SlideShare a Scribd company logo
1 of 20
Shawnee Charleston
• pri·va·cy
ˈprīvəsē/
noun
• the state or condition of being free
from being observed or disturbed by
other people.
• the state of being free from public
attention.
• An intangible property right
• The right to be let alone
• The right to be anonymous
• The right to control who, when, where,
and how information about us is
shared
• A recently recognized human right
• Right to life
Freedom from physical injury
Freedom from fear of physical injury
• Right to liberty
Freedom from physical restraint
• Right to property
 Tangible and intangible
• Bodily Privacy
• Locational Privacy
• Political Privacy
• Medical Privacy
• Genetic Privacy
• Internet Privacy
• Voter Privacy
• Family Privacy
• Religious Privacy
• Financial Privacy
• Children’s Privacy
• Data Privacy
• Firearms Privacy
• Workplace Privacy
• Travel Privacy
• Postal Service Privacy
• Digital Info. Privacy
• The right within reason to control who has
access to our thoughts, sentiments, and
emotions
• Protect intellectual property rights (publication of
manuscripts, diaries, sculptures, photographs,
etc)
• Protects against disclosure of personal
communications: diaries, letters, etc or their
content
• 5th Amendment Protects against disclosing
information in a government proceeding.
• Credit card payments are protected.
But not necessarily private.
Paypal etc.. May solve the privacy issues.
• Site and portal registrations:
Beware of “we will enhance your browsing
experience”
Using email as id on some sites.
• Third party ads.
Contests and offers: Free Iphones!
• Cookies:
• Be-aware of third party cookies. E.g., Double Click and
online profiling.
• Adware
• Web-bug.
• Spyware: keystroke loggers.
• People being anonymous
• Making multiple identities
• Designate an individual to be responsible
for privacy.
• Develop a business strategy.
• Perform a risk assessment and gap
analysis of controls and procedures.
• Develop, design, and implement privacy
initiatives.
• Sustain and manage privacy processes
• Social media
• Phones
• Computers
• People post more than what they should
• Someone is always watching
• Smart phones are the ultimate tracking device
• Privacy on computers are similar to cell phones many
things can be tracked on a computer
• Defensive Privacy:
protects against transient financial loss
resulting from information collection or
theft. This is the territory of phishers,
conmen, blackmailers, identity thieves, and
organized crime. It could also be the
purview of governments that seize assets
from people or businesses.
• Human Rights Privacy:
protects against existential threats
resulting from information collection or
theft. This is the territory of stalkers and
other felonious criminals as well as
authoritarian governments and other
persons intent on doing damage to
someone for personal for his or her beliefs
or political views.
• Personal Privacy:
protects persons against observation
and intrusion; it's what Judge Thomas
Cooley called "the right to be let
alone", as cited by future Supreme
Court Justice Louis Brandeis in "The
Right to Privacy"
•Contextual Privacy:
protects persons against
unwanted intimacy.
Privacy

More Related Content

What's hot

Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resourcelawexchange.co.uk
 
Creating new documents infosnippet
Creating new documents infosnippetCreating new documents infosnippet
Creating new documents infosnippetReynold Leming
 
Text Data Mining & Publishing: Checklist
Text Data Mining & Publishing: ChecklistText Data Mining & Publishing: Checklist
Text Data Mining & Publishing: ChecklistRachael Samberg
 
Legal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for LibrariesLegal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for LibrariesAllana Delgado
 
Documents of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual FreedomDocuments of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual Freedomaswitzer1
 
Right to accesible information
Right to accesible informationRight to accesible information
Right to accesible informationCheryl Stephens
 
Legal issues associated with information management
Legal issues associated with information managementLegal issues associated with information management
Legal issues associated with information managementDaniel Appiah
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Dissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerDissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerUNICORNS IN TECH
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Facundo Mauricio
 
Paul Iulo is a veteran in law enforcement, private security and fire security
Paul Iulo is a veteran in law enforcement, private security and fire securityPaul Iulo is a veteran in law enforcement, private security and fire security
Paul Iulo is a veteran in law enforcement, private security and fire securityfabian062
 

What's hot (17)

Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resource
 
Creating new documents infosnippet
Creating new documents infosnippetCreating new documents infosnippet
Creating new documents infosnippet
 
Text Data Mining & Publishing: Checklist
Text Data Mining & Publishing: ChecklistText Data Mining & Publishing: Checklist
Text Data Mining & Publishing: Checklist
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Assignment #2
Assignment #2Assignment #2
Assignment #2
 
Legal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for LibrariesLegal and Access issues in Collection Development for Libraries
Legal and Access issues in Collection Development for Libraries
 
Documents of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual FreedomDocuments of Freedom: Establishing Policies That Protect Intellectual Freedom
Documents of Freedom: Establishing Policies That Protect Intellectual Freedom
 
Right to accesible information
Right to accesible informationRight to accesible information
Right to accesible information
 
The dark web
The dark webThe dark web
The dark web
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Legal issues associated with information management
Legal issues associated with information managementLegal issues associated with information management
Legal issues associated with information management
 
