Privacy on the WEB

Preview:

DESCRIPTION

Privacy on the WEB. Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme. Topics. Privacy Enablers of Privacy Invasion Methods of Protection Government Regulation. Privacy on the WEB. Is there really any? “You’ve got mail”, but is it secure? - PowerPoint PPT Presentation

Citation preview

Privacy on the WEB Privacy on the WEB

Group 0227Efrain Castro, Dinesh Parmer, Michael Raiford

Robert Reich, Kim Walker, Claudia Worme

TopicsTopics

PrivacyEnablers of Privacy InvasionMethods of ProtectionGovernment Regulation

Privacy on the WEBPrivacy on the WEB

Is there really any?“You’ve got mail”, but is it secure?

Does a company have the right to profile your Internet use?

Do you have the right to know if your are being “watched”?

Do others have the right to gather personal data without your knowledge or permission?

Privacy – Intro.Privacy – Intro.

Invasion of privacy intentional intrusion upon the solitude or seclusion of another that is highly offensive to a reasonable person (Webster’s)

Privacy on the WEBRefers to security and confidentiality of personal and/or financial information

Privacy – Intro.Privacy – Intro.

Forbes article– 56% of Americans are “very concerned”– 86% of computer user believe business

should get explicit permission before collecting data

– Expect federal and state regulatory agencies to take notice

Forbes ASAP February 19,2001

Why the recent concern?Why the recent concern?

Profiling – on-line retailers collect data to target individual preferences for direct solicitation

Selling of marketing lists

Data has always been available but not with the current easy of access

PrivacyPrivacy

Personal– Anonymity is still widespread on the Internet

but information is collected

Workplace– 66% of 500 firms conduct electronic

surveillance– 27% monitor email

Consumer Relationships– Collection of personal information for profiling

What has enabled the invasion?What has enabled the invasion?

Wide spread use of the Internet & E-mail

Cooperative BrowsersCookies– Track personal usage– Anonymous or customized– Persistent or Session

What has enabled the invasion?What has enabled the invasion?

WEB Banners– Can use cookies– Setup on many sites to track patterns

WEB Bugs– 1-pixel gif file setup on the WEB page or

sent via email– Undetectable by ant-cookie filters– Can run executable code

What has enabled the invasion?What has enabled the invasion?

Spyware– Email monitoring– WEB use monitoring– Data interception– Email interception

Naïve Users– High-speed Internet access– Wireless Internet access– Free Internet access

What has enabled the invasion?What has enabled the invasion?

Inadequate Business Practices– Outdated email protocols– Trusted networks– Poor user maintenance on unused

accounts– Instant messaging– Inadequate firewalls

What has enabled the invasion?What has enabled the invasion?

Vendor – Back DoorsCode written into programs to allow the developer of the software to circumvent security

Examples– RealJukebox– Alexa– Cuecat– Microsoft– Barbie

Has your privacy been Compromised?Has your privacy been Compromised?

411 Locate, InfoUSA, 555-1212– List phone numbers and email

addressesBigfoot– Email addresses

YBLost, Stalker Site– Links to just about anything

Methods of ProtectionMethods of Protection

Individual– Anonymity– Education– Protection software

HW & SW– VPN (Virtual Private Network)– Encryption

Methods of ProtectionMethods of Protection

Businesses– Good security– Control email–Monitor systems– Corporate Privacy Policies

Cybersurance

Government RegulationGovernment Regulation

Carnivore– FBI email monitoring

Federal Trade Commission– FTC Fair Information Practices• Notice• Choice• Access• Security

Government RegulationGovernment Regulation

USA does not have a comprehensive e-commerce privacy bill

Children's Online Privacy Protection Act– 13 years and younger– Parental consent to collect information– Refrain from re-distribution of identifiable

information– Best effort to discourage posting of contact

information– No special offers

Government RegulationGovernment Regulation

Privacy Bills Currently in Congress– Spyware Control and Privacy Protection

Act– Electronic Privacy Protection Act– Consumer Online Privacy and

Disclosure Act– Consumer Internet Privacy

Enhancement Act

Government RegulationGovernment Regulation

Non-Government Privacy Organizations– CERT Coordination Center– Online Privacy Alliance– Platform for Privacy Preferences Project

(P3P)

Government RegulationGovernment Regulation

International : European Union– 1998 law requiring personal information

on the Internet to be:• Accurate• Current• Gathered fairly and lawfully• Processed and used for a specified

legitimate purpose• Kept no longer than deemed necessary;y to

fulfill the stated purpose

ConclusionConclusion

Need for strong lawsConsumers need to be fully informed

and educatedPrivacy PoliciesTenacious in fighting for privacy