Ryan Marken Dan Trout Ben Knapic CHAPTER 2
Ryan Marken Dan Trout Ben Knapic CHAPTER 2: PRIVACY
Roadmap � Privacy and Computer Technology � “Big Brother Is Watching You” � Diverse Privacy Topics � Protecting Privacy � Communications � Cases
Introduction � Three aspects of protecting privacy ○ Freedom from intrusion ○ Control of information about oneself ○ Freedom from surveillance(being followed, tracked, watched, or eavesdropped on)
Personal Information � Health � Relationship � Family Issues � ect…
Opposition to Privacy � What are you hiding your identity from � Gives way to fraud � Help cover up deception, hypocrisy, and wrong doing. � Thoughts?
Search Query Data � Millions use search engines daily � Terabytes of data daily �Customized search results �Example: Milky way candy bar vs. Milky way galaxy
Advantages vs. Disadvantage � Customized search results for users � Advertisements targeted to the right audience � Data collected about users can be used to trace who the user is without knowing who knowing the users name
A Few Definitions �Invisible information gathering ○ Collection of someone’s personal information without their knowledge �Example – download that allows to change your web browser cursor ○ Sends data to the company �Ethical issue ○ How will the user know if their information is being tracked or used?
Continued… �Secondary use ○ The use of someone’s data for any reason other than what the user consented. �Example – database information used to tailor a political pitch to someone
Big Brother is Watching YOU �Government use databases to monitor and follow what we do �Databases: government maintain thousands of databases containing personal information ○ Ask businesses to share personal information about customers ○ Subpoenas and court order to force businesses.
Privacy Act of 1974 Law about the federal government’s use of person data. � Bill was passed to stop the governments abuse of data � Files on war protesters, wiretappings, mail openings, harassment of individuals for political purpose � Studies show that the government do not always obey the laws � FBI use of data mining didn’t comply with all rules for collecting data on citizens �
IRS Agent Example � KKK member � Snooping through other klan members tax information � Trying to find undercover agent
Tracking College Kids � Collect personal information � grades, major, courses taken, courses passed, loans, scholarships � 80 billion dollars in grants to students � Need a good way to monitor how their money is affecting education � Thoughts?
Fourth Amendment � Sets limits for government to search our homes and businesses � Problem? Technology allows government to search computers without entering homes. � Personal Information is no longer as safe as we once thought. � Thoughts?
Marketing, Personalization, and Consumer Dossiers One of the biggest uses of personal information— businesses, political parties, organizations � Supermarkets store data, companies sell email � Key aspect of privacy: control information about oneself �
Marketing, Personalization, and Consumer Dossiers cont. � Marketers argue target marketing useful to customers—reduce cost � Web advertising company said: � 16% targeted clicked vs. 1% untargeted clicked � 20 -50% personalized coupons vs. 1 -5% newspaper coupons � Targeting reduces unwanted ads, increases wanted ads
Marketing, Personalization, and Consumer Dossiers cont. � Company’s privacy policy—agreement of doing business � One company targeted young adult males who bought diapers and sent coupons for beer � To compete with Wal-Mart, one company analyzed their customer’s shopping habits and set price’s below Wal-Mart’s
Marketing, Personalization, and Consumer Dossiers cont. � Political parties may send information to party member that THEY want to hear—may feel manipulated � Personal information can leak—threaten people’s safety � One woman, after filling out a questionnaire to receive coupons, received a frightening 12 -page letter containing graphic sexual fantasies � Convicted rapist in prison asked to input questionnaire data � Woman won lawsuit, received monetary award, and court order prohibiting company to allow prisoners to enter data
Location Tracking � GPS, cell phones, and other technologies have location-based applications that depend on knowing where people are � Whereabouts of: ○ Restaurants ○ ATMS ○ Hospitals ○ Etc. � Privacy of location tracking varies from little to great depending on the situation
Location Tracking cont. RFID Tags – stores data, transmits radio signal to device which reads data � Federal government plans to use RFID tags in various identity documents � Security Issues: � � Easy to read chip, copy to another chip, and make counterfeit document
Stolen and Lost Data � Criminals steal personal data by: � Hacking � Stealing computers and disks � Buy/request records under false pretenses � Bribe employees that store data � Information brokers sell data obtained illegally � Spyware ○ Track someone’s Web surfing or collect passwords/credit card numbers � Identity theft/fraud is often the main goal
Stolen and Lost Data cont. Pretexting – pretending to be someone with a legitimate reason for obtaining the data � Easy to fake because information is easy to get � � Is convenience worth the privacy risk?
