Top Banner
Privacy and Civil Privacy and Civil Liberties Liberties Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy Protection Protection Privacy Implications of Massive Privacy Implications of Massive Database Systems Database Systems Technological Strategies for Privacy Technological Strategies for Privacy Protection Protection Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace
47

Privacy and Civil Liberties Ethical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Systems Technological Strategies.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy Protection Protection

Privacy Implications of Massive Database Privacy Implications of Massive Database Systems Systems

Technological Strategies for Privacy Technological Strategies for Privacy Protection Protection

Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the WorkplacePrivacy in the Workplace

Page 2: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy Protection Protection

Privacy Implications of Massive Database Privacy Implications of Massive Database Systems Systems

Technological Strategies for Privacy Technological Strategies for Privacy Protection Protection

Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace

Page 3: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Ethical and Legal Basis Ethical and Legal Basis for Privacy Protectionfor Privacy Protection

The word “privacy” is not The word “privacy” is not found in the constitution.found in the constitution.

Which means…Which means…

The U.S. Supreme Court must interpret whether or not our founding fathers intended for a right to privacy.

Page 4: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Unethical practices regarding Unethical practices regarding privacy by businessprivacy by business

TiVo sells detailed informationTiVo sells detailed information Cell phones can track individualsCell phones can track individuals Spyware was found on 91 percent of the Spyware was found on 91 percent of the

120 computers with a hi-speed Internet 120 computers with a hi-speed Internet connection connection

Spam email reached 40 percent in 2003Spam email reached 40 percent in 2003

Page 5: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Unethical practices regarding Unethical practices regarding privacy by governmentprivacy by government

FBI, illegal use of FBI, illegal use of wiretaps.wiretaps.

In 1967, phone taps were deemed In 1967, phone taps were deemed illegal thought Katz v. United illegal thought Katz v. United StatesStates

NSA, operation NSA, operation shamrockshamrock

During WWII, the government had During WWII, the government had access to all telegram traffic.access to all telegram traffic.

Page 6: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Unethical Practice = Legal Unethical Practice = Legal BasisBasis

Having witnessed the abuse of power Having witnessed the abuse of power by the government, people sought out by the government, people sought out for protection.for protection.

Privacy Act of 1974Privacy Act of 1974

-granted fundamental rights to privacy.-granted fundamental rights to privacy.

http://www.cdt.org/privacy/guide/protect/laws.shtmlhttp://www.cdt.org/privacy/guide/protect/laws.shtml

Page 7: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Recent legislation and privacy Recent legislation and privacy threatsthreats

The PATRIOT Act of 2001The PATRIOT Act of 2001Government can legally tap telephone lines in Government can legally tap telephone lines in certain cases, and has the ability to intercept certain cases, and has the ability to intercept Internet messages through its Carnivore program. Internet messages through its Carnivore program.

ECHELONECHELONCaptures and analyzes virtually every phone call, Captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in fax, email and telex message sent anywhere in the world the world

What is going on?

Page 8: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Privacy Implications of Massive

Database SystemsDatabase Systems Technological Strategies for Privacy Technological Strategies for Privacy

Protection Protection Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace

Page 9: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy Implications of Privacy Implications of Massive Database Massive Database

SystemsSystems

Bryan Sullivan

Page 10: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

The ProblemThe Problem

Debate over personal privacy and Debate over personal privacy and data miningdata mining

• Data TrackingData Tracking

• Data MiningData Mining

Page 11: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

HistoryHistory

Data TrackingData Tracking• Data tracking: gathering data by Data tracking: gathering data by

querying a database and deducing querying a database and deducing confidential information.confidential information.

• Trackers may store the results of Trackers may store the results of multiple queries.multiple queries.

• Data tracking has been a problem for Data tracking has been a problem for the past two decadesthe past two decades

Page 12: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Tracking ExampleTracking Example

Page 13: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Data MiningData Mining

Data mining accomplishes essentially Data mining accomplishes essentially what tracking doeswhat tracking does

Data mining software allows the Data mining software allows the common user to perform data common user to perform data tracking, whereas before data mining tracking, whereas before data mining software, user had to be rather software, user had to be rather sophisticated in making deductionssophisticated in making deductions

Page 14: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

ImplicationsImplications

Unfair PracticeUnfair Practice

National securityNational security

Sparks ethical debate: Sparks ethical debate: Assuring Assuring privacy when big brother is watching privacy when big brother is watching

Page 15: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy ProtectionProtection

Privacy Implications of Massive Database Privacy Implications of Massive Database Systems Systems

Technological Strategies for Privacy Technological Strategies for Privacy ProtectionProtection

Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace

Page 16: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Technical Strategies to Technical Strategies to Privacy Protection Privacy Protection

Carl Tsue

Page 17: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

What’s the problem?What’s the problem?

