Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
IntroductionIntroduction

Group Members:
14: M Ali Shirwany
72: M Ali
1
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
ContentsContents
Privacy
Copyrights
2
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 3
OutlineOutline
What is privacy?
Privacy laws and self-regulation
Privacy risks from personalization
Reducing privacy risks
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 4
What is privacy?What is privacy?
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 5
Hard to defineHard to define
“Privacy is a value so complex, so
entangled in competing and contradictory
dimensions, so engorged with various and
distinct meanings, that I sometimes despair
whether it can be usefully addressed at all.”
Robert C. Post, Three Concepts of Privacy,
89 Geo. L.J. 2087 (2001).
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 6
Realizing limited access and controlRealizing limited access and control
Limited access
• Laws to prohibit or limit collection, disclosure,
contact
• Technology to facilitate anonymous
transactions, minimize disclosure
Control
• Laws to mandate choice (opt-in/opt-out)
• Technology to facilitate informed consent, keep
track of and enforce privacy preferences
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 7
Privacy laws and self-regulationPrivacy laws and self-regulation
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 8
Privacy policiesPrivacy policies
Policies let consumers know about site’s
privacy practices
Consumers can then decide whether or not
practices are acceptable, when to opt-in or
opt-out, and who to do business with
The presence of privacy policies increases
consumer trust
What are some problems with privacy policies?
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 9
Privacy policy problemsPrivacy policy problems
BUT policies are often
• difficult to understand
• hard to find
• take a long time to read
• change without notice
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 10
Risks may be magnified in futureRisks may be magnified in future
Wireless location tracking
Semantic web applications
Ubiquitous computing
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
WHAT IS COPYRIGHT?WHAT IS COPYRIGHT?
 Copyright is a form of protection given to
authors/creators of original works.
 This property right can be sold or transferred to
others.
11
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT LAWCOPYRIGHT LAW
 Copyright is a form of protection grounded in the
U.S. Constitution and granted by law for original
works of authorship.
 The current copyright law, the Copyright Act of
1976, is codified in Title 17 of the U.S. Code.
12
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
AUTHOR´S RIGHTSAUTHOR´S RIGHTS
 Copyright law assures ownership, which comes with several
rights, that the author has exclusively. For example:
• Make copies of the work
• Distribute copies of the work
• Perform the work publicly
• Display the work publicly
• Make derivative works
13
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
 The law provides certain ways in which copyright works
may be used without the need to first obtain permission
from the copyright holder - these include:
• Fair use (e.g. to make copies)
• Public domain
• Library privilege
• Copying for examinations and copying for instruction
14
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT PROTECTIONCOPYRIGHT PROTECTION
 Copyright covers both published and unpublished
works. 
 Copyright protection is automatic at the moment the
work is created and fixed in a tangible form that it is
perceptible
15
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHTABLE WORKSCOPYRIGHTABLE WORKS
 Literary works
 Dramatic works
 Musical works
 Artistic works
16
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
NON-COPYRIGHTABLE WORKSNON-COPYRIGHTABLE WORKS
Not everything is protected by copyright
law. 
Copyright does not protect facts, ideas,
systems, or methods of operation.
17
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
Copyright VS. Patent andCopyright VS. Patent and
TrademarkTrademark
 Copyright protects original works of authorship,
while a patent protects inventions or discoveries.
 A trademark protects words, phrases, symbols, or
designs identifying the source of the goods or
services of one party and distinguishing them from
those of others. 
18

Privacy And Copyrights

  • 1.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ IntroductionIntroduction  Group Members: 14: M Ali Shirwany 72: M Ali 1
  • 2.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ ContentsContents Privacy Copyrights 2
  • 3.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 3 OutlineOutline What is privacy? Privacy laws and self-regulation Privacy risks from personalization Reducing privacy risks
  • 4.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 4 What is privacy?What is privacy?
  • 5.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 5 Hard to defineHard to define “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087 (2001).
  • 6.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 6 Realizing limited access and controlRealizing limited access and control Limited access • Laws to prohibit or limit collection, disclosure, contact • Technology to facilitate anonymous transactions, minimize disclosure Control • Laws to mandate choice (opt-in/opt-out) • Technology to facilitate informed consent, keep track of and enforce privacy preferences
  • 7.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 7 Privacy laws and self-regulationPrivacy laws and self-regulation
  • 8.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 8 Privacy policiesPrivacy policies Policies let consumers know about site’s privacy practices Consumers can then decide whether or not practices are acceptable, when to opt-in or opt-out, and who to do business with The presence of privacy policies increases consumer trust What are some problems with privacy policies?
  • 9.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 9 Privacy policy problemsPrivacy policy problems BUT policies are often • difficult to understand • hard to find • take a long time to read • change without notice
  • 10.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 10 Risks may be magnified in futureRisks may be magnified in future Wireless location tracking Semantic web applications Ubiquitous computing
  • 11.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ WHAT IS COPYRIGHT?WHAT IS COPYRIGHT?  Copyright is a form of protection given to authors/creators of original works.  This property right can be sold or transferred to others. 11
  • 12.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ COPYRIGHT LAWCOPYRIGHT LAW  Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original works of authorship.  The current copyright law, the Copyright Act of 1976, is codified in Title 17 of the U.S. Code. 12
  • 13.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ AUTHOR´S RIGHTSAUTHOR´S RIGHTS  Copyright law assures ownership, which comes with several rights, that the author has exclusively. For example: • Make copies of the work • Distribute copies of the work • Perform the work publicly • Display the work publicly • Make derivative works 13
  • 14.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/  The law provides certain ways in which copyright works may be used without the need to first obtain permission from the copyright holder - these include: • Fair use (e.g. to make copies) • Public domain • Library privilege • Copying for examinations and copying for instruction 14
  • 15.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ COPYRIGHT PROTECTIONCOPYRIGHT PROTECTION  Copyright covers both published and unpublished works.   Copyright protection is automatic at the moment the work is created and fixed in a tangible form that it is perceptible 15
  • 16.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ COPYRIGHTABLE WORKSCOPYRIGHTABLE WORKS  Literary works  Dramatic works  Musical works  Artistic works 16
  • 17.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ NON-COPYRIGHTABLE WORKSNON-COPYRIGHTABLE WORKS Not everything is protected by copyright law.  Copyright does not protect facts, ideas, systems, or methods of operation. 17
  • 18.
    Usable Privacy andSecurity • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ Copyright VS. Patent andCopyright VS. Patent and TrademarkTrademark  Copyright protects original works of authorship, while a patent protects inventions or discoveries.  A trademark protects words, phrases, symbols, or designs identifying the source of the goods or services of one party and distinguishing them from those of others.  18