SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
MARCH 4, 2016
CAROLINA ROSSINI
VP @ PUBLIC KNOWLEDGE
BODY CAMERAS, BIG DATA,
AND PRIVACY: TWENTY FIRST
CENTURY TECHNOLOGY AND
THE FOURTH AMENDMENT
ELON LAW REVIEW SYMPOSIUM
International Sources
u the right to privacy is explicitly defined as a right for all people
Universal Declaration of Human Rights,
International Covenant on Civil and Political Rights (ICCPR
American Convention on Human Rights
Charter of Fundamental Rights (Arts. 7 and 8)
OECD Privacy Guidelines
Fair Information Practices.
What does privacy enables?
u The right to privacy allows for all people to keep information about themselves out
of the hands of those they don’t want to have the information. This includes
personal data, such as weight or birthplace to more sensitive personal data, such
as personal preferences, religious beliefs, and political views.
u The right to privacy also allows for people to feel empowered to have free flowing
discussions and communications (offline and online) about sensitive issues without
fear of retaliation or censorship.
u The right to privacy is most important because it allows for the rights of freedom of
expression, freedom of speech, freedom of opinion, freedom of association,
access to information, to flourish.
Right to be Anonymous
u In addition to privacy, the right to be anonymous online - thus,
the right to say something online without having it be
connected to your real identity - is also a crucial piece of the
discussion around human rights, surveillance, data protection,
and big data.
Your Privacy on The Web
What does privacy
mean to you?
“Nothing to hide”?
Or
“Having Control on your
data” ?
Online Privacy?
uThe ability to control what information one
reveals about oneself over the internet,
and control who can access that
information.
How differently people look at it?
u “Privacy is the future. Get used to it.” - Marc
Rotenberg, Director, Electronic Privacy
Information Centre - EPIC) (Fortune, 2001).
u “You have zero privacy anyway. Get over it.”
- Scott McNealy, CEO, Sun Microsystems, 1999
Contemporaneous issues and trends
Your, Mine, Ours Digital Shadow
https://myshadow.org/
Behavioral Marketing
u Retargeting marks or tags online users who visit a certain brand website with a pixel or
a cookie,[2] and then serves banner ads only to the people who have shown at least some
amount of engagement with the original brand. In the milliseconds before you land on a
web site where a retargeting company has either directly placed or has access to the site
users cookie information, they present you with a highly targeted real-time and
personalized advert for that very thing that you were looking at while you were on the
retailers website earlier.
u Pretargeting is a form of online targeted advertising by which online advertising is targeted
to consumers based on their previous actions on many websites. PreTargeting is a method
to identify websites that people have likely or actually visited before coming to a retailer or
publishers website and that information can be then used by them to better target the
content that you see while browsing their website.
Behavioral Marketing
u The giants of the marketing world, namely Facebook and Google, already have an unimaginable
amount of data regarding shopping trends and experiences. They can use this to spot the next big
trends with a 90% degree of accuracy. With these types of insights they can predict the shopper's
future and send out messages to encourage the customer towards a purchase.
u Amazon does a fantastic job of pretargeting with the customers that connect with Facebook.
Shoppers can see their friends and Amazon starts building a shopping list, which is frightfully
accurate.
$$$$
Not only your social media
u Walmart is an example that combines offline and online tracking with data
aggregation. Walmart has gathered a large amount of consumer
information from offline and online behaviors, and enhance their tracking
abilities with the additional information sought from third parties.
Consumers, Big Data,andOnline Tracking in the Retail Industry: ACase Study of Walmart, Center for MediaJustice(November 2013),
http://centerformediajustice.org/wp-content/uploads/2014/06/WALMART_PRIVACY_.pdf
Profiling goes global
