Why to study privacy? Understanding the risks and problems is a first step toward protecting...

47

Transcript of Why to study privacy? Understanding the risks and problems is a first step toward protecting...

Page 1: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.
Page 2: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Why to study privacy? Understanding the risks and problems is a first

step toward protecting privacy. For computer professionals, understanding the

risks and problems is a step toward designing systems with built-in privacy protections and less risk

Page 3: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Key aspects of privacyThere are three key aspects of privacy: Freedom from intrusion—being left alone Control of information about oneself Freedom from surveillance (from being

followed, tracked, watched, and eavesdropped upon

Page 4: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Critics of privacyCritics of privacy argue that it gives cover to deception, hypocrisy,

and wrongdoing. It allows fraud. It protects the guilty. Concern for privacy may be regarded with a

suspicious “What do you have to hide?”

Page 5: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Supporters of privacy

The desire to keep things private does not mean we are doing anything wrong.

We might wish to keep health, relationship, and family issues private.

We might wish to keep religious beliefs and political views private from some of the people we interact with.

Privacy of some kinds of information can be important to safety and security as well. Examples include travel plans, financial data, and for some people, simply a home address.

Page 6: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Privacy ThreatsPrivacy threats come in several categories: Intentional, institutional uses of personal

information (in the government sector primarily for law enforcement and tax collection, and in the private sector primarily for marketing and decision making)

Unauthorized use or release by “insiders,” the people who maintain the information

Theft of information Inadvertent leakage of information through

negligence or carelessness Our own actions (sometimes intentional trade-offs

and sometimes when we are unaware of the risks)

Page 7: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Privacy issues arise in many contexts. Spam, the intrusion of junk email and text

messages, Hacking and identity theft Monitoring of workplace communications and

other issues of privacy for employees privacy risks result from the fact that so much

of the data stored about us is incorrect. Databases contain errors. Files are not updated. Records of different people with similar names or other similarities get comingled or confused.

Responsibilities of computer professionals.

Page 8: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Point to understand

We cannot expect complete privacy. Nor can we expect to be totally free from

surveillance.

Page 9: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Invasion of PrivacyInformation is most value able commodity today.

For business information is ‘money’

For some governmental and military organizations, information is security and for this reason they manipulate personal data in the name of safety and public security.

Although IT is related to privacy violation, it is not computers that invade privacy but people who have the tendency, in various ways, to invade the privacy of others.

Page 10: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Invasion of privacy is a legal term which refers primarily to a person's right to keep his or her life private and free from the intrusion of others.

Invasion of privacy charges are usually presented in a civil lawsuit against an organization that has crossed a perceived line into a celebrity or other person's private life.

Employee Invasion Of Privacy.Since the employer owns the phone lines, he or she can get records of all phone calls made from workplace phones.

Another issue of concern to employees is privacy while using work computers.

Since the employer owns the computers and the network, employee privacy laws do little to protect employees while using the computer.

Page 11: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Invasion of PrivacyTo select different kind of sensitive data such as banking records, police records, insurance records, phone calls, military records, medical records, airline reservation, passport registration, and credit card purchases, advanced information technologies used as instruments of surveillance, they include:

Network databases Digital and Television cameras Microphone transmitters Camouflaging bug devices Monitoring hardware device and software programs

Page 12: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Invasion of PrivacyInvasion of Privacy by GovernmentIn some cases government collect personal data for identification reasons, in case of emergency, for security reasons, in case of criminal actions, and for information reasons, in case of national statistics.

In a computerized world where only information has value, individuals are usually treated more as the sum of data than as free human beings.

This issue underlies the problem of freedom and privacy in modern societies.

Page 13: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Invasion of PrivacyRights of Privacy

Solitude. I have the right to be alone without disturbance.

Anonymity. I have the right to have no personal identity in public

Intimacy. I have the right to do something privately (private cozy atmosphere)

Reserve. I have right to control personal information about oneself as well as the methods of dissemination of that

information. E.g. to limit disclosure to others

Page 14: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Rights of Privacy

Problems of Privacy involves:

1. Territorial Privacy.

Limiting the intrusion into domestic, professional, civil and recreational environment.

Methods: Authentication control, Biometric scanning, Laser cards, Video Surveillance etc etc.

2. Location Privacy Managing geolocation technologies (such as GPS and satellite system)

Page 15: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Rights of Privacy 3. Bodily Privacy.

Respecting the integrity of an individual’s body through restriction on invasive activity.

Protection of people's physical selves against invasive procedures such as genetic tests, drug testing and cavity searches etc

Topics of Bodily privacy include:

• Blood transfusion without consent • Arbitrary arrest and detention, and kidnapping • Torture

Page 16: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Rights of Privacy 4. Communication Privacy.

Include privacy of emails, teleconferences, postal mail etc.

5. Information Privacy (It include legislation and industry codes…….credit information, medical record, government record).

