1 The Impact of Computer Technology Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: • Freedom from intrusion. • Control of information about oneself. • Freedom from surveillance. Privacy and Personal Information
Privacy and Personal Information. The Impact of Computer Technology. Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: Freedom from intrusion. Control of information about oneself. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
The Impact of Computer Technology
Computers are not needed for the invasion of privacy.
Computers simply make new threats possible and old threats more potent.
Privacy can mean:• Freedom from intrusion.• Control of information about oneself.• Freedom from surveillance.
Q: What other personal information should a national ID card contain?
24
More Privacy Risks
National ID Card System
If implemented, the system could allow access to your:
• Medical information.• Tax records.• Citizenship.• Credit history.• Much more…
25
26
27
More Privacy Risks
Personal Health and Medical Information
Data can include:• History of substance abuse.• Treatment for sexually
transmitted disease.• Extent of psychiatric help
received.• Any suicide attempt(s).• Diagnosis of diseases
(diabetes, angina, cancer, etc.).
• Use of prescribed medicines.
• Much more…
28
More Privacy Risks
Public RecordsAvailable in paper form and/or online:
• Bankruptcy.• Arrest.• Marriage-license
application.• Divorce proceedings.• Property ownership.• Salary (if employed by state
or federal government).• Wills and Trusts.• Much more…
Q: How should access to public records be controlled?
29
Protecting Privacy: Education, Technology, and Markets
EducationMust include awareness of:
• How the technology works.• How the technology is being used.• The risks brought on by the technology.• How to limit unwanted use of personal information.• Applicable state and federal laws and regulations.
Q: How do you limit unwanted use of your personal information?
30
Protecting Privacy: Education, Technology, and Markets
TechnologyEnhance privacy using:
• Cookie disablers.• Opt-in/opt-out options.• Anonymous Web services.• P3P (Platform for Privacy Preferences).• ‘Good’ passwords.• Audit trails.
Q: What privacy-enhancing technology do you use regularly?
31
Protecting Privacy: Education, Technology, and Markets
Market ResponseMarkets can protect your privacy by:
• Using trusted third parties.• Adhering to established privacy policies.• Purchasing consumer information directly from the consumer.• Developing and selling privacy-enhancing technologies and
services.
Q: Have you read the privacy policies at Web sites you frequent?
32
Protecting Privacy: Law and Regulation
Philosophical ViewsSamuel Warren & Louis Brandeis:
• Individuals have the right to prohibit publication of personal facts and photos.
Judith Jarvis Thompson:• No distinct right to privacy.• Privacy rights result from rights to our property, body, and
contracts.
Transactions:• Transactions have two parties, often with conflicting
preferences about privacy.
33
Protecting Privacy: Law and Regulation
Contrasting ViewsFree-market View
• The parties of a transaction are viewed as equal.• Truth in information gathering.• Strong reliance on contracts.• Freedom of speech and commerce.
Consumer-Protection View• The parties of a transaction are viewed differently.• More stringent consent requirements required by law.• Strong limitations on secondary uses of information required
by law.• Legal restrictions on consumer profiling.
Q: How should the privacy of consumer transactions be regulated?
34
Protecting Privacy: Law and Regulation
Contracts and RegulationsBasic Legal Framework:
• Enforce agreements and contracts.• Publish privacy policies.• Set defaults for situations not in contract.
Requiring Specific Consent policies:• Adhere to informed consumer consent.• Use opt-in policies.
Legal Regulations:• Determine effectiveness, direct and hidden costs, and any loss
of services or inconvenience.
Q: Recall a situation where you exchanged personal information for some benefit.
35
Protecting Privacy: Law and Regulation
Contracts and Regulations (cont’d)
Ownership of personal data. Can an individual own:• Facts (e.g. marriage license in public records)?• Personal information (e.g. your date of birth)?
Freedom of speech• Prohibiting communication of information may violate the ???
Amendment.
Q: When does protecting privacy conflict with freedom of speech?
36
Protecting Privacy: Law and Regulation
EU (European Union) Privacy RegulationKey points:
• Limited collection of personal data.• Data must be up-to-date and destroyed when no longer
needed.• Consent for sharing data is required.• Sensitive data (e.g. religion) can only be provided with
consent.• Notify consumers about the collection and intended purpose of
data.• Restricted access and sharing of criminal convictions.
Q: Can the EU’s privacy regulations work in the US? Indonesia ?