privacy csc385

32
Privacy Privacy CSC385 CSC385 Kutztown University Kutztown University Fall 2009 Fall 2009 Oskars J. Rieksts Oskars J. Rieksts

Upload: oralee

Post on 04-Feb-2016

18 views

Category:

Documents


0 download

DESCRIPTION

Privacy CSC385. Kutztown University Fall 2009 Oskars J. Rieksts. Notes on Privacy. Based on Lawrence Snyder Fluency in Information Technology Augmented with my notes See also: http://faculty.kutztown.edu/rieksts/385/topics/privacy/notes.html. Outline. Privacy basics - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy CSC385

PrivacyPrivacyCSC385CSC385

Kutztown UniversityKutztown UniversityFall 2009Fall 2009

Oskars J. RiekstsOskars J. Rieksts

Page 2: Privacy CSC385

2009 Kutztown University 2

Notes on PrivacyNotes on Privacy Based on Lawrence SnyderBased on Lawrence Snyder Fluency in Information TechnologyFluency in Information Technology Augmented with my notesAugmented with my notes See also: See also:

http://faculty.kutztown.edu/rieksts/385/topics/privacy/notes.html

Page 3: Privacy CSC385

2009 Kutztown University 3

OutlineOutline Privacy basicsPrivacy basics Threats to privacyThreats to privacy Personal information controlPersonal information control FIP principlesFIP principles Privacy practicesPrivacy practices CookiesCookies CryptographyCryptography Data miningData mining

Page 4: Privacy CSC385

2009 Kutztown University 4

Privacy BasicsPrivacy Basics Definition – “The right of people to choose freely Definition – “The right of people to choose freely

under what circumstances and to what extent under what circumstances and to what extent they will reveal themselves to others.” – p. 481they will reveal themselves to others.” – p. 481

Rieksts: Privacy is the cornerstone of selfhoodRieksts: Privacy is the cornerstone of selfhood Modern devices & privacyModern devices & privacy Chief Justice, Louis BrandeisChief Justice, Louis Brandeis

Page 5: Privacy CSC385

2009 Kutztown University 5

Basis of Privacy ConflictBasis of Privacy Conflict

Modern life requiresModern life requiresRevelation of informationRevelation of information

Financial transactionsFinancial transactions ApplicationsApplications Medical servicesMedical services Etc.Etc.

Page 6: Privacy CSC385

2009 Kutztown University 6

Basic Privacy IssueBasic Privacy Issue

Ownership of informationOwnership of information Related IT ownership issueRelated IT ownership issue

Your machineYour machine Contents of your machineContents of your machine

FilesFiles SoftwareSoftware

Page 7: Privacy CSC385

2009 Kutztown University 7

Threats to PrivacyThreats to Privacy Criminal elementCriminal element

Identity theftIdentity theft Cyber-stalkingCyber-stalking Organized crimeOrganized crime

Business & industryBusiness & industry MarketingMarketing EmploymentEmployment

Page 8: Privacy CSC385

2009 Kutztown University 8

Threats to PrivacyThreats to Privacy Enemies of public safetyEnemies of public safety GovernmentsGovernments

Totalitarian regimesTotalitarian regimes Overzealous public servantsOverzealous public servants

Social engineersSocial engineers

Page 9: Privacy CSC385

2009 Kutztown University 9

Spectrum of Personal Information Spectrum of Personal Information ControlControl

The lensThe lens Transaction produces informationTransaction produces information

Basic categoriesBasic categories No usesNo uses Opt-In or ApprovalOpt-In or Approval Opt-Out or ObjectionOpt-Out or Objection Internal use onlyInternal use only No limitsNo limits

Page 10: Privacy CSC385

2009 Kutztown University 10

Storage & UseStorage & Usebeyond transactional necessitybeyond transactional necessity

No usesNo uses Delete informationDelete information Upon completion of transactionUpon completion of transaction

Opt-InOpt-In Permission must be requestedPermission must be requested Explicit approval requiredExplicit approval required

Page 11: Privacy CSC385

2009 Kutztown University 11

Storage & UseStorage & Usebeyond transactional necessitybeyond transactional necessity

Opt-OutOpt-Out S&U is OKS&U is OK Unless specifically objected toUnless specifically objected to

Internal use onlyInternal use only S&U OKS&U OK Only for business itselfOnly for business itself

No limitsNo limits

Page 12: Privacy CSC385

2009 Kutztown University 12

FIP PrinciplesFIP Principles FIP = fair information practicesFIP = fair information practices Standard 8 point listStandard 8 point list Developed in 1980 by OECDDeveloped in 1980 by OECD OECD = Organization of Economic OECD = Organization of Economic

Cooperation and DevelopmentCooperation and Development

Page 13: Privacy CSC385

2009 Kutztown University 13

Eight FIP PrinciplesEight FIP Principles Limited CollectionLimited Collection QualityQuality PurposePurpose Use LimitationUse Limitation SecuritySecurity OpennessOpenness ParticipationParticipation AccountabilityAccountability

