SlideShare a Scribd company logo
1 of 19
Meet Jane.
Google: A Policy Primer Case Study
By using Google, you agree to the Terms of Service (and any additional terms) provided by Google Inc. (Google Inc., 2014).
Furthermore, Google is not required to individually notify its users of any changes to their policies – users are expected to
regularly monitor the terms.
So lets have a look at the Privacy Policy and just how private Google is.
Meet Jane.
Jane Obscurus
Jane Obscurus is a 25 year-old female living in Incognitus, Australia.
She is a typical, run-of-the-mill, average Jane.
One of these days, Jane wants to be famous.
What Jane Gives Google.
What Jane Gave Google.
Jane Sets Up with Google
Jane needs a Google account to access some content, for example, 18+ on YouTube (Google Inc., 2014).
So she sets up an account and fills in her basic info:
o Name
o Date of birth
o Email address
o Telephone number
o Credit card
She also sets up a new email account with Gmail so everything can be in the same place.
Plus a Little Visual Data.
Photographs
Jane has uploaded a photograph to Google Drive. This photo is a little racy and has been uploaded purely for her own
posterity… and perhaps to email to her boyfriend.
Videos
Jane is tagged in a video on YouTube from the night she had a bit too much to drink. Jane also frequently watches YouTube
clips about cats... it is her secret pleasure to watch hours and hours of cats.
Fun Fact:
Google uses facial recognition technology to “compare known faces against a new face and see if there is a probable match
or similarity” (Google Inc., 2016b).
What Google Collects from Jane.
“Google keeps search requests? It does.
Curiosity is monitored, producing a
searchable database of the curious.”
Lessig, 2006, p. 204
What Google Collects.
Device Information
o Hardware model
o Operating system
o Unique device identifiers
o Mobile network information (phone number and carrier)
Log Information
o Search queries
o Telephone log information
o Phone number
o Type, time, date and duration of calls
o SMS routing information
o IP Address
o Cookies
o ‘Device event information’ so even turning her phone off is logged
Search History.
‘Google it':
Jane, like the rest of us, is inadvertently revealing personal, private, medical, professional and financial information each time
she ‘googles it’ (Barbaro & Zeller, 2006; Philipson, 2013).
Out of Context:
In the last week Jane has been busy, she:
o Googled ‘BDSM’ after reading a review of Fifty Shades of Grey
o Heard about syphilis on an episode of House and wanted to read up on it
o Purchased a cat costume for Halloween
As far as Google is concerned, Jane is a cat-costume-wearing, sadomasochist with a side of syphilis. As you can see, the
little bites of metadata, without the relevant context, can prove to be very misleading (Barbaro & Zeller, 2006).
Location, Location, Location.
Google Maps & GPS
Jane uses Google Maps to find her way to work from her new apartment – a cool feature lets Jane save these locations as
‘Jane Home’ and ‘Jane Work’.
IP Addresses, Android, and “Other Sensors”
When Jane uses Google services, they can glean location information using her IP address, GPS, nearby devices and cell
phone towers, and if she is lucky they can access her phones accelerometer to determine how fast she is going (Google Inc.,
2016a).
What Google Does with Jane’s
Information.
What Now.
Collecting Jane’s Data
Google uses Jane’s information to:
o Provide, maintain, protect, improve and develop services
o “…to protect Google and our users”
o Provide relevant search results and ads
To really deliver the above, Google even analyses Jane’s personal emails.
“Our automated systems analyse your content (including emails) …” (Google Inc., 2014)
Sharing Jane’s Data
Personal information is sent for external processing to “affiliates or other trusted business or persons” who are “in compliance
with our Privacy Policy” (Google Inc., 2016a).
Google can share personal information with other ‘companies, organisations or individuals’ if they believe that it is necessary
to (Google Inc., 2016a):
o Meet any law, regulation, or enforceable government request
o An investigation of a potential violation of the Terms of Service
o To stop fraud, security or technical issues
o Protect the rights, property or safety of Google or members of the public
Link ‘That’ to ‘This’
Consistent Representation
