Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

62
Lorrie Faith Cranor AT&T Labs-Research http://lorrie.cranor.org/ Online Online Privacy Privacy What are People So Concerned About What are People So Concerned About and What is Being Done About it? and What is Being Done About it?

description

Online Privacy What are People So Concerned About and What is Being Done About it?. Lorrie Faith Cranor AT&T Labs-Research http://lorrie.cranor.org/. Recent headlines. FTC, Toysmart Settle Online Privacy Case. U.S. Net Users Want Privacy Guarantee. - PowerPoint PPT Presentation

Transcript of Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

Page 1: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

Lorrie Faith CranorAT&T Labs-Research

http://lorrie.cranor.org/

Online Online PrivacyPrivacy

What are People So Concerned What are People So Concerned About About

and What is Being Done About it?and What is Being Done About it?

Page 2: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

2

Recent headlinesRecent headlines

Doubleclick shelves plan to tag Web surfers

Clinton Issues Privacy Warning To Technology Leaders

U.S. Net Users Want Privacy Guarantee

Online Privacy Code Gets FTC's Support

FTC, Toysmart Settle Online Privacy Case

Page 3: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

3

Online privacy in the Online privacy in the comics!comics!

Cathy February 25, 2000

Page 4: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

4

Why is Cathy concerned?Why is Cathy concerned?Cathy March 1, 2000

Page 5: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

5

How did Irving find this out? How did Irving find this out? He snooped her emailHe looked at the files on her computerHe observed the “chatter” sent by her

browserHe set cookies through banner ads and

“web bugs” that allowed him to track her activities across web sites

Page 6: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

6

What do browsers chatter What do browsers chatter about?about?

Browsers chatter aboutIP address, domain

name, organization, Referring pagePlatform: O/S, browser What information is

requestedURLs and search terms

Cookies

To anyone who might be listeningEnd serversSystem administratorsInternet Service

ProvidersOther third parties

Advertising networksAnyone who might

subpoena log files later

Page 7: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

7

A typical HTTP requestA typical HTTP requestGET /retail/searchresults.asp?qu=beer HTTP/1.0Referer: http://www.us.buy.com/default.aspUser-Agent: Mozilla/4.75 [en] (X11; U; NetBSD

1.5_ALPHA i386)Host: www.us.buy.comAccept: image/gif, image/jpeg, image/pjpeg, */*Accept-Language: enCookie: buycountry=us; dcLocName=Basket;

dcCatID=6773; dcLocID=6773; dcAd=buybasket; loc=; parentLocName=Basket; parentLoc=6773; ShopperManager%2F=ShopperManager%2F=66FUQULL0QBT8MMTVSC5MMNKBJFWDVH7; Store=107; Category=0

Page 8: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

8

What about cookies?What about cookies? Cookies can be useful

used like a staple to attach multiple parts of a form together

used to identify you when you return to a web site so you don’t have to remember a password

used to help web sites understand how people use them

Cookies can be harmfulused to profile users and track their activities,

especially across web sites

Page 9: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

9

YOU

Searchengine

Ad

Search formedical

information

BookStore

Ad

Buy book

Ad companycan get yourname and

address frombook order and

link them to your search

Readcookie

Setcookie

Page 10: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

10

Web bugsWeb bugs Invisible “images” embedded in web pages that

cause cookies to be transferred Work just like banner ads from ad networks, but

you can’t see them unless you look at the code behind a web page

Also embedded in HTML formatted email messages

For more info on web bugs see: http://www.privacyfoundation.org/education/webbug.html

Page 11: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

11

Referer log problemsReferer log problemsGET methods result in values in URLThese URLs are sent in the referer

header to next hostExample: http://www.merchant.com/cgi_bin/order?name=Tom+Jones&address=here+there&credit+card=234876923234&PIN=1234& -> index.html

Page 12: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

12

What DoubleClick knows…What DoubleClick knows…… about Richard M. Smith Personal data:

My Email address My full name My mailing address (street, city, state, and Zip code) My phone number

Transactional data: Names of VHS movies I am interesting in buying Details of a plane trip Search phrases used at search engines Health conditions

Page 13: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

13

No clicks requiredNo clicks required

“It was not necessary for me to click on the banner ads for information to be sent to DoubleClick servers.”

