SlideShare a Scribd company logo
Privacy
in the digital age
Jane Prusakova
@jprusakova
Why care about
Surveillance as a business model
Pre-digital surveillance
• Nielsen surveys – media and TVs
• US Post office – address information
• White pages – phone and address
• Credit reporting
• Store loyalty cards
Your data or your life?
In plain view Location
Thoughts &
actions
PurchasesInteractions
Interests &
queries
Self-Censored
Metadata
DNA &
biometrics
FROM ENTERTAINMENT
TO APPLIENCES
TO FULL CLOUD CONTROL
Commercial Value of Data
•Facebook $245 billion
• 1 1/2 billion users
•United Airlines $22 billion
• Planes, licenses, contracts on airport slots
User value of data
Supplies her data to multiple
aggregators
Maintains exclusive
relationship for one provider
RECEIVES SAME SERVICE AND BENEFITS
Knowledge is Power
Price discrimination
Bias choices
Knowledge is Power
Aggregate data
-Scientific research and
development
- Learn from others’ experience
People living under constant
surveillance quickly realise that
privacy isn't about having
something to hide. It's about
individuality and personal
autonomy. It's about being able
to decide who to reveal yourself
to and under what terms. It's
about being free to be an
individual and not having to
constantly justify yourself to
some overseer.
SCHNEIER ON
SECURITY
Bruce Schneier
Cryptographer,
computer security and
privacy specialist.
The development of critical
subjectivity is a realistic goal
only to the extent that privacy
comes into play. Subjectivity is a
function of the interplay
between emergent selfhood and
social shaping; privacy, which
inheres in the interstices of
social shaping, is what permits
that interplay to occur.
WHAT PRIVACY IS FOR
JULIE E. COHEN
Professor of Law and
Technology
Georgetown LawLack of privacy means reduced
scope for self-making.
Ephemeral
•Conversations, interactions, events
• Exceptions:
• court proceedings
• recorded performances
• portraits and photographs
• diaries
Data privacy laws: US
•Ad-hoc approach
• Right to privacy is implicit
• Laws and regulation apply to narrow
classes of data
• Self-regulation
• Industry is expected to design regulations
Data privacy laws: US
•Control means ownership
• Subject of the data has no rights in respect to
data
•Legal protections are narrow exceptions
• Financial data
• Medical records
• Children information
Data privacy laws: EU
Data Protection Directive 95/46/EC
• Data owned by subject of the data.
• Principles
• Transparency
• Legitimate purpose
• Proportionality
Data privacy laws: EU
• Rights and responsibilities
• Personal data should not be gathered or
processed, except when strict conditions are
met.
• The data subject has rights regarding her data.
• Consent is required for processing, except in
special circumstances.
• Consent can be withdrawn.
Cost of data ownership
•Responsibilities
•Security breach
•Risk of lawsuits
SECURITY vs PRIVACY
Privacy
in the digital age
Jane Prusakova
@jprusakova

More Related Content

What's hot

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
Mark Jhon Oxillo
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
Mark Jhon Oxillo
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Bribery and corruption
Bribery and corruptionBribery and corruption
Bribery and corruption
CCEF Australie
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aashir Khalil
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 

What's hot (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Ethics for IT Workers and IT Users
Ethics for IT Workers and IT UsersEthics for IT Workers and IT Users
Ethics for IT Workers and IT Users
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Bribery and corruption
Bribery and corruptionBribery and corruption
Bribery and corruption
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 

Similar to Privacy In The Digital Age

Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Rebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Security Innovation
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
Jonathan Ezor
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
James Mulhern
 
Constraintsand challenges
Constraintsand challengesConstraintsand challenges
Constraintsand challenges
jyotikhadake
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
ARDC
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Clio - Cloud-Based Legal Technology
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Energy Data Privacy Presentation
Energy Data Privacy PresentationEnergy Data Privacy Presentation
Energy Data Privacy PresentationBrian Orion
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
LAURA VIVET
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Liza Dawson, "The Common Rule and Research with Data, Big and Small"
Liza Dawson, "The Common Rule and Research with Data, Big and Small"Liza Dawson, "The Common Rule and Research with Data, Big and Small"
Liza Dawson, "The Common Rule and Research with Data, Big and Small"
The Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
JohnLagman3
 