u The current business model for global companies is
“connected recognition ,” gathering and analyzing the
information about your locations and activities across a
number of devices you may own.
BARBIE
https://myshadow.org/trace-my-shadow
“As big data becomes more commonplace and embedded in everyday interactions, it could be used to
automate discrimination and unfairness, both when data analytics delivers inaccurate profiles of individuals,
for instance, but also when correct personal profiling is used to take advantage of a person’s weaknesses,
such as with predatory lending. In both cases, she stressed that it could have profound impacts on people’s
stability, mobility, and ability to determine their personal destinies.” Profa. Seeta Peña Gangadharan
Consequences – nothing funny
Barocas, Solon and Rosenblat, Alex and boyd, danah and Gangadharan, Seeta Peña and Yu, Corrine,
Data & Civil Rights: Technology Primer (October 30, 2014). Data & Civil Rights Conference, October
2014. Availableat SSRN: http://ssrn.com/abstract=2536579 or http://dx.doi.org/10.2139/ssrn.2536579
Privacy and IoT
"The Internet of Things" (IoT) refers to the capability of
everyday devices to connect to other devices and people
through the existing Internet infrastructure.
u Like it or not, technology is becoming inextricably entwined with the fabric of our lives. Our cars,
our homes, even our bodies, are collecting, storing and streaming more personal data than ever
before. In 2015, Gartner, Inc. forecasts the number of connected “things” will reach 4.9 billion, up
30 percent from 2014. By the year 2020, that number is expected to reach 25 billion.
u They are able to communicate with consumers, collect and transmit data to companies, and
compile large amounts of data for third parties.
Privacy and IoT
Car Privacy and Security
As vehicle manufacturers rush to adopt mobile-
friendly platforms and wireless technologies,
they've neglected to plug security and privacy
gaps, a new report revealed.
"Nearly 100% of vehicles on the market include
wireless technologies that could pose
vulnerabilities to hacking or privacy intrusions,”
Source: https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-
Tracking_Hacking_CarSecurity%202.pdf
BARBIE
BARBIE
BARBIE
hackers turn your baby monitor into a spy cam
“Eight of the nine cameras got an
F and one got a D minus,” security researcher
Mark Stanislav told Fusion’s Kashmir Hill. Security
flaws included issues such as a lack of encryption,
the use of default passwords, and access to
Internet portals with the device’s serial number or
account number.
Source: http://www.wired.com/2015/09/security-news-week-turns-baby-monitors-w ildly -easy-hack/
Baby monitors are crazy easy to hack
Why is metadata important?
u We generate metadata unknowingly, in an organized format and over the long term.
Metadata makes it easy to analyze, recognize patterns and draw conclusions about
who we are, and what we are doing.
u Companies that are central to our communications - like our mobile phone provider or
internet/email service provider - have detailed logs of this metadata, and this gives
them, and anyone else who can access this information, an unprecedentedly detailed
picture.
u Metadata can also reveal things we might not want to reveal. If our phone shows up in
a certain location at the time that there is a protest, this can reveal that we were one
of the protesters.
Big Data, Privacy and Profiling
u Big data has a variety of definitions, but is often described as:
u the fastly growing, massive data sets that contain a large volume, velocity, and variety
of information. Big data sets, including those scraped from social media, online
shopping sites, GPS devices, banks, entertainments sites, and others are usually too
large to be analyzed by most modern data analyzing tools. Hundreds of trillions of
bytes of data have been created, just on the Internet, and for many, big data paves
the way for more efficient research, marketing, polling, and health/scientific research.
Private sector companies havebegun to invest more into big data research and
analysis, as have a number of individual governments.
Who “regulates” privacy?
u The United States Federal Trade Commission (FTC) has
been involved in oversight of the behavioral targeting
