SlideShare a Scribd company logo
1 of 27
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 1
Social, Legal, and Ethical Issues for Computers and the Internet
Privacy & Personal Information
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 2
A Gift of Fire
Privacy and Personal Information
The Impact of Computer Technology
“Big Brother is Watching You”
Consumer Information
More Privacy Risks
Protecting Privacy: Education, Technology, and Markets
Protecting Privacy: Law and Regulation
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 3
The Impact of Computer Technology
Computers are not needed for the invasion of
privacy.
Computers simply make new threats possible
and old threats more potent.
Privacy can mean:
• Freedom from intrusion-being left alone.
• Control of information about oneself.
• Freedom from surveillance (followed, watched, eavesdropped upon).
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 4
The Impact of Computer Technology
Invisible Information Gathering
Examples:
• Satellite surveillance.
• Caller ID.
• 800- or 900-number calls. Or Pizza Hut!
• Web-tracking data; cookies. Peer-to-peer monitoring.
– Spyware such as Gator, BonziBUDDY, and Comet Cursor is often
surreptitiously bundled with freeware and shareware software that users
download from the Internet, and is commonly found in popular peer-to-
peer programs, such as KaZaa, BearShare, AudioGalaxy, and others. In
the most malicious cases, spyware can perform non-marketing
operations, all hidden to the user, including data collection for industrial
espionage purposes.
• Others…
Q: Recall an example of invisible information gathering about
you.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 5
The Impact of Computer Technology
Secondary Use
Using information for a purpose other than the one for which it
was obtained. A few examples:
• Sale (or trade) of consumer information to other businesses.
• Credit check by a prospective employer.
• Government agency use of consumer database.
Q: Recall an occasion when a secondary use of your personal information was
made.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 6
The Impact of Computer Technology
Computer Matching
Combining and comparing information from more than one
database (usually matching SS# to records). Some examples:
• Sharing of government agencies’ databases to detect fraud by recipients
of government programs.
• Creating consumer dossier from various business databases.
Q: Recall an example of computer matching that has appeared in the news.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 7
The Impact of Computer Technology
Profiling
Using data in computer files to predict likely behaviors of
people. Some examples:
• Businesses engage in profiling to determine consumer propensity
toward a product or service.
• Government agencies use profiling to create descriptions of possible
terrorists.
Q: How might profiling be used with your personal information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 8
The Impact of Computer Technology
Monitoring and Tracking
Examples:
• GPS (global positioning system).
• Cell-phones.
• Blackboxes in automobiles. (monitoring speed and where traveled)
• Other wireless appliances.
• Google Map….type your address in Google—see what happens
Q: What is the impact of GPS-equipped childrens’ wrist watches.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 9
“Big Brother is Watching You”
Federal Government Databases
Purpose:
• Determine eligibility for jobs and programs.
• Reduce waste.
• Detect fraud.
• Law enforcement.
Regulations:
• Privacy Act of 1974.
• Computer Matching and Privacy Protection Act of 1988.
Q: Which government databases contains your personal information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 10
“Big Brother is Watching You”
4th
Amendment
Expectation of Privacy:
• Government’s rights are limited.
• Government must have probable cause to search private premises or
seize documents.
Privacy Challenges:
• New sensing and surveillance technologies enable the government
access to private premises without physical entry.
• New technologies provide the government with access to huge amounts
of personal data in business databases.
• Courts allow some searches and seizures of computers without search
warrants.
Q: Has technology strengthened or weakened the spirit of the 4th
Amendment?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 11
Consumer Information
Consumer Databases
Gathering Information:
• Warranty cards.
• Purchasing records.
• Membership lists.
• Web activity.
• Change-of-address forms.
• Much more…
Q: Recall ways in which you have contributed to consumer databases.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 12
Consumer Information
Consumer Databases (cont’d)
Limiting Collection, Use, Sharing, and Sale of Personal Data:
• Consumers can take measures to restrict the use of their personal
information.
• Some information sharing is prohibited by law.
• Some information sharing is prohibited by published, privacy policies.
Q: What measures do you take to limit consumer information gathered
about you?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 13
Consumer Information
Marketing: Using Consumer Information
• Trading/buying customer lists.
• Telemarketing.
• Data Mining. (Spyware)
• Mass-marketing.
• Web ads.
• Spam (unsolicited e-mail).
Q: How are children affected by marketers using consumer information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 14
Consumer Information
Credit Bureaus
Uses of consumer information:
• Evaluate credit risk of applicant.
• Marketing.
Regulation:
• FCRA (Fair Credit Reporting Act)
• Self-regulated by privacy principles.
Q: If you are denied credit, what are your rights based on the FCRA?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 15
More Privacy Risks
