1 / 14

The Impact of Computer Technology on Privacy and Personal Information

Explore the various ways in which computer technology has impacted privacy and personal information, including invisible information gathering, secondary use of data, computer matching, profiling, monitoring and tracking. Discover the challenges to privacy protection and regulations in government databases, and understand the impact of consumer databases on privacy. Learn about marketing practices using consumer information and the role of credit bureaus in evaluating credit risk.

Download Presentation

The Impact of Computer Technology on Privacy and Personal Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 프라이버시와 개인 정보 • 이 충기 • 명지대학교 • 컴퓨터소프트웨어학과

  2. A Gift of Fire Privacy and Personal Information The Impact of Computer Technology “Big Brother is Watching You” Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation

  3. The Impact of Computer Technology • Computers are not needed for the invasion of privacy. • Computers simply make new threats possible and old threats more potent. • Privacy can mean: • Freedom from intrusion • Control of information about oneself • Freedom from surveillance

  4. The Impact of Computer Technology • Invisible Information Gathering • Examples: • Satellite surveillance • Caller ID • 080- or 900-number calls • Loyalty cards • Web-tracking data; cookies • Peer-to-peer monitoring • Others… Q: Recall an example of invisible information gathering about you.

  5. The Impact of Computer Technology • Secondary Use • Using information for a purpose other than the one for which it was obtained. A few examples: • Sale (or trade) of consumer information to other businesses • Credit check by a prospective employer • Government agency use of consumer database Q: Recall an occasion when a secondary use of your personal information was made.

  6. The Impact of Computer Technology • Computer Matching • Combining and comparing information from more than one database. Some examples: • Sharing of government agencies’ databases to detect fraud by recipients of government programs • Creating consumer dossiers from various business databases Q: Recall an example of computer matching that has appeared in the news.

  7. The Impact of Computer Technology • Profiling • Using data in computer files to predict likely behaviors of people. Some examples: • Businesses engage in profiling to determine consumer propensity toward a product or service. • Government agencies use profiling to create descriptions of possible terrorists. Q: How might profiling be used with your personal information?

  8. The Impact of Computer Technology • Monitoring and Tracking • Examples: • GPS (global positioning system) • Cell-phones • Blackboxes in automobiles • Other wireless appliances Q: What is the impact of GPS-equipped childrens’ wrist watches?

  9. “Big Brother is Watching You” • National Government Databases • Purpose: • Determine eligibility for jobs and programs • Reduce waste • Detect fraud • Law enforcement • Regulations: • Privacy Act of 1974 • Computer Matching and Privacy Protection Act of 1988 Q: Which government databases contains your personal information?

  10. “Big Brother is Watching You” • 4th Amendment • Expectation of Privacy: • Government’s rights are limited. • Government must have probable cause to search private premises or seize documents. • Privacy Challenges: • New sensing and surveillance technologies enable the government access to private premises without physical entry. • New technologies provide the government with access to huge amounts of personal data in business databases. • Courts allow some searches and seizures of computers without search warrants. Q: Has technology strengthened or weakened the spirit of the 4th Amendment?

  11. Consumer Information • Consumer Databases • Gathering Information: • Warranty cards • Purchasing records • Membership lists • Web activity • Change-of-address forms • Much more… Q: Recall ways in which you have contributed to consumer databases.

  12. Consumer Information • Consumer Databases (cont’d) • Limiting Collection, Use, Sharing, and Sale of Personal Data: • Consumers can take measures to restrict the use of their personal information. • Some information sharing is prohibited by law. • Some information sharing is prohibited by published, privacy policies. Q: What measures do you take to limit consumer information gathered about you?

  13. Consumer Information • Marketing: Using Consumer Information • Trading/buying customer lists • Telemarketing • Data Mining • Mass-marketing • Web ads • Spam (unsolicited e-mail) Q: How are children affected by marketers using consumer information?

  14. Consumer Information • Credit Bureaus • Uses of consumer information: • Evaluate credit risk of applicant. • Marketing. • Regulation: • FCRA (Fair Credit Reporting Act) • Self-regulated by privacy principles. Q: If you are denied credit, what are your rights based on the FCRA?

More Related