This document discusses several key aspects of privacy and how they relate to computer technology. It begins by defining privacy and information privacy. It then examines how computer technologies like databases, cameras, social media, and location tracking have changed people's ability to access and use personal information. It outlines several privacy threats like intentional and unauthorized use of data, data theft, and inadvertent information leakage. The document also explores new risks from tools like surveillance, data analysis, cloud computing and vulnerabilities in data security. It discusses how personal information can now be gathered invisibly through things like cookies and device fingerprints. Key issues discussed include secondary use of data, data mining/matching/profiling and identity theft. The document concludes by examining principles of informed