Privacy - PowerPoint PPT Presentation

1 / 28
About This Presentation
Title:

Privacy

Description:

companies within the J.C. Penney family of companies. Privacy. CS 4001 ... J.C. Penney family of companies to contact you, and you decide that you ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 29
Provided by: compu62
Category:
Tags: penney | privacy

less

Transcript and Presenter's Notes

Title: Privacy


1
Seating plan for today
Front of room
Front 3 rows Last name ends in A..H
Middle N rows Last name ends in I..Q
Back 3 rows Last name ends in R..Z
Back of room
2
What is Privacy?
  • CS 4001B
  • Summer, 2003

3
Contents
  • What are rights (continued)
  • Rights claims and obligations
  • Sidebar Hohfeld in cyberspace
  • What is privacy?
  • Activity Privacy vs. freedom of expression
  • Sidebar conceptual metaphors for abstract
    ideas
  • Privacy and security metaphors used in policies
  • Fair Information Practices privacy by design
  • Activity Consumer information
  • The right to be let alone
  • Activity Definining Spam

4
Contents
  • What are rights (continued)
  • Rights claims and obligations
  • What is privacy?
  • Activity Privacy vs. freedom of expression
  • Sidebar conceptual metaphors for abstract
    ideas
  • Privacy and security metaphors used in policies
  • Fair Information Practices privacy by design
  • Activity Consumer information
  • The right to be let alone
  • Activity Definining Spam

5
What is a right?
By the way, did anyone find out which
philosopher's mummy is on display?
  • Inherent in being human?
  • Human rights vs. nonsense on stilts
  • Right to do/right to demand
  • Negative vs. positive
  • Rights as shorthand for mutual obligation/permissi
    on relationships
  • Rights claims
  • Can we develop a logic of rights or obligations
  • Deontic logic for policy enforcement

6
Hohfeld Krogh on rights
  • Claim(i,j,A)
  • I have a claim from them that A
  • Im entitled that data about me be accurate
  • Liberty(i,j,A)
  • Im free to A (if I want to)
  • We can decide to use the data you give us, but we
    dont have to
  • Power(i,j,A)
  • I am empowered by them to see to it that A (but
    its up to me whether I do).
  • Immunity(i,j,A)
  • They grant me A as an immunity
  • Govt. is obliged not to do anything that leads to
    my not being protected from self-incrimination
  • NoRight(i,j,A)
  • I have no right to happiness (but Im not
    forbidden it either)
  • Duty(i,j,A)
  • I have a duty to them to A
  • Eckerd is obliged to store the data securely
  • Disability(i,j,A)
  • Obligation to refrain from seeing to it that
    not A
  • Liability(i,j,A)
  • I am liable to them for A
  • Or They are not obliged to refrain from
    requiring A of me

7
Privacy is...
  • Security
  • Privacy Confidentiality
  • Autonomy
  • Privacy The right to be let alone
  • Property
  • Privacy Freedom from intrusion

8
Slipperiness of concepts
  • Perhaps we mean too many different things?
  • Perhaps we cannot formalize (and therefore
    enforce through code) unless we restrict
    application?
  • Perhaps we need to understand how people really
    think about abstract concepts like privacy?

9
Contents
  • What are rights (continued)
  • Rights claims and obligations
  • What is privacy?
  • Activity Privacy vs. freedom of expression
  • Sidebar conceptual metaphors for abstract
    ideas
  • Privacy and security metaphors used in policies
  • Fair Information Practices privacy by design
  • Activity Consumer information
  • The right to be let alone
  • Activity Definining Spam

10
Some grounded metaphors (Lakoff Johnson)
  • important big
  • difficulty burden
  • more up
  • type of inside
  • similar near
  • degree position
  • arch. phys. struct.
  • help support
  • time motion
  • change motion
  • state place
  • action self-propulsion
  • purpose destination
  • purpose desired thing
  • cause force
  • relationship enclosure
  • control be above
  • know see
  • understand grasp
  • see touch