“In addition, we may replace past names associated with your Google Account so that you are represented consistently
across all our services” (Google Inc., 2016a).
So if Jane had previously changed her name, Google would still create a link between ‘that’ data and ‘this’ data.
Linking
“Google may associate your device identifiers or phone number with your Google Account” (Google Inc., 2016a). So without
even signing in, more pieces of data are being added to the pile with Jane’s name on it.
“We may combine personal information from one service with information, including personal information, from other Google
services…” (Google Inc., 2016a)
Meet Google’s Jane.
A Portrait of Jane.
What Google knows about Jane:
Google is sitting on a catalogue of dubious emails and questionable search queries that are linked to Jane’s name and IP
address in a database waiting to be discovered (Lessig, 2006).
o Full name
o Gender
o Birthday
o Address
o Credit card number
o What she looks like (facial recognition)
o Her interests
o Medical history
o What devices she uses (phone, tablet, laptop)
o What her favourite website is
o Search habits
Google also probably knows Jane’s:
o The name of her primary school
o Sexual orientation
o Political affiliation
o Bra size
o Her cat obsession
o Her sexual preferences
o Ex-boyfriends new fiancé's ring size
“…after you delete information from our services, we may
not immediately delete residual copies from our active
servers and may not remove information from our backup
systems.”
- Google Privacy Policy
Don’t Be Like Jane.
Minimizing Your Trail
Touted as a means to prevent organised crime and terrorism, Australia’s media retention scheme keeps a record of every
search query, each website visit, every phone call, text message, and email that Jane makes (Tucker, 2015). This information
waits patiently in a database until someone in the police force, customs, Border Protection Service, or other law-enforcement
agencies, decides to take a look (Tucker, 2015). Much of this data is collected by Google.
This data collection is supposedly for providing accurate advertising to potential consumers, but the future consequences of
each little piece of seemingly innocuous information that is stored, compiled and aggregated are yet to materialise (Barbaro &
Zeller, 2006)
To prevent your email address and search history from being linked…
o Log out of your email account after using it and clear your browser’s cookies before going to other websites
o Don’t use the same search engine website as your email address (e.g. Google search engine and a Gmail account)
o Use a different browser for accessing emails and for using a search engine
(Privacy Rights Clearing House, 2015)
References.
Barbaro, M., & Zeller, T. (2006, August 9). A Face Is Exposed for AOL Searcher No. 4417749. New York Times. http://w2.eff.org/Privacy/AOL/exhibit_d.pdf
Google Inc., (2014). Terms of Service. Google. Retrieved from: https://www.google.com.au/intl/en/policies/terms/regional.html
Google Inc., (2016a). Privacy Policy. Google. Retrieved from:
https://static.googleusercontent.com/media/www.google.com.au/en/au/intl/en/policies/privacy/google_privacy_policy_en.pdf
Google Inc., (2016b). Technologies: How Google Uses Pattern Recognition. Google. https://www.google.com.au/intl/en/policies/technologies/pattern-recognition/
Google Inc., (2016c). Transparency Report: Requests for User Information. Google. Retrieved from:
https://www.google.com/transparencyreport/userdatarequests/?hl=en
Lessig, L. (2006). Privacy. Code: And Other Laws of Cyberspace, Version 2.0. pp. 200-233. Basic Books.
Philipson, J. (February 1, 2013). How Google Became a Verb. The Lingua File: The Language Blog. http://www.thelinguafile.com/2013/02/how-google-became-
verb.html#.WBG34zJ7FE4
Privacy Rights Clearinghouse (2015). Privacy and the Internet: Travelling in Cyberspace Safely. Privacy Rights Clearinghouse. https://www.privacyrights.org/consumer-
guides/online-privacy-using-internet-safely
Shervell, J. (2015). How Much Does Google Really Know About You? Visua.ly. http://visual.ly/how-much-does-google-really-know-about-you
Tucker, H. (2015, October 8). New Data Retention Laws Begin Today, this is What You Need to Know. News.com.au. http://www.news.com.au/technology/online/new-
data-retention-laws-begin-today-this-is-what-you-need-to-know/news-story/28ea2dc1b01d15e53f474e21b6d68501