Similar to Privacy In The Digital Age (20)

Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Constraintsand challenges
Constraintsand challengesConstraintsand challenges
Constraintsand challenges
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Energy Data Privacy Presentation
Energy Data Privacy PresentationEnergy Data Privacy Presentation
Energy Data Privacy Presentation
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Liza Dawson, "The Common Rule and Research with Data, Big and Small"
Liza Dawson, "The Common Rule and Research with Data, Big and Small"Liza Dawson, "The Common Rule and Research with Data, Big and Small"
Liza Dawson, "The Common Rule and Research with Data, Big and Small"
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 

More from Jane Prusakova

Software architecture houstontechfest2020
Software architecture houstontechfest2020Software architecture houstontechfest2020
Software architecture houstontechfest2020
Jane Prusakova
 
Estimating software development
Estimating software developmentEstimating software development
Estimating software development
Jane Prusakova
 
Better remote teams
Better remote teamsBetter remote teams
Better remote teams
Jane Prusakova
 
Thoughts on building software architecture
Thoughts on building software architectureThoughts on building software architecture
Thoughts on building software architecture
Jane Prusakova
 
Improving IT Performance
Improving IT PerformanceImproving IT Performance
Improving IT Performance
Jane Prusakova
 
Agile Software Development
Agile Software DevelopmentAgile Software Development
Agile Software Development
Jane Prusakova
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
Jane Prusakova
 
Just startcoding
Just startcodingJust startcoding
Just startcoding
Jane Prusakova
 
Just start coding
Just start codingJust start coding
Just start coding
Jane Prusakova
 
Good code
Good codeGood code
Good code
Jane Prusakova
 
Managing remote teams.
Managing remote teams.Managing remote teams.
Managing remote teams.
Jane Prusakova
 
Gender-neutral Recruiting
Gender-neutral RecruitingGender-neutral Recruiting
Gender-neutral Recruiting
Jane Prusakova
 
Interview: a Learning Conversation
Interview: a Learning ConversationInterview: a Learning Conversation
Interview: a Learning Conversation
Jane Prusakova
 
Effective Code Review
Effective Code ReviewEffective Code Review
Effective Code Review
Jane Prusakova
 
Effective Code Review
Effective Code ReviewEffective Code Review
Effective Code Review
Jane Prusakova
 
Lets talk about good code
Lets talk about good codeLets talk about good code
Lets talk about good code
Jane Prusakova
 
Motivating Knowledge Workers
Motivating Knowledge WorkersMotivating Knowledge Workers
Motivating Knowledge Workers
Jane Prusakova
 
What is good code?
What is good code?What is good code?
What is good code?
Jane Prusakova
 
Pragmatic Agile: distributed teams
Pragmatic Agile: distributed teamsPragmatic Agile: distributed teams
Pragmatic Agile: distributed teams
Jane Prusakova
 
A case for remote teams
A case for remote teamsA case for remote teams
A case for remote teams
Jane Prusakova
 

More from Jane Prusakova (20)

Software architecture houstontechfest2020
Software architecture houstontechfest2020Software architecture houstontechfest2020
Software architecture houstontechfest2020
 
Estimating software development
Estimating software developmentEstimating software development
Estimating software development
 
Better remote teams
Better remote teamsBetter remote teams
Better remote teams
 
Thoughts on building software architecture
Thoughts on building software architectureThoughts on building software architecture
Thoughts on building software architecture
 
Improving IT Performance
Improving IT PerformanceImproving IT Performance
Improving IT Performance
 
Agile Software Development
Agile Software DevelopmentAgile Software Development
Agile Software Development
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
 
Just startcoding
Just startcodingJust startcoding
Just startcoding
 
Just start coding
Just start codingJust start coding
Just start coding
 
Good code
Good codeGood code
Good code
 
Managing remote teams.
Managing remote teams.Managing remote teams.
Managing remote teams.
 
