SlideShare a Scribd company logo
INFORMATION PRIVACY
INFORMATION TECHNOLOGY ERODES PRIVACY
• COLLECTION, EXCHANGE, COMBINATION, AND DISTRIBUTION
OF INFORMATION EASIER THAN EVER, LESSENS PRIVACY
• “YOU HAVE ZERO PRIVACY ANYWAY. GET OVER IT.”
• WE WILL CONSIDER HOW WE LEAVE AN “ELECTRONIC TRAIL” OF INFORMATION BEHIND US AND
WHAT OTHERS CAN DO WITH THIS INFO
DEFINING PRIVACY
• PRIVACY RELATED TO NOTION OF ACCESS
• ACCESS
• PHYSICAL PROXIMITY TO A PERSON
• KNOWLEDGE ABOUT A PERSON
• PRIVACY IS A “ZONE OF INACCESSIBILITY”
• PRIVACY VIOLATIONS ARE AN AFFRONT TO HUMAN DIGNITY
• TOO MUCH INDIVIDUAL PRIVACY CAN HARM SOCIETY
• WHERE TO DRAW THE LINE?
• HARMS OF PRIVACY
• COVER FOR ILLEGAL OR IMMORAL ACTIVITIES
• IGNORED PEOPLE ON SOCIETY’S FRINGES
• BENEFITS OF PRIVACY
• FREEDOM TO BE YOURSELF
• DEVELOPMENT OF LOVING, TRUSTING, CARING, INTIMATE RELATIONSHIPS
• QUESTION: IS THERE AN NATURAL RIGHT TO PRIVACY?
QUESTION: DO PEOPLE HAVE THE RIGHT TO BE
LEFT ALONE?
PRIVACY AND TRUST
• PERHAPS MODERN LIFE IS ACTUALLY MORE PRIVATE THAN
LIFE CENTURIES AGO
• MOST PEOPLE DON’T LIVE WITH EXTENDED FAMILIES
• AUTOMOBILE ALLOWS US TO TRAVEL ALONE
• TELEVISION V. PUBLIC ENTERTAINMENT
• CHALLENGE: WE NOW LIVE AMONG STRANGERS
• REMEDY: ESTABLISHING REPUTATIONS
• ORDEAL, SUCH AS LIE DETECTOR TEST OR DRUG TEST
• CREDENTIAL, SUCH AS DRIVER’S LICENSE, KEY, ID CARD, COLLEGE DEGREE
• ESTABLISHING REPUTATION IS DONE AT THE COST OF
REDUCING PRIVACY
CASE STUDY: NEW PARENTS
• SULLIVANS HAVE A BABY GIRL
• BOTH WORK; THEY ARE CONCERNED ABOUT PERFORMANCE OF FULL-TIME NANNY
• PURCHASE PROGRAM THAT ALLOWS MONITORING THROUGH LAPTOP’S CAMERA PLACED IN
FAMILY ROOM
• THEY DO NOT INFORM NANNY SHE IS BEING MONITORED
DISCLOSING INFORMATION
• PUBLIC RECORD: INFORMATION ABOUT AN INCIDENT OR ACTION REPORTED TO A GOVERNMENT
AGENCY FOR PURPOSE OF INFORMING THE PUBLIC
• EXAMPLES: BIRTH CERTIFICATES, MARRIAGE LICENSES, MOTOR VEHICLE RECORDS, CRIMINAL RECORDS,
DEEDS TO PROPERTY
• PRIVATE RECORDS
• EXAMPLES: CREDIT CARD PURCHASES, PURCHASES MADE WITH LOYALTY CARDS, VOLUNTARY
DISCLOSURES, POSTS TO SOCIAL NETWORK SITES
DATA GATHERING AND PRIVACY IMPLICATIONS
• FACEBOOK TAGS
• FACEBOOK ALLOWS USERS TO TAG PEOPLE WHO ARE ON THEIR LIST OF FRIENDS
• ABOUT 100 MILLION TAGS ADDED PER DAY IN FACEBOOK
• FACEBOOK USES FACIAL RECOGNITION TO SUGGEST NAME OF FRIEND APPEARING IN
PHOTO
• DOES THIS FEATURE INCREASE RISK OF IMPROPER TAGGING?
• ENHANCED 911 SERVICES
• CELL PHONE PROVIDERS IN UNITED STATES REQUIRED TO TRACK LOCATIONS OF
ACTIVE CELL PHONES TO WITHIN 100 METERS
• ALLOWS EMERGENCY RESPONSE TEAMS TO REACH PEOPLE IN DISTRESS
• WHAT IF THIS INFORMATION IS SOLD OR SHARED?