techniques used by online advertisers since the mid-1990s.
These techniques, initially called "online profiling", are now
referred to as "behavioral targeting"; they are used to
target online behavioral advertising (OBA) to consumers
based on preferences inferred from their online behavior.
BARBIE
the public-private surveillance partnership
u What companies know, governments can & will know
u Any reform must take into account this relationship
Who else is watching you?
Privacy and Surveillance
Increase on “surveillance” agencies’ budget since the Patriotic Act
Encryption and Cryptography
Encryption and Cryptography
The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography's potential for use as a tool for espionage and sedition has led many governments to
classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where
the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption
keys for documents relevant to an investigation.
Modern cryptography is increasingly being used by human rights and nonprofit community activist
groups around the world to protect sensitive data from governments and hostile organizations.
Tor Usage and Political Rights
u Opportunity vs. Need
Source: The Dark Web Dilemma: Tor, Anonymity and
Online Policing Eric Jardine (CIGI, 2016)
https://www.cigionline.org/sites/default/files/no.21_1.pdf
Free Flow and Trade
u Forum Shopping: The total number of new data privacy laws globally, viewed by decade, shows
that their growth is accelerating, not merely expanding linearly: 8 (1970s), 13 (1980s), 21 (1990s),
35 (2000s) and 12 (2 years of the 2010s), giving the total of 89.
u It is not about freedom of expression
u It is about trade, it is about e-commerce
u Privacy considered as a trade barrier
u countries should not use trade agreements to challenge privacy laws as trade
barriers
u we need to make clear about what type of information we are discussing when
discussing “free-flow”, which historically is related to cross-personal-data flow
u and if we want the language to go beyond cross-data-flow and actually deal with
freedom of expression, the e-commerce chapter is a limited venue for that
Moreat: Information Flow and TradeAgreements: History and Implications for Consumers’ Privacy Alberto Cerda and Carolina
Rossini – May, 20131http://a2knetwork.org/sites/default/files/tpp_and_free_flow.pdf
The Digital TradeImbalance and Its Implications for Internet Governance, Susan Ariel Aaronson, (CIGI, 2016)
https://www.ourinternet.org/publication/the-digital-trade-imbalance-and-its-implications-for-internet-governance/
CISA - Surveillance bill by another name?
Source: https://www.newamerica.org/oti/the-cispa-zombie-wont-die-instead-it-changed-its-name-to-cisa-and-its-here-to-violate-your-
privacy/
What it means for consumers/users
What it means for companies
https://www.ccianet.org/2015/10/ccia-urges-senate-to-improve-cybersecurity-information-sharing-act/
http://www.law360.com/articles/760952/information-sharing-under-cisa-what-it-means-for-companies
Wearables and Health Privacy
https://cdt.org/blog/recent-health-privacy-work-cdt/
Wearables + cutting-edge consent process
= good science
Mole Mapper, a patient-centered iPhone-
app based study to quantitatively track moles
and help detect early signs of the deadly skin
cancer melanoma.
Share the Journey: Mind, Body, and
Wellness after Breast Cancer -
Research on cognition after cancer is
diagnosed
http://sagebase.org/mole-mapper/http://parkinsonmpower.org/
http://sharethejourneyapp.org/
BARBIE
http://sagebase.org/pcc/participant-centered-consent-toolkit/
Privacy + Consent = TRUST
u over 75 percent of the more than 12,000 mPower
participants chose to share their data broadly with
researchers.
u This cutting-edge consent process is outlined in a
third paper published today in Nature
Biotechnology, and represents a sea of change in
participant control over data sharing.
Privacy and security
are two sides of a coin,
intertwined and in near
constant tension.
its your responsibility and opportunity
https://www.epic.org/privacy/tools.html
Understand your technology
Video @ https://www.article19.org/resources.php/resource/38278/en/a-net-of-rights?-new-
film-links-human-rights-and-internet-protocols
Thank you!
crossini@publicknowledge.org
Carolinarossini

