SlideShare a Scribd company logo
1 of 18
ONLINE PRIVACY; 
MYTH OR REALITY? 
Swaleh A. Ahmed
Privacy? 
• Refers to the quality of being secluded from the presence 
or view of others. 
• Every person has the right to privacy, which includes the 
right not to have-- 
a) their person, home or property searched; 
b) their possessions seized; 
c) information relating to their family or private affairs 
unnecessarily required or revealed; or 
d) the privacy of their communications infringed. 
http://www.kictanet.or.ke/?p=19844
Internet privacy 
involves the right or mandate of personal privacy 
concerning the storing, repurposing, provision to third 
parties, and displaying of information pertaining to oneself 
via the Internet. 
Internet privacy is a subset of computer privacy.
Privacy Questions 
• Where is my data? 
• How is it used? 
• Who sees it? 
• Is anything private anymore? 
Everything about you is in at least one 
computer file
How Did They Get My Data? 
• Loans 
• Charge accounts 
• Orders via mail 
• Magazine subscriptions 
• Tax forms 
• Applications for 
schools, jobs, clubs 
• Insurance claim 
• Hospital stay 
• Sending checks 
• Fund-raisers 
• Advertisers 
• Warranties 
• Military draft registration 
• Court petition
Your Boss is Spying on You! 
Monitoring software 
– Screens 
– E-mail 
– Keystrokes per minute 
– Length of breaks 
– What computer files are used and for how long 
Privacy groups want legislation requiring 
employers to alert employees that they are 
being monitored.
Monitoring by Web Sites 
Records: 
• City 
• Site you just left 
• Everything you do while on the site 
• Hardware and software you use 
• Click stream 
– Series of clicks that link from site to site 
– History of what the user chooses to view
Monitoring by Web Sites 
Cookie 
• Stores information about you 
• Located on your hard drive 
• Beneficial uses 
– Viewing preferences 
– Online shopping 
– Secure sites retain password in cookie 
• Controversial use 
– Tracking surfing habits for advertisers 
• Can set browser to refuse cookies or warn before 
storing 
• Software available to manage cookies
P3P 
Platform for Privacy Preference Project 
• Standards proposed by the World Wide Web 
Consortium (W3C) 
– User sets privacy preferences 
– Web server transmits privacy policies 
– Software determines if web site meets users’ 
requirements 
• Participation by web site is voluntary
We lose Privacy: Technology 
• Ubiquitous communications capacity 
• Walls evaporate for reading, viewing 
• transactions can be observed anywhere 
• Extensive processing capacity 
• Inefficiency & cost protect privacy 
• Aggregating and access 
• Data-mining – analysis algorithms 
• Communications + processing 
• Transactional data collection 
• Profiling 
• Data mining
We lose Privacy: Business 
• Information as competitive tool 
• Customized preference formation: advertising 
• Customized service/goods delivered 
• Customized price/price discrimination 
• Customer’s life-long consumption as primary asset of firm 
• Proprietary information fends off competitive pressures
We lose Privacy: Politics 
• U.S. & other governments highly sophisticated information 
gatherers 
• 1990s saw the encryption wars, US Government partially 
lost 
• September 11th released the leash 
• Governments back into an explicit role of extensive 
information collection and processing 
• Including by access to market-actor collected information
Fair Information Practices 
• Minimal standards imposed by law with a supporting 
regulatory framework 
• As opposed to “privacy preferences” 
• EU Data protection 
• OECD Guidelines
Fair Information Practices 
• Collection Limitation 
• Data Quality 
• Purpose Specification 
• Use Limitation 
• Security Safeguards 
• Openness 
• Individual Participation 
• Accountability
RFID Story 
• Clothing manufacturers sew RFID into cloth. 
Include garment characteristics, cloth batch etc 
for recalls & quality control 
• Stores, malls, etc. install readers to limit pilfering 
& for inventory management 
• Question 
• Mall owners use the information to dynamically change the 
advertisements they project on billboards in the Mall 
• Police officers use the information to track the 
location of cloths that match crime scene 
evidence
Hypothetical Amazon Story 
• Collects information to tailor offerings 
• Provides good recommendations for books to read 
• Suggests music you like 
• Offers good advice when you seem to need it, 
usually guesses right what you need 
• How far would you go with this? 
• Buying a car or furniture 
• Financing/loan services 
• Physician referral service
discussion 
• How private is your online experience?
“The only true protection is to understand that 
anything you put up there can be accessed by 
somebody else.”