– Richard M. Smith

http://www.tiac.net/users/smiths/privacy/banads.htm

Page 14: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

14

DoubleClick examplesDoubleClick examplesAltaVista Yellow Pages – Complete home address (Fixed January 2000)

Banner ad URL: http://live.av.com/scripts/search.dll?ep=7&gca=address&orderby=distance&sstreet=172+mason+terr&scity=brookline&sstate=MA&szip=02446&scountry=USA&query=sinsa&qname=&sic=&ck=&userid=130782922&userpw=.&uh=130782922,0,&ccity=brookline&cstate=MA&ver=hb1.2.2

Travelocity – Email address

Referring URL: http://dps1.travelocity.com/[email protected]

Page 15: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

15

Merging online and offline Merging online and offline datadata

In mid-February DoubleClick announced plans to merge “anonymous” online data with personal information obtained from offline databases

By the first week in March the plans were put on hold

Page 16: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

16

Public concernPublic concernApril 1997 Louis Harris Poll of Internet

users5% say they have been the victim of an

invasion of privacy while on the Internet53% say they are concerned that information

about which sites they visit will be linked to their email address and disclosed without their knowledge

Page 17: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

17

Beyond concernBeyond concern April 1999 Study: Beyond Concern:

Understanding Net Users' Attitudes About Online Privacy by Cranor, Ackerman and Reagle (US panel results reported)http://www.research.att.com/projects/privacystudy/Internet users more likely to provide info when they are not

identifiedSome types of data more sensitive than othersMany factors important in decisions about information

disclosureAcceptance of persistent identifiers varies according to

purposeInternet users dislike automatic data transfer

Page 18: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

18

March 2000 BusinessWeek March 2000 BusinessWeek pollpoll

Telephone survey of 1,014 US adults by Harris Interactivehttp://businessweek.com/2000/00_12/b3673006.htm63% not comfortable with anonymous online profiling89% not comfortable with identified online profiling95% not comfortable with identified online profiling that

includes sensitive information91% not comfortable with web sites sharing their info

to track them across multiple sites

Page 19: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

19

IBM-Harris multi-national IBM-Harris multi-national surveysurvey

Telephone interviews with 1000+ adults in each of three countries: US, UK, Germanyhttp://www.ibm.com/services/e-business/priwkshop.htmlAmericans profess the greatest degree of confidence

in the way companies handle their personal information, but Americans also are the most likely among the three groups of citizens to take steps to protect their privacy.

Americans appear to be motivated to take privacy protection measures, not so much from a set of specific concerns, but by a general sense that their personal information may be misused.

Page 20: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

20

No one wants to be knownNo one wants to be known

Cathy February 22, 2000

Page 21: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

21

International issuesInternational issuesEuropean Union Data Directive

prohibits secondary uses of data without informed consentCreating personally-identifiable online profiles

will have to be opt-in in most casesUpfront notice must be given when data is

collected – no web bugsNo transfer of data to non-EU countries unless

there is adequate privacy protection

Page 22: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

22

Children’s issuesChildren’s issuesChildren’s Online Privacy Protection

Act (COPPA) requires parental consent before collecting personally-identifiable data from children online

Page 23: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

23

SubpoenasSubpoenasData on online activities is increasingly

of interest in civil and criminal casesThe only way to avoid subpoenas is to

not have dataYour files on your computer in your

home have much greater legal protection that your files stored on a server on the network

Page 24: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

24

Privacy concernsPrivacy concerns Data is often collected silently

Web allows lots of data to be collected easily, cheaply, unobtrusively and automatically

Individuals not given meaningful choice

Data from many sources may be mergedEven non-identifiable data can become identifiable

when merged

Data collected for business purposes may be used in civil and criminal proceedings

Page 25: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

25

Some solutionsSome solutionsPrivacy policiesVoluntary guidelines and codes of

conductSeal programsLaws and regulationsPrivacy tools

Page 26: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

26

Privacy policiesPrivacy policies Policies let consumers know about site’s

privacy practices Consumers can then decide whether or not

practices are acceptable, when to opt-in or opt-out, and who to do business with

The presence or privacy policies increases consumer trust

BUT policies are often difficult to understand, hard to find, and take a long time to read

Many policies are changed frequently without notice

Page 27: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

27

Voluntary guidelinesVoluntary guidelinesOnline Privacy Alliancehttp://www.privacyalliance.org

Direct Marketing Association Privacy Promise http://www.thedma.org/library/privacy/privacypromise.shtml

Network Advertising Initiative Principles http://www.networkadvertising.org/

Page 28: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

28

OECD fair information OECD fair information principlesprinciples

http://www.oecd.org/dsti/sti/it/secur/prod/PRIV-en.HTM

Collection limitation Data quality Purpose specification Use limitation Security safeguards Openness Individual participation Accountability