Gender-neutral Recruiting
Gender-neutral RecruitingGender-neutral Recruiting
Gender-neutral Recruiting
 
Interview: a Learning Conversation
Interview: a Learning ConversationInterview: a Learning Conversation
Interview: a Learning Conversation
 
Effective Code Review
Effective Code ReviewEffective Code Review
Effective Code Review
 
Effective Code Review
Effective Code ReviewEffective Code Review
Effective Code Review
 
Lets talk about good code
Lets talk about good codeLets talk about good code
Lets talk about good code
 
Motivating Knowledge Workers
Motivating Knowledge WorkersMotivating Knowledge Workers
Motivating Knowledge Workers
 
What is good code?
What is good code?What is good code?
What is good code?
 
Pragmatic Agile: distributed teams
Pragmatic Agile: distributed teamsPragmatic Agile: distributed teams
Pragmatic Agile: distributed teams
 
A case for remote teams
A case for remote teamsA case for remote teams
A case for remote teams
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 

Recently uploaded (20)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 

Privacy In The Digital Age

  • 1. Privacy in the digital age Jane Prusakova @jprusakova
  • 3. Surveillance as a business model
  • 4. Pre-digital surveillance • Nielsen surveys – media and TVs • US Post office – address information • White pages – phone and address • Credit reporting • Store loyalty cards
  • 5.
  • 6. Your data or your life?
  • 7. In plain view Location Thoughts & actions PurchasesInteractions Interests & queries Self-Censored Metadata DNA & biometrics
  • 10. TO FULL CLOUD CONTROL
  • 11.
  • 12. Commercial Value of Data •Facebook $245 billion • 1 1/2 billion users •United Airlines $22 billion • Planes, licenses, contracts on airport slots
  • 13. User value of data Supplies her data to multiple aggregators Maintains exclusive relationship for one provider RECEIVES SAME SERVICE AND BENEFITS
  • 14. Knowledge is Power Price discrimination Bias choices
  • 15. Knowledge is Power Aggregate data -Scientific research and development - Learn from others’ experience
  • 16.
  • 17.
  • 18. People living under constant surveillance quickly realise that privacy isn't about having something to hide. It's about individuality and personal autonomy. It's about being able to decide who to reveal yourself to and under what terms. It's about being free to be an individual and not having to constantly justify yourself to some overseer. SCHNEIER ON SECURITY Bruce Schneier Cryptographer, computer security and privacy specialist.
  • 19. The development of critical subjectivity is a realistic goal only to the extent that privacy comes into play. Subjectivity is a function of the interplay between emergent selfhood and social shaping; privacy, which inheres in the interstices of social shaping, is what permits that interplay to occur. WHAT PRIVACY IS FOR JULIE E. COHEN Professor of Law and Technology Georgetown LawLack of privacy means reduced scope for self-making.
  • 20.
  • 21.
  • 22. Ephemeral •Conversations, interactions, events • Exceptions: • court proceedings • recorded performances • portraits and photographs • diaries
  • 23. Data privacy laws: US •Ad-hoc approach • Right to privacy is implicit • Laws and regulation apply to narrow classes of data • Self-regulation • Industry is expected to design regulations
  • 24. Data privacy laws: US •Control means ownership • Subject of the data has no rights in respect to data •Legal protections are narrow exceptions • Financial data • Medical records • Children information
  • 25. Data privacy laws: EU Data Protection Directive 95/46/EC • Data owned by subject of the data. • Principles • Transparency • Legitimate purpose • Proportionality
  • 26. Data privacy laws: EU • Rights and responsibilities • Personal data should not be gathered or processed, except when strict conditions are met. • The data subject has rights regarding her data. • Consent is required for processing, except in special circumstances. • Consent can be withdrawn.
  • 27. Cost of data ownership •Responsibilities •Security breach •Risk of lawsuits
  • 29. Privacy in the digital age Jane Prusakova @jprusakova