• Weak SecurityWeak Security• Data MagnetsData Magnets

Explicitly collecting information through online Explicitly collecting information through online registrationregistration

Identifying users through IP addressesIdentifying users through IP addresses Software DownloadsSoftware Downloads CookiesCookies Web BeaconsWeb Beacons Screen scrapingScreen scraping Federated identityFederated identity Indirectly collecting informationIndirectly collecting information

Page 18: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Strategies for privacy protection Strategies for privacy protection

Client-based Solutions Client-based Solutions Server-based SolutionsServer-based Solutions Client-server-based SolutionsClient-server-based Solutions

Page 19: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Client-based Solutions Client-based Solutions

• Client based Solutions Client based Solutions FirewallFirewall Proxy based anonymizersProxy based anonymizers Routing based anonymizersRouting based anonymizers Mix-Based anonymizersMix-Based anonymizers Peer-to-Peer anonymizersPeer-to-Peer anonymizers

Page 20: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Server-based SolutionServer-based Solution

Virtual Private Networks Virtual Private Networks

Page 21: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Client-server-based SolutionsClient-server-based Solutions

• Client-server-based solutionClient-server-based solution Negotiation-based solutionNegotiation-based solution

• P3PP3P Encryption-based SolutionsEncryption-based Solutions

• Symmetric encryption Symmetric encryption • Asymmetric encryption Asymmetric encryption

Page 22: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Privacy Implications of Massive Database

Systems Systems Technological Strategies for Privacy Technological Strategies for Privacy

Protection Protection Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace

Page 23: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Freedom of Expression in Freedom of Expression in CyberspaceCyberspace

Marc Van Gelder

Page 24: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Historical PerspectiveHistorical Perspective

What does Freedom of Expression really What does Freedom of Expression really mean?mean?• Has always been a debatable topicHas always been a debatable topic

Free Speech and the InternetFree Speech and the Internet• December 11, 2002December 11, 2002

Ethical Blogging and Information (Content) Ethical Blogging and Information (Content) FilteringFiltering

Page 25: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Ethical BloggingEthical Blogging What is Blogging?What is Blogging?

Joyce Park (aka Troutgirl)Joyce Park (aka Troutgirl)• Worked for FriendsterWorked for Friendster

Michael HanscomMichael Hanscom• Contractor who worked for MicrosoftContractor who worked for Microsoft

Ellen SimonettiEllen Simonetti• Worked for Delta Air LinesWorked for Delta Air Lines

Page 26: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Information (Content) FilteringInformation (Content) Filtering

Libraries – a haven for free speech?Libraries – a haven for free speech?• Information FilteringInformation Filtering

Concept: Single Book vs. EncyclopediaConcept: Single Book vs. Encyclopedia

““Filtering software is known to be wrong Filtering software is known to be wrong about one out of five times”, based on a about one out of five times”, based on a review by Consumer Reportsreview by Consumer Reports

Page 27: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Empirical Analysis of Internet Empirical Analysis of Internet Filtering in ChinaFiltering in China

Google search termProportion of Top 10 Sites

BlockedProportion of Top 100 Sites

Blocked

Tibet 100% 64%

taiwan china 100% 37%

equality 100% 24%

democracy china 80% 42%

dissident china 80% 37%

taiwan 70% 47%

revolution 70% 21%

dissident 60% 31%

性病 ("STDs" in Chinese) 60% 13%

freedom china 60% 32%

justice china 60% 30%

counterrevolution china 50% 21%

news china 40% 40%

liberty china 40% 17%

Data Source: http://cyber.law.harvard.edu/filtering/china/

Page 28: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

ConclusionConclusion

Nature of the InternetNature of the Internet

Should governments fear the Should governments fear the Internet’s ability to freely share Internet’s ability to freely share information?information?

Freedom of InformationFreedom of Information

Page 29: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Privacy Implications of Massive Database

Systems Systems Technological Strategies for Privacy Technological Strategies for Privacy

Protection Protection Freedom of Expression in CyberspaceFreedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the WorkplacePrivacy in the Workplace

Page 30: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

International ImplicationsInternational Implications

Matt Zayatz

Page 31: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Foreign LawsForeign Laws

Free SpeechFree Speech Taken for granted by U.S.Taken for granted by U.S. Protected by the First AmendmentProtected by the First Amendment But in some countries, speech isn’t freeBut in some countries, speech isn’t free Former East GermanyFormer East Germany Former Soviet UnionFormer Soviet Union ChinaChina North KoreaNorth Korea

Page 32: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Foreign Laws (Continued) Foreign Laws (Continued) Copyright LawCopyright Law DMCA – U.S. but enforceable elsewhere? DMCA – U.S. but enforceable elsewhere? Intellectual Property – Held with high regard Intellectual Property – Held with high regard

in other countries? in other countries? Other Differences in Foreign LawOther Differences in Foreign Law Basic human rightsBasic human rights Right to privacyRight to privacy EncryptionEncryption Search and seizure, warrants.Search and seizure, warrants. Right to anonymity Right to anonymity ConsequencesConsequences

Page 33: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Potential Problems Potential Problems

International Considerations International Considerations Open Source SoftwareOpen Source Software Software audienceSoftware audience Licensing Licensing PiracyPiracy Import / Export RegulationImport / Export Regulation MoralMoral International LawyerInternational Lawyer ResearchResearch

Page 34: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Privacy Implications of Massive Database

Systems Systems Technological Strategies for Privacy Technological Strategies for Privacy

Protection Protection Freedom of Expression in CyberspaceFreedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the WorkplacePrivacy in the Workplace

Page 35: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Privacy in the WorkplacePrivacy in the Workplace

A Growing Concern under A Growing Concern under Technological Improvements and Technological Improvements and

SurveillanceSurveillance

Gene CummGene Cumm

Page 36: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

BackgroundBackground DefineDefine

• general privacy versus workplace privacygeneral privacy versus workplace privacy• ““Freedom from the inappropriate judgement Freedom from the inappropriate judgement

of others” [Johnson]of others” [Johnson] Allowed?Allowed?

