0% found this document useful (0 votes)
5 views22 pages

DT6 - Privacy 3

The document outlines the importance of privacy and confidentiality in the context of digital technology, emphasizing the ethical and legal rights individuals have regarding their personal information. It discusses data privacy laws, the Fair Information Practice Principles (FIPPS), and highlights examples of data breaches and their consequences. Additionally, it addresses the implications of large databases and online identity on personal privacy.

Uploaded by

mernagoodgirl666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views22 pages

DT6 - Privacy 3

The document outlines the importance of privacy and confidentiality in the context of digital technology, emphasizing the ethical and legal rights individuals have regarding their personal information. It discusses data privacy laws, the Fair Information Practice Principles (FIPPS), and highlights examples of data breaches and their consequences. Additionally, it addresses the implications of large databases and online identity on personal privacy.

Uploaded by

mernagoodgirl666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

UR5 :

Foundations of Digital Technology


Privacy

Dr Rashad Ragab
Math. Dept., Helwan University
rragab@science.helwan.edu.eg
Outline

 Privacy and confidentially


 Framework of Data Privacy
 Examples of comprehensive laws and
regulation
 FIPPS
 Example of data breaches and Fines

COE526: Lecture 2 2
Privacy

 Privacy - The desire of a person to control the


disclosure of personal information
 Privacy – What are the threats to personal
privacy and how can we protect
ourselves?
 Privacy – concerns the collection and use
of data about individuals
Confidentiality

 The ability of a person to control release of


personal information to an information system
under an agreement that limits further release
of that information
Why do they matter?

 Ethically, privacy and confidentiality are


considered to be rights (in our culture)
 Information revealed may result in harm to
interests of the individual
 The provision of those rights tends to ensure
that the information is accurate and complete
 Accurate and complete information from
individuals benefits society in different areas
such as limiting spread of diseases to society
(i.e. HIV)
Legal Views on Privacy
 Privacy is a fundamental human right that
has become one of the most important rights
of the modern age
 Each country has a provision for rights of
inviolability of the home and secrecy of
communications

COE526: Lecture 2 6
Data Privacy and Protection Laws
 Data Privacy and Protection laws refer to legislation that is
intended to:
 protect the right to privacy of individuals
 ensure that Personal Data is used appropriately by organisations
that may have

 Personal data is any information that can be used to


identify a natural person
 Name; Phone Number; Email address; etc

 Special Categories of Personal Data require more stringent


measures of protection
 Religion; Ethnicity; Medical information; Criminal Data; Children’s
Data

COE526: Lecture 2 7
Privacy
 Three primary privacy issues:
 Accuracy
relates to the responsibility of those who collect
data to ensure that the data is correct.
 Property
relates to who owns data.
 Access
relates to the responsibility of those who have
data to control who is able to use that data.

8
Large Databases (Page 1 of 2)
 Large organizations compile
information about us.

 Federal government has over


2,000 databases

 Telephone companies
 Reverse directory lists of calls
we make

 Supermarkets
 What we buy and when

9
Large Databases (Page 2 of 2)
 Information resellers or information brokers
 Collect and sell personal data
 Electronic profiles easily created
 Personal information is a marketable
commodity, which raises many issues:
 Collecting public, but personally identifying
information (e.g., Google’s Street View)
 Spreading information without personal consent,
leading to identity theft
 Spreading inaccurate information
 Mistaken identity
 Freedom of Information Act

10
Private Networks
 Employers can monitor e-mail legally
 75 percent of all businesses search employees’
electronic mail and computer files using
snoopware
 A proposed law could
prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first

11
Viewing and Blocking Cookies
 Cookies
 Small pieces of information that are deposited on
your hard disk from web sites you have visited
 First-party cookies
 is one that is generated (and then read) only by the
website you are currently visiting
 Third-party cookies
 is usually generated by an advertising company that is
affiliated with the website you are currently visiting.
(tracking cookies.)

12
Online Identity

 The information that people voluntarily post


about themselves online
 Archiving and search features of the Web
make it available indefinitely
 Major Laws on Privacy
 Gramm-Leach-Bliley Act
 Health Insurance Portability and Accountability Act
(HIPAA)
 Family Educational Rights and Privacy Act
(FERPA)

13
Fair Information Practice Principles (1)

 FIPPS are a set of internationally recognized principles that


inform information privacy policies both within government
and the private sector

1. Collection Limitation
 There should be limits to the collection of personal data and any
such data should be obtained by lawful and fair means and,
where appropriate, with the knowledge or consent of the data
subject.

2. Data quality principle


 Personal data should be relevant to the purposes for which they
are to be used, and, to the extent necessary for those purposes,
should be accurate, complete and kept up-to-date.

14
Fair Information Principles (2)

3. Purpose specification
 The purposes for which personal data are collected should
be specified not later than at the time of data collection
and the subsequent use limited to the fulfilment of those
purposes or such others as are not incompatible with
those purposes and as are specified on each occasion of
change of purpose.

4. Use limitation principle


 Personal data should not be disclosed, made available or
otherwise used for purposes other than those specified in
accordance with Paragraph 9 except: (a) with the consent
of the data subject; or (b) by the authority of law.

15
Fair Information Principles (3)

5. Security safeguards principle


 Personal data should be protected by reasonable security
safeguards against such risks as loss or unauthorized
access, destruction, use, modification or disclosure of
data.

6. Openness principle
 There should be a general policy of openness about
developments, practices and policies with respect to
personal data. Means should be readily available of
establishing the existence and nature of personal data,
and the main purposes of their use, as well as the identity
about usual residence of the data controller.

16
Fair Information Principles (4)

7. Individual participation principle: An individual


should have the right:
 to obtain from a data controller, or otherwise, confirmation
of whether or not the data controller has data relating to
him;
 to have communicated to him, data relating to him within a
reasonable time; at a charge, if any, that is not excessive;
in a reasonable manner; and in a form that is readily
intelligible to him;
 to be given reasons if a request made under
subparagraphs (a) and (b) is denied, and to be able to
challenge such denial
 to challenge data relating to him and, if the challenge is
successful, to have the data erased; rectified, completed or
amended.

17
Fair Information Principles (5)

8. Accountability principle
 A data controller should be accountable for
complying with measures which give effect to the
principles stated above.

18
Information Life Cycle

Capture 1. Capture – Obtain and


record information
2. Store – Save the
information electronically
Destroy Store or in paper format
3. Use – Use or reuse
information
4. Destroy – Delete, erase
Use or shred information

19
Examples of Data Laws Breaches
 Marriot International Inc.
 ~339 million guest records leaked including payment details
 ~30 million are EU
 fined £99,200,396 for the violation
 British Airways
 ~500K customers information leakes
 Resulted in a fine of £183.39 million.
 Google
 failing to get valid consent from the users for personalized ads.
 Google was fined €50 million
 Facebook
 Related to Cambridge
 Fined £500,000

20
Open-Ended Questions
 Define privacy and discuss the impact of
large databases, private networks, the
Internet, and the Web.

 Define and discuss online identity and the


major privacy laws.

21

You might also like