Progress Process Booklet - Thematic
Progress Process Booklet - Thematic
............
. ....... . ......
...... ............ ............
............ ............
....... .......
.......
............
Ways in which
Celebrities are you could catc
otect your ing you to your “digital di h and filter
Be proactiv e in steps to pr constantly unde
r threat to y websites help rt.”
their private liv
es. There are man .
online data. the interent
find yourself on
Key Reading
ent
nship Managem e - Digital Vaul
t
Vendor Relatio Personas Final Outcom
ll
............ .....
. . . .Ellie
. . . . . .Goldin
. . . . . . . .g
. . .-. Social
. . . . . . . . .Life.
..
............
............
.... ............
..
.......
. . . .Jim
. . . . .Allen
. . . . . . . -. .Leisu
Ellie Golding is . . . . . . .re
. . .&
24 living in a rented . . .Healt
. . . . . . h.
..........
on her first job. flat ..
...................
..........
..
Danah Boyd -
people don’t ca and make complete
secrecy but they re about r personal data cu re and under your
do care about People own thei sa tio ns. I used personas A n ea sy, se
to managing yo
ur own
control. rtain organi to identify how
control facility
it available to ce types of people
would use the
different
service. data.
Cloud Computing
Is it secure?
The Internet can be a dangerous place. People should also be concerned about
1 in 8 web-users have been victim of Government/Private companies looking
some kind of online fraud. at and using cloud computing to save
Nearly £3 billion was lost last year alone. money. Is this data safe? And who has
Very few people realise just how much access to it?
information can be accessed about us, if
you know where to look. Peoples attitudes seem to have changed,
call it openness or exhibitionism. On
I researched privacy and security risks at twitter you can post your thoughts minute
present and saw that people are becoming by minute. On Facebook and Flickr
worried about their own privacy and the personal photographs.
huge amount of information stored about
them by the Government and companies Experts say the erosion of privacy brings
like Tesco. dangers for both individuals and the
wider population.
At present the retailer now tracks the
shopping habits of 16m families across
The internet is a rich ground for
Britain through the Tesco loyalty card and
identity theft. This does not easily mesh
buying preferences, delivering an
with a life that creates it’s own
extraordinary insight into their lives, not
digital shadow.
only for themselves but for companies
such as Coca-Cola, Nestlé and Unilever
which buy the rights to the data.
• Provocative photographs.
• Inappropriate content.
• Discussions about alcohol or drug
use.
• Bad mouthing previous employers.
• No concept of grammar by using text
language.
I undertook an experiment to see how As you can see it is very easy to build a
much information I could acquire using profile of John Smith, with this
web technology available to all, to build a information I could carry out various
profile of someone I don’t know. illegal operations. Of course I didn’t!
Clean up your profiles on any social You might find some unflattering
networking sites such as LinkedIn, information about yourself on the web.
Myspace, Facebook etc - also YouTube.
The key is to be proactive and take steps
Remove any potentially embarrassing to clean up as much as possible before a
information, comments, photos or videos. prospective employer sees it.
Disconnect links to other sites that might If information is found, attempt to get it
have content inconsistent with your removed, updated or corrected.
professional image, and cut off links to
any friends or acquaintances with
questionable content on their pages.
Celebrities are often under constant “anyone in the public eye, whether
attack on their private lives. through choice or inadvertently, is
entitled to protection for their private
lives.” - Susan Hall.
Privacy law in the UK is terribly
confusing. It derives from a patchwork of It is the intensely private aspects of a
legal areas, including the Data Protection celebrity’s life - involving drugs, sex or
Act, the Human Rights Act and common sexual orientation, marital discord, issues
law breach of confidence and is heavily with children or other family members,
dependent on the specific facts of each or similar topics - that the public and the
case. media deem newsworthy. (Illegality only
ratchets up the stakes, and increases
“The issue many people have is that interest in the story.)
celebrities are only too happy to pose for
photographs and give interviews when
receiving a fee but when another party In the news: Peaches Geldof, photos of
tries to cash in on their fame, they claim a “heroin-fueled one-night stand” were
that their privacy rights are being leaked on the internet this week.
exploited.” - Media law specialist Susan
Hall
• PeopleData.com
• PeopleLookup.com
• WhitePages.com
• Peoplefinders.com
• Peopletraceonline.co.uk
• 192.com
• Lookuppeople.co.uk
• Theelectroralroll.co.uk
Main points:
The Data Protection Act gives have breached security risks so that you
individuals the right to know what can actively change passwords or at least
information is held about them. It be aware of the risks. At present you are
provides a framework to ensure that required to go onto ICO.com and look
personal information is handled properly. through the list.
The Act works in two ways. Firstly, it One of the big areas of privacy and
states that anyone who processes personal security concerns at present is data
information must comply with eight handling by third parties. Managing
principles, which make sure that personal and analysing vast amounts of customer
information is: information is a complex activity, many
organisations hand over the data they
• Fairly and lawfully processed have collected to specialists.
• Processed for limited purposes
• Adequate, relevant and not excessive According to research undertaken by
• Accurate and up to date security research firm the Ponemon
• Not kept for longer than is necessary Institute, data breaches involving third
• Processed in line with your rights party providers jumped to 44% of the
• Secure total last year, up from 21% in 2005.
• Not transferred to other countries They also cost more to deal with at
without adequate protection around £140 per compromised record
compared with an average of £123.