6. Personal Privacy (undue interference, such as physical searches, and information gathering)

Page 17: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Human Rights

According to British Philosopher John Locke, most fundamental human rights are life, liberty, and property.

Locke maintains that any threat to an individual’s private property is a potential threat to that individual’s personal life, and therefore, liberty and privacy have to be undeniably protected.

It is further argued by Emmanuel Kant that rationality and autonomy are essential prerequisites in the freedom of a person.

Page 18: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Methods of Privacy Violation 1. Intrusion. (wrong entry or acquiring possession of property that

belongs to another, violation of privacy)

2. Misuse of information.

3. Interception of information. Act of secretly listening to the private conversation of others without their consent

Unauthorized access to private communication

Page 19: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Methods of Privacy Violation 4. Data Matching

It involves bringing together data from different sources, compiled it and applied to a range of public policy purposes.

Much of the data-matching done by agencies subject to the Privacy Act aims to identify people for further action or investigation.

Government agencies for Tax purpose as well.

Data-matching poses a particular threat to personal privacy because it

involves analysing information about large numbers of people without prior cause for suspicion.

Page 20: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Methods of Privacy Violation 5. Data Mining

Compiling of masses of data into one or more databases in order to extract new information and knowledge that were previously hidden and/or unidentified.

This technique uses artificial intelligence, neural networks

• It is used in direct marketing• Commercial companies to discover patterns of behavior for

consumer’s preferences and activities.

e.g. Credit card company may determine how consumers have spend their money.

Page 21: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Methods of Privacy Violation Computer databases and networks are not the only IT tools involved in the invasion of privacy. Video cameras, satellite, the internet, and ID cards are actively engaged in monitoring people and collecting information about them.

Page 22: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Activity

Think of any privacy related incident where you think your privacy got invaded.

Page 23: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Key Privacy And Anonymity Issues

• Data encryption • Identity theft • Customer profiling • Workplace monitoring • Spamming • Advanced surveillance techniques

Page 24: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Data EncryptionCryptography

•science of encoding messages

•only sender and intended receiver can understand the messages

•key tool for ensuring confidentiality, integrity, authenticity of electronic messages and online business transactions

Encryption

•process of converting electronic messages into a form understood only by the intended recipients

Page 25: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Data Encryption

Despite potential management and administration headaches most people agree encryption eventually must be built into

•networks

•file servers

•tape backup systems

Page 26: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Identity Theft Theft of key pieces of personal information to gain access to a person’s financial accounts

•using this info, ID thief may apply for new credit or financial accounts, register for college courses, etc—all in someone else’s name Information includes: •name •address •date of birth •Social Security number •passport number •driver’s license number •mother’s maiden name

Page 27: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Identity Theft Phishing

•attempt to steal personal identity data

•by tricking users into entering information on a counterfeit Web site (spoof emails)

•spear-phishing - a variation in which employees are sent phony e-mails that look like they came from high-level executives within their organization

Page 28: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Identity Theft Spyware •keystroke-logging software downloaded to user’s computer without consent

•enables the capture of: -account usernames -passwords -credit card numbers -other sensitive information

•operates even if an infected computer is not connected to the Internet

•records keystrokes until users reconnects; data collected then emailed to spy or posted to a web site

Page 29: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Consumer ProfilingCompanies can collect info about consumers without their explicit permission! Companies openly collect personal information about Internet users

•when they register at web sites, complete surveys, fill out forms or enter contests online Cookies •text files a web site places on user’s hard drive so that it can remember info •examples: site preferences, contents of electronic shopping cart •cookie are sent back to server unchanged by browser each time it accesses that server Tracking software •identify visitors to your web site from e.g. pay-per-click accounts

Page 30: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Consumer ProfilingSimilar methods used outside the Web environment •marketing firms warehouse consumer data •for example, credit card purchases, frequent flier points, mail-order catalogue purchases, phone surveys Databases contain a huge amount of consumer behavioral data Affiliated Web sites: •group of web sites served by single advertising network •DoubleClick tracks ad clicks and web purchases: useful for marketers and sellers Customized service for each consumer •marketers use cookies to recognize return visitors and store useful info about them

Page 31: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Consumer Profiling

Four ways to limit or even stop the deposit of cookies on hard drives

•set the browser to limit or stop cookies

•manually delete them from the hard drive

•download and install a cookie-management program

•use anonymous browsing programs that don’t accept cookies

-e.g. anonymizer.com allows you to hide your identity while browsing

Page 32: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Code of Fair Information Practices and 1980 OECD privacy guidelines

•companies collect only personal info necessary to deliver its products/services

•protects this info

•informs customers if it intends to use this info for research or marketing

•provides a means for customers to opt out

Page 33: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Workplace Monitoring

•ensure worker productivity without violating privacy rights of employees Employers monitor workers •record email, surfing activity, files, even videotaping employees on the job

Inform employees of electronic monitoring devices; restrict type of info collected

