Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Consumers' and Citizens' Privacy
1. MARCH 4, 2016
CAROLINA ROSSINI
VP @ PUBLIC KNOWLEDGE
BODY CAMERAS, BIG DATA,
AND PRIVACY: TWENTY FIRST
CENTURY TECHNOLOGY AND
THE FOURTH AMENDMENT
ELON LAW REVIEW SYMPOSIUM
2.
3. International Sources
u the right to privacy is explicitly defined as a right for all people
Universal Declaration of Human Rights,
International Covenant on Civil and Political Rights (ICCPR
American Convention on Human Rights
Charter of Fundamental Rights (Arts. 7 and 8)
OECD Privacy Guidelines
Fair Information Practices.
4. What does privacy enables?
u The right to privacy allows for all people to keep information about themselves out
of the hands of those they don’t want to have the information. This includes
personal data, such as weight or birthplace to more sensitive personal data, such
as personal preferences, religious beliefs, and political views.
u The right to privacy also allows for people to feel empowered to have free flowing
discussions and communications (offline and online) about sensitive issues without
fear of retaliation or censorship.
u The right to privacy is most important because it allows for the rights of freedom of
expression, freedom of speech, freedom of opinion, freedom of association,
access to information, to flourish.
5. Right to be Anonymous
u In addition to privacy, the right to be anonymous online - thus,
the right to say something online without having it be
connected to your real identity - is also a crucial piece of the
discussion around human rights, surveillance, data protection,
and big data.
6. Your Privacy on The Web
What does privacy
mean to you?
“Nothing to hide”?
Or
“Having Control on your
data” ?
7. Online Privacy?
uThe ability to control what information one
reveals about oneself over the internet,
and control who can access that
information.
8. How differently people look at it?
u “Privacy is the future. Get used to it.” - Marc
Rotenberg, Director, Electronic Privacy
Information Centre - EPIC) (Fortune, 2001).
u “You have zero privacy anyway. Get over it.”
- Scott McNealy, CEO, Sun Microsystems, 1999
11. Behavioral Marketing
u Retargeting marks or tags online users who visit a certain brand website with a pixel or
a cookie,[2] and then serves banner ads only to the people who have shown at least some
amount of engagement with the original brand. In the milliseconds before you land on a
web site where a retargeting company has either directly placed or has access to the site
users cookie information, they present you with a highly targeted real-time and
personalized advert for that very thing that you were looking at while you were on the
retailers website earlier.
u Pretargeting is a form of online targeted advertising by which online advertising is targeted
to consumers based on their previous actions on many websites. PreTargeting is a method
to identify websites that people have likely or actually visited before coming to a retailer or
publishers website and that information can be then used by them to better target the
content that you see while browsing their website.
12. Behavioral Marketing
u The giants of the marketing world, namely Facebook and Google, already have an unimaginable
amount of data regarding shopping trends and experiences. They can use this to spot the next big
trends with a 90% degree of accuracy. With these types of insights they can predict the shopper's
future and send out messages to encourage the customer towards a purchase.
u Amazon does a fantastic job of pretargeting with the customers that connect with Facebook.
Shoppers can see their friends and Amazon starts building a shopping list, which is frightfully
accurate.
16. Not only your social media
u Walmart is an example that combines offline and online tracking with data
aggregation. Walmart has gathered a large amount of consumer
information from offline and online behaviors, and enhance their tracking
abilities with the additional information sought from third parties.
Consumers, Big Data,andOnline Tracking in the Retail Industry: ACase Study of Walmart, Center for MediaJustice(November 2013),
http://centerformediajustice.org/wp-content/uploads/2014/06/WALMART_PRIVACY_.pdf
17. Profiling goes global
u The current business model for global companies is
“connected recognition ,” gathering and analyzing the
information about your locations and activities across a
number of devices you may own.
19. “As big data becomes more commonplace and embedded in everyday interactions, it could be used to
automate discrimination and unfairness, both when data analytics delivers inaccurate profiles of individuals,
for instance, but also when correct personal profiling is used to take advantage of a person’s weaknesses,
such as with predatory lending. In both cases, she stressed that it could have profound impacts on people’s
stability, mobility, and ability to determine their personal destinies.” Profa. Seeta Peña Gangadharan
Consequences – nothing funny
Barocas, Solon and Rosenblat, Alex and boyd, danah and Gangadharan, Seeta Peña and Yu, Corrine,
Data & Civil Rights: Technology Primer (October 30, 2014). Data & Civil Rights Conference, October
2014. Availableat SSRN: http://ssrn.com/abstract=2536579 or http://dx.doi.org/10.2139/ssrn.2536579
20. Privacy and IoT
"The Internet of Things" (IoT) refers to the capability of
everyday devices to connect to other devices and people
through the existing Internet infrastructure.
21. u Like it or not, technology is becoming inextricably entwined with the fabric of our lives. Our cars,
our homes, even our bodies, are collecting, storing and streaming more personal data than ever
before. In 2015, Gartner, Inc. forecasts the number of connected “things” will reach 4.9 billion, up
30 percent from 2014. By the year 2020, that number is expected to reach 25 billion.
u They are able to communicate with consumers, collect and transmit data to companies, and
compile large amounts of data for third parties.
Privacy and IoT
22.
23. Car Privacy and Security
As vehicle manufacturers rush to adopt mobile-
friendly platforms and wireless technologies,
they've neglected to plug security and privacy
gaps, a new report revealed.