Social Security Numbers (SSNs)
Appear in:
• Employer records.
• Government databases.
• School records.
• Credit reports.
• Consumer applications.
• Many other databases.
Be careful giving out your SSN…identity theft problems.
Q: What are the risks of using SSNs as identifiers?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 16
More Privacy Risks
National ID Card System
If implemented, the card could contain your:
• Name.
• Address.
• Telephone number(s).
• Photo.
• SSN.
Q: What other personal information should a national ID card contain?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 17
More Privacy Risks
National ID Card System
If implemented, the system could allow access to your:
• Medical information.
• Tax records.
• Citizenship.
• Credit history.
• Much more…
Kind of scary…”Let me see your papers.”
Q: Are the benefits of a national ID system greater than the risks?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 18
More Privacy Risks
Personal Health and Medical Information
Data can include:
• History of substance abuse.
• Treatment for sexually transmitted disease.
• Extent of psychiatric help received.
• Any suicide attempt(s).
• Diagnosis of diseases (diabetes, angina, cancer, etc.).
• Use of prescribed medicines.
• Much more…
Q: Why would marketers want access to your medical information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 19
More Privacy Risks
Public Records
Available in paper form and/or online:
• Bankruptcy.
• Arrest.
• Marriage-license application.
• Divorce proceedings.
• Property ownership.
• Salary (if employed by state or federal government).
• Wills and Trusts.
• Much more…
Q: How should access to public records be controlled?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 20
Protecting Privacy: Education,
Technology, and Markets
Education
Must include awareness of:
• How the technology works.
• How the technology is being used.
• The risks brought on by the technology.
• How to limit unwanted use of personal information.
• Applicable state and federal laws and regulations.
Q: How do you limit unwanted use of your personal information?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 21
Protecting Privacy: Education,
Technology, and Markets
Technology
Enhance privacy using:
• Cookie (files a web site; stores it on each visitor’s computer) disablers.
• Opt-in (Consumer must check if they want info)/opt-out (consumer
must check if they don’t want info) options.
• Anonymous Web services. Anonymizer.com…surf the web
anonymously
• P3P (Platform for Privacy Preferences). (automatically protect people’s
privacy when they use the web…users choose the amount of info to give
out)
Audit trails-keep track of who sees what. (system keeps track of each user
that accesses each type of data)
Q: What privacy-enhancing technology do you use regularly?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 22
Protecting Privacy: Education,
Technology, and Markets
Market Response
Markets can protect your privacy by:
• Using trusted third parties.
• Adhering to established privacy policies.
• Purchasing consumer information directly from the consumer.
• Developing and selling privacy-enhancing technologies and services.
Q: Have you read the privacy policies at Web sites you frequent?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 23
Protecting Privacy: Law and Regulation
Philosophical Views
Samuel Warren & Louis Brandeis:
• Individuals have the right to prohibit publication of personal facts and
photos.
Judith Jarvis Thompson:
• No distinct right to privacy.
• Privacy rights result from rights to our property, body, and contracts.
Transactions:
• Transactions have two parties, often with conflicting preferences about
privacy.
Q: How should rights to information about transactions between two parties
be assigned?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 24
Protecting Privacy: Law and Regulation
Contrasting Views
Free-market View
• The parties of a transaction are viewed as equal.
• Truth in information gathering.
• Strong reliance on contracts.
• Freedom of speech and commerce.
Consumer-Protection View
• The parties of a transaction are viewed differently.
• More stringent consent requirements required by law.
• Strong limitations on secondary uses of information required by law.
• Legal restrictions on consumer profiling.
Q: How should the privacy of consumer transactions be regulated?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 25
Protecting Privacy: Law and Regulation
Contracts and Regulations
Basic Legal Framework:
• Enforce agreements and contracts.
• Publish privacy policies.
• Set defaults for situations not in contract.
Requiring Specific Consent policies:
• Adhere to informed consumer consent.
• Use opt-in policies. (not opt-out)
Q: Recall a situation where you exchanged personal information for some
benefit.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 26
Protecting Privacy: Law and Regulation
Contracts and Regulations (cont’d)
Ownership of personal data. Can an individual own:
• Facts (e.g. marriage license in public records)?
• Personal information (e.g. your date of birth)?
Freedom of speech
• Prohibiting communication of information may violate the 1st
Amendment.
Q: When does protecting privacy conflict with freedom of speech?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 27
Protecting Privacy: Law and Regulation
EU (European Union) Privacy Regulation
Key points:
• Limited collection of personal data.
• Data must be up-to-date and destroyed when no longer needed.
• Consent for sharing data is required.
• Sensitive data (e.g. religion) can only be provided with consent.
• Notify consumers about the collection and intended purpose of data.
• Restricted access and sharing of criminal conviction.
Q: Can the EU’s privacy regulations work in the US?

