1 / 18

Privacy 2

Privacy 2. Digital Dossier. The data shadow The digital dossier Your own diary of recordable events. Persistence of Information. Communication modes Writing Speech Electronic forms E-mail V-mail IM Images The presumption of truth. Information Trails. The present The future

elysia
Download Presentation

Privacy 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy 2

  2. Digital Dossier • The data shadow • The digital dossier • Your own diary of recordable events

  3. Persistence of Information • Communication modes • Writing • Speech • Electronic forms • E-mail • V-mail • IM • Images • The presumption of truth

  4. Information Trails • The present • The future • Examples • DEA sweeps • Borked! • Pervasive record keeping • Data retention

  5. Privacy Legislation • The Video Protection Act • Is this a good law? Is it justified? • What caused it to be enacted? • Free market and self regulation – Does this work for privacy? • Government regulation • Enacting laws does not equal enforcing them

  6. Building a Datasphere • Make data collectible • Make data machine readable • Build a big database

  7. Check Digits • VIN check digit • http://www.home.planet.nl/~fransang/checkdig.html

  8. RFID • Definition – Radio Frequency Identification, the use of radio waves to automatically identify individual items by means of a microchip capable of transmitting identifying information. • Applications – product identification in stores, warehouses, medical facilities, warranties, identification of animals, people via implanted chips • Privacy issues – tracking individuals through their product purchases and uses, scope creep, location tracking of individuals

  9. One Big Happy Database • Thomas Watson’s 1940s estimate on the need for computers joke • What’s on the web? • Search engines and their ilk • Your defense

  10. Data Quality • Large databases and data accuracy • Credit Reporting data • NCIC • The web

  11. A Personal Question • Would you run for public office if you knew that everything you had ever said or done could be held up for public scrutiny? • What happens in Vegas stays in Vegas

  12. Satellite Imagery • Do satellite images violate privacy? Are they illegal? • Resolution • Applications • Tax collections • Political claims

  13. Ground Surveillance • Surveillance cameras • In malls • ATMs • “The End of Violence” • Traffic violation control

  14. Bayes Theorem and Surveillance • Facial identification systems – Tampa Superbowl • Fingerprint ID systems • http://members.aol.com/johnp71/bayes.html

  15. Personal Systems • Webcam • Nanny cam • Steve Mann http://www.wearcam.org/students.htm • Webcam • Nanny cam • Steve Mann http://www.wearcam.org/students.htm

  16. Low Cost Personal Devices • Tracking devices (location) • Keystroke capturers • Recording devices • Tracking devices (location) • Keystroke capturers • Recording devices • www.spyemporium.com • http://www.asginvestigations.com/

  17. Employee Monitoring • Various means are being employed: e-mail, phone, video, drug testing, psychological profiling • Is it legal? • Is it ethical? • Should Fair Information Practices be applied to employee monitoring?

  18. Surveillance Systems • What questions could be asked about them? • Should they be permitted or banned? • Are they effective? • Do they create additional problems? • What restrictions should be placed on their use? • What restrictions should be placed on the data they generate? • Who should watch the watchers?

More Related