• REWARDS OR LOYALTY PROGRAMS
• SHOPPERS WHO BELONG TO STORE’S REWARDS PROGRAM CAN SAVE
MONEY ON MANY OF THEIR PURCHASES
• COMPUTERS USE INFORMATION ABOUT BUYING HABITS TO PROVIDE
PERSONALIZED SERVICE
• SHOPRITE COMPUTERIZED SHOPPING CARTS WITH POP-UP ADS
• DO CARD USERS PAY LESS, OR DO NON-USERS GET OVERCHARGED?
• RFID TAGS
• RFID: RADIO FREQUENCY IDENTIFICATION
• AN RFID TAG IS A TINY WIRELESS TRANSMITTER
• MANUFACTURERS ARE REPLACING BAR CODES WITH RFID TAGS
• CONTAIN MORE INFORMATION
• CAN BE SCANNED MORE EASILY
• IF TAG CANNOT BE REMOVED OR DISABLED, IT BECOMES A TRACKING DEVICE
• PUBLIC RECORDING DEVICES
• PUBLIC CAMERAS IN CITIES
• POLICE BODY CAMS
• COOKIES
• COOKIE: FILE PLACED ON COMPUTER’S HARD DRIVE BY A WEB SERVER
• CONTAINS INFORMATION ABOUT VISITS TO A WEB SITE
• ALLOWS WEB SITES TO PROVIDE PERSONALIZED SERVICES
• PUT ON HARD DRIVE WITHOUT USER’S PERMISSION
• YOU CAN SET WEB BROWSER TO ALERT YOU TO NEW COOKIES OR TO BLOCK COOKIES
ENTIRELY
CREDIT REPORTS
• EXAMPLE OF HOW INFORMATION ABOUT CUSTOMERS CAN ITSELF BECOME A
COMMODITY
• CREDIT BUREAUS
• KEEP TRACK OF AN INDIVIDUAL’S ASSETS, DEBTS, AND HISTORY OF PAYING BILLS AND
REPAYING LOANS
• SELL CREDIT REPORTS TO BANKS, CREDIT CARD COMPANIES, AND OTHER POTENTIAL LENDERS
• SYSTEM GIVES YOU MORE CHOICES IN WHERE TO BORROW MONEY
• POOR CREDIT CAN HURT EMPLOYMENT PROSPECTS
• QUESTION: HOW IS THIS DIFFERENT FROM ANY COMPANY SELLING/USING YOUR
INFORMATION?
INSTAGRAM’S PROPOSED CHANGE TO TERMS OF
SERVICE
• LATE 2012: INSTAGRAM ANNOUNCED CHANGES
• PRIVACY POLICY
• TERMS OF SERVICE
• LEGAL EXPERTS: INSTAGRAM AND FACEBOOK WOULD HAVE
RIGHT TO USE PHOTOS IN ADS WITHOUT PERMISSION
• INSTAGRAM CEO: NEW POLICY MISUNDERSTOOD
• CHANGED ADVERTISING SECTION OF TERMS OF SERVICE
AGREEMENT BACK TO ORIGINAL VERSION
DATA MINING
• SEARCHING RECORDS IN ONE OR MORE DATABASES, LOOKING FOR PATTERNS OR RELATIONSHIPS
• CAN BE USED TO CREATE PROFILES OF INDIVIDUALS
• ALLOWS COMPANIES TO BUILD MORE PERSONAL RELATIONSHIPS WITH CUSTOMERS
• EXAMPLES: AMAZON, NETFLIX
• QUESTION: WHO OWNS THE DATA?
DATA MINING EXAMPLES
• LOTUS DEVELOPMENT CORPORATION DEVELOPED CD WITH INFORMATION ON 120 MILLION
AMERICANS
• PLANNED TO SELL CD TO TARGETED SMALL BUSINESSES THAT WANTED TO CREATE MAILING LISTS
BASED ON VARIOUS CRITERIA, SUCH AS HOUSEHOLD INCOME
• DUE TO 30,000 COMPLAINTS ABOUT PRIVACY LOTUS DROPPED PLANS TO SELL CD
• IN 2011 TWO MALLS RECORDED MOVEMENT OF SHOPPERS BY TRACKING LOCATIONS OF CELL
PHONES
• HOW MUCH TIME PEOPLE SPEND IN EACH STORE?
• DO PEOPLE WHO SHOP AT X ALSO SHOP AT Y?
• ARE THERE UNPOPULAR AREAS OF MALL?
• SMALL SIGNS INFORMED SHOPPERS OF STUDY
• AFTER PROTEST, MALL QUICKLY HALTED STUDY