More Related Content

What's hot

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 

What's hot (20)

14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Network security
Network securityNetwork security
Network security
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linuxUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Professionalism
ProfessionalismProfessionalism
ProfessionalismUc Man
 
Manual de Buenas Prácticas en Movilidad Virtual
Manual de Buenas Prácticas en Movilidad VirtualManual de Buenas Prácticas en Movilidad Virtual
Manual de Buenas Prácticas en Movilidad VirtualCesar Barletta
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 

Viewers also liked (6)

Dhcp in linux
Dhcp in linuxDhcp in linux
Dhcp in linux
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Professionalism
ProfessionalismProfessionalism
Professionalism
 
Manual de Buenas Prácticas en Movilidad Virtual
Manual de Buenas Prácticas en Movilidad VirtualManual de Buenas Prácticas en Movilidad Virtual
Manual de Buenas Prácticas en Movilidad Virtual
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 

Similar to Privacy and personal information

Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issuesStefan Schippers
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - PrivacyFrances Coronel
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012lilianedwards
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxmckerliejonelle
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRCase IQ
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)schermerbw
 

Similar to Privacy and personal information (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
04 privacy
04 privacy04 privacy
04 privacy
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Chapter2
Chapter2Chapter2
Chapter2
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 

More from Uc Man

Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2Uc Man
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practiceUc Man
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2Uc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Effective time-management
Effective time-managementEffective time-management
Effective time-managementUc Man
 
Digital divide
Digital divideDigital divide
Digital divideUc Man
 
Course outline pp
Course outline ppCourse outline pp
Course outline ppUc Man
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practiceUc Man
 
Time management
Time managementTime management
Time managementUc Man
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritizationUc Man
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Uc Man
 
Personal effectiveness
Personal effectivenessPersonal effectiveness
Personal effectivenessUc Man
 
Professional context of ICT (Need of professionalism)
Professional context of ICT (Need of professionalism) Professional context of ICT (Need of professionalism)
Professional context of ICT (Need of professionalism) Uc Man
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalismUc Man
 
Effective time-management
Effective time-managementEffective time-management
Effective time-managementUc Man
 

More from Uc Man (20)

Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Course outline pp_2
Course outline pp_2Course outline pp_2
Course outline pp_2
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Unit 3 maintain yourself in professional practice
Unit 3    maintain yourself in professional practiceUnit 3    maintain yourself in professional practice
Unit 3 maintain yourself in professional practice
 
Pro in the_workplace2
Pro in the_workplace2Pro in the_workplace2
Pro in the_workplace2
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 
Digital divide
Digital divideDigital divide
Digital divide
 
Course outline pp
Course outline ppCourse outline pp
Course outline pp
 
Maintain yourself in professional practice
Maintain yourself in professional practiceMaintain yourself in professional practice
Maintain yourself in professional practice
 
Time management
Time managementTime management
Time management
 
Time management,planning and prioritization
Time management,planning and prioritizationTime management,planning and prioritization
Time management,planning and prioritization
 
Student attendancereportofit 105(a)
Student attendancereportofit 105(a)Student attendancereportofit 105(a)
Student attendancereportofit 105(a)
 
Personal effectiveness
Personal effectivenessPersonal effectiveness
Personal effectiveness
 
Professional context of ICT (Need of professionalism)
Professional context of ICT (Need of professionalism) Professional context of ICT (Need of professionalism)
Professional context of ICT (Need of professionalism)
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalism
 
Effective time-management
Effective time-managementEffective time-management
Effective time-management
 

Recently uploaded

Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Recently uploaded (20)

Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

Privacy and personal information

  • 1. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 1 Social, Legal, and Ethical Issues for Computers and the Internet Privacy & Personal Information
  • 2. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology “Big Brother is Watching You” Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation
  • 3. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 3 The Impact of Computer Technology Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: • Freedom from intrusion-being left alone. • Control of information about oneself. • Freedom from surveillance (followed, watched, eavesdropped upon).
  • 4. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 4 The Impact of Computer Technology Invisible Information Gathering Examples: • Satellite surveillance. • Caller ID. • 800- or 900-number calls. Or Pizza Hut! • Web-tracking data; cookies. Peer-to-peer monitoring. – Spyware such as Gator, BonziBUDDY, and Comet Cursor is often surreptitiously bundled with freeware and shareware software that users download from the Internet, and is commonly found in popular peer-to- peer programs, such as KaZaa, BearShare, AudioGalaxy, and others. In the most malicious cases, spyware can perform non-marketing operations, all hidden to the user, including data collection for industrial espionage purposes. • Others… Q: Recall an example of invisible information gathering about you.
  • 5. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 5 The Impact of Computer Technology Secondary Use Using information for a purpose other than the one for which it was obtained. A few examples: • Sale (or trade) of consumer information to other businesses. • Credit check by a prospective employer. • Government agency use of consumer database. Q: Recall an occasion when a secondary use of your personal information was made.
  • 6. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 6 The Impact of Computer Technology Computer Matching Combining and comparing information from more than one database (usually matching SS# to records). Some examples: • Sharing of government agencies’ databases to detect fraud by recipients of government programs. • Creating consumer dossier from various business databases. Q: Recall an example of computer matching that has appeared in the news.
  • 7. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 7 The Impact of Computer Technology Profiling Using data in computer files to predict likely behaviors of people. Some examples: • Businesses engage in profiling to determine consumer propensity toward a product or service. • Government agencies use profiling to create descriptions of possible terrorists. Q: How might profiling be used with your personal information?
  • 8. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 8 The Impact of Computer Technology Monitoring and Tracking Examples: • GPS (global positioning system). • Cell-phones. • Blackboxes in automobiles. (monitoring speed and where traveled) • Other wireless appliances. • Google Map….type your address in Google—see what happens Q: What is the impact of GPS-equipped childrens’ wrist watches.
  • 9. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 9 “Big Brother is Watching You” Federal Government Databases Purpose: • Determine eligibility for jobs and programs. • Reduce waste. • Detect fraud. • Law enforcement. Regulations: • Privacy Act of 1974. • Computer Matching and Privacy Protection Act of 1988. Q: Which government databases contains your personal information?
  • 10. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 10 “Big Brother is Watching You” 4th Amendment Expectation of Privacy: • Government’s rights are limited. • Government must have probable cause to search private premises or seize documents. Privacy Challenges: • New sensing and surveillance technologies enable the government access to private premises without physical entry. • New technologies provide the government with access to huge amounts of personal data in business databases. • Courts allow some searches and seizures of computers without search warrants. Q: Has technology strengthened or weakened the spirit of the 4th Amendment?
  • 11. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 11 Consumer Information Consumer Databases Gathering Information: • Warranty cards. • Purchasing records. • Membership lists. • Web activity. • Change-of-address forms. • Much more… Q: Recall ways in which you have contributed to consumer databases.
  • 12. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 12 Consumer Information Consumer Databases (cont’d) Limiting Collection, Use, Sharing, and Sale of Personal Data: • Consumers can take measures to restrict the use of their personal information. • Some information sharing is prohibited by law. • Some information sharing is prohibited by published, privacy policies. Q: What measures do you take to limit consumer information gathered about you?
  • 13. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 13 Consumer Information Marketing: Using Consumer Information • Trading/buying customer lists. • Telemarketing. • Data Mining. (Spyware) • Mass-marketing. • Web ads. • Spam (unsolicited e-mail). Q: How are children affected by marketers using consumer information?
  • 14. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 14 Consumer Information Credit Bureaus Uses of consumer information: • Evaluate credit risk of applicant. • Marketing. Regulation: • FCRA (Fair Credit Reporting Act) • Self-regulated by privacy principles. Q: If you are denied credit, what are your rights based on the FCRA?
