This document defines and discusses various aspects of privacy. It begins by defining privacy as the state of being free from observation and disturbance by others, and the freedom from public attention. It then discusses privacy as a property right and human right, including the right to be let alone. It outlines different types of privacy such as bodily, locational, political, and data privacy. It also discusses how privacy applies to intellectual property, personal communications, financial information, social media use, phones, and computers. Finally, it defines four main categories of privacy: defensive, human rights, personal, and contextual privacy.
2. • pri·va·cy
ˈprīvəsē/
noun
• the state or condition of being free
from being observed or disturbed by
other people.
• the state of being free from public
attention.
3. • An intangible property right
• The right to be let alone
• The right to be anonymous
• The right to control who, when, where,
and how information about us is
shared
• A recently recognized human right
4. • Right to life
Freedom from physical injury
Freedom from fear of physical injury
• Right to liberty
Freedom from physical restraint
• Right to property
Tangible and intangible
5. • Bodily Privacy
• Locational Privacy
• Political Privacy
• Medical Privacy
• Genetic Privacy
• Internet Privacy
• Voter Privacy
• Family Privacy
• Religious Privacy
• Financial Privacy
• Children’s Privacy
• Data Privacy
• Firearms Privacy
• Workplace Privacy
• Travel Privacy
• Postal Service Privacy
• Digital Info. Privacy
6. • The right within reason to control who has
access to our thoughts, sentiments, and
emotions
• Protect intellectual property rights (publication of
manuscripts, diaries, sculptures, photographs,
etc)
• Protects against disclosure of personal
communications: diaries, letters, etc or their
content
• 5th Amendment Protects against disclosing
information in a government proceeding.
7. • Credit card payments are protected.
But not necessarily private.
Paypal etc.. May solve the privacy issues.
• Site and portal registrations:
Beware of “we will enhance your browsing
experience”
Using email as id on some sites.
• Third party ads.
Contests and offers: Free Iphones!
8. • Cookies:
• Be-aware of third party cookies. E.g., Double Click and
online profiling.
• Adware
• Web-bug.
• Spyware: keystroke loggers.
11. • Designate an individual to be responsible
for privacy.
• Develop a business strategy.
• Perform a risk assessment and gap
analysis of controls and procedures.
• Develop, design, and implement privacy
initiatives.
• Sustain and manage privacy processes
15. • Privacy on computers are similar to cell phones many
things can be tracked on a computer
16. • Defensive Privacy:
protects against transient financial loss
resulting from information collection or
theft. This is the territory of phishers,
conmen, blackmailers, identity thieves, and
organized crime. It could also be the
purview of governments that seize assets
from people or businesses.
17. • Human Rights Privacy:
protects against existential threats
resulting from information collection or
theft. This is the territory of stalkers and
other felonious criminals as well as
authoritarian governments and other
persons intent on doing damage to
someone for personal for his or her beliefs
or political views.
18. • Personal Privacy:
protects persons against observation
and intrusion; it's what Judge Thomas
Cooley called "the right to be let
alone", as cited by future Supreme
Court Justice Louis Brandeis in "The
Right to Privacy"