What We Do Ourselves Many simply do not know enough about the Web, and often make bad decisions about what they put out there � Young people forget about employers and law agencies � Essentially, if information is out there, it can always be found � � Do young people simply not care about privacy, or do they not understand the risks?
Public Records: Access Vs. Privacy � Governments maintain public records � Bankruptcy records, arrest records, marriage license applications, etc � Maricopa County, AZ � First to put public records on the Web � Has highest rate of identity theft in the United States What should be available on the Web? � What if terrorists get a hold of information about a plane? � Where is the line drawn in easiness of access and risks of anyone seeing it? �
National ID Systems First national ID system: Social Security Card, 1936 � Originally only to be used for Social Security program � Now, � � Records systems � Taxpayer ID number � Welfare � MVD � Birth certificate � Credit bureaus � Various licenses � SSN too widely available to securely identify someone
National ID Systems cont. • National ID card proposals would require: — Citizenship, employment, health, tax, and financial data — Biometric data � Pros: � Need card, not number � Harder to forge � One card for several services � Authentication reduces fraud � Track/identify criminals easier � Cons: � Profound threats to freedom and privacy � If it is stolen/forged, benefits are lost � What if one mistake was made which ruined a persons life?
Children Privacy and safety major concerns for parents � Adults understand risks, children do not � Adults can: � � Install software to track children on the Web � Track child’s physical location � Although it can increase safety, at what age does Web monitoring become an invasion of child’s privacy?
Warren and Brandeis/Thomson � Warren and Brandeis take the position that people have the right to prohibit publication of facts about themselves and photographs of themselves. � Judith Jarvis Thomson argues that privacy concerns are addressed by other rights such as private property
The Free-Market View Emphasize the freedom of individuals to make choices and enter into agreements � Views privacy a negative right (liberty) � Technologies � � Internet Proxies (such as Tor) � Encryption Software (such as True. Crypt) � Agreements ○ ○ Contracts Terms of Service
The Consumer-Protection View The focus of this viewpoint is to protect consumers against abuses and carelessness by businesses and against their own lack of knowledge, judgment, or interest. � Views privacy as a positive right (claim right) � Consumers don’t have the time or understanding to know what they are agreeing to � Consumers have no bargaining power against large companies �
CASE � USA v. Warshak �The case United States v. Warshak, decided December 14, 2010 by the Sixth Circuit Court of Appeals, maintained the idea that an ISP actually is allowed access to private e-mail. However, the government must get hold of a search warrant before obtaining such e-mail. This case dealt with the question of e-mails hosted on an isolated server. Due to the fact that e-mail is similar to other forms of communication such as telephone calls, e-mail requires the same amount of protection under the 4 th amendment.
Case Study: US vs. Ziegler � Zeigler: � Possession of child pornography on company’s computer in his private office � Said the court should suppress evidence because his office was private and his computer had a password Employer gave the Government consent to search his computer � Because of this, it complied with the Fourth Amendment �
US vs. Ziegler cont. � Stakeholders: � Ziegler � Company � Government Ziegler had the negative right of privacy because his office and computer were private � Government had the positive right to search because the employer gave consent �
Kelly v. Borough of Carlisle United States Court of Appeals, Third Circuit � Argued February 1, 2010. Filed: October 4, 2010 � � Officer David J. Rogers, individually sued as well The right to record government officials was establish � First Amendment rights � � qualified immunity � Forth Amendment rights � Remanded for further review
Summary � Privacy and Computer Technology � “Big Brother Is Watching You” � Diverse Privacy Topics � Protecting Privacy � Communications � Cases
Resources Baase, S. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet. Prentice Hall. Upper Saddle River, NJ. 2008. � Samson, M. 2007. United States of America v. Jeffery Brian Ziegler. Internet Library of Law and Court Decisions. Retrieved from http: //www. internetlibrary. com/cases/lib_case 550. c fm � Kelly v. Borough of Carlisle. United States Court of Appeals, Third Circuit. 4 Oct. 2010. �
Questions
- Slides: 37