More Related Content

What's hot

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
Thoughtworks
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
Privacy
PrivacyPrivacy
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
Yäsh Chaudhary
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 

What's hot (20)

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Information security
Information securityInformation security
Information security
 
Data protection
Data protectionData protection
Data protection
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Privacy
PrivacyPrivacy
Privacy
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 

Similar to Information Privacy

Security Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptxSecurity Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptx
Anshika865276
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
Class_5_Data_2018W_pptx.pptx
Class_5_Data_2018W_pptx.pptxClass_5_Data_2018W_pptx.pptx
Class_5_Data_2018W_pptx.pptx
ccaskumba
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
Swaleh Ahmed
 
Presentation for ethics
Presentation for ethicsPresentation for ethics
Presentation for ethics
Saadalshahrani19
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
Code Computerlove
 
Topic 5 understanding privacy
Topic 5 understanding privacyTopic 5 understanding privacy
Topic 5 understanding privacyHamid Zainudin
 
Social business digital business social media customer service
Social business   digital business social media customer serviceSocial business   digital business social media customer service
Social business digital business social media customer service
Robert Sullivan
 
Social business digital business customer service care
Social business   digital business customer service careSocial business   digital business customer service care
Social business digital business customer service care
Robert Sullivan
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
Tara Aaron
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
StampedeCon
 
With Much Grace Inc
With Much Grace IncWith Much Grace Inc
With Much Grace Inc
GraceNeal1
 
Social Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller CoasterSocial Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller Coaster
debmourey
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education Course
Scott Diehl
 
Promotions on Social Media. Cobalt LLP
Promotions on Social Media.  Cobalt LLPPromotions on Social Media.  Cobalt LLP
Promotions on Social Media. Cobalt LLP
Tsan Abrahamson
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Quarles & Brady
 

Similar to Information Privacy (20)

Security Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptxSecurity Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptx
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Class_5_Data_2018W_pptx.pptx
Class_5_Data_2018W_pptx.pptxClass_5_Data_2018W_pptx.pptx
Class_5_Data_2018W_pptx.pptx
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Presentation for ethics
Presentation for ethicsPresentation for ethics
Presentation for ethics
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 
PowerPoint
PowerPointPowerPoint
PowerPoint
 
Topic 5 understanding privacy
Topic 5 understanding privacyTopic 5 understanding privacy
Topic 5 understanding privacy
 
Social business digital business social media customer service
Social business   digital business social media customer serviceSocial business   digital business social media customer service
Social business digital business social media customer service
 
Social business digital business customer service care
Social business   digital business customer service careSocial business   digital business customer service care
Social business digital business customer service care
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
With Much Grace Inc
With Much Grace IncWith Much Grace Inc
With Much Grace Inc
 
Social Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller CoasterSocial Media and HR Riding the Roller Coaster
Social Media and HR Riding the Roller Coaster
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education Course
 
Promotions on Social Media. Cobalt LLP
Promotions on Social Media.  Cobalt LLPPromotions on Social Media.  Cobalt LLP
Promotions on Social Media. Cobalt LLP
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...
 