Más contenido relacionado

La actualidad más candente

Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
 
Links for #sif12u Marco Civil
Links for #sif12u Marco Civil Links for #sif12u Marco Civil
Links for #sif12u Marco Civil Carolina Rossini
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
Internet governance
Internet governanceInternet governance
Internet governancermvvr143
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)OliverGibbs505
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
Internet Governance
Internet GovernanceInternet Governance
Internet GovernanceRIPE NCC
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Brian Rowe
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionIGF Indonesia
 
International internet governance
International internet governanceInternational internet governance
International internet governanceJillian York
 
The RIR System & Internet Governance
The RIR System & Internet GovernanceThe RIR System & Internet Governance
The RIR System & Internet GovernanceRIPE NCC
 
Privacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyPrivacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyThai Netizen Network
 

La actualidad más candente (20)

Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
 
Links for #sif12u Marco Civil
Links for #sif12u Marco Civil Links for #sif12u Marco Civil
Links for #sif12u Marco Civil
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
ID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship TransitionID IGF 2016 - Opening - IANA Stewardship Transition
ID IGF 2016 - Opening - IANA Stewardship Transition
 
International internet governance
International internet governanceInternational internet governance
International internet governance
 
The RIR System & Internet Governance
The RIR System & Internet GovernanceThe RIR System & Internet Governance
The RIR System & Internet Governance
 
Privacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyPrivacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital Society
 

Similar a Consumers' and Citizens' Privacy

Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
Big Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarBig Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarKunal Dutta
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Harsh Tripathi
 

Similar a Consumers' and Citizens' Privacy (20)

Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
Big Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarBig Data Analytics - The New Cold War
Big Data Analytics - The New Cold War
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
9th
9th9th
9th
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 

Más de Carolina Rossini

REA no mundo / OER in the World
REA no mundo / OER in the World REA no mundo / OER in the World
REA no mundo / OER in the World Carolina Rossini
 
Tratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la InternetTratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la InternetCarolina Rossini
 
Ciberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad CivilCiberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad CivilCarolina Rossini
 
Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Carolina Rossini
 
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...Carolina Rossini
 
REA no workshop da FEA./USP
REA no workshop da FEA./USP REA no workshop da FEA./USP
REA no workshop da FEA./USP Carolina Rossini
 
USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014   USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014 Carolina Rossini
 
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013Carolina Rossini
 
Open Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar seriesOpen Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar seriesCarolina Rossini
 
Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02Carolina Rossini
 
Eff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sdEff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sdCarolina Rossini
 
Impact of Trade Agreements on IP
Impact of Trade Agreements on IPImpact of Trade Agreements on IP
Impact of Trade Agreements on IPCarolina Rossini
 
Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações Carolina Rossini
 
REA na Frente Parlamentar de Cultura
REA na Frente Parlamentar de CulturaREA na Frente Parlamentar de Cultura
REA na Frente Parlamentar de CulturaCarolina Rossini
 

Más de Carolina Rossini (20)

REA no mundo / OER in the World
REA no mundo / OER in the World REA no mundo / OER in the World
REA no mundo / OER in the World
 
Tratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la InternetTratados Y Gobernanza de la Internet
Tratados Y Gobernanza de la Internet
 
Ciberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad CivilCiberseguridad y el rol de la Sociedad Civil
Ciberseguridad y el rol de la Sociedad Civil
 
Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms Sif14 How Trade Agreements Mess Up with Internet Freedoms
Sif14 How Trade Agreements Mess Up with Internet Freedoms
 
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
2:00-3:30 Session VI: Can We Measure Internet Openness? If so, what does that...
 
REA no workshop da FEA./USP
REA no workshop da FEA./USP REA no workshop da FEA./USP
REA no workshop da FEA./USP
 
USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014   USA CENDI's Strategic Thinking About Openness for 2014
USA CENDI's Strategic Thinking About Openness for 2014
 
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
Workshop on Copyright Management for Open Access in Brazil - CONFOA 2013
 
Open Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar seriesOpen Educational Resources at the mAlliance and OAS Seminar series
Open Educational Resources at the mAlliance and OAS Seminar series
 
Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02Cr4ocwcbr 121030145301-phpapp02
Cr4ocwcbr 121030145301-phpapp02
 
Eff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sdEff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sd
 
Cr4 tpp aucklan2012_edit
Cr4 tpp aucklan2012_editCr4 tpp aucklan2012_edit
Cr4 tpp aucklan2012_edit
 
