1 / 40

Forum IIIB Group 7 Open Access to Personal Information

Forum IIIB Group 7 Open Access to Personal Information. Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen. Introduction. Steve Ayers. Every computer should come with a label that reads: WARNING!.

oshin
Download Presentation

Forum IIIB Group 7 Open Access to Personal Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Forum IIIB Group 7Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen

  2. Introduction Steve Ayers

  3. Every computer should come with a label that reads:WARNING! USE OF THIS DEVISE CAN RESULT IN LOSS OF PRIVACY Steve Ayers

  4. “With dossiers being compiled by commercial bureaus, state and local law enforcement agencies, the CIA, the FBI, the Armed Services, and the Census Bureau, we live in an Orwellian age in which the computer has become the heart of a surveillance system that will turn society into a transparent world.” Supreme Court Justice William Douglas 1974 Steve Ayers

  5. ORWELL’s 1984Fact or fiction Steve Ayers

  6. The big questions • Where does the individual fit? • Where is the real power? • Is it our information? • How important is personal access? • How do we amend false information? • What sort of technology is needed? • Can control be brought to the system? • Does the system offer protection and safeguards? • Who’s responsible? Steve Ayers

  7. THE HISTORICAL PERSPECTIVE Records started with writing In early America the church did most of the personal record keeping The US Census Federal Income Tax The Social Security System Expanding Government role in personal lives Consumers and computers Steve Ayers

  8. THE DATABASE BUSINESS 550 companies $3 Billion Each individual is in an average of 50 databases Steve Ayers

  9. THE HEAVYWIEGHTS CatalinaMarketing: 30 million American’s buying habits particularly from supermarkets Aristotle Industries: Specializes in voter records Donnelley Marketing Info Svcs: Operates a demographic database service on 125 million Americans Willard Services: Database on 215 million Americans Steve Ayers

  10. THE CREDIT REPORTING COMAPNIES THE REST OF THE GUYS: • THE CABLE COMPANY • VIDEO STORES • THE PHONE COMPANY • TRAVEL AGENCIES • DOCTORS OFFICES • STUDENT RECORDS • ETC. ETC. ETC. THE LIST GOES ON Steve Ayers

  11. THE LAW THE PRIVACY ACT OF 1974: Applies only to public records FERPA: Addresses student records CCPA: Applies to cable TV operators ECPA: Covers electronic transmissions VVPA: Limits video rental information Steve Ayers

  12. THE LAW Drivers License Protection Act of 1994 HIPPA: The all encompassing healthcare record act Gramm-Leach-Bailey Act: An example of a worthless law Steve Ayers

  13. WHERE IS ALL THIS INFORMATION GOING AND HOW IS IT BEING USED • CREDIT CARD COMPANIES • SUPERMARKETS • ATM CARDS • PHONE CALLING CARDS • MEDICAL RECORDS • CREDIT REPORTING COMPANIES • THE CENSUS BUREAU Steve Ayers

  14. Pros Michelle Peterson

  15. Data System Structure Where information stored: • One database • Separate databases Who has access: • Individuals • Individuals & Authorized Entities Michelle Peterson

  16. Each person can access all data about themselves held by anyone. Michelle Peterson

  17. Medical Legal Work history Company Held Data Financial Scholastic Political Types of Records Michelle Peterson

  18. Medical Michelle Peterson

  19. Financial Michelle Peterson

  20. Legal Michelle Peterson

  21. Why does this matter? Michelle Peterson

  22. ErrorsPlanningSecurity Michelle Peterson

  23. Collected data is used by authorized personnel. Michelle Peterson

  24. Medical Personnel Remote Care Emergent Care Michelle Peterson

  25. Financial Agencies Credit Information Michelle Peterson

  26. Legal Agencies Historical data Michelle Peterson

  27. It is an achievable goal!

  28. Cons Christie Christman

  29. Free or for a Fee? • Accessing our own information Christie Christman

  30. Inaccurate Reports • Effects of errors Christie Christman

  31. Hackers & Crackers • Identity Theft • Impact of all information in one database • Malicious or False entries Christie Christman

  32. Are we willing to trade that much info about our identity to one business/entity? Do we get a say in how our info is used? Christie Christman

  33. Who else has access to our files? • Will our files be sold? - Direct marketing • Who will maintain the system? Christie Christman

  34. Conclusion:Consumer Privacy vs. Legitimate Duties Audrey Clausen

  35. Consumer Privacy • Access to private databases • Who shares the costs? • Who owns the information? • Hackers & Crackers? • Illegitimate use of data Audrey Clausen

  36. Legitimate Duties • Track Federal Tax debtors • Dept Collection Act • Parents Delinquent in Child Support • Child Support Enforcement Act • Foreign Counterterrorism Investigations • ChoicePoint’s Database Audrey Clausen

  37. Letter to Federal Trade Commission in 1996 Audrey Clausen

  38. Is the non-consensual compilation, sale and usage of the database a violation of private citizens civil rights? • Are the databases subject to unlawful usage? Do they create an undue potential for fraud on consumers? Audrey Clausen

  39. Are the compilation, sale, and usage of consumers' personal data consistent with the Fair Credit Reporting Act and federal telemarketing regulations? • Are there ways consumers can prevent data-based service companies from including their personal background information in commercial data bases absent their content? Audrey Clausen

  40. The End Steve Ayers, Michelle Peterson, Christie Christman, Audrey Clausen

More Related