More Related Content

Viewers also liked

IERC Salzburg MBA Polymers
IERC Salzburg MBA PolymersIERC Salzburg MBA Polymers
IERC Salzburg MBA PolymersMBA Polymers Inc
 
Supercharged Personal Branding
Supercharged Personal BrandingSupercharged Personal Branding
Supercharged Personal BrandingMykl Roventine
 
Financiación Pública Andalucía - INVERCARIA
Financiación Pública Andalucía - INVERCARIAFinanciación Pública Andalucía - INVERCARIA
Financiación Pública Andalucía - INVERCARIAIván García Berjano
 
De Japón a Roma buscando el sol de la cristiandad
De Japón a Roma buscando el sol de la cristiandadDe Japón a Roma buscando el sol de la cristiandad
De Japón a Roma buscando el sol de la cristiandadMarta Salazar
 
Ensayo isopyrazam y azoxystrobin.
Ensayo isopyrazam y azoxystrobin.Ensayo isopyrazam y azoxystrobin.
Ensayo isopyrazam y azoxystrobin.Campo Global
 
Search engine optimization dubai - sm es - gregory bolle
Search engine optimization   dubai - sm es - gregory bolleSearch engine optimization   dubai - sm es - gregory bolle
Search engine optimization dubai - sm es - gregory bolleMajidHaider
 
Manual características básicas del servicio edición 8
Manual características básicas del servicio  edición 8 Manual características básicas del servicio  edición 8
Manual características básicas del servicio edición 8 AUTOCARES CARRIÓ SL
 
Cambio de paradigma en el sector turístico
Cambio de paradigma en el sector turísticoCambio de paradigma en el sector turístico
Cambio de paradigma en el sector turísticoDavid Mora
 
Escuela de Lideres. Soldados de Jesucristo
Escuela de Lideres. Soldados de JesucristoEscuela de Lideres. Soldados de Jesucristo
Escuela de Lideres. Soldados de Jesucristopastorjoseluisdejoy
 
Campaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robesCampaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robesDiana Karina Palomo
 
Kushi kushilla abelino chávez dueñas
Kushi kushilla   abelino chávez dueñasKushi kushilla   abelino chávez dueñas
Kushi kushilla abelino chávez dueñasivan_educa
 
Estandares en sistemas de informacion en salud
Estandares en sistemas de informacion en saludEstandares en sistemas de informacion en salud
Estandares en sistemas de informacion en saludPablo Pazos
 

Viewers also liked (18)

IERC Salzburg MBA Polymers
IERC Salzburg MBA PolymersIERC Salzburg MBA Polymers
IERC Salzburg MBA Polymers
 
Supercharged Personal Branding
Supercharged Personal BrandingSupercharged Personal Branding
Supercharged Personal Branding
 
Financiación Pública Andalucía - INVERCARIA
Financiación Pública Andalucía - INVERCARIAFinanciación Pública Andalucía - INVERCARIA
Financiación Pública Andalucía - INVERCARIA
 
De Japón a Roma buscando el sol de la cristiandad
De Japón a Roma buscando el sol de la cristiandadDe Japón a Roma buscando el sol de la cristiandad
De Japón a Roma buscando el sol de la cristiandad
 
Ensayo isopyrazam y azoxystrobin.
Ensayo isopyrazam y azoxystrobin.Ensayo isopyrazam y azoxystrobin.
Ensayo isopyrazam y azoxystrobin.
 
Convocatorias 22 09
Convocatorias 22 09Convocatorias 22 09
Convocatorias 22 09
 
BLUE ACACIA
BLUE ACACIABLUE ACACIA
BLUE ACACIA
 
Search engine optimization dubai - sm es - gregory bolle
Search engine optimization   dubai - sm es - gregory bolleSearch engine optimization   dubai - sm es - gregory bolle
Search engine optimization dubai - sm es - gregory bolle
 
Manual características básicas del servicio edición 8
Manual características básicas del servicio  edición 8 Manual características básicas del servicio  edición 8
Manual características básicas del servicio edición 8
 
Cambio de paradigma en el sector turístico
Cambio de paradigma en el sector turísticoCambio de paradigma en el sector turístico
Cambio de paradigma en el sector turístico
 
Escuela de Lideres. Soldados de Jesucristo
Escuela de Lideres. Soldados de JesucristoEscuela de Lideres. Soldados de Jesucristo
Escuela de Lideres. Soldados de Jesucristo
 
Campaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robesCampaña este libro es mío, tuyo, es de todos no los robes
Campaña este libro es mío, tuyo, es de todos no los robes
 