More Related Content

What's hot

Ed Wright - Staying on the right side of the law in the digital world
Ed Wright - Staying on the right side of the law in the digital worldEd Wright - Staying on the right side of the law in the digital world
Ed Wright - Staying on the right side of the law in the digital worldHallam
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Energy Data Privacy Presentation
Energy Data Privacy PresentationEnergy Data Privacy Presentation
Energy Data Privacy PresentationBrian Orion
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
Concepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and SecurityConcepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and SecurityMaven Logix
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulationcjw119
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to DataCybera Inc.
 
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Jim Loter
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesInfinity Software Solutions
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startupsEkoInnovationCentre
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesKavitha Gupta, CIPP-Asia
 

What's hot (19)

Ed Wright - Staying on the right side of the law in the digital world
Ed Wright - Staying on the right side of the law in the digital worldEd Wright - Staying on the right side of the law in the digital world
Ed Wright - Staying on the right side of the law in the digital world
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Overview Data Privacy Bill India
Overview Data Privacy Bill IndiaOverview Data Privacy Bill India
Overview Data Privacy Bill India
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Energy Data Privacy Presentation
Energy Data Privacy PresentationEnergy Data Privacy Presentation
Energy Data Privacy Presentation
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
Concepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and SecurityConcepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and Security
 
Rent-a-DPO for IT Vendors
Rent-a-DPO for IT VendorsRent-a-DPO for IT Vendors
Rent-a-DPO for IT Vendors
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Data protection compliance for tech startups
Data protection compliance for tech startupsData protection compliance for tech startups
Data protection compliance for tech startups
 
GDPR introduction
GDPR introductionGDPR introduction
GDPR introduction
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 

Viewers also liked

Cómo hacer una presentación efectiva en power point
Cómo hacer una presentación efectiva en power pointCómo hacer una presentación efectiva en power point
Cómo hacer una presentación efectiva en power pointVakitaOtaku
 
Estrategias fundamentales para una presentación efectiva en Power Point
Estrategias fundamentales para una presentación efectiva en Power PointEstrategias fundamentales para una presentación efectiva en Power Point
Estrategias fundamentales para una presentación efectiva en Power PointIsmael Rios
 
Tecnicas Profesionales para realizar Presentaciones
Tecnicas Profesionales para realizar PresentacionesTecnicas Profesionales para realizar Presentaciones
Tecnicas Profesionales para realizar PresentacionesMind de Colombia
 
Parámetros para realizar una presentación efectiva
Parámetros para realizar una presentación efectivaParámetros para realizar una presentación efectiva
Parámetros para realizar una presentación efectivaguadalupe28d1996
 
Pasos para realizar presentaciones exitosas
Pasos para realizar presentaciones exitosasPasos para realizar presentaciones exitosas
Pasos para realizar presentaciones exitosasJuan Carlos Fernández
 

Viewers also liked (8)

presentación efectiva
presentación efectivapresentación efectiva
presentación efectiva
 
Netiqueta(Clase 3 y 4)
Netiqueta(Clase 3 y 4)Netiqueta(Clase 3 y 4)
Netiqueta(Clase 3 y 4)
 
Cómo hacer una presentación efectiva en power point
Cómo hacer una presentación efectiva en power pointCómo hacer una presentación efectiva en power point
Cómo hacer una presentación efectiva en power point
 
Estrategias fundamentales para una presentación efectiva en Power Point
Estrategias fundamentales para una presentación efectiva en Power PointEstrategias fundamentales para una presentación efectiva en Power Point
Estrategias fundamentales para una presentación efectiva en Power Point
 
Presentaciones efectivas
Presentaciones efectivasPresentaciones efectivas
Presentaciones efectivas
 
Tecnicas Profesionales para realizar Presentaciones
Tecnicas Profesionales para realizar PresentacionesTecnicas Profesionales para realizar Presentaciones
Tecnicas Profesionales para realizar Presentaciones
 
Parámetros para realizar una presentación efectiva
Parámetros para realizar una presentación efectivaParámetros para realizar una presentación efectiva
Parámetros para realizar una presentación efectiva
 
Pasos para realizar presentaciones exitosas
Pasos para realizar presentaciones exitosasPasos para realizar presentaciones exitosas
Pasos para realizar presentaciones exitosas
 