More from primeteacher32

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
primeteacher32
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
primeteacher32
 
Returning Data
Returning DataReturning Data
Returning Data
primeteacher32
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
primeteacher32
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
primeteacher32
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
primeteacher32
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
primeteacher32
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
primeteacher32
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
primeteacher32
 
Input Validation
Input ValidationInput Validation
Input Validation
primeteacher32
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
primeteacher32
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
primeteacher32
 
Conditionals
ConditionalsConditionals
Conditionals
primeteacher32
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
primeteacher32
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
primeteacher32
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
primeteacher32
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
primeteacher32
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
primeteacher32
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
primeteacher32
 
Block chain security
Block chain securityBlock chain security
Block chain security
primeteacher32
 

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
taexnic
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
ssuser3e63fc
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
Manu Mitra
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
Manu Mitra
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
GokulnathMbbs
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
AlinaseFaith
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
Manu Mitra
 
Chapters 3 Contracts.pptx Chapters 3 Contracts.pptx
Chapters 3  Contracts.pptx Chapters 3  Contracts.pptxChapters 3  Contracts.pptx Chapters 3  Contracts.pptx
Chapters 3 Contracts.pptx Chapters 3 Contracts.pptx
Sheldon Byron
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
Dr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdf
Dr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdfDr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdf
Dr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdf
Dr. Nazrul Islam
 

Recently uploaded (20)

Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
Chapters 3 Contracts.pptx Chapters 3 Contracts.pptx
Chapters 3  Contracts.pptx Chapters 3  Contracts.pptxChapters 3  Contracts.pptx Chapters 3  Contracts.pptx
Chapters 3 Contracts.pptx Chapters 3 Contracts.pptx
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
Dr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdf
Dr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdfDr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdf
Dr. Nazrul Islam, Northern University Bangladesh - CV (29.5.2024).pdf
 

