privacy 7 february

22
PRIVACY 7 FEBRUARY “zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381

Upload: red

Post on 22-Feb-2016

84 views

Category:

Documents


0 download

DESCRIPTION

“zone of inaccessibility” Edmund Byrne, 1998. COMP 381. Privacy 7 February . “The right to be alone” Warren and Brandeis, 1890. Views on Privacy. “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, BT Research “You have zero privacy anyway.” - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy 7 February

PRIVACY7 FEBRUARY

“zone of inaccessibility” Edmund Byrne, 1998

“The right to be alone” Warren and Brandeis, 1890

COMP 381

Page 2: Privacy 7 February

Views on Privacy “All this secrecy is making life harder,

more expensive, dangerous …”Peter Cochran, BT Research

“You have zero privacy anyway.”Scott McNealy, Sun

“By 2010, privacy will become a meaningless concept in western society”

Gartner report

Page 3: Privacy 7 February

Aspects of Privacy Secrecy

Limiting dissemination of information Anonymity

Protection from undesired attention Solitude

Lack of proximityRuth Gavison 1984

Page 4: Privacy 7 February

Historical Basis of Privacy Code of Hammurabi

1760 BCEcrime to break a hole through the wall of

another’s house Justice of Peace Act

England 1361Peeping Toms and eavesdroppers

Page 5: Privacy 7 February

Current Basis of Privacy Universal Declaration of Human Rights

United Nations 1948Article 12

European Convention on Human RightsEuropean Council 1950Article 8

US Constitution: Bill of Rights Evolution from property rights Amendment IV

Page 6: Privacy 7 February

Without Privacy Extrinsic loss of freedom

Ability of others to control our behaviorCoercion or imposition of others’ wills

Intrinsic loss of freedomChanges how we behave“anticipatory conformity”

Autonomy requires privacy

Page 7: Privacy 7 February

Privacy and Identity Identity

sense of selfdistinct personality of an individualan individual's comprehension of him or

herself as a discrete, separate entity What defines your identity?

Page 8: Privacy 7 February

Privacy and Trust In order to trust others, need to know

something about themPrivacy impedes

In order to build STRONGEST trust between two people, need to create a bondRequires privacy

Page 9: Privacy 7 February

Importance of Privacy Privacy and relationships How is it different from pre-

computers/networks?Electronic alter ego

Identity convergence

Page 10: Privacy 7 February

Everyone Agrees Privacy is not absolute in society …why? Willing to divulge SOME information

in exchange for SOME economic or social benefit….

BUT reasonable expectation about how it’s treated…

What is known about you?

Page 11: Privacy 7 February

Controversy & Challenge My right to informational privacy

vs. others’ right to know

vs. security Does it have to be versus? Is it really a zero-sum game?

Page 12: Privacy 7 February

My rights Shouldn’t I have a say? Why should I care?

Decisions made about us Effect if data are Incomplete?

Erroneous? Sensitive?

Page 13: Privacy 7 February

Legal Realities of Privacy Self-regulation approach in US, Japan Comprehensive laws in Europe, Canada,

Australia European Union

Limits data collectionRequires comprehensive disclosuresProhibits data export to unsafe countries

○ Or any country for some types of data

Page 14: Privacy 7 February

Privacy Impingement In the Past Go to the court or town hall Go through trash Interview people Eavesdrop/wiretap Surveillance Breaking and entering

Page 15: Privacy 7 February

… and Today Public records easier to find Publications spread faster Surveillance Keeping records of what you do on the

webShoppingSurfingSearching

Breaches

Page 16: Privacy 7 February

Privacy on the Web The right to have information that you

don’t expect to be available to others remain that way

On many sites, you give up your right to privacy

But there are also other more insidious ways

Google Dashboard

Page 17: Privacy 7 February

Aspects of Privacy Transparency and Control: knowing

what is being collected Anonymity Security

Data breaches chronologyMike Reiter lecture in 2 weeks

Page 18: Privacy 7 February

Impediments to Privacy Cookies

Web site retaining cookies for 5 years Sniffing, Snarfing, Snorting

Forms of capturing packets over networkDiffer by how much info & what is done with it

SurveillanceDifferent forms?Google Street View

Data collection and sharing

Page 19: Privacy 7 February

What’s Coming: Web 3.0 Semantic Web

Assign meanings -> further connections

Page 20: Privacy 7 February

Identity Theft

“crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception”

Identity Theft is a Federal Offense Crimes of Persuasion

Commercial

Page 21: Privacy 7 February

(Stop Internet Fraud and Identity Theft)