Page 14: Privacy CSC385

2009 Kutztown University 14

Limited Collection PrincipleLimited Collection Principle

Limits to data collectedLimits to data collected Collection byCollection by

Fair meansFair means Lawful meansLawful means

Knowledge & consent requiredKnowledge & consent required If possibleIf possible When appropriateWhen appropriate

Page 15: Privacy CSC385

2009 Kutztown University 15

Quality PrincipleQuality Principle

RelevanceRelevance Data must be relevantData must be relevant to collection purposeto collection purpose

Data must beData must be AccurateAccurate CompleteComplete Up to dateUp to date

Page 16: Privacy CSC385

2009 Kutztown University 16

Purpose PrinciplePurpose Principle

Purpose of collection statedPurpose of collection stated Use limitationUse limitation

Use limited to . .Use limited to . . stated purposestated purpose

Page 17: Privacy CSC385

2009 Kutztown University 17

Use Limitation PrincipleUse Limitation Principle

Data not to be disclosedData not to be disclosed No use for other purposesNo use for other purposes Unless . . Unless . .

Consent given by individualConsent given by individual Authority granted by lawAuthority granted by law

Page 18: Privacy CSC385

2009 Kutztown University 18

Security PrincipleSecurity Principle

Data controller must . .Data controller must . . Exercise reasonable security measuresExercise reasonable security measures

Page 19: Privacy CSC385

2009 Kutztown University 19

Openness PrincipleOpenness Principle

Data collection policies & practices . .Data collection policies & practices . . Open to the publicOpen to the public Public knowledge of . .Public knowledge of . .

Existence of dataExistence of data Kind of dataKind of data Purpose/use of dataPurpose/use of data Identity & contact information ofIdentity & contact information of

Data controllerData controller

Page 20: Privacy CSC385

2009 Kutztown University 20

Participation PrincipleParticipation Principle

Individual able to determine . .Individual able to determine . . Whether data controller has informationWhether data controller has information What the information isWhat the information is

Denial of access can be challengedDenial of access can be challenged Information can be challengedInformation can be challenged

Page 21: Privacy CSC385

2009 Kutztown University 21

Accountability PrincipleAccountability Principle

Data controller accountable . .Data controller accountable . . for FIP Principles compliancefor FIP Principles compliance

Page 22: Privacy CSC385

2009 Kutztown University 22

Privacy Practices – EUPrivacy Practices – EU

European UnionEuropean Union AAccepts OECD FIP principlesccepts OECD FIP principles Has European Data Protection DirectiveHas European Data Protection Directive EU citizen protection standardEU citizen protection standard

Extends beyond EU bordersExtends beyond EU borders

Page 23: Privacy CSC385

2009 Kutztown University 23

Privacy Practices – U.S.A.Privacy Practices – U.S.A. Sectoral approachSectoral approach Freedom of Information Act – 1966Freedom of Information Act – 1966 Privacy Act of 1974 (wrt government)Privacy Act of 1974 (wrt government) Electronics Communication Privacy Act – Electronics Communication Privacy Act –

19861986 Video Privacy Protection Act – 1988Video Privacy Protection Act – 1988 Telephone Consumer Protection Act – Telephone Consumer Protection Act –

19911991 Drivers Privacy Protection Act – 1994Drivers Privacy Protection Act – 1994

Page 24: Privacy CSC385

2009 Kutztown University 24

Freedom of Information Act – LinksFreedom of Information Act – Links

One Two Three Four

Page 25: Privacy CSC385

2009 Kutztown University 25

Privacy Act of 1974 – LinksPrivacy Act of 1974 – Links

One Two Three

Page 26: Privacy CSC385

2009 Kutztown University 26

Electronic Communications Privacy Electronic Communications Privacy ActAct

One Two Three Efforts to updateEfforts to update

Page 27: Privacy CSC385

2009 Kutztown University 27

Video Privacy Protection ActVideo Privacy Protection Act

One Two Three

Page 28: Privacy CSC385

2009 Kutztown University 28

Telephone Consumer Protection ActTelephone Consumer Protection Act

OneTwoThreeThree

Page 29: Privacy CSC385

2009 Kutztown University 29

Driver Privacy Protection ActDriver Privacy Protection Act

OneOne TwoTwo ThreeThree FourFour

Page 30: Privacy CSC385

2009 Kutztown University 30

Privacy AdvocacyPrivacy Advocacy

EPICEPIC Electronic Privacy Information CenterElectronic Privacy Information Center AboutAbout Home PageHome Page

Privacy Rights ClearinghousePrivacy Rights Clearinghouse Electronic Frontier FoundationElectronic Frontier Foundation

AboutAbout WikipediaWikipedia

Page 31: Privacy CSC385

2009 Kutztown University 31

CookiesCookies

7-field record7-field record Uniquely identifies . .Uniquely identifies . . customer session on websitecustomer session on website

Page 32: Privacy CSC385

2009 Kutztown University 32

Cookies – 3Cookies – 3rdrd Party Problem Party Problem

Advertiser on contacted websiteAdvertiser on contacted website Client/server relationship with customerClient/server relationship with customer

Allows 3Allows 3rdrd party cookies party cookies PlacedPlaced AccessedAccessed from various sitesfrom various sites

DiscussionDiscussion