Web Content Laws
Web Content LawsWeb Content Laws
Web Content Laws
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Dissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen BergerDissent as strategy - Cathleen Berger
Dissent as strategy - Cathleen Berger
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
Paul Iulo is a veteran in law enforcement, private security and fire security
Paul Iulo is a veteran in law enforcement, private security and fire securityPaul Iulo is a veteran in law enforcement, private security and fire security
Paul Iulo is a veteran in law enforcement, private security and fire security
 

Similar to Privacy

Media Ethics: Privacy
Media Ethics: PrivacyMedia Ethics: Privacy
Media Ethics: PrivacyRachel Khan
 
Information Session for Learners
Information Session for LearnersInformation Session for Learners
Information Session for LearnersThe Pathway Group
 
Information Session for Learners
Information Session for LearnersInformation Session for Learners
Information Session for LearnersThe Pathway Group
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Santosh Sigdel
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxLimeJuice5
 
Unit+6+B+-+Whistle-blowing.pptx
Unit+6+B+-+Whistle-blowing.pptxUnit+6+B+-+Whistle-blowing.pptx
Unit+6+B+-+Whistle-blowing.pptxlakshayrana27
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United StatesFrederick Lane
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy Daniel Appiah
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeJhouBautista
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalobarbio
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeorosalegaspi
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangerommelaa
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchangeleejhayacosido
 

Similar to Privacy (20)

Media Ethics: Privacy
Media Ethics: PrivacyMedia Ethics: Privacy
Media Ethics: Privacy
 
Information Session for Learners
Information Session for LearnersInformation Session for Learners
Information Session for Learners
 
Information Session for Learners
Information Session for LearnersInformation Session for Learners
Information Session for Learners
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptx
 
Unit+6+B+-+Whistle-blowing.pptx
Unit+6+B+-+Whistle-blowing.pptxUnit+6+B+-+Whistle-blowing.pptx
Unit+6+B+-+Whistle-blowing.pptx
 
human rights presentation
human rights presentation human rights presentation
human rights presentation
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy
 
4-Privacy1.pptx
4-Privacy1.pptx4-Privacy1.pptx
4-Privacy1.pptx
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 
9 ictasplatformforchange
9 ictasplatformforchange9 ictasplatformforchange
9 ictasplatformforchange
 

Recently uploaded

Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 

Recently uploaded (20)

Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 

Privacy

  • 2. • pri·va·cy ˈprīvəsē/ noun • the state or condition of being free from being observed or disturbed by other people. • the state of being free from public attention.
  • 3. • An intangible property right • The right to be let alone • The right to be anonymous • The right to control who, when, where, and how information about us is shared • A recently recognized human right
  • 4. • Right to life Freedom from physical injury Freedom from fear of physical injury • Right to liberty Freedom from physical restraint • Right to property  Tangible and intangible
  • 5. • Bodily Privacy • Locational Privacy • Political Privacy • Medical Privacy • Genetic Privacy • Internet Privacy • Voter Privacy • Family Privacy • Religious Privacy • Financial Privacy • Children’s Privacy • Data Privacy • Firearms Privacy • Workplace Privacy • Travel Privacy • Postal Service Privacy • Digital Info. Privacy
  • 6. • The right within reason to control who has access to our thoughts, sentiments, and emotions • Protect intellectual property rights (publication of manuscripts, diaries, sculptures, photographs, etc) • Protects against disclosure of personal communications: diaries, letters, etc or their content • 5th Amendment Protects against disclosing information in a government proceeding.
  • 7. • Credit card payments are protected. But not necessarily private. Paypal etc.. May solve the privacy issues. • Site and portal registrations: Beware of “we will enhance your browsing experience” Using email as id on some sites. • Third party ads. Contests and offers: Free Iphones!
  • 8. • Cookies: • Be-aware of third party cookies. E.g., Double Click and online profiling. • Adware • Web-bug. • Spyware: keystroke loggers.
  • 9. • People being anonymous • Making multiple identities
  • 10.
  • 11. • Designate an individual to be responsible for privacy. • Develop a business strategy. • Perform a risk assessment and gap analysis of controls and procedures. • Develop, design, and implement privacy initiatives. • Sustain and manage privacy processes
  • 12. • Social media • Phones • Computers
  • 13. • People post more than what they should • Someone is always watching
  • 14. • Smart phones are the ultimate tracking device
  • 15. • Privacy on computers are similar to cell phones many things can be tracked on a computer
  • 16. • Defensive Privacy: protects against transient financial loss resulting from information collection or theft. This is the territory of phishers, conmen, blackmailers, identity thieves, and organized crime. It could also be the purview of governments that seize assets from people or businesses.
  • 17. • Human Rights Privacy: protects against existential threats resulting from information collection or theft. This is the territory of stalkers and other felonious criminals as well as authoritarian governments and other persons intent on doing damage to someone for personal for his or her beliefs or political views.
  • 18. • Personal Privacy: protects persons against observation and intrusion; it's what Judge Thomas Cooley called "the right to be let alone", as cited by future Supreme Court Justice Louis Brandeis in "The Right to Privacy"
  • 19. •Contextual Privacy: protects persons against unwanted intimacy.