Editor's Notes

  1. Granted, not the entire internet is service-for-privacy. Lavabit, a secure email provider, famously shutdown in 2013, after it was served a government court order to turn over its encryption keys used for all users’ data, because Edward Snowden may have been a client. There are services offering secure email, anonymous web browsing, anonymous social networks.
  2. Stores used to know what we buy – patterns of items, timing, costs.
  3. Now we moved to smarter devices – and we are sharing new information.
  4. Computers are taking an increasingly larger spot in our lives – personal, professional, and social.
  5.  Samsung televisions that listen to conversations in the room and send them elsewhere for transcription—just in case someone is telling the TV to change the channel—and a Barbie that records your child's questions and sells them to third parties.
  6. “interactive doll”, the toy uses voice recognition technology similar to that employed by Apple’s Siri and Google’s Now digital assistants to understand what a child is saying to Barbie and respond. However, privacy advocates are worried about the use of voice recognition technology that sends recordings of children to third-party companies for processing, potentially revealing his or her intimate thoughts and details.
  7. More data means better value from advertising. But more data also brings diminishing returns in advertising value. Additionally, the cost of advertising is going down since everyone is getting access to the same improved data and ways to benefit from it. In 2012, Target started sending a young woman adverts for baby items, before the girl had a chance to tell her parents that she was expecting. We are figuring out that ads are becoming targeted – and feel creepy about advertising. Which leads to more advertising being pushed, since advertising is the major revenue stream for much of Internet-based market.
  8. Medical research, popularity contests, product and service reviews. Open and transparent customer support.
  9. The rise of social networking online means that people no longer have an expectation of privacy, according to Facebook founder Mark Zuckerberg. Talking at the Crunchie awards in San Francisco this weekend, the 25-year-old chief executive of the world's most popular social network said that privacy was no longer a "social norm". "People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people," he said. "That social norm is just something that has evolved over time."
  10. Beria was the longest-lived and most influential of Stalin's secret police chiefs. The Great Purge or the Great Terror (Russian: Большой террор) was a campaign of political repression in the Soviet Union which occurred from 1936 to 1938, and continued into the 1940s. A great number of accusations, were based on forced confessions, often obtained through torture,[4] and on loose interpretations of Article 58 of the RSFSR Penal Code, which dealt with counter-revolutionary crimes. Hundreds of thousands of victims were accused of various political crimes (espionage, wrecking,sabotage, anti-Soviet agitation, conspiracies to prepare uprisings and coups); they were quickly executed by shooting, or sent to the Gulag labor camps. Many died at the penal labor camps of starvation, disease, exposure, and overwork. Other methods of dispatching victims were used on an experimental basis. After becoming chief of NKVD in 1938, oversaw a purge of ½ the organization – with people being sent to death and prison, including his former boss.
  11. Medtronic and car manufacturers claim ownership of the data produced by their respective devices (pace makers, stencils,
  12. The data subject has the right to be informed when his personal data is being processed. The data subject has the right to access all data processed about him. The data subject even has the right to demand the rectification, deletion or blocking of data that is incomplete, inaccurate or isn't being processed in compliance with the data protection rules. The data subject may object at any time to the processing of personal data for the purpose of direct marketing. 
  13. The data subject has the right to be informed when his personal data is being processed. The data subject has the right to access all data processed about him. The data subject even has the right to demand the rectification, deletion or blocking of data that is incomplete, inaccurate or isn't being processed in compliance with the data protection rules. The data subject may object at any time to the processing of personal data for the purpose of direct marketing. 
  14. Collecting and keeping consumer data is easy, convenient, comes with commercial benefits, but not a lot of costs – at least in the US. The legal framework in place provides virtually no rights to the data subject, i.e. consumers, thus relieving corporations of most of the responsibilities in regard to the data they hold. The majority of the cost of security breaches is generally passed to data holders. The onus is on the consumer to prove damages, and to prove that a particular data leak caused it. Consumer data is held and distributed by multiple entities, and in general consumers do not know (nor consent) what entities have access and distribution rights to their data. Cost of data ownership is higher in Europe, because data holders have responsibilities toward data subjects. As a result, corporations are more careful collecting, using, holding and distributing data – and disclosing to data subjects how their data is utilized.
  15. An honest, open examination of surveillance programs might show the choice is not so simple, says Ashkan Soltani, an independent security researcher. Casting such wide nets is also ineffective, he argues. Collecting mountains and mountains of data simply means that when the time comes to find that proverbial needle in a haystack, you've simply created a bigger haystack. "Law enforcement is being sold bill of goods that the more data you get, the better your security is. We find that is not true," Soltani said.