Orderbird
OrderbirdOrderbird
Orderbird
 
Vegetta777
Vegetta777Vegetta777
Vegetta777
 
Kushi kushilla abelino chávez dueñas
Kushi kushilla   abelino chávez dueñasKushi kushilla   abelino chávez dueñas
Kushi kushilla abelino chávez dueñas
 
DMAI Fundamentals - Chapter 7 - Technology
DMAI Fundamentals - Chapter 7 - TechnologyDMAI Fundamentals - Chapter 7 - Technology
DMAI Fundamentals - Chapter 7 - Technology
 
4 timmar framgang 20130521
4 timmar framgang 201305214 timmar framgang 20130521
4 timmar framgang 20130521
 
Estandares en sistemas de informacion en salud
Estandares en sistemas de informacion en saludEstandares en sistemas de informacion en salud
Estandares en sistemas de informacion en salud
 

Similar to Jane Obscurus

Online policy primer google - al black
Online policy primer   google - al blackOnline policy primer   google - al black
Online policy primer google - al blackAl Black
 
Policy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy PolicyPolicy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy PolicyCamille Davey
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacyapazooki2
 
1 nameellington david assignmentcase 8 google an
1 nameellington david assignmentcase 8 google an1 nameellington david assignmentcase 8 google an
1 nameellington david assignmentcase 8 google anssusera34210
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgMuir_Net303
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorshipkrthenson
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
Google search recommendation
Google search recommendationGoogle search recommendation
Google search recommendationRajwant Mishra
 
Google Policy Primer 2013
Google Policy Primer 2013Google Policy Primer 2013
Google Policy Primer 2013Kylie M
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesGillian Shaw
 
Google maps the new stalker service
Google maps   the new stalker serviceGoogle maps   the new stalker service
Google maps the new stalker serviceEatSleepDigitals.com
 
Why Google Scares People
Why Google Scares PeopleWhy Google Scares People
Why Google Scares PeopleLiudas Butkus
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMARaj Goel
 
Google Presentation for COM 495
Google Presentation for COM 495Google Presentation for COM 495
Google Presentation for COM 495memeellis
 
Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10EDSONFBONFIM
 
Net303 Policy Primer Google Drive
Net303 Policy Primer Google DriveNet303 Policy Primer Google Drive
Net303 Policy Primer Google Drivefunstix
 
Voice Search Blue Paper
Voice Search Blue PaperVoice Search Blue Paper
Voice Search Blue Paper4imprint
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxgitagrimston
 
Searching Google For Website
Searching Google For WebsiteSearching Google For Website
Searching Google For Websiteguestfc2a34c
 

Similar to Jane Obscurus (20)

Online policy primer google - al black
Online policy primer   google - al blackOnline policy primer   google - al black
Online policy primer google - al black
 
Policy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy PolicyPolicy Primer - Google's Privacy Policy
Policy Primer - Google's Privacy Policy
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
1 nameellington david assignmentcase 8 google an
1 nameellington david assignmentcase 8 google an1 nameellington david assignmentcase 8 google an
1 nameellington david assignmentcase 8 google an
 
Net303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirgNet303 a.2 policy_primer_muirg
Net303 a.2 policy_primer_muirg
 
Google Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and CensorshipGoogle Terms of Service, Privacy, Surveillance and Censorship
Google Terms of Service, Privacy, Surveillance and Censorship
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
Google search recommendation
Google search recommendationGoogle search recommendation
Google search recommendation
 
google_privacy_policy_en.pdf
google_privacy_policy_en.pdfgoogle_privacy_policy_en.pdf
google_privacy_policy_en.pdf
 
Google Policy Primer 2013
Google Policy Primer 2013Google Policy Primer 2013
Google Policy Primer 2013
 
Letter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocatesLetter to Google CEO Larry Page from privacy advocates
Letter to Google CEO Larry Page from privacy advocates
 
Google maps the new stalker service
Google maps   the new stalker serviceGoogle maps   the new stalker service
Google maps the new stalker service
 
Why Google Scares People
Why Google Scares PeopleWhy Google Scares People
Why Google Scares People
 
Google Health - NYHIMA
Google Health - NYHIMAGoogle Health - NYHIMA
Google Health - NYHIMA
 
Google Presentation for COM 495
Google Presentation for COM 495Google Presentation for COM 495
Google Presentation for COM 495
 
Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10Think Holiday Webinar 8.24.10
Think Holiday Webinar 8.24.10
 
Net303 Policy Primer Google Drive
Net303 Policy Primer Google DriveNet303 Policy Primer Google Drive
Net303 Policy Primer Google Drive
 
Voice Search Blue Paper
Voice Search Blue PaperVoice Search Blue Paper
Voice Search Blue Paper
 
Ethics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docxEthics and Management7Google” Ethics and ManagementIs.docx
Ethics and Management7Google” Ethics and ManagementIs.docx
 
Searching Google For Website
Searching Google For WebsiteSearching Google For Website
Searching Google For Website
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Jane Obscurus

  • 2. Google: A Policy Primer Case Study By using Google, you agree to the Terms of Service (and any additional terms) provided by Google Inc. (Google Inc., 2014). Furthermore, Google is not required to individually notify its users of any changes to their policies – users are expected to regularly monitor the terms. So lets have a look at the Privacy Policy and just how private Google is.
  • 3. Meet Jane. Jane Obscurus Jane Obscurus is a 25 year-old female living in Incognitus, Australia. She is a typical, run-of-the-mill, average Jane. One of these days, Jane wants to be famous.
  • 4. What Jane Gives Google.
  • 5. What Jane Gave Google. Jane Sets Up with Google Jane needs a Google account to access some content, for example, 18+ on YouTube (Google Inc., 2014). So she sets up an account and fills in her basic info: o Name o Date of birth o Email address o Telephone number o Credit card She also sets up a new email account with Gmail so everything can be in the same place.
  • 6. Plus a Little Visual Data. Photographs Jane has uploaded a photograph to Google Drive. This photo is a little racy and has been uploaded purely for her own posterity… and perhaps to email to her boyfriend. Videos Jane is tagged in a video on YouTube from the night she had a bit too much to drink. Jane also frequently watches YouTube clips about cats... it is her secret pleasure to watch hours and hours of cats. Fun Fact: Google uses facial recognition technology to “compare known faces against a new face and see if there is a probable match or similarity” (Google Inc., 2016b).
  • 7. What Google Collects from Jane.
  • 8. “Google keeps search requests? It does. Curiosity is monitored, producing a searchable database of the curious.” Lessig, 2006, p. 204
  • 9. What Google Collects. Device Information o Hardware model o Operating system o Unique device identifiers o Mobile network information (phone number and carrier) Log Information o Search queries o Telephone log information o Phone number o Type, time, date and duration of calls o SMS routing information o IP Address o Cookies o ‘Device event information’ so even turning her phone off is logged
  • 10. Search History. ‘Google it': Jane, like the rest of us, is inadvertently revealing personal, private, medical, professional and financial information each time she ‘googles it’ (Barbaro & Zeller, 2006; Philipson, 2013). Out of Context: In the last week Jane has been busy, she: o Googled ‘BDSM’ after reading a review of Fifty Shades of Grey o Heard about syphilis on an episode of House and wanted to read up on it o Purchased a cat costume for Halloween As far as Google is concerned, Jane is a cat-costume-wearing, sadomasochist with a side of syphilis. As you can see, the little bites of metadata, without the relevant context, can prove to be very misleading (Barbaro & Zeller, 2006).
  • 11. Location, Location, Location. Google Maps & GPS Jane uses Google Maps to find her way to work from her new apartment – a cool feature lets Jane save these locations as ‘Jane Home’ and ‘Jane Work’. IP Addresses, Android, and “Other Sensors” When Jane uses Google services, they can glean location information using her IP address, GPS, nearby devices and cell phone towers, and if she is lucky they can access her phones accelerometer to determine how fast she is going (Google Inc., 2016a).
  • 12. What Google Does with Jane’s Information.
  • 13. What Now. Collecting Jane’s Data Google uses Jane’s information to: o Provide, maintain, protect, improve and develop services o “…to protect Google and our users” o Provide relevant search results and ads To really deliver the above, Google even analyses Jane’s personal emails. “Our automated systems analyse your content (including emails) …” (Google Inc., 2014) Sharing Jane’s Data Personal information is sent for external processing to “affiliates or other trusted business or persons” who are “in compliance with our Privacy Policy” (Google Inc., 2016a). Google can share personal information with other ‘companies, organisations or individuals’ if they believe that it is necessary to (Google Inc., 2016a): o Meet any law, regulation, or enforceable government request o An investigation of a potential violation of the Terms of Service o To stop fraud, security or technical issues o Protect the rights, property or safety of Google or members of the public
