Top Banner
336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.
44

336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

336699

Presentation by Collie Moran, Jenna Barry, Celeste Bergin,

Órla Leland & Brendan Brophy.

Page 2: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Introducing Privacy

• Privacy is a fundamental human right. • It is protected in the Universal Declaration of Human

Rights, the International Covenant on Civil and Political Rights

• Nearly every country in the world includes a right of privacy in its constitution.

• Most recently written constitutions include specific rights to access and control one's personal information.

• In many of the countries where privacy is not explicitly recognized in the constitution, the courts have found that right in other provisions.

Page 3: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Defining Privacy

• Privacy is perhaps the most difficult to define.

• Definitions of privacy vary widely according to context and environment.

• In many countries, the concept has been fused with data protection.

• Privacy protection is frequently seen as a way of drawing the line at how far society can intrude into a person's affairs.

Page 4: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Some viewpoints on privacy:

"The desire by each of us for physical space where we can be free of interruption, intrusion, embarrassment, or accountability and the attempt to control the time and manner of disclosures of personal information about ourselves." - Robert Ellis Smith, editor of the Privacy Journal

 Privacy is an interest of the human personality. It protects the inviolate personality, the individual's independence, dignity and integrity. - Edward Bloustein, “Privacy as an Aspect of Human Dignity,” 39 New York University Law Review, p. 971 (1964)

 The right of the individual to be protected against intrusion into his personal life or affairs, or those of his family, by direct physical means or by publication of information. - The Calcutt Committee in the United Kingdom

Page 5: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Aspects of Privacy

• Information Privacy

• Bodily Privacy

• Privacy Communications

• Territorial Privacy

Page 6: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Models of Privacy Protection

• Comprehensive Laws

• Sectoral Laws

• Self-Regulation

• Technologies of Privacy

Page 7: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The Evolution of Data Protection

Interest in the right of privacy increased in the 1960s and 1970s with the advent of information technology.

The surveillance potential of powerful computer systems prompted demands for specific rules governing the collection and handling of personal information. The genesis of modern legislation in this area can be traced to the first data protection law in the world enacted in the Land of Hesse in Germany in 1970. This was followed by national laws in Sweden (1973), the United States (1974), Germany (1977), and France (1978).

Page 8: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The expression of data protection in various declarations and laws varies. All require that personal

information must be:

• obtained fairly and lawfully;• used only for the original specified purpose;• adequate, relevant and not excessive to purpose;• accurate and up to date;• accessible to the subject;• kept secure;• destroyed after its purpose is completed.

Page 9: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Privacy laws and the internet

Page 10: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Contents of Laws

• Government records

• Privacy laws

• Amendment I

• Amendment IV

• The patriot act

• Electronic Communications Privacy

Act of 1986

• Communications Assistance for

Law enforcement Act 1994

Page 11: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Government keep record of milestones in our lives

• Birth certificate,

• School exams

• Driving license

• Buying a house

• Getting married

• Death certificate

Page 12: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

First Amendment

• Congress shall make no law respecting

an establishment of religion, or

prohibiting the free exercise thereof; or

abridging the freedom of speech, or of

the press; or the right of the people

peaceably to assemble, and to petition

the government for a redress of

grievances.”

Page 13: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Fourth Amendment

• The right of the people to be secure in their

persons, houses, papers, and effects,

against unreasonable searches and

seizures, shall not be violated, and no

warrants shall issue, but upon probable

cause, supported by oath or affirmation,

and particularly describing the place to be

searched, and the persons or things to be

seized.”

Page 14: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Electronic Communications

• An electronic communication is the transfer of text, signals, signs, sound,

images, data of any character, transmitted by wire (i.e. the internet),

radio, photo-optical, photo-electronic or electromagnetic system. The only

electronic transmission it does not cover is a tracking device, electronic

and electronic funds transferred by a financial institution.

Page 15: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Electronic Communications Privacy Act of 1986

• The issue of access, use, disclosure, interception

and privacy of electronic communications is

covered under the Electronic Communications

Privacy Act 1986 (ECPA). Effectively this covers any

information or communication that is transmitted

partly or wholly by wire, or some other form of

electronic means that affects interstate or foreign

commerce. Under this act, unlawful access or

disclosures of certain contents are prohibited. The

government are also subject to this act and

requires that they must follow certain appropriate

procedures in order to gain lawful access to

electronic communications

Page 16: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The Patriot Act

• The US Patriot Act was passed as a

response to the terrorist attacks of

September 11, 2001. This act is put

in place to allow greater law

enforcement and foreign intelligence

gathering by Federal officials and

significantly increasing their

surveillance, authority in tracking

and intercepting communications by

monitoring private communications

and access personal information.