  • 15. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 15 More Privacy Risks Social Security Numbers (SSNs) Appear in: • Employer records. • Government databases. • School records. • Credit reports. • Consumer applications. • Many other databases. Be careful giving out your SSN…identity theft problems. Q: What are the risks of using SSNs as identifiers?
  • 16. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 16 More Privacy Risks National ID Card System If implemented, the card could contain your: • Name. • Address. • Telephone number(s). • Photo. • SSN. Q: What other personal information should a national ID card contain?
  • 17. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 17 More Privacy Risks National ID Card System If implemented, the system could allow access to your: • Medical information. • Tax records. • Citizenship. • Credit history. • Much more… Kind of scary…”Let me see your papers.” Q: Are the benefits of a national ID system greater than the risks?
  • 18. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 18 More Privacy Risks Personal Health and Medical Information Data can include: • History of substance abuse. • Treatment for sexually transmitted disease. • Extent of psychiatric help received. • Any suicide attempt(s). • Diagnosis of diseases (diabetes, angina, cancer, etc.). • Use of prescribed medicines. • Much more… Q: Why would marketers want access to your medical information?
  • 19. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 19 More Privacy Risks Public Records Available in paper form and/or online: • Bankruptcy. • Arrest. • Marriage-license application. • Divorce proceedings. • Property ownership. • Salary (if employed by state or federal government). • Wills and Trusts. • Much more… Q: How should access to public records be controlled?
  • 20. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 20 Protecting Privacy: Education, Technology, and Markets Education Must include awareness of: • How the technology works. • How the technology is being used. • The risks brought on by the technology. • How to limit unwanted use of personal information. • Applicable state and federal laws and regulations. Q: How do you limit unwanted use of your personal information?
  • 21. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 21 Protecting Privacy: Education, Technology, and Markets Technology Enhance privacy using: • Cookie (files a web site; stores it on each visitor’s computer) disablers. • Opt-in (Consumer must check if they want info)/opt-out (consumer must check if they don’t want info) options. • Anonymous Web services. Anonymizer.com…surf the web anonymously • P3P (Platform for Privacy Preferences). (automatically protect people’s privacy when they use the web…users choose the amount of info to give out) Audit trails-keep track of who sees what. (system keeps track of each user that accesses each type of data) Q: What privacy-enhancing technology do you use regularly?
  • 22. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 22 Protecting Privacy: Education, Technology, and Markets Market Response Markets can protect your privacy by: • Using trusted third parties. • Adhering to established privacy policies. • Purchasing consumer information directly from the consumer. • Developing and selling privacy-enhancing technologies and services. Q: Have you read the privacy policies at Web sites you frequent?
  • 23. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 23 Protecting Privacy: Law and Regulation Philosophical Views Samuel Warren & Louis Brandeis: • Individuals have the right to prohibit publication of personal facts and photos. Judith Jarvis Thompson: • No distinct right to privacy. • Privacy rights result from rights to our property, body, and contracts. Transactions: • Transactions have two parties, often with conflicting preferences about privacy. Q: How should rights to information about transactions between two parties be assigned?
  • 24. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 24 Protecting Privacy: Law and Regulation Contrasting Views Free-market View • The parties of a transaction are viewed as equal. • Truth in information gathering. • Strong reliance on contracts. • Freedom of speech and commerce. Consumer-Protection View • The parties of a transaction are viewed differently. • More stringent consent requirements required by law. • Strong limitations on secondary uses of information required by law. • Legal restrictions on consumer profiling. Q: How should the privacy of consumer transactions be regulated?
  • 25. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 25 Protecting Privacy: Law and Regulation Contracts and Regulations Basic Legal Framework: • Enforce agreements and contracts. • Publish privacy policies. • Set defaults for situations not in contract. Requiring Specific Consent policies: • Adhere to informed consumer consent. • Use opt-in policies. (not opt-out) Q: Recall a situation where you exchanged personal information for some benefit.
  • 26. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 26 Protecting Privacy: Law and Regulation Contracts and Regulations (cont’d) Ownership of personal data. Can an individual own: • Facts (e.g. marriage license in public records)? • Personal information (e.g. your date of birth)? Freedom of speech • Prohibiting communication of information may violate the 1st Amendment. Q: When does protecting privacy conflict with freedom of speech?
  • 27. A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 27 Protecting Privacy: Law and Regulation EU (European Union) Privacy Regulation Key points: • Limited collection of personal data. • Data must be up-to-date and destroyed when no longer needed. • Consent for sharing data is required. • Sensitive data (e.g. religion) can only be provided with consent. • Notify consumers about the collection and intended purpose of data. • Restricted access and sharing of criminal conviction. Q: Can the EU’s privacy regulations work in the US?