States (2001)  Supreme Court ruled that police could not use thermal-imaging devices to search a home from the outside without a search warrant.  Court stated that where “government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a ‘search.’” Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 23.  How should we interpret “plain view” for search of computer or smartphone files? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 24.  Security cameras  Increased security  Decreased privacy Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 25. Discussion questions:  Should organizers at events which are possible terrorist targets use such systems?  Should we allow them to screen for people with unpaid parking tickets? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 26.  Data mining  Targeted ads Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 27.  Informed consent  “Do Not Track” button in browsers Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 28.  Paying for consumer information Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 29.  What we do  Post opinions, gossip, pictures, “away from home” status  What they do  New services with unexpected privacy settings Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 30. Discussion Questions  Is there information that you have posted to the Web that you later removed? Why did you remove it? Were there consequences to posting the information?  Have you seen information that others have posted about themselves that you would not reveal about yourself? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 31.  Security of online data  Convenience Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 32.  Global Positioning Systems (GPS) – computer or communication services that know exactly where a person is at a particular time  Cell phones and other devices are used for location tracking  Pros and cons Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 33.  Tools for parents  GPS tracking via cell phones or RFID Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 34.  The right to have material removed.  negative right (a liberty)  positive right (a claim right) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 35. Databases:  Government Accountability Office (GAO) - monitors government's privacy policies  Burden of proof and "fishing expeditions"  Data mining and computer matching to fight terrorism Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 36. Public Records: Access vs. Privacy:  Public Records – records available to general public (bankruptcy, property, and arrest records, salaries of government employees, etc.)  Identity theft can arise when public records are accessed  How should we control access to sensitive public records? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 37. Discussion Questions:  What data does the government have about you?  Who has access to the data?  How is your data protected? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 38.  Social Security Numbers  Too widely used  Easy to falsify  Various new proposals would require citizenship, employment, health, tax, financial, or other data, as well as biometric information. In many proposals, the cards would also access a variety of databases for additional information. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 39.  A new national ID system - Pros  would require the card  harder to forge  have to carry only one card  A new national ID system - Cons  Threat to freedom and privacy  Increased potential for abuse Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 40. Technology and Markets:  Privacy enhancing-technologies for consumers  Encryption  Public-key cryptography  Business tools and policies for protecting data Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 41.  Government ban on export of strong encryption software in the 1990s (removed in 2000) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 42.  Warren and Brandeis: The inviolate personality  Judith Jarvis Thomson: Is there a right to privacy? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 43.  Transactions  Ownership of personal data  A basic legal framework: Enforcement of agreements and contracts  Regulation Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 44.  Free Market View  Freedom of consumers to make voluntary agreements  Diversity of individual tastes and values  Response of the market to consumer preferences  Usefulness of contracts  Flaws of regulatory solutions Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 45.  Consumer Protection View  Uses of personal information  Costly and disruptive results of errors in databases  Ease with which personal information leaks out  Consumers need protection from their own lack of knowledge, judgment, or interest Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 46. Discussion Questions  How would the free market view and the consumer protection view differ on errors in Credit Bureau databases?  Who is the consumer in this situation? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 47.  EU’s rules are more strict than U.S. regulations  EU Data Privacy Directive  Prohibits transfer of personal information to countries outside the EU that do not have an adequate system of privacy protection.  “Safe Harbor” plan  Abuses still occur  Puts requirements on businesses outside the EU Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 48. Wiretapping and Email Protection:  Telephone  1934 Communications Act prohibited interception of messages  1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order)  Email and other new communications  Electronic Communications Privacy Act of 1986 (ECPA) extended the 1968 wiretapping laws to include electronic communications, restricts government access to email Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 49.  The Communications Assistance for Law Enforcement Act (CALEA)  Passed in 1994  Requires telecommunications equipment be designed to ensure that the government can intercept telephone calls (with a court order or other authorization).  Rules and requirements written by Federal Communications Commission (FCC) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
  • 50.  The National Security Agency (NSA)  Foreign Intelligence Surveillance Act (FISA) established oversight rules for the NSA  Secret access to communications records Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved