privacy and civil liberties ethical and legal basis for privacy protection privacy implications of...
Post on 21-Dec-2015
218 views
TRANSCRIPT
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy Protection Protection
Privacy Implications of Massive Database Privacy Implications of Massive Database Systems Systems
Technological Strategies for Privacy Technological Strategies for Privacy Protection Protection
Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the WorkplacePrivacy in the Workplace
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy Protection Protection
Privacy Implications of Massive Database Privacy Implications of Massive Database Systems Systems
Technological Strategies for Privacy Technological Strategies for Privacy Protection Protection
Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace
Ethical and Legal Basis Ethical and Legal Basis for Privacy Protectionfor Privacy Protection
The word “privacy” is not The word “privacy” is not found in the constitution.found in the constitution.
Which means…Which means…
The U.S. Supreme Court must interpret whether or not our founding fathers intended for a right to privacy.
Unethical practices regarding Unethical practices regarding privacy by businessprivacy by business
TiVo sells detailed informationTiVo sells detailed information Cell phones can track individualsCell phones can track individuals Spyware was found on 91 percent of the Spyware was found on 91 percent of the
120 computers with a hi-speed Internet 120 computers with a hi-speed Internet connection connection
Spam email reached 40 percent in 2003Spam email reached 40 percent in 2003
Unethical practices regarding Unethical practices regarding privacy by governmentprivacy by government
FBI, illegal use of FBI, illegal use of wiretaps.wiretaps.
In 1967, phone taps were deemed In 1967, phone taps were deemed illegal thought Katz v. United illegal thought Katz v. United StatesStates
NSA, operation NSA, operation shamrockshamrock
During WWII, the government had During WWII, the government had access to all telegram traffic.access to all telegram traffic.
Unethical Practice = Legal Unethical Practice = Legal BasisBasis
Having witnessed the abuse of power Having witnessed the abuse of power by the government, people sought out by the government, people sought out for protection.for protection.
Privacy Act of 1974Privacy Act of 1974
-granted fundamental rights to privacy.-granted fundamental rights to privacy.
http://www.cdt.org/privacy/guide/protect/laws.shtmlhttp://www.cdt.org/privacy/guide/protect/laws.shtml
Recent legislation and privacy Recent legislation and privacy threatsthreats
The PATRIOT Act of 2001The PATRIOT Act of 2001Government can legally tap telephone lines in Government can legally tap telephone lines in certain cases, and has the ability to intercept certain cases, and has the ability to intercept Internet messages through its Carnivore program. Internet messages through its Carnivore program.
ECHELONECHELONCaptures and analyzes virtually every phone call, Captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in fax, email and telex message sent anywhere in the world the world
What is going on?
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Privacy Implications of Massive
Database SystemsDatabase Systems Technological Strategies for Privacy Technological Strategies for Privacy
Protection Protection Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace
Privacy Implications of Privacy Implications of Massive Database Massive Database
SystemsSystems
Bryan Sullivan
The ProblemThe Problem
Debate over personal privacy and Debate over personal privacy and data miningdata mining
• Data TrackingData Tracking
• Data MiningData Mining
HistoryHistory
Data TrackingData Tracking• Data tracking: gathering data by Data tracking: gathering data by
querying a database and deducing querying a database and deducing confidential information.confidential information.
• Trackers may store the results of Trackers may store the results of multiple queries.multiple queries.
• Data tracking has been a problem for Data tracking has been a problem for the past two decadesthe past two decades
Tracking ExampleTracking Example
Data MiningData Mining
Data mining accomplishes essentially Data mining accomplishes essentially what tracking doeswhat tracking does
Data mining software allows the Data mining software allows the common user to perform data common user to perform data tracking, whereas before data mining tracking, whereas before data mining software, user had to be rather software, user had to be rather sophisticated in making deductionssophisticated in making deductions
ImplicationsImplications
Unfair PracticeUnfair Practice
National securityNational security
Sparks ethical debate: Sparks ethical debate: Assuring Assuring privacy when big brother is watching privacy when big brother is watching
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy Ethical and Legal Basis for Privacy ProtectionProtection
Privacy Implications of Massive Database Privacy Implications of Massive Database Systems Systems
Technological Strategies for Privacy Technological Strategies for Privacy ProtectionProtection
Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace
Technical Strategies to Technical Strategies to Privacy Protection Privacy Protection
Carl Tsue
What’s the problem?What’s the problem?
