Upload
bryce
View
38
Download
4
Tags:
Embed Size (px)
DESCRIPTION
Privacy on the WEB. Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme. Topics. Privacy Enablers of Privacy Invasion Methods of Protection Government Regulation. Privacy on the WEB. Is there really any? “You’ve got mail”, but is it secure? - PowerPoint PPT Presentation
Citation preview
Privacy on the WEB Privacy on the WEB
Group 0227Efrain Castro, Dinesh Parmer, Michael Raiford
Robert Reich, Kim Walker, Claudia Worme
TopicsTopics
PrivacyEnablers of Privacy InvasionMethods of ProtectionGovernment Regulation
Privacy on the WEBPrivacy on the WEB
Is there really any?“You’ve got mail”, but is it secure?
Does a company have the right to profile your Internet use?
Do you have the right to know if your are being “watched”?
Do others have the right to gather personal data without your knowledge or permission?
Privacy – Intro.Privacy – Intro.
Invasion of privacy intentional intrusion upon the solitude or seclusion of another that is highly offensive to a reasonable person (Webster’s)
Privacy on the WEBRefers to security and confidentiality of personal and/or financial information
Privacy – Intro.Privacy – Intro.
Forbes article– 56% of Americans are “very concerned”– 86% of computer user believe business
should get explicit permission before collecting data
– Expect federal and state regulatory agencies to take notice
Forbes ASAP February 19,2001
Why the recent concern?Why the recent concern?
Profiling – on-line retailers collect data to target individual preferences for direct solicitation
Selling of marketing lists
Data has always been available but not with the current easy of access
PrivacyPrivacy
Personal– Anonymity is still widespread on the Internet
but information is collected
Workplace– 66% of 500 firms conduct electronic
surveillance– 27% monitor email
Consumer Relationships– Collection of personal information for profiling
What has enabled the invasion?What has enabled the invasion?
Wide spread use of the Internet & E-mail
Cooperative BrowsersCookies– Track personal usage– Anonymous or customized– Persistent or Session
What has enabled the invasion?What has enabled the invasion?
WEB Banners– Can use cookies– Setup on many sites to track patterns
WEB Bugs– 1-pixel gif file setup on the WEB page or
sent via email– Undetectable by ant-cookie filters– Can run executable code
What has enabled the invasion?What has enabled the invasion?
Spyware– Email monitoring– WEB use monitoring– Data interception– Email interception
Naïve Users– High-speed Internet access– Wireless Internet access– Free Internet access
What has enabled the invasion?What has enabled the invasion?
Inadequate Business Practices– Outdated email protocols– Trusted networks– Poor user maintenance on unused
accounts– Instant messaging– Inadequate firewalls
What has enabled the invasion?What has enabled the invasion?
Vendor – Back DoorsCode written into programs to allow the developer of the software to circumvent security
Examples– RealJukebox– Alexa– Cuecat– Microsoft– Barbie
Has your privacy been Compromised?Has your privacy been Compromised?
411 Locate, InfoUSA, 555-1212– List phone numbers and email
addressesBigfoot– Email addresses
YBLost, Stalker Site– Links to just about anything
Methods of ProtectionMethods of Protection
Individual– Anonymity– Education– Protection software
HW & SW– VPN (Virtual Private Network)– Encryption
Methods of ProtectionMethods of Protection
Businesses– Good security– Control email–Monitor systems– Corporate Privacy Policies
Cybersurance
Government RegulationGovernment Regulation
Carnivore– FBI email monitoring
Federal Trade Commission– FTC Fair Information Practices• Notice• Choice• Access• Security
Government RegulationGovernment Regulation
USA does not have a comprehensive e-commerce privacy bill
Children's Online Privacy Protection Act– 13 years and younger– Parental consent to collect information– Refrain from re-distribution of identifiable
information– Best effort to discourage posting of contact
information– No special offers
Government RegulationGovernment Regulation
Privacy Bills Currently in Congress– Spyware Control and Privacy Protection
Act– Electronic Privacy Protection Act– Consumer Online Privacy and
Disclosure Act– Consumer Internet Privacy
Enhancement Act
Government RegulationGovernment Regulation
Non-Government Privacy Organizations– CERT Coordination Center– Online Privacy Alliance– Platform for Privacy Preferences Project
(P3P)
Government RegulationGovernment Regulation
International : European Union– 1998 law requiring personal information
on the Internet to be:• Accurate• Current• Gathered fairly and lawfully• Processed and used for a specified
legitimate purpose• Kept no longer than deemed necessary;y to
fulfill the stated purpose
ConclusionConclusion
Need for strong lawsConsumers need to be fully informed
and educatedPrivacy PoliciesTenacious in fighting for privacy