Information Privacy

  • 2. INFORMATION TECHNOLOGY ERODES PRIVACY • COLLECTION, EXCHANGE, COMBINATION, AND DISTRIBUTION OF INFORMATION EASIER THAN EVER, LESSENS PRIVACY • “YOU HAVE ZERO PRIVACY ANYWAY. GET OVER IT.” • WE WILL CONSIDER HOW WE LEAVE AN “ELECTRONIC TRAIL” OF INFORMATION BEHIND US AND WHAT OTHERS CAN DO WITH THIS INFO
  • 3. DEFINING PRIVACY • PRIVACY RELATED TO NOTION OF ACCESS • ACCESS • PHYSICAL PROXIMITY TO A PERSON • KNOWLEDGE ABOUT A PERSON • PRIVACY IS A “ZONE OF INACCESSIBILITY” • PRIVACY VIOLATIONS ARE AN AFFRONT TO HUMAN DIGNITY • TOO MUCH INDIVIDUAL PRIVACY CAN HARM SOCIETY • WHERE TO DRAW THE LINE? • HARMS OF PRIVACY • COVER FOR ILLEGAL OR IMMORAL ACTIVITIES • IGNORED PEOPLE ON SOCIETY’S FRINGES • BENEFITS OF PRIVACY • FREEDOM TO BE YOURSELF • DEVELOPMENT OF LOVING, TRUSTING, CARING, INTIMATE RELATIONSHIPS • QUESTION: IS THERE AN NATURAL RIGHT TO PRIVACY?
  • 4. QUESTION: DO PEOPLE HAVE THE RIGHT TO BE LEFT ALONE?
  • 5. PRIVACY AND TRUST • PERHAPS MODERN LIFE IS ACTUALLY MORE PRIVATE THAN LIFE CENTURIES AGO • MOST PEOPLE DON’T LIVE WITH EXTENDED FAMILIES • AUTOMOBILE ALLOWS US TO TRAVEL ALONE • TELEVISION V. PUBLIC ENTERTAINMENT • CHALLENGE: WE NOW LIVE AMONG STRANGERS • REMEDY: ESTABLISHING REPUTATIONS • ORDEAL, SUCH AS LIE DETECTOR TEST OR DRUG TEST • CREDENTIAL, SUCH AS DRIVER’S LICENSE, KEY, ID CARD, COLLEGE DEGREE • ESTABLISHING REPUTATION IS DONE AT THE COST OF REDUCING PRIVACY
  • 6. CASE STUDY: NEW PARENTS • SULLIVANS HAVE A BABY GIRL • BOTH WORK; THEY ARE CONCERNED ABOUT PERFORMANCE OF FULL-TIME NANNY • PURCHASE PROGRAM THAT ALLOWS MONITORING THROUGH LAPTOP’S CAMERA PLACED IN FAMILY ROOM • THEY DO NOT INFORM NANNY SHE IS BEING MONITORED
  • 7. DISCLOSING INFORMATION • PUBLIC RECORD: INFORMATION ABOUT AN INCIDENT OR ACTION REPORTED TO A GOVERNMENT AGENCY FOR PURPOSE OF INFORMING THE PUBLIC • EXAMPLES: BIRTH CERTIFICATES, MARRIAGE LICENSES, MOTOR VEHICLE RECORDS, CRIMINAL RECORDS, DEEDS TO PROPERTY • PRIVATE RECORDS • EXAMPLES: CREDIT CARD PURCHASES, PURCHASES MADE WITH LOYALTY CARDS, VOLUNTARY DISCLOSURES, POSTS TO SOCIAL NETWORK SITES
  • 8. DATA GATHERING AND PRIVACY IMPLICATIONS • FACEBOOK TAGS • FACEBOOK ALLOWS USERS TO TAG PEOPLE WHO ARE ON THEIR LIST OF FRIENDS • ABOUT 100 MILLION TAGS ADDED PER DAY IN FACEBOOK • FACEBOOK USES FACIAL RECOGNITION TO SUGGEST NAME OF FRIEND APPEARING IN PHOTO • DOES THIS FEATURE INCREASE RISK OF IMPROPER TAGGING? • ENHANCED 911 SERVICES • CELL PHONE PROVIDERS IN UNITED STATES REQUIRED TO TRACK LOCATIONS OF ACTIVE CELL PHONES TO WITHIN 100 METERS • ALLOWS EMERGENCY RESPONSE TEAMS TO REACH PEOPLE IN DISTRESS • WHAT IF THIS INFORMATION IS SOLD OR SHARED? • REWARDS OR LOYALTY PROGRAMS • SHOPPERS WHO BELONG TO STORE’S REWARDS PROGRAM CAN SAVE MONEY ON MANY OF THEIR PURCHASES • COMPUTERS USE INFORMATION ABOUT BUYING HABITS TO PROVIDE PERSONALIZED SERVICE • SHOPRITE COMPUTERIZED SHOPPING CARTS WITH POP-UP ADS • DO CARD USERS PAY LESS, OR DO NON-USERS GET OVERCHARGED? • RFID TAGS • RFID: RADIO FREQUENCY IDENTIFICATION • AN RFID TAG IS A TINY WIRELESS TRANSMITTER • MANUFACTURERS ARE REPLACING BAR CODES WITH RFID TAGS • CONTAIN MORE INFORMATION • CAN BE SCANNED MORE EASILY • IF TAG CANNOT BE REMOVED OR DISABLED, IT BECOMES A TRACKING DEVICE • PUBLIC RECORDING DEVICES • PUBLIC CAMERAS IN CITIES • POLICE BODY CAMS • COOKIES • COOKIE: FILE PLACED ON COMPUTER’S HARD DRIVE BY A WEB SERVER • CONTAINS INFORMATION ABOUT VISITS TO A WEB SITE • ALLOWS WEB SITES TO PROVIDE PERSONALIZED SERVICES • PUT ON HARD DRIVE WITHOUT USER’S PERMISSION • YOU CAN SET WEB BROWSER TO ALERT YOU TO NEW COOKIES OR TO BLOCK COOKIES ENTIRELY
  • 9. CREDIT REPORTS • EXAMPLE OF HOW INFORMATION ABOUT CUSTOMERS CAN ITSELF BECOME A COMMODITY • CREDIT BUREAUS • KEEP TRACK OF AN INDIVIDUAL’S ASSETS, DEBTS, AND HISTORY OF PAYING BILLS AND REPAYING LOANS • SELL CREDIT REPORTS TO BANKS, CREDIT CARD COMPANIES, AND OTHER POTENTIAL LENDERS • SYSTEM GIVES YOU MORE CHOICES IN WHERE TO BORROW MONEY • POOR CREDIT CAN HURT EMPLOYMENT PROSPECTS • QUESTION: HOW IS THIS DIFFERENT FROM ANY COMPANY SELLING/USING YOUR INFORMATION?
  • 10. INSTAGRAM’S PROPOSED CHANGE TO TERMS OF SERVICE • LATE 2012: INSTAGRAM ANNOUNCED CHANGES • PRIVACY POLICY • TERMS OF SERVICE • LEGAL EXPERTS: INSTAGRAM AND FACEBOOK WOULD HAVE RIGHT TO USE PHOTOS IN ADS WITHOUT PERMISSION • INSTAGRAM CEO: NEW POLICY MISUNDERSTOOD • CHANGED ADVERTISING SECTION OF TERMS OF SERVICE AGREEMENT BACK TO ORIGINAL VERSION
  • 11. DATA MINING • SEARCHING RECORDS IN ONE OR MORE DATABASES, LOOKING FOR PATTERNS OR RELATIONSHIPS • CAN BE USED TO CREATE PROFILES OF INDIVIDUALS • ALLOWS COMPANIES TO BUILD MORE PERSONAL RELATIONSHIPS WITH CUSTOMERS • EXAMPLES: AMAZON, NETFLIX • QUESTION: WHO OWNS THE DATA?
  • 12. DATA MINING EXAMPLES • LOTUS DEVELOPMENT CORPORATION DEVELOPED CD WITH INFORMATION ON 120 MILLION AMERICANS • PLANNED TO SELL CD TO TARGETED SMALL BUSINESSES THAT WANTED TO CREATE MAILING LISTS BASED ON VARIOUS CRITERIA, SUCH AS HOUSEHOLD INCOME • DUE TO 30,000 COMPLAINTS ABOUT PRIVACY LOTUS DROPPED PLANS TO SELL CD • IN 2011 TWO MALLS RECORDED MOVEMENT OF SHOPPERS BY TRACKING LOCATIONS OF CELL PHONES • HOW MUCH TIME PEOPLE SPEND IN EACH STORE? • DO PEOPLE WHO SHOP AT X ALSO SHOP AT Y? • ARE THERE UNPOPULAR AREAS OF MALL? • SMALL SIGNS INFORMED SHOPPERS OF STUDY • AFTER PROTEST, MALL QUICKLY HALTED STUDY