• Everything in the workplace, except where a Everything in the workplace, except where a person would have “a reasonable person would have “a reasonable expectation of privacy”expectation of privacy”

• Most federal jobs have some protectionMost federal jobs have some protection Reasoning: Safety and Justification of Reasoning: Safety and Justification of

ExpensesExpenses

Page 37: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Cases and examplesCases and examples CasesCases

• Bourke et al. v NissanBourke et al. v Nissan• Smyth v. PillsburySmyth v. Pillsbury• Restuccia et al. v. Burk Technology, Restuccia et al. v. Burk Technology,

Inc.Inc. ExamplesExamples

• Preston: hidden surveillance and Preston: hidden surveillance and 'Truth Phone''Truth Phone'

Page 38: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

ConclusionsConclusions Be Aware, Informed, and EducatedBe Aware, Informed, and Educated

• Laws countLaws count• Policies don't always reciprocatePolicies don't always reciprocate• Destroying data requires destroying Destroying data requires destroying

mediamedia "Whether or not privacy is protected by law "Whether or not privacy is protected by law

or contract, fostering a workplace culture or contract, fostering a workplace culture where privacy is valued and respected where privacy is valued and respected contributes to morale and mutual trust, and contributes to morale and mutual trust, and makes good business sense." makes good business sense." http://www.privcom.gc.ca/fs-fi/02_05_d_17_http://www.privcom.gc.ca/fs-fi/02_05_d_17_e.aspe.asp

Page 39: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

More International IssuesMore International Issues

Peter StrombergPeter Stromberg

Page 40: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

International IssuesInternational Issues Intellectual Property rightsIntellectual Property rights SecuritySecurity Access/Digital DivideAccess/Digital Divide

Page 41: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

History of Intellectual Property History of Intellectual Property rightsrights

1883: Paris Convention for the Protection 1883: Paris Convention for the Protection of Industrial Propertyof Industrial Property

1896: Berne Convention for the Protection 1896: Berne Convention for the Protection of Literary and Artistic Worksof Literary and Artistic Works

Page 42: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Modern International ProtectionsModern International Protections

World Intellectual Property Organization World Intellectual Property Organization (WIPO) in the World Copyright Treaty (WIPO) in the World Copyright Treaty (WCT) in 1996(WCT) in 1996

1995: Agreement on Trade-Related 1995: Agreement on Trade-Related Aspects of Intellectual Property Rights Aspects of Intellectual Property Rights (“TRIPS”) adopted by the World Trade (“TRIPS”) adopted by the World Trade Organization (WTO)Organization (WTO)

Page 43: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

International SecurityInternational Security

Individuals can affect the global economy Individuals can affect the global economy and cause billions of dollars in damagesand cause billions of dollars in damages

● ex) teenager from Minnesota modified ex) teenager from Minnesota modified the blaster worm code and released it the blaster worm code and released it damaging over 48,000 computersdamaging over 48,000 computers

Many systems are vulnerable to attackMany systems are vulnerable to attack IT security as a new front in the global war IT security as a new front in the global war

on terrorismon terrorism

Page 44: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

International Security ProtectionsInternational Security Protections

There is currently not international agency There is currently not international agency responsible for international computer securityresponsible for international computer security

Cooperation between nations lags the global Cooperation between nations lags the global threatthreat

Any global efforts must coordinate many Any global efforts must coordinate many separate police and intelligence forcesseparate police and intelligence forces

Page 45: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

The Digital DivideThe Digital Divide There are more telephones in New York There are more telephones in New York

City than all of rural Africa.City than all of rural Africa. There are more Internet accounts in There are more Internet accounts in

London than all of Africa.London than all of Africa. Around 80% of the world's population has Around 80% of the world's population has

never made a phone call.never made a phone call. Segregation into the “information rich” Segregation into the “information rich”

and the “information poor”and the “information poor”

Page 46: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Digital Divide ContinuedDigital Divide Continued

Page 47: Privacy and Civil Liberties  Ethical and Legal Basis for Privacy Protection  Privacy Implications of Massive Database Systems  Technological Strategies.

Whats being done?Whats being done?

Many non-government aid organizations Many non-government aid organizations committed to providing ICTs to poorer committed to providing ICTs to poorer countries countries

Some companies see developing Some companies see developing countries without ICT opportunities as lost countries without ICT opportunities as lost markets and are therefore working to close markets and are therefore working to close the gap.the gap.