Page 34: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

SpammingTransmission of same e-mail message to large number of people Extremely inexpensive method of marketing •$1K vs. $10K for direct-mail campaign •3 weeks to develop vs. 3 months •48hrs for feedback vs. 3 weeksUsed by many legitimate organizations •example: product announcementsCan contain unwanted and objectionable materials Last 2 bullets point to the ethical conundrum! Email considered Spam: 40% of all email; Daily Spam emails sent: 12.4 billion; Daily Spam received per person: 6; Annual Spam received per person: 2,200; Spam cost to all non-corp Internet users: $255 million; Spam cost to all U.S. Corporations in 2002: $8.9 billion: States with Anti-Spam Laws: 26

Page 35: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act 2004

says it is legal to spam but -spammers cannot disguise their identity -there must be a label in the message specifying that the e-mail is an ad or solicitation -they must include a way for recipients to indicate they do not want future mass mailings (i.e. opt out)

•may have actually increased the flow of spam as it legalizes the sending of unsolicited e-mail

Page 36: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Advanced Surveillance Technology

Provides exciting new data-gathering capabilities vs. personal-privacy issues •advocates: people have no legitimate expectation of privacy in public places •critics: creates potential for abuse – intimidation of political dissenters, blackmail of people caught with “wrong” person or in “wrong” place

Camera surveillance

•U.S. cities plan to expand surveillance systems London has one of world’s largest public surveillance systems •“Smart surveillance system” singles out people acting suspiciously

Page 37: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Advanced Surveillance Technology

Facial recognition software

•identifies criminal suspects and other undesirable characters

•yields mixed results Global Positioning System (GPS) chips

•Placed in many devices to precisely locate users -cars, cellphones, etc. •Good: accurately respond to 911 callers; real-time location-aware marketing

•Bad: wireless spamming from local restaurants etc, your whereabouts always known

Page 38: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Advanced Surveillance Technology

Facial recognition software

•identifies criminal suspects and other undesirable characters

•yields mixed results Global Positioning System (GPS) chips

•Placed in many devices to precisely locate users -cars, cellphones, etc. •Good: accurately respond to 911 callers; real-time location-aware marketing

•Bad: wireless spamming from local restaurants etc, your whereabouts always known

Page 39: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

EXAMPLES( CASE STUDIES )

Page 40: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Search engines collect many terabytes of data daily Search engine companies want to know how

many pages of search results users actually look at, how many they click on, how they refine their search queries, and what spelling errors they commonly make. The companies analyze the data to improve search services, to target advertising better, and to develop new services.

Page 41: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Search engines The database of past queries also provides

realistic input for testing and evaluating modifications in the algorithms search engines use to select and rank results.

Search query data are valuable to many companies besides search engine companies.

By analyzing search queries, companies draw conclusions about what kinds of products and features people are looking for. They modify their products to meet consumer preferences.

Page 42: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Search engines In 2006, the federal government presented

Google with a subpoena for two months of user search queries and all the Web addresses that Google indexes. Google protested, bringing the issue to public attention.

A subpoena is a court order for someone to give testimony or provide documents or other information for an investigation or a trial

Page 43: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Search engines the idea of the government gaining access to

the details of people’s searches horrified privacy advocates and many people who use search engines.

Google and privacy advocates opposed the precedent of government access to large masses of such data. A court reduced the scope of the subpoena, removing user queries.

Page 44: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Search engines A few months later, release of a huge

database of search queries at AOL showed that privacy violations occur even when the company does not associate the queries with people’s names.

Against company policy, an employee put the data on a website for search technology researchers. This data included more than 20 million search queries by more than 650,000 people from a three-month period

Page 45: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Example: Smartphones Some Android phones and iPhones send

location data (essentially the location of nearby cell towers) to Google and Apple, respectively. Companies use the data to build location-based services that can be quite valuable for the public and for the companies.

Page 46: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Smartphones Roughly half the apps in one test sent the phone’s ID

number or location to other companies (in addition to the one that provided the app). Some sent age and gender information to advertising companies. The apps sent the data without the user’s knowledge or consent.

Various apps copy the user’s contact list to remote servers. Android phones and iPhones allow apps to copy photos (and, for example, post them on the Internet) if the user permits the app to do certain other things that have nothing to do with photos.

(Google said this capability dated from when photos were on removable memory cards and thus less vulnerable. This is a reminder that designers must regularly review and update security design decisions.)

Page 47: Why to study privacy?  Understanding the risks and problems is a first step toward protecting privacy.  For computer professionals, understanding the.

Smartphones A major bank announced that its free mobile banking app

inadvertently stored account numbers and security access codes in a hidden file on the user’s phone.

A phone maker found a flaw in its phones that allowed apps to access email addresses and texting data without the owner’s permission.

Some iPhones stored months of data, in a hidden file, about where the phone had been and when, even if the user had turned off location services. Data in such files are vulnerable to loss, hacking, and misuse. If you do not know the phone stores the information, you do not know to erase it.

Given the complexity of smartphone software, it is possible that the companies honestly did not intend the phones to do these things