Similar to Online privacy

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentialityempalmer
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptxjohn6938
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Raab innovation begins with data
Raab innovation begins with dataRaab innovation begins with data
Raab innovation begins with datadraab
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 

Similar to Online privacy (20)

E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Surveillance and security.pptx
Surveillance and security.pptxSurveillance and security.pptx
Surveillance and security.pptx
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Raab innovation begins with data
Raab innovation begins with dataRaab innovation begins with data
Raab innovation begins with data
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 

Online privacy

  • 1. ONLINE PRIVACY; MYTH OR REALITY? Swaleh A. Ahmed
  • 2. Privacy? • Refers to the quality of being secluded from the presence or view of others. • Every person has the right to privacy, which includes the right not to have-- a) their person, home or property searched; b) their possessions seized; c) information relating to their family or private affairs unnecessarily required or revealed; or d) the privacy of their communications infringed. http://www.kictanet.or.ke/?p=19844
  • 3. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of computer privacy.
  • 4. Privacy Questions • Where is my data? • How is it used? • Who sees it? • Is anything private anymore? Everything about you is in at least one computer file
  • 5. How Did They Get My Data? • Loans • Charge accounts • Orders via mail • Magazine subscriptions • Tax forms • Applications for schools, jobs, clubs • Insurance claim • Hospital stay • Sending checks • Fund-raisers • Advertisers • Warranties • Military draft registration • Court petition
  • 6. Your Boss is Spying on You! Monitoring software – Screens – E-mail – Keystrokes per minute – Length of breaks – What computer files are used and for how long Privacy groups want legislation requiring employers to alert employees that they are being monitored.
  • 7. Monitoring by Web Sites Records: • City • Site you just left • Everything you do while on the site • Hardware and software you use • Click stream – Series of clicks that link from site to site – History of what the user chooses to view
  • 8. Monitoring by Web Sites Cookie • Stores information about you • Located on your hard drive • Beneficial uses – Viewing preferences – Online shopping – Secure sites retain password in cookie • Controversial use – Tracking surfing habits for advertisers • Can set browser to refuse cookies or warn before storing • Software available to manage cookies
  • 9. P3P Platform for Privacy Preference Project • Standards proposed by the World Wide Web Consortium (W3C) – User sets privacy preferences – Web server transmits privacy policies – Software determines if web site meets users’ requirements • Participation by web site is voluntary
  • 10. We lose Privacy: Technology • Ubiquitous communications capacity • Walls evaporate for reading, viewing • transactions can be observed anywhere • Extensive processing capacity • Inefficiency & cost protect privacy • Aggregating and access • Data-mining – analysis algorithms • Communications + processing • Transactional data collection • Profiling • Data mining
  • 11. We lose Privacy: Business • Information as competitive tool • Customized preference formation: advertising • Customized service/goods delivered • Customized price/price discrimination • Customer’s life-long consumption as primary asset of firm • Proprietary information fends off competitive pressures
  • 12. We lose Privacy: Politics • U.S. & other governments highly sophisticated information gatherers • 1990s saw the encryption wars, US Government partially lost • September 11th released the leash • Governments back into an explicit role of extensive information collection and processing • Including by access to market-actor collected information
  • 13. Fair Information Practices • Minimal standards imposed by law with a supporting regulatory framework • As opposed to “privacy preferences” • EU Data protection • OECD Guidelines
  • 14. Fair Information Practices • Collection Limitation • Data Quality • Purpose Specification • Use Limitation • Security Safeguards • Openness • Individual Participation • Accountability
  • 15. RFID Story • Clothing manufacturers sew RFID into cloth. Include garment characteristics, cloth batch etc for recalls & quality control • Stores, malls, etc. install readers to limit pilfering & for inventory management • Question • Mall owners use the information to dynamically change the advertisements they project on billboards in the Mall • Police officers use the information to track the location of cloths that match crime scene evidence
  • 16. Hypothetical Amazon Story • Collects information to tailor offerings • Provides good recommendations for books to read • Suggests music you like • Offers good advice when you seem to need it, usually guesses right what you need • How far would you go with this? • Buying a car or furniture • Financing/loan services • Physician referral service
  • 17. discussion • How private is your online experience?
  • 18. “The only true protection is to understand that anything you put up there can be accessed by somebody else.”