• Weak SecurityWeak Security• Data MagnetsData Magnets
Explicitly collecting information through online Explicitly collecting information through online registrationregistration
Identifying users through IP addressesIdentifying users through IP addresses Software DownloadsSoftware Downloads CookiesCookies Web BeaconsWeb Beacons Screen scrapingScreen scraping Federated identityFederated identity Indirectly collecting informationIndirectly collecting information
Strategies for privacy protection Strategies for privacy protection
Client-based Solutions Client-based Solutions Server-based SolutionsServer-based Solutions Client-server-based SolutionsClient-server-based Solutions
Client-based Solutions Client-based Solutions
• Client based Solutions Client based Solutions FirewallFirewall Proxy based anonymizersProxy based anonymizers Routing based anonymizersRouting based anonymizers Mix-Based anonymizersMix-Based anonymizers Peer-to-Peer anonymizersPeer-to-Peer anonymizers
Server-based SolutionServer-based Solution
Virtual Private Networks Virtual Private Networks
Client-server-based SolutionsClient-server-based Solutions
• Client-server-based solutionClient-server-based solution Negotiation-based solutionNegotiation-based solution
• P3PP3P Encryption-based SolutionsEncryption-based Solutions
• Symmetric encryption Symmetric encryption • Asymmetric encryption Asymmetric encryption
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Privacy Implications of Massive Database
Systems Systems Technological Strategies for Privacy Technological Strategies for Privacy
Protection Protection Freedom of Expression in Cyberspace Freedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the Workplace Privacy in the Workplace
Freedom of Expression in Freedom of Expression in CyberspaceCyberspace
Marc Van Gelder
Historical PerspectiveHistorical Perspective
What does Freedom of Expression really What does Freedom of Expression really mean?mean?• Has always been a debatable topicHas always been a debatable topic
Free Speech and the InternetFree Speech and the Internet• December 11, 2002December 11, 2002
Ethical Blogging and Information (Content) Ethical Blogging and Information (Content) FilteringFiltering
Ethical BloggingEthical Blogging What is Blogging?What is Blogging?
Joyce Park (aka Troutgirl)Joyce Park (aka Troutgirl)• Worked for FriendsterWorked for Friendster
Michael HanscomMichael Hanscom• Contractor who worked for MicrosoftContractor who worked for Microsoft
Ellen SimonettiEllen Simonetti• Worked for Delta Air LinesWorked for Delta Air Lines
Information (Content) FilteringInformation (Content) Filtering
Libraries – a haven for free speech?Libraries – a haven for free speech?• Information FilteringInformation Filtering
Concept: Single Book vs. EncyclopediaConcept: Single Book vs. Encyclopedia
““Filtering software is known to be wrong Filtering software is known to be wrong about one out of five times”, based on a about one out of five times”, based on a review by Consumer Reportsreview by Consumer Reports
Empirical Analysis of Internet Empirical Analysis of Internet Filtering in ChinaFiltering in China
Google search termProportion of Top 10 Sites
BlockedProportion of Top 100 Sites
Blocked
Tibet 100% 64%
taiwan china 100% 37%
equality 100% 24%
democracy china 80% 42%
dissident china 80% 37%
taiwan 70% 47%
revolution 70% 21%
dissident 60% 31%
性病 ("STDs" in Chinese) 60% 13%
freedom china 60% 32%
justice china 60% 30%
counterrevolution china 50% 21%
news china 40% 40%
liberty china 40% 17%
Data Source: http://cyber.law.harvard.edu/filtering/china/
ConclusionConclusion
Nature of the InternetNature of the Internet
Should governments fear the Should governments fear the Internet’s ability to freely share Internet’s ability to freely share information?information?
Freedom of InformationFreedom of Information
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Privacy Implications of Massive Database
Systems Systems Technological Strategies for Privacy Technological Strategies for Privacy
Protection Protection Freedom of Expression in CyberspaceFreedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the WorkplacePrivacy in the Workplace
International ImplicationsInternational Implications
Matt Zayatz
Foreign LawsForeign Laws
Free SpeechFree Speech Taken for granted by U.S.Taken for granted by U.S. Protected by the First AmendmentProtected by the First Amendment But in some countries, speech isn’t freeBut in some countries, speech isn’t free Former East GermanyFormer East Germany Former Soviet UnionFormer Soviet Union ChinaChina North KoreaNorth Korea
Foreign Laws (Continued) Foreign Laws (Continued) Copyright LawCopyright Law DMCA – U.S. but enforceable elsewhere? DMCA – U.S. but enforceable elsewhere? Intellectual Property – Held with high regard Intellectual Property – Held with high regard
in other countries? in other countries? Other Differences in Foreign LawOther Differences in Foreign Law Basic human rightsBasic human rights Right to privacyRight to privacy EncryptionEncryption Search and seizure, warrants.Search and seizure, warrants. Right to anonymity Right to anonymity ConsequencesConsequences
Potential Problems Potential Problems
International Considerations International Considerations Open Source SoftwareOpen Source Software Software audienceSoftware audience Licensing Licensing PiracyPiracy Import / Export RegulationImport / Export Regulation MoralMoral International LawyerInternational Lawyer ResearchResearch
Privacy and Civil LibertiesPrivacy and Civil Liberties
Ethical and Legal Basis for Privacy ProtectionEthical and Legal Basis for Privacy Protection Privacy Implications of Massive Database Privacy Implications of Massive Database
Systems Systems Technological Strategies for Privacy Technological Strategies for Privacy
Protection Protection Freedom of Expression in CyberspaceFreedom of Expression in Cyberspace International Implications International Implications Intercultural Implications Intercultural Implications Privacy in the WorkplacePrivacy in the Workplace
Privacy in the WorkplacePrivacy in the Workplace
A Growing Concern under A Growing Concern under Technological Improvements and Technological Improvements and
SurveillanceSurveillance
Gene CummGene Cumm
BackgroundBackground DefineDefine
• general privacy versus workplace privacygeneral privacy versus workplace privacy• ““Freedom from the inappropriate judgement Freedom from the inappropriate judgement
of others” [Johnson]of others” [Johnson] Allowed?Allowed?