11
Intrusion is movement inside
My information
Unwelcome intrusion
12
Access/Intrusion is movement inside
Regardless of whether Eckerd uses your
information, we will store it securely and will
not allow it to be accessed or used by any person
or entity not affiliated with Eckerd Corporation,
other than under the conditions described below...
My information
Access
13
Disclosure is movement away
Hackers PC
My PC
My credit card number
14
Disclosure is movement away
Other parties
In addition, we may ask you if you would like to
receive information about health care issues or
other products and services. If you indicate
that you would, we may also use your personal
identifying information to ... or (2) create
customer lists or other data summaries which may
be shared with the companies within the J.C.
Penney family of companies.
Company
Personal information
15
Retraction is movement back
Other parties
You may remove your personal identifying
information from our records. If you have
submitted personal identifying information to
Eckerd, and you wish to have it removed from our
records, please tell us by sending an e-mail to
us at the following address In addition, if
you have given consent for Eckerd or other
members of the J.C. Penney family of companies to
contact you, and you decide that you do not wish
to be contacted any further, please e-mail us to
let us know. Your request will be processed with
all reasonable speed. You will be notified when
the removal has been completed.
Company
Personal information
16
Disclosure is social exchange
Disclosed information
Service in return
Information Subject
Business/ Govt.
17
Disclosure is social exchange
Disclosed information
If you do send personal identifying information
to Eckerd, we may use it for reasonable business
purposeswithout further consent from you or
obligation to you.
Service in return
Information Subject
Business/ Govt.
18
Disclosure is social exchange
Disclosed information
In addition, we may ask you if you would like to
receive information about health care issues or
other products and services. If you indicate
that you would, we may also use your personal
identifying information to (1) contact you about
Eckerd programs and/or to seek additional
input from you regarding your experiences with
Eckerd
Service in return
Information Subject
Business/ Govt.
19
Rights and obligations are magnitudes
20
Rights and obligations are magnitudes
Confidential pharmacy information will not be
used by Eckerd, Express Pharmacy Services, or
Eckerd Health Services, except for those
limited purposes currently permitted under state
and federal law, such as for review by a treating
physician, for purposes of processing
payment, pursuant to subpoena or court order, or
to provide you with health information that you
may find useful, and the like.
21
Contents
  • What are rights (continued)
  • Rights claims and obligations
  • What is privacy?
  • Activity Privacy vs. freedom of expression
  • Sidebar conceptual metaphors for abstract
    ideas
  • Privacy and security metaphors used in policies
  • Fair Information Practices privacy by design
  • Activity Consumer information
  • The right to be let alone
  • Activity Definining Spam

22
Fair Information Principles
  • Notice and awareness
  • Choice and consent
  • Adequate security and integrity
  • Access and participation
  • Enforcement and/or redress
  • Related concepts
  • Anonymity and pseudonymity
  • Proximity and locality

23
Fair Information Practices (1)
  • Openness and transparency
  • No secret record keeping
  • Individual participation
  • subject can access challenge
  • Collection limitation
  • Data collection proportional and not excessive
    given purpose
  • Data quality
  • Data relevant to purposes and kept up to date

24
Fair Information Practices (2)
  • Use limitation
  • For specific purpose
  • By authorized personnel
  • Reasonable security
  • Adequate safeguards given datas sensitivity
  • Accountability
  • Record keepers accountable for compliance

25
Privacy-relevant Properties of Ubiquitous
computing (contrast Mgt. Info. Sys.)
  • Ubiquity
  • (gt accountability, choice)
  • Invisibility
  • (gt secrecy/choice)
  • Sensory augmentation
  • (gt use limitations)
  • Memory amplification
  • (gt use limitations)

26
Contents
  • What are rights (continued)
  • Rights claims and obligations
  • What is privacy?
  • Activity Privacy vs. freedom of expression
  • Sidebar conceptual metaphors for abstract
    ideas
  • Privacy and security metaphors used in policies
  • Fair Information Practices privacy by design
  • Activity Consumer information
  • The right to be let alone
  • Activity Definining Spam

27
Points to take away
  • Concepts arent clear
  • Morality/legality of rights as logic vs. concepts
    of privacy as metaphors
  • Privacy isnt just security
  • Rights over information use, accuracy, personal
    representation, freedom from intrusion
  • Privacy conflicts with other rights
  • If it is a right
  • Privacy by design imposes big information
    management requirements on systems
  • Spam, Spam, Spam, Spam

28
For next time
  • Read chapter on encryption
  • We will be concerned mainly with privacy from
    Government
  • Especially law-enforcement uses of personal
    information
  • And Government-mandated privacy policy
  • Especially healthcare records under HIPAA
Write a Comment
User Comments (0)
About PowerShow.com