The second area covered by the Act Select Language - English >
provides individuals with important Cooporations that you have a relationship with who
have breached security risks:
rights, including the right to find out what
personal information is held on computer St James Primary School - sensitive personal data relating Investigate
and most paper records. to a number of pupils.
The Information Commissioner also Birmingham and Solihull Mental Health NHS
Foundation Trust - theft of an unencrypted laptop computer
produces a ‘sin list’ of all the companies which contained personal data relating to some 1,500 of Trusts
Change Passwords
patients and some 450 staff.
who have been involved security
Redstone Mortgages Ltd following the disclosure of
breaches and loss of data. reports containing personal data of over 15,000 mortgage Change Passwords
customers
This gave me an idea. People sign up Billing Pharmacy Ltd - follows the theft of an
unencrypted computer containing sensitive personal data
Change Passwords
Privacy. Behaviour.
Customers put their information into their There is then an incentive for the
own personal digital vault which is under companies to give you important and
their complete control, no copies will be valuable information and advertisements,
taken and stored elsewhere. Completely not just junk mail. As at any point you
secure. can cut the company off viewing your
data.
Organisations would no longer need huge
amounts of information about individuals Companies would offer great deals and
in massive databases that they spend time treat you amicably in return for access to
and money on trying to manage, protect your data.
and analyse.
. . . Ellie
. . . . . . .Golding
. . . . . . . . . . -. . Social
. . . . . . . . Life.
...............................
How is this service going to help
Ellie?
Ellie Golding is 24 living in a rented flat on her Ellie can allow access to her data
first job. depending on which companies
she is interested in allowing them
She is keen to get the best overdraft at the bank as to send her offers on products
she is spending more than she is making. and services, for example mobile
phone tariffs in Ellie’s case.
She is interested in:
Mobile phone tariff deals. If a certain company isn’t sending
Special deals for clubs. any useful advertising she has the
Package holidays, ability to cut them off. Thus not
Cheap flights. giving them access to her personal
data.
She is on social networking sites.
. . . Callum
. . . . . . . . . . Stone
. . . . . . . .-. Family
. . . . . . . . . .Life.
.............................
How is this service going to help
Callum?
Utilities can be hooked up to the service. Constantly feeding information updates relating to use Finance. (Top privilege)
and preferences straight into your secure digital vault.
Final Outcome:
Input Your Basic Information: Input Your Activities & Interests:
Sex: Activities:
D.O.B:
Hometown:
Interests:
Relationship Status:
Music:
Political Views:
Books:
Religious Views:
Movies:
Deposit
DigitalVault
Safeguard Your Privacy Now!
Deposit DigitalVault
Safeguard Your Privacy Now!
User inputs their basic information into their DigitalVault. User can deposit their Activities and Interests into their DigitalVault.
Flights
Hotels
Internet TV Channels Phone Car Stats Medical Gas Electricity
Package Holidays
Long-haul
Attach your utilities smart meters to the service.
Deposit
City Breaks Easy and Secure. Constantly feeding information
updates relating to use and preferences straight
Ski into your secure digital vault.
Cruise
DigitalVault
Safeguard Your Privacy Now!
DigitalVault
Safeguard Your Privacy Now!
User then chooses which services they are interested in. This allows only User can also hook up their utility’s smart metres along with medical notes
these companies to access their information. and vehicle stats.
Choose Your Representation:
Thomas
Cook
Thompsons sainsburys
02
orange
Tesco
HSBC
Apple
DigitalVault
Safeguard Your Privacy Now!
User then chooses which skin they would like to display their connections. User can instantly see which companies they have a connection with.
Clicking on the bright spots tells the user that their is a news story connected
to that company.
Thomas Thomas
Cook Cook
02 02
orange orange
Tesco Tesco
HSBC HSBC
Brings up the news story. In this instance it is Apple and the suicides of Click on the centre of the flower to view how much information you are
workers. allowing that company to see. The less information you allow the company to
view more wilted the flower will become.
Thomas Thomas
Cook Cook
02 02
orange orange
Tesco Tesco
Cut off any links with this company?
HSBC HSBC
Basic Information
Apple Activities Apple
Interests
Music
Books
Movies
Finance
How much information you are leaking to that company can be edited. To remove a link to a company cut off at the stem.
Thomas
Cook
Companies
Thomas
Cook
that have accessed your information recently: Deny Access
Thompsons sainsburys Thompsons
23:28 02 June 2010 - Johnsons sainsburys
02 02
23:16 02 June 2010 - Dixsons
22:11 02 June 2010 - Floursand
19:12 02 June 2010 - Sony
orange orange 18:45 02 June 2010 - Clarins
Tesco 18:45 02 JuneTesco
2010 - Two Faced ink
15:25 02 June 2010 - Logo
HSBC 14:28 02 June 2010 - Jaspers HSBC
14:16 02 June 2010 - Holland
14:11 02 June 2010 - Phillips
13:12 02 June 2010 - Candy
13:45 02 June 2010 - Hoover
Apple Apple 13:45 02 June 2010 - Asda
11:25 02 June 2010 - CocaCola
10:45 02 June 2010 - Royal Bank of Scotland
09:45 02 June 2010 - Mark and Spencer
07:25 02 June 2010 - Pink
This company no longer has access to your DigitalVault. It is also possible to look at your log book of recent companies accessing
your information. Simply click to deny them access again.
Feedback
Invitations from companies asking to view your data and offer services:
You could also put timers on how long a “I like the idea it would
company could access your digital vault also be good if you could
for. User: “I only want to know about
view where you are in
your products for 6 months.”
other DigitalVaults.”