Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

18
Privacy 2

Transcript of Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Page 1: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Privacy 2

Page 2: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Digital Dossier

• The data shadow• The digital dossier• Your own diary of recordable events

Page 3: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Persistence of Information

• Communication modes– Writing– Speech– Electronic forms

• E-mail• V-mail• IM

– Images• The presumption of truth

Page 4: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Information Trails

• The present• The future• Examples

– DEA sweeps– Borked!

• Pervasive record keeping • Data retention

Page 5: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Privacy Legislation

• The Video Protection Act– Is this a good law? Is it justified?– What caused it to be enacted?

• Free market and self regulation – Does this work for privacy?

• Government regulation – Enacting laws does not equal enforcing

them

Page 6: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Building a Datasphere

1) Make data collectible2) Make data machine readable3) Build a big database

Page 7: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Check Digits

• VIN check digit

• http://www.home.planet.nl/~fransang/checkdig.html

Page 8: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

RFID

• Definition – Radio Frequency Identification, the use of radio waves to automatically identify individual items by means of a microchip capable of transmitting identifying information.

• Applications – product identification in stores, warehouses, medical facilities, warranties, identification of animals, people via implanted chips

• Privacy issues – tracking individuals through their product purchases and uses, scope creep, location tracking of individuals

Page 9: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

One Big Happy Database

• Thomas Watson’s 1940s estimate on the need for computers joke

• What’s on the web?• Search engines and their ilk• Your defense

Page 10: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Data Quality

• Large databases and data accuracy– Credit Reporting data– NCIC

• The web

Page 11: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

A Personal Question

• Would you run for public office if you knew that everything you had ever said or done could be held up for public scrutiny?

• What happens in Vegas stays in Vegas

Page 12: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Satellite Imagery

• Do satellite images violate privacy? Are they illegal?

• Resolution• Applications

– Tax collections– Political claims

Page 13: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Ground Surveillance

• Surveillance cameras– In malls– ATMs– “The End of Violence”– Traffic violation control

Page 14: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Bayes Theorem and Surveillance

• Facial identification systems – Tampa Superbowl

• Fingerprint ID systems

• http://members.aol.com/johnp71/bayes.html

Page 15: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Personal Systems

• Webcam• Nanny cam• Steve Mann

http://www.wearcam.org/students.htm

• Webcam• Nanny cam• Steve Mann

http://www.wearcam.org/students.htm

Page 16: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Low Cost Personal Devices

• Tracking devices (location)• Keystroke capturers• Recording devices

• Tracking devices (location)• Keystroke capturers• Recording devices• www.spyemporium.com• http://www.asginvestigations.com/

Page 17: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Employee Monitoring

• Various means are being employed: e-mail, phone, video, drug testing, psychological profiling

• Is it legal?• Is it ethical?• Should Fair Information Practices be

applied to employee monitoring?

Page 18: Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Surveillance Systems

• What questions could be asked about them?– Should they be permitted or banned?– Are they effective?– Do they create additional problems?– What restrictions should be placed on their

use?– What restrictions should be placed on the data

they generate?– Who should watch the watchers?