  • 14. Link ‘That’ to ‘This’ Consistent Representation “In addition, we may replace past names associated with your Google Account so that you are represented consistently across all our services” (Google Inc., 2016a). So if Jane had previously changed her name, Google would still create a link between ‘that’ data and ‘this’ data. Linking “Google may associate your device identifiers or phone number with your Google Account” (Google Inc., 2016a). So without even signing in, more pieces of data are being added to the pile with Jane’s name on it. “We may combine personal information from one service with information, including personal information, from other Google services…” (Google Inc., 2016a)
  • 16. A Portrait of Jane. What Google knows about Jane: Google is sitting on a catalogue of dubious emails and questionable search queries that are linked to Jane’s name and IP address in a database waiting to be discovered (Lessig, 2006). o Full name o Gender o Birthday o Address o Credit card number o What she looks like (facial recognition) o Her interests o Medical history o What devices she uses (phone, tablet, laptop) o What her favourite website is o Search habits Google also probably knows Jane’s: o The name of her primary school o Sexual orientation o Political affiliation o Bra size o Her cat obsession o Her sexual preferences o Ex-boyfriends new fiancé's ring size
  • 17. “…after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.” - Google Privacy Policy
  • 18. Don’t Be Like Jane. Minimizing Your Trail Touted as a means to prevent organised crime and terrorism, Australia’s media retention scheme keeps a record of every search query, each website visit, every phone call, text message, and email that Jane makes (Tucker, 2015). This information waits patiently in a database until someone in the police force, customs, Border Protection Service, or other law-enforcement agencies, decides to take a look (Tucker, 2015). Much of this data is collected by Google. This data collection is supposedly for providing accurate advertising to potential consumers, but the future consequences of each little piece of seemingly innocuous information that is stored, compiled and aggregated are yet to materialise (Barbaro & Zeller, 2006) To prevent your email address and search history from being linked… o Log out of your email account after using it and clear your browser’s cookies before going to other websites o Don’t use the same search engine website as your email address (e.g. Google search engine and a Gmail account) o Use a different browser for accessing emails and for using a search engine (Privacy Rights Clearing House, 2015)
  • 19. References. Barbaro, M., & Zeller, T. (2006, August 9). A Face Is Exposed for AOL Searcher No. 4417749. New York Times. http://w2.eff.org/Privacy/AOL/exhibit_d.pdf Google Inc., (2014). Terms of Service. Google. Retrieved from: https://www.google.com.au/intl/en/policies/terms/regional.html Google Inc., (2016a). Privacy Policy. Google. Retrieved from: https://static.googleusercontent.com/media/www.google.com.au/en/au/intl/en/policies/privacy/google_privacy_policy_en.pdf Google Inc., (2016b). Technologies: How Google Uses Pattern Recognition. Google. https://www.google.com.au/intl/en/policies/technologies/pattern-recognition/ Google Inc., (2016c). Transparency Report: Requests for User Information. Google. Retrieved from: https://www.google.com/transparencyreport/userdatarequests/?hl=en Lessig, L. (2006). Privacy. Code: And Other Laws of Cyberspace, Version 2.0. pp. 200-233. Basic Books. Philipson, J. (February 1, 2013). How Google Became a Verb. The Lingua File: The Language Blog. http://www.thelinguafile.com/2013/02/how-google-became- verb.html#.WBG34zJ7FE4 Privacy Rights Clearinghouse (2015). Privacy and the Internet: Travelling in Cyberspace Safely. Privacy Rights Clearinghouse. https://www.privacyrights.org/consumer- guides/online-privacy-using-internet-safely Shervell, J. (2015). How Much Does Google Really Know About You? Visua.ly. http://visual.ly/how-much-does-google-really-know-about-you Tucker, H. (2015, October 8). New Data Retention Laws Begin Today, this is What You Need to Know. News.com.au. http://www.news.com.au/technology/online/new- data-retention-laws-begin-today-this-is-what-you-need-to-know/news-story/28ea2dc1b01d15e53f474e21b6d68501