Editor's Notes

  1. Privacy natural right Privacy rights stem from property rights: “a man’s home is his castle” Coercive Acts before American Revolution led to 3rd Amendment to U.S. Constitution Samuel Warren and Louis Brandeis: People have “the right to be let alone” Judith Jarvis Thomson: “Privacy rights” overlap other rights Conclusion: Privacy is not a natural right, but it is a prudential right
  2. Princess Diana – deemed driver was drunk by alleged paparrazi was to blame
  3. Rule Utilitarian If everyone monitored nannies, it would not remain a secret for long Consequences Nannies would be on best behavior in front of camera Might reduce child abuse and parents’ peace of mind Would also increase stress and reduce job satisfaction of child care providers Might result in higher turnover rate and less experienced pool of nannies, who would provide lower-quality care Harms appear greater than benefits, so we conclude action was wrong Social Contract Theory It is reasonable for society to give people privacy in their own homes Nanny has a reasonable expectation that her interactions with baby inside home are private Sullivan’s decision to secretly monitor the nanny is wrong because it violates her privacy Kantian Evaluation Imagine rule, “An employer may secretly monitor the work of an employee who works with vulnerable people” If universalized, there would be no expectation of privacy by employees, so secret monitoring would be impossible Proposed rule is self-defeating, so it is wrong for Sullivans to act according to the rule Virtue Ethics Sullivans are responsible for well-being of their daughter Chose nanny through concern for baby: characteristic of good parents Daughter is truly defenseless, unable to communicate with them Decision to monitor can be viewed as characteristic of good parents Would also expect them to cease monitoring once assured nanny is doing well
  4. Computerized databases and Internet have made public records much easier to access
  5. Social Network Analysis Collect information from social networks to inform decisions Police use Facebook and Twitter posts to deploy officers on big party nights Banks combine social network data with credit reports to determine creditworthiness
  6. Opt-in: Consumer must explicitly give permission before the organization can share info Opt-out: Organization can share info until consumer explicitly forbid it Opt-in is a barrier for new businesses, so direct marketing organizations prefer opt-out Collaborative Filtering Form of data mining Analyze information about preferences of large number of people to predict what one person may prefer Explicit method: people rank preferences Implicit method: keep track of purchases Used by online retailers and movie sites