Page 29: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

29

Simplified principlesSimplified principlesNotice and disclosureChoice and consentData securityData quality and accessRecourse and remedies

Page 30: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

30

Seal ProgramsSeal Programs TRUSTe – http://www.truste.org BBBOnline – http://www.bbbonline.org CPA WebTrust – http://www.cpawebtrust.org/

Japanese Privacy Mark http://www.jipdec.or.jp/security/privacy/

Page 31: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

31

Laws and regulationsLaws and regulations Privacy laws and regulations vary widely throughout

the world US has mostly sector-specific laws, with relatively

minimal protections Federal Trade Commission has jurisdiction over fraud and

deceptive practices Federal Communications Commission regulates

telecommunications

European Data Protection Directive requires all European Union countries to adopt similar comprehensive privacy laws Privacy commissions in each country (some countries have

national and state commissions)

Page 32: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

32

Privacy ToolsPrivacy Tools Anonymity tools

Prevent your actions from being linked to youCrowds, The Anonymizer, Onion Routing, Freedom

Allow you to develop persistent relationships not linked to each other or youLucent Personal Web Assistant

Policy toolsMake informed choices about how your information will

be used Platform for Privacy Preferences Project

Know that assurances about information practices are trust worthyTRUSTe, BBBOnline Privacy Seal

Page 33: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

33

P3P1.0 – A first stepP3P1.0 – A first step Offers an easy way for web sites to

communicate about their privacy policies in a standard machine-readable formatCan be deployed using existing web servers

This will enable the development of tools (built into browsers or separate applications) that:Provide snapshots of sites’ policiesCompare policies with user preferencesAlert and advise the user

Page 34: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

34

P3P is part of the solutionP3P is part of the solutionP3P1.0 helps users understand privacy policies

but is not a complete solution Seal programs and regulations

help ensure that sites comply with their policies

Anonymity tools reduce the amount of information revealed while browsing

Encryption tools secure data in transit and storage

Laws and codes of practice provide a base line level for acceptable policies

Page 35: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

35

Using P3P on your Web siteUsing P3P on your Web site1. Formulate privacy policy

2. Translate privacy policy into P3P format Use a policy generator tool

3. Place P3P policy on web site One policy for entire site or multiple policies for different parts of

the site

4. Associate policy with web resources: Place P3P policy reference file (which identifies location of

relevant policy file) at well-known location on server; Configure server to insert P3P header with link to P3P policy

reference file; or Insert link to P3P policy reference file in HTML content

Page 36: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

36

P3P policiesP3P policies Machine-readable (XML) version of web site

privacy policies Use P3P Vocabulary to express data

practices Use P3P Base Data Set to express type of

data collected Capture common elements of privacy policies

but may not express everything (sites may provide further explanation in human-readable policies)

Page 37: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

37

The P3P vocabularyThe P3P vocabulary Who is collecting data? What data is collected? For what purpose will

data be used? Is there an ability to opt-

in or opt-out of some data uses?

Who are the data recipients (anyone beyond the data collector)?

To what information does the data collector provide access?

What is the data retention policy?

How will disputes about the policy be resolved?

Where is the human-readable privacy policy?

Page 38: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

38

P3P informs Web surfersP3P informs Web surfers

privacymanagerbutton

Page 39: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

39

TransparencyTransparency P3P clients can

check a privacy policy each time it changes

P3P clients can check privacy policies on all objects in a web page, including ads and invisible images

http://adforce.imgis.com/?adlink|2|68523|1|146|ADFORCE

http://www.att.com/accessatt/

Page 40: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

40

A simple HTTP transactionA simple HTTP transactionWeb

ServerGET /index.html HTTP/1.1Host: www.att.com. . . Request web page

HTTP/1.1 200 OKContent-Type: text/html. . . Send web page

Page 41: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

41

… … with P3P 1.0 addedwith P3P 1.0 addedWeb

ServerGET /w3c/p3p.xml HTTP/1.1Host: www.att.comRequest Policy Reference File

Send Policy Reference File

GET /index.html HTTP/1.1Host: www.att.com. . . Request web page

HTTP/1.1 200 OKContent-Type: text/html. . . Send web page

Request P3P Policy

Send P3P Policy

Page 42: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

42

P3P enabled web sitesP3P enabled web sites www.aol.com www.att.com www.cdt.org www.engage.com www.hp.com www.ibm.com www.idcide.com

www.microsoft.com www.pg.com www.ttuhsc.edu www.youpowered.com www.vineyard.net www.w3.org www.whitehouse.gov

And many more….

Page 43: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

43

User preferencesUser preferences P3P spec does not specify how users should

configure their preferences or what user agent should doSome guidelines are offered in Guiding Principles

A separate W3C specification – A P3P Preference Exchange Language (APPEL) provides a standard format for encoding preferencesNot required for P3P user agent implementations

Page 44: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

44

Types of P3P user agent Types of P3P user agent toolstools

On-demand or continuous Some tools only check for P3P policies when the user requests,

others check automatically at every site

Generic or customized Some tools simply describe a site’s policy in some user friendly

format – others are customizable and can compare the policy with a user’s preferences

Information-only or automatic action Some tools simply inform users about site policies, while others may

actively block cookies, referrers, etc. or take other actions at sites that don’t match user’s preferences

Built-in, add-on, or service Some tools may be built into web browsers or other software, others

are designed as plug-ins or other add-ons, and others may be provided as part of an ISP or other service

Page 45: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

45

Other types of P3P toolsOther types of P3P tools P3P validators

Check a site’s P3P policy for valid syntax

Policy generatorsGenerate P3P policies and policy reference files for

web sites

Web site management toolsAssist sites in deploying P3P across the site, making

sure forms are consistent with P3P policy, etc.

Search and comparison toolsCompare privacy policies across multiple web sites –

perhaps built into search engines

Page 46: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

P3P User Agent DemosP3P User Agent Demos

Microsoft/AT&T P3P Browser Helper Object

Idcide Privacy Companion YOUpowered Orby Privacy Plus

Page 47: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

47

Microsoft/AT&T P3P browser helper Microsoft/AT&T P3P browser helper objectobject

A prototype tool designed to work with Microsoft Internet Explorer Browser

Not yet fully tested, still missing some features

AT&T continuing workUser interface researchDevelopment of pluggin for both IE and

Navigator

Page 48: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

48

Privacy button added to browser toolbarPrivacy button added to browser toolbar

privacymanagerbutton

Icon will change according to site’s privacy policy

Site’s policy matches user preferences

Site’s policy is unknown

Site’s policy does not match user preferences

Page 49: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

49

Preference settings

Page 50: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

50

Page 51: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

51

When preferences are changed toDisallow profiling, the privacy checkwarns us that this site profiles visitors

Page 52: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

52

IDcide Privacy CompanionIDcide Privacy Companion A browser plug-in that adds functionality to Netscape or

Internet Explorer browsers Includes icons to let users know that sites use first-

and/or third-party cookies Enables users to select a privacy level that controls the

cookie types allowed (1st or 3rd party) Prevents data spills to 3rd parties through “referer” Let’s users view tracking history Prototype P3P-enabled Privacy Companion allows for

more fine-grained automatic decision making based on P3P policies

http://www.idcide.com

Page 53: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

53

Searching for a P3P policy

No P3P policy found

P3P policy isNOT acceptable

P3P policy isacceptable

IDcide P3P Icons

Page 54: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

54

Double clicking on the P3P icon indicates wherethe site’s policy differs from the user’s preferences

Page 55: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

55

YOUpowered Orby Privacy YOUpowered Orby Privacy PlusPlus

A tool bar that sits at the top of a user’s desktop and allows a user toAccept or deny cookies while surfing Decide how, when and where to share

personal information Store website passwords Enjoy the convenience of "one-click" form-fill

P3P features in prototype automatically rate web sites based on their P3P policies

Page 56: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

56

TrustMeter

Page 57: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

57

Orby cookie prompt

Page 58: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

Policy Generator DemosPolicy Generator Demos

IBM P3P Policy EditorPrivacyBot.comYOUPowered Consumer Trust Policy

Manager Wizard

Page 59: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

59

IBM P3P Policy EditorIBM P3P Policy EditorAllows web sites to create privacy

policies in P3P and human-readable format

Drag and drop interfaceAvailable from IBM AlphaWorks site:

http://www.alphaworks.ibm.com/tech/p3peditor

Page 60: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

60

Sites can list the typesof data theycollect

And view the correspondingP3P policy

Page 61: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

61

Propertieswindows allowssites to specify detailed informationabout how eachtype of data isused.

Page 62: Lorrie Faith Cranor AT&T Labs-Research lorrie.cranor

62

PrivacyBot.comPrivacyBot.comAllows webmasters to fill out an online questionnaire to automatically create a human-readable privacy policy and a P3P policy