Ip luncheon
Ip luncheonIp luncheon
Ip luncheon
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Cr knol gov4gc
Cr knol gov4gcCr knol gov4gc
Cr knol gov4gc
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Impact of Trade Agreements on IP
Impact of Trade Agreements on IPImpact of Trade Agreements on IP
Impact of Trade Agreements on IP
 
Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações Ebooks: desafios, perturbações e inovações
Ebooks: desafios, perturbações e inovações
 
Croi4 hc
Croi4 hcCroi4 hc
Croi4 hc
 
REA na Frente Parlamentar de Cultura
REA na Frente Parlamentar de CulturaREA na Frente Parlamentar de Cultura
REA na Frente Parlamentar de Cultura
 

Último

Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 

Último (20)

Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 

Consumers' and Citizens' Privacy

  • 1. MARCH 4, 2016 CAROLINA ROSSINI VP @ PUBLIC KNOWLEDGE BODY CAMERAS, BIG DATA, AND PRIVACY: TWENTY FIRST CENTURY TECHNOLOGY AND THE FOURTH AMENDMENT ELON LAW REVIEW SYMPOSIUM
  • 2.
  • 3. International Sources u the right to privacy is explicitly defined as a right for all people Universal Declaration of Human Rights, International Covenant on Civil and Political Rights (ICCPR American Convention on Human Rights Charter of Fundamental Rights (Arts. 7 and 8) OECD Privacy Guidelines Fair Information Practices.
  • 4. What does privacy enables? u The right to privacy allows for all people to keep information about themselves out of the hands of those they don’t want to have the information. This includes personal data, such as weight or birthplace to more sensitive personal data, such as personal preferences, religious beliefs, and political views. u The right to privacy also allows for people to feel empowered to have free flowing discussions and communications (offline and online) about sensitive issues without fear of retaliation or censorship. u The right to privacy is most important because it allows for the rights of freedom of expression, freedom of speech, freedom of opinion, freedom of association, access to information, to flourish.
  • 5. Right to be Anonymous u In addition to privacy, the right to be anonymous online - thus, the right to say something online without having it be connected to your real identity - is also a crucial piece of the discussion around human rights, surveillance, data protection, and big data.
  • 6. Your Privacy on The Web What does privacy mean to you? “Nothing to hide”? Or “Having Control on your data” ?
  • 7. Online Privacy? uThe ability to control what information one reveals about oneself over the internet, and control who can access that information.
  • 8. How differently people look at it? u “Privacy is the future. Get used to it.” - Marc Rotenberg, Director, Electronic Privacy Information Centre - EPIC) (Fortune, 2001). u “You have zero privacy anyway. Get over it.” - Scott McNealy, CEO, Sun Microsystems, 1999
  • 10. Your, Mine, Ours Digital Shadow https://myshadow.org/
  • 11. Behavioral Marketing u Retargeting marks or tags online users who visit a certain brand website with a pixel or a cookie,[2] and then serves banner ads only to the people who have shown at least some amount of engagement with the original brand. In the milliseconds before you land on a web site where a retargeting company has either directly placed or has access to the site users cookie information, they present you with a highly targeted real-time and personalized advert for that very thing that you were looking at while you were on the retailers website earlier. u Pretargeting is a form of online targeted advertising by which online advertising is targeted to consumers based on their previous actions on many websites. PreTargeting is a method to identify websites that people have likely or actually visited before coming to a retailer or publishers website and that information can be then used by them to better target the content that you see while browsing their website.
  • 12. Behavioral Marketing u The giants of the marketing world, namely Facebook and Google, already have an unimaginable amount of data regarding shopping trends and experiences. They can use this to spot the next big trends with a 90% degree of accuracy. With these types of insights they can predict the shopper's future and send out messages to encourage the customer towards a purchase. u Amazon does a fantastic job of pretargeting with the customers that connect with Facebook. Shoppers can see their friends and Amazon starts building a shopping list, which is frightfully accurate.