"Nearly 100% of vehicles on the market include
wireless technologies that could pose
vulnerabilities to hacking or privacy intrusions,”
Source: https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-
Tracking_Hacking_CarSecurity%202.pdf
26. hackers turn your baby monitor into a spy cam
“Eight of the nine cameras got an
F and one got a D minus,” security researcher
Mark Stanislav told Fusion’s Kashmir Hill. Security
flaws included issues such as a lack of encryption,
the use of default passwords, and access to
Internet portals with the device’s serial number or
account number.
Source: http://www.wired.com/2015/09/security-news-week-turns-baby-monitors-w ildly -easy-hack/
Baby monitors are crazy easy to hack
27. Why is metadata important?
u We generate metadata unknowingly, in an organized format and over the long term.
Metadata makes it easy to analyze, recognize patterns and draw conclusions about
who we are, and what we are doing.
u Companies that are central to our communications - like our mobile phone provider or
internet/email service provider - have detailed logs of this metadata, and this gives
them, and anyone else who can access this information, an unprecedentedly detailed
picture.
u Metadata can also reveal things we might not want to reveal. If our phone shows up in
a certain location at the time that there is a protest, this can reveal that we were one
of the protesters.
28. Big Data, Privacy and Profiling
u Big data has a variety of definitions, but is often described as:
u the fastly growing, massive data sets that contain a large volume, velocity, and variety
of information. Big data sets, including those scraped from social media, online
shopping sites, GPS devices, banks, entertainments sites, and others are usually too
large to be analyzed by most modern data analyzing tools. Hundreds of trillions of
bytes of data have been created, just on the Internet, and for many, big data paves
the way for more efficient research, marketing, polling, and health/scientific research.
Private sector companies havebegun to invest more into big data research and
analysis, as have a number of individual governments.
29. Who “regulates” privacy?
u The United States Federal Trade Commission (FTC) has
been involved in oversight of the behavioral targeting
techniques used by online advertisers since the mid-1990s.
These techniques, initially called "online profiling", are now
referred to as "behavioral targeting"; they are used to
target online behavioral advertising (OBA) to consumers
based on preferences inferred from their online behavior.
31. the public-private surveillance partnership
u What companies know, governments can & will know
u Any reform must take into account this relationship
35. Encryption and Cryptography
The growth of cryptographic technology has raised a number of legal issues in the information age.
Cryptography's potential for use as a tool for espionage and sedition has led many governments to
classify it as a weapon and to limit or even prohibit its use and export. In some jurisdictions where
the use of cryptography is legal, laws permit investigators to compel the disclosure of encryption
keys for documents relevant to an investigation.
Modern cryptography is increasingly being used by human rights and nonprofit community activist
groups around the world to protect sensitive data from governments and hostile organizations.
36. Tor Usage and Political Rights
u Opportunity vs. Need
Source: The Dark Web Dilemma: Tor, Anonymity and
Online Policing Eric Jardine (CIGI, 2016)
https://www.cigionline.org/sites/default/files/no.21_1.pdf
37. Free Flow and Trade
u Forum Shopping: The total number of new data privacy laws globally, viewed by decade, shows
that their growth is accelerating, not merely expanding linearly: 8 (1970s), 13 (1980s), 21 (1990s),
35 (2000s) and 12 (2 years of the 2010s), giving the total of 89.
u It is not about freedom of expression
u It is about trade, it is about e-commerce
u Privacy considered as a trade barrier
38. u countries should not use trade agreements to challenge privacy laws as trade
barriers
u we need to make clear about what type of information we are discussing when
discussing “free-flow”, which historically is related to cross-personal-data flow
u and if we want the language to go beyond cross-data-flow and actually deal with
freedom of expression, the e-commerce chapter is a limited venue for that
Moreat: Information Flow and TradeAgreements: History and Implications for Consumers’ Privacy Alberto Cerda and Carolina
Rossini – May, 20131http://a2knetwork.org/sites/default/files/tpp_and_free_flow.pdf
The Digital TradeImbalance and Its Implications for Internet Governance, Susan Ariel Aaronson, (CIGI, 2016)
https://www.ourinternet.org/publication/the-digital-trade-imbalance-and-its-implications-for-internet-governance/
41. What it means for companies
https://www.ccianet.org/2015/10/ccia-urges-senate-to-improve-cybersecurity-information-sharing-act/
http://www.law360.com/articles/760952/information-sharing-under-cisa-what-it-means-for-companies
42. Wearables and Health Privacy
https://cdt.org/blog/recent-health-privacy-work-cdt/
43. Wearables + cutting-edge consent process
= good science
Mole Mapper, a patient-centered iPhone-
app based study to quantitatively track moles
and help detect early signs of the deadly skin
cancer melanoma.
Share the Journey: Mind, Body, and
Wellness after Breast Cancer -
Research on cognition after cancer is
diagnosed
http://sagebase.org/mole-mapper/http://parkinsonmpower.org/
http://sharethejourneyapp.org/
45. Privacy + Consent = TRUST
u over 75 percent of the more than 12,000 mPower
participants chose to share their data broadly with
researchers.
u This cutting-edge consent process is outlined in a
third paper published today in Nature
Biotechnology, and represents a sea of change in
participant control over data sharing.
48. Understand your technology
Video @ https://www.article19.org/resources.php/resource/38278/en/a-net-of-rights?-new-
film-links-human-rights-and-internet-protocols