Page 17: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Communications Assistance for Law enforcement Act 1994

• Congress enacted this law to protect public

safety ensure and national security on

October 25, 1994. Telecommunications

carriers are obliged to assist law

enforcement agencies in executing

electronic surveillance pursuant under

lawful authorisation, interception of

communications and the collection of call-

identifying information.

Telecommunications companies should also

have the required capability and adequate

capacity to help law enforcement agencies

Page 18: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Next ………………….

There are many cases in the US at the moment where the government are using different forms of technology and software to infringe on peoples privacy rights for example cookies, chat-room software, wire-tapping, keystrokes and data-mining.

 Celeste is now going to discuss the software involved and cases

related to the usage of them.

Page 19: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

UNCLE SAM IS TAPPING INTO

YOUR PERSONAL BUSINESS

Page 20: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

DATAINTEGRATION•Pressure on companies

•Data-Mining programs

•Purchase from private sector

Page 21: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

INTERNET WIRETAPPING

•FBI – “Carnivore”

•Broadband and Internet phone services

Page 22: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

COOKIES

•Drug Enforcement

•Government agency's non-compliance

Page 23: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

CHATROOMS

Software funding and the CIA

Page 24: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

KEYSTROKE RECORDER

The Case of Nicodemo Scarfo Jr. (Little Nicky)

Other keystroke methods

Page 25: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Computer Ethics & Privacy

“Computer ethics is a branch of practical philosophy, which deals with how computing professionals should make decisions regarding professional and social conduct.”www.wikipedia.org.

Page 26: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Computer Ethics & Privacy

• Introduction of computers

• Introduction of laws

• Introduction of Ten Commandments.– Dr. Ramon C. Barquins paper “In pursuit of a Ten

commandments for computer ethics”.

Page 27: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The 10 Commandments of Computer Ethics www.brook.edu

• 1.      Thou shalt not use a computer to harm other people. • 2.      Thou shalt not interfere with other people's computer work. • 3.      Thou shalt not snoop around in other people's computer files. • 4.      Thou shalt not use a computer to steal. • 5.      Thou shalt not use a computer to bear false witness. • 6.      Thou shalt not copy or use proprietary software for which you

have not paid. • 7.      Thou shalt not use other people's computer resources

without authorization or proper compensation. • 8.      Thou shalt not appropriate other people's intellectual output. • 9.      Thou shalt think about the social consequences of the

program you are writing or the system you are designing. • 10. Thou shalt always use a computer in ways that insure

consideration and respect for your fellow humans

Page 28: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The 10 Commandments of Computer Ethics• Commandment 1) Thou shalt not use a computer to

harm other people – Environment?– Animals?

• Commandment 1 & 10: Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.V’sArticle 19 of the Universal declaration of Human Rights:Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

Page 29: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The 10 Commandments of Computer Ethics

• Commandment 3) Thou shalt not snoop around in other people's computer files. – Finger Tool?– Crime?

• Commandment 7) Thou shalt not use other people's computer resources without authorization or proper compensation. – What about in an emergency?

Page 30: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The 10 Commandments of Computer Ethics

• The dilemma of the Internet:

What we have a right to do V’s

What is right to do…….

The Right to Privacy: No one shall be subjected to arbitrary interference

with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

Page 31: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Rights Ethics & Privacy

• Non-Consequential

• Moral rights rather than Legal Rights

• Example: – The FBI Wiretap.– Wiretapping the Government

Page 32: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Utilitarianism & Privacy

• The greater good• Example: Data mining can lead to the capture of

terrorists…..

Page 33: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Kant & Privacy

• Universality of actions

• Example:– The surveillance of chat rooms

Page 34: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Rule & Act Utilitarianism

• Rule:• Following rules will maximise happiness• Following the 10 commandments

– Example:Commandment 3 Thou shalt not snoop around in other people's computer files.

• Act: Consequences of Individual acts.– Example: Commandment 9 Thou shalt think about

the social consequences of the program you are writing or the system you are designing.

– Thinking V’s Acting

Page 35: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

The 10 Commandments of Computer Ethics

• Good Starting Point

• Brief

• Lack of Detail

• Conclusion

Page 36: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Conclusion

Page 37: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Colin

• Introduced privacy and defined it.

• Different forms of privacy

• The four main laws of privacy

Page 38: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Jenna

• The legal end of Privacy

• Amendment 1 & 4

• Act 1 & 2

Page 39: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Celeste

• Issues & Examples

• Wiretapping

• Chat Rooms

• Cookies

Page 40: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Orla

• Ethics & Morality

• The Ten Commandments of Computer Ethics

• Rights Ethics

Page 41: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Ireland on Privacy

• Article 40.3.1

“The State guarantees in its laws to respect, and, as far as practicable, by its laws to defend and vindicate the personal rights of the citizens”

Page 42: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Ireland on Privacy

• Internet Society Commission

Page 43: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

Ireland on Privacy

• Protection of Privacy • Data Retention• ICTs

Page 44: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.

References