  • 13.
  • 14.
  • 15. $$$$
  • 16. Not only your social media u Walmart is an example that combines offline and online tracking with data aggregation. Walmart has gathered a large amount of consumer information from offline and online behaviors, and enhance their tracking abilities with the additional information sought from third parties. Consumers, Big Data,andOnline Tracking in the Retail Industry: ACase Study of Walmart, Center for MediaJustice(November 2013), http://centerformediajustice.org/wp-content/uploads/2014/06/WALMART_PRIVACY_.pdf
  • 17. Profiling goes global u The current business model for global companies is “connected recognition ,” gathering and analyzing the information about your locations and activities across a number of devices you may own.
  • 19. “As big data becomes more commonplace and embedded in everyday interactions, it could be used to automate discrimination and unfairness, both when data analytics delivers inaccurate profiles of individuals, for instance, but also when correct personal profiling is used to take advantage of a person’s weaknesses, such as with predatory lending. In both cases, she stressed that it could have profound impacts on people’s stability, mobility, and ability to determine their personal destinies.” Profa. Seeta Peña Gangadharan Consequences – nothing funny Barocas, Solon and Rosenblat, Alex and boyd, danah and Gangadharan, Seeta Peña and Yu, Corrine, Data & Civil Rights: Technology Primer (October 30, 2014). Data & Civil Rights Conference, October 2014. Availableat SSRN: http://ssrn.com/abstract=2536579 or http://dx.doi.org/10.2139/ssrn.2536579
  • 20. Privacy and IoT "The Internet of Things" (IoT) refers to the capability of everyday devices to connect to other devices and people through the existing Internet infrastructure.
  • 21. u Like it or not, technology is becoming inextricably entwined with the fabric of our lives. Our cars, our homes, even our bodies, are collecting, storing and streaming more personal data than ever before. In 2015, Gartner, Inc. forecasts the number of connected “things” will reach 4.9 billion, up 30 percent from 2014. By the year 2020, that number is expected to reach 25 billion. u They are able to communicate with consumers, collect and transmit data to companies, and compile large amounts of data for third parties. Privacy and IoT
  • 22.
  • 23. Car Privacy and Security As vehicle manufacturers rush to adopt mobile- friendly platforms and wireless technologies, they've neglected to plug security and privacy gaps, a new report revealed. "Nearly 100% of vehicles on the market include wireless technologies that could pose vulnerabilities to hacking or privacy intrusions,” Source: https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport- Tracking_Hacking_CarSecurity%202.pdf
  • 26. hackers turn your baby monitor into a spy cam “Eight of the nine cameras got an F and one got a D minus,” security researcher Mark Stanislav told Fusion’s Kashmir Hill. Security flaws included issues such as a lack of encryption, the use of default passwords, and access to Internet portals with the device’s serial number or account number. Source: http://www.wired.com/2015/09/security-news-week-turns-baby-monitors-w ildly -easy-hack/ Baby monitors are crazy easy to hack
  • 27. Why is metadata important? u We generate metadata unknowingly, in an organized format and over the long term. Metadata makes it easy to analyze, recognize patterns and draw conclusions about who we are, and what we are doing. u Companies that are central to our communications - like our mobile phone provider or internet/email service provider - have detailed logs of this metadata, and this gives them, and anyone else who can access this information, an unprecedentedly detailed picture. u Metadata can also reveal things we might not want to reveal. If our phone shows up in a certain location at the time that there is a protest, this can reveal that we were one of the protesters.
  • 28. Big Data, Privacy and Profiling u Big data has a variety of definitions, but is often described as: u the fastly growing, massive data sets that contain a large volume, velocity, and variety of information. Big data sets, including those scraped from social media, online shopping sites, GPS devices, banks, entertainments sites, and others are usually too large to be analyzed by most modern data analyzing tools. Hundreds of trillions of bytes of data have been created, just on the Internet, and for many, big data paves the way for more efficient research, marketing, polling, and health/scientific research. Private sector companies havebegun to invest more into big data research and analysis, as have a number of individual governments.
