Slides
Slides
Fourth edition
PRIVACY
What We Will Cover
• Privacy and Computer Technology
• Privacy Topics
• Protecting Privacy
• Communications
Privacy and Computer Technology
• Computer technology is not necessary for the invasion of
privacy. However, the use of digital technology has made
new threats possible and old threats more potent.
• Computer technologies—databases, digital cameras, the
Web, smartphones, and global positioning system (GPS)
devices, among others—have profoundly changed what
people can know about us and how they can use that
information.
• Understanding the risks and problems is a first step towards
protecting privacy.
• For computer professionals, understanding the risks and
problems is a step towards designing systems with built-in
privacy protections and less risk.
Privacy and Computer Technology
Key Aspects of Privacy:
• Freedom from disturbance (being left alone)
• Control of information about oneself
• Freedom from surveillance (being tracked,
followed, watched)
Information Privacy
• Definition of privacy
– “The right to be left alone—the most comprehensive
of rights, and the right most valued by a free people”
• Information privacy is a combination of:
– Communications privacy
• Ability to communicate with others without being
monitored by other persons or organizations
– Data privacy
• Ability to limit access to one’s personal data by other
individuals and organizations in order to exercise a
substantial degree of control over that data and its use
Privacy threats come in several
categories
• Intentional, institutional uses of personal information
(in the government sector primarily for law
enforcement and tax collection, and in the private
sector primarily for marketing and decision making)
• Unauthorized use or release by “insiders,” the people
who maintain the information
• Theft of information
• Inadvertent leakage of information through negligence
or carelessness
• Our own actions (sometimes intentional trade-offs and
sometimes when we are unaware of the risks)
Privacy and Computer Technology
(cont.)
New Technology, New Risks:
• Government and private databases
• Sophisticated tools for surveillance and data
analysis
• Vulnerability of data
Government and private databases
• Today there are thousands (probably millions) of databases, both
government and private, containing personal information about us.
• In the past, there was simply no record of some of this information,
such as our specific purchases of groceries and books.
• Government documents like divorce and bankruptcy records have
long been in public records, but accessing such information took a
lot of time and effort.
• When we browsed in a library or store, no one knew what we read
or looked at. It was not easy to link together our financial, work,
and family records.
Government and private databases
• Now, large companies that operate video, email, social network,
and search services can combine information from a member’s
use of all of them to obtain a detailed picture of the person’s
interests, opinions, relationships, habits, and activities.
• Even if we do not log in as members, software tracks our activity
on the Web. In the past, conversations disappeared when people
finished speaking, and only the sender and the recipient normally
read personal communications.
• Now, when we communicate by texting, email, social networks,
and so on, there is a record of our words that others can copy,
forward, distribute widely, and read years later.
Sophisticated tools for surveillance
and data analysis
• Miniaturization of processors and sensors put tiny cameras
in cellphones that millions of people carry everywhere.
Cameras in some 3-D television sets warn children if they
are sitting too close. What else might such cameras record,
and who might see it?
• The wireless appliances we carry contain GPS and other
location devices. They enable others to determine our
location and track our movements.
• Patients refill prescriptions and check the results of
medical tests on the Web. They correspond with doctors by
email.
Sophisticated tools for surveillance
and data analysis
• We store our photos and videos, do our taxes, and
create and store documents and financial spreadsheets
in a cloud of remote servers instead of on our own
computer.
• Law enforcement agencies have very sophisticated
tools for eavesdropping, surveillance, and collecting
and analyzing data about people’s activities, tools that
can help reduce crime and increase security—or
threaten privacy and liberty.
Vulnerability of data
• Combining powerful new tools and applications can have
astonishing results. It is possible to snap a photo of
someone on the street, match the photo to one on a social
network, and use a trove of publicly accessible information
to guess, with high probability of accuracy, the person’s
name, birth date, and most of his or her Social Security
number.
• This does not require a supercomputer; it is done with a
smartphone app. We see such systems in television shows
and movies, but to most people they seem exaggerated or
way off in the future. All these gadgets, services, and
activities have benefits, of course, but they expose us to
new risks. The implications for privacy are profound.
Privacy and Computer Technology (cont.)
Personal information
• In the context of privacy issues, it includes any
information relating to, or traceable to, an individual
person.
• The term does not apply solely to what we might
think of as sensitive information, although it includes
that.
• It also includes information associated with a
particular person’s user name, online nickname,
identification number, email address, or phone
number.
• Nor does it refers to text . It extends to any
information, including images, from which someone
can identify a living individual.
Privacy and Computer Technology (cont.)
Invisible information gathering
27