• Everything in the workplace, except where a Everything in the workplace, except where a person would have “a reasonable person would have “a reasonable expectation of privacy”expectation of privacy”
• Most federal jobs have some protectionMost federal jobs have some protection Reasoning: Safety and Justification of Reasoning: Safety and Justification of
ExpensesExpenses
Cases and examplesCases and examples CasesCases
• Bourke et al. v NissanBourke et al. v Nissan• Smyth v. PillsburySmyth v. Pillsbury• Restuccia et al. v. Burk Technology, Restuccia et al. v. Burk Technology,
Inc.Inc. ExamplesExamples
• Preston: hidden surveillance and Preston: hidden surveillance and 'Truth Phone''Truth Phone'
ConclusionsConclusions Be Aware, Informed, and EducatedBe Aware, Informed, and Educated
• Laws countLaws count• Policies don't always reciprocatePolicies don't always reciprocate• Destroying data requires destroying Destroying data requires destroying
mediamedia "Whether or not privacy is protected by law "Whether or not privacy is protected by law
or contract, fostering a workplace culture or contract, fostering a workplace culture where privacy is valued and respected where privacy is valued and respected contributes to morale and mutual trust, and contributes to morale and mutual trust, and makes good business sense." makes good business sense." http://www.privcom.gc.ca/fs-fi/02_05_d_17_http://www.privcom.gc.ca/fs-fi/02_05_d_17_e.aspe.asp
More International IssuesMore International Issues
Peter StrombergPeter Stromberg
International IssuesInternational Issues Intellectual Property rightsIntellectual Property rights SecuritySecurity Access/Digital DivideAccess/Digital Divide
History of Intellectual Property History of Intellectual Property rightsrights
1883: Paris Convention for the Protection 1883: Paris Convention for the Protection of Industrial Propertyof Industrial Property
1896: Berne Convention for the Protection 1896: Berne Convention for the Protection of Literary and Artistic Worksof Literary and Artistic Works
Modern International ProtectionsModern International Protections
World Intellectual Property Organization World Intellectual Property Organization (WIPO) in the World Copyright Treaty (WIPO) in the World Copyright Treaty (WCT) in 1996(WCT) in 1996
1995: Agreement on Trade-Related 1995: Agreement on Trade-Related Aspects of Intellectual Property Rights Aspects of Intellectual Property Rights (“TRIPS”) adopted by the World Trade (“TRIPS”) adopted by the World Trade Organization (WTO)Organization (WTO)
International SecurityInternational Security
Individuals can affect the global economy Individuals can affect the global economy and cause billions of dollars in damagesand cause billions of dollars in damages
● ex) teenager from Minnesota modified ex) teenager from Minnesota modified the blaster worm code and released it the blaster worm code and released it damaging over 48,000 computersdamaging over 48,000 computers
Many systems are vulnerable to attackMany systems are vulnerable to attack IT security as a new front in the global war IT security as a new front in the global war
on terrorismon terrorism
International Security ProtectionsInternational Security Protections
There is currently not international agency There is currently not international agency responsible for international computer securityresponsible for international computer security
Cooperation between nations lags the global Cooperation between nations lags the global threatthreat
Any global efforts must coordinate many Any global efforts must coordinate many separate police and intelligence forcesseparate police and intelligence forces
The Digital DivideThe Digital Divide There are more telephones in New York There are more telephones in New York
City than all of rural Africa.City than all of rural Africa. There are more Internet accounts in There are more Internet accounts in
London than all of Africa.London than all of Africa. Around 80% of the world's population has Around 80% of the world's population has
never made a phone call.never made a phone call. Segregation into the “information rich” Segregation into the “information rich”
and the “information poor”and the “information poor”
Digital Divide ContinuedDigital Divide Continued
Whats being done?Whats being done?
Many non-government aid organizations Many non-government aid organizations committed to providing ICTs to poorer committed to providing ICTs to poorer countries countries
Some companies see developing Some companies see developing countries without ICT opportunities as lost countries without ICT opportunities as lost markets and are therefore working to close markets and are therefore working to close the gap.the gap.