  • 29. Who “regulates” privacy? u The United States Federal Trade Commission (FTC) has been involved in oversight of the behavioral targeting techniques used by online advertisers since the mid-1990s. These techniques, initially called "online profiling", are now referred to as "behavioral targeting"; they are used to target online behavioral advertising (OBA) to consumers based on preferences inferred from their online behavior.
  • 31. the public-private surveillance partnership u What companies know, governments can & will know u Any reform must take into account this relationship
  • 32. Who else is watching you?
  • 33. Privacy and Surveillance Increase on “surveillance” agencies’ budget since the Patriotic Act
  • 35. Encryption and Cryptography The growth of cryptographic technology has raised a number of legal issues in the information age. Cryptography's potential for use as a tool for espionage and sedition has led many governments to classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption keys for documents relevant to an investigation. Modern cryptography is increasingly being used by human rights and nonprofit community activist groups around the world to protect sensitive data from governments and hostile organizations.
  • 36. Tor Usage and Political Rights u Opportunity vs. Need Source: The Dark Web Dilemma: Tor, Anonymity and Online Policing Eric Jardine (CIGI, 2016) https://www.cigionline.org/sites/default/files/no.21_1.pdf
  • 37. Free Flow and Trade u Forum Shopping: The total number of new data privacy laws globally, viewed by decade, shows that their growth is accelerating, not merely expanding linearly: 8 (1970s), 13 (1980s), 21 (1990s), 35 (2000s) and 12 (2 years of the 2010s), giving the total of 89. u It is not about freedom of expression u It is about trade, it is about e-commerce u Privacy considered as a trade barrier
  • 38. u countries should not use trade agreements to challenge privacy laws as trade barriers u we need to make clear about what type of information we are discussing when discussing “free-flow”, which historically is related to cross-personal-data flow u and if we want the language to go beyond cross-data-flow and actually deal with freedom of expression, the e-commerce chapter is a limited venue for that Moreat: Information Flow and TradeAgreements: History and Implications for Consumers’ Privacy Alberto Cerda and Carolina Rossini – May, 20131http://a2knetwork.org/sites/default/files/tpp_and_free_flow.pdf The Digital TradeImbalance and Its Implications for Internet Governance, Susan Ariel Aaronson, (CIGI, 2016) https://www.ourinternet.org/publication/the-digital-trade-imbalance-and-its-implications-for-internet-governance/
  • 39. CISA - Surveillance bill by another name?
  • 41. What it means for companies https://www.ccianet.org/2015/10/ccia-urges-senate-to-improve-cybersecurity-information-sharing-act/ http://www.law360.com/articles/760952/information-sharing-under-cisa-what-it-means-for-companies
  • 42. Wearables and Health Privacy https://cdt.org/blog/recent-health-privacy-work-cdt/
  • 43. Wearables + cutting-edge consent process = good science Mole Mapper, a patient-centered iPhone- app based study to quantitatively track moles and help detect early signs of the deadly skin cancer melanoma. Share the Journey: Mind, Body, and Wellness after Breast Cancer - Research on cognition after cancer is diagnosed http://sagebase.org/mole-mapper/http://parkinsonmpower.org/ http://sharethejourneyapp.org/
  • 45. Privacy + Consent = TRUST u over 75 percent of the more than 12,000 mPower participants chose to share their data broadly with researchers. u This cutting-edge consent process is outlined in a third paper published today in Nature Biotechnology, and represents a sea of change in participant control over data sharing.
  • 46. Privacy and security are two sides of a coin, intertwined and in near constant tension.
  • 47. its your responsibility and opportunity https://www.epic.org/privacy/tools.html
  • 48. Understand your technology Video @ https://www.article19.org/resources.php/resource/38278/en/a-net-of-rights?-new- film-links-human-rights-and-internet-protocols
  • 49.