2. What is privacy?
• “The right to be left alone"
• “The state or condition of being free
from being observed or disturbed by
other people.”
• “The state of being free from public
attention.”
Aurora Computer Studies
(www.auroracs.lk)
2
3. Aspects of privacy
• Secrecy, or the option to conceal any
information from others
• The option to limit the access others
have to one's personal information
• Personhood and autonomy
• protection of intimate relationships
Aurora Computer Studies
(www.auroracs.lk)
3
4. Privacy information
• Health related
• Personal finance related
• Political view (voting) related
• Intimate relationships
• Any other personal information
o Residential information
o Contact details
Aurora Computer Studies
(www.auroracs.lk)
4
5. Possible conflicting situations
• Financial privacy Vs. taxation laws
• Criminal investigation
• Contingency situations
• Freedom of expression vs. privacy of
individual
Aurora Computer Studies
(www.auroracs.lk)
5
Note: Strict statutory rules and/or ethical
norms must be followed.
6. Possible privacy violations
• Surveillance
o Surveillance without informing
o Excessive monitoring
• Hacking systems
o Hacking information systems and stealing personal data
• It is a obligation of the organization/individual who
collect privacy data to secure those.
• Blackmailing
o Publishing of intimacy related information with vicious
intents
Aurora Computer Studies
(www.auroracs.lk)
6
7. Possible privacy violations (Con.)
• Identity theft
o Social media/e-mail/banking account identity is hacked.
• Loosing one’s laptop/ notebook/
smartphone
o Possible loss of identities (username/passwords)
o Possible loss of privacy contents
• Privacy data collected by OS and other
internet related systems and apps like;
o Social media
o Search engines
o Geographical Information Systems like Google Map/Street views
Aurora Computer Studies
(www.auroracs.lk)
7
8. Search engine related privacy
concerns
• Most search engines gather
individual’s search history to provide
them with better search results
• At the same time it compromise
privacy
Aurora Computer Studies
(www.auroracs.lk)
8
9. Social media related privacy concerns
• Social media gather user’s behavioral
patterns to provide with better
contents and also targeted
advertising.
Aurora Computer Studies
(www.auroracs.lk)
9
10. Google map related privacy
concerns
• User’s traveling and movements are
tracked and traced through GPS
Aurora Computer Studies
(www.auroracs.lk)
10
11. Google street views related
privacy concerns
• Pictures of individuals houses are
captured and displayed which is raised
as a privacy concern by some people.
• Street view camera may capture some
privacy related incidents like;
o Picture exposing someone’s job or job place
o Someone visiting a particular sensitive place like
hospital/clinic
o Security concerns like burglary
Aurora Computer Studies
(www.auroracs.lk)
11
12. Actions taken for online privacy
concerns
• Well defined privacy policies
• Strict security measures to protect
collected data
• Strict employee regulations to prevent
access to individual data
• Mechanism to report privacy concerns or
inappropriate materials
• Remove certain contents from their
systems on request by individuals having
privacy concern
Aurora Computer Studies
(www.auroracs.lk)
12
13. How to preserve privacy?
• Frequently change password of
important user accounts
• Do not install suspicious software and
browser plugins that may collect your
privacy data
• Keep sensitive data encrypted
• Provide only the minimum required
data to third parties
Aurora Computer Studies
(www.auroracs.lk)
13
14. How to preserve privacy? (Con.)
• Protect your laptop/smart phone
• Backup and delete all sensitive data
before hand over your electronic
devices for repair
• Delete all the data before discard
your electronic devices
• Protest against unethical excessive
monitoring
Aurora Computer Studies
(www.auroracs.lk)
14
15. How to preserve privacy? (Con.)
• How Google street view address
privacy concerns
o Reporting mechanism
o Blurring facility for privacy concerns
o Quality filters on crowed sourced contents
• https://www.google.com/streetview/pri
vacy/
Aurora Computer Studies
(www.auroracs.lk)
15
17. Source of privacy data
• Employees data
• Customer’s data
• Any other third party data collected
Aurora Computer Studies
(www.auroracs.lk)
17
18. Aspects
• Legal aspects
o EU data protection directive
o UK data protection act
o USA acts on privacy
• Ethical aspects
Aurora Computer Studies
(www.auroracs.lk)
18
19. EU data protection directive
• The seven principles governing the
protection of personal data
1. Notice
• Data subjects should be given notice when their
data is being collected
2. Purpose
• data should only be used for the purpose stated
and not for any other purposes
3. Consent
• data should not be disclosed without the data
subject’s consent
Aurora Computer Studies
(www.auroracs.lk)
19
20. EU data protection directive (Con.)
4. Security
• Collected data should be kept secure from any
potential abuses
5. Disclosure
• data subjects should be informed as to who is
collecting their data
6. Access
• data subjects should be allowed to access their data
and make corrections to any inaccurate data
7. Accountability
• data subjects should have a method available to them
to hold data collectors accountable for not following
the above principles
Aurora Computer Studies
(www.auroracs.lk)
20
21. UK Data Protection Act
• Based on following principles (Also
known as Yong’s principles)
1. Personal data shall be processed fairly and lawfully.
2. Personal data shall be obtained only for one or more
specified and lawful purposes, and shall not be
further processed for any other purposes.
3. Personal data shall be adequate, relevant and not
excessive in relation to the purpose(s).
4. Personal data shall be accurate and, where
necessary, kept up to date
Aurora Computer Studies
(www.auroracs.lk)
21
22. UK Data Protection Act (Con.)
5. Personal data shall not be kept for longer than is
necessary for that purpose(s).
6. Personal data shall be processed in accordance with the
rights of data subjects (individuals).
7. Appropriate technical and organizational measures shall
be taken against unauthorized or unlawful processing of
personal data and against accidental loss or destruction
of, or damage to, personal data.
8. Personal data shall not be transferred to a country or
territory outside the European Economic Area unless that
country or territory ensures an adequate level of
protection for the rights and freedoms of data.
Aurora Computer Studies
(www.auroracs.lk)
22
23. USA acts on privacy
• Health Insurance Portability and
Accountability Act –1996 (HIPAA)
• Children’s Online Privacy Protection
Act -1998 (COPPA)
• Family Education Rights and Privacy
Act –1974 (FERPA)
• Gramm-Leach-Bliley Act -1999
Aurora Computer Studies
(www.auroracs.lk)
23
24. HIPAA - 1996
• Health Insurance Portability and
Accountability Act (HIPAA)
• Idea
o Established procedures for the exercise of individual
health information privacy rights.
o The use and disclosure of individual health
information should be authorized or required.
Aurora Computer Studies
(www.auroracs.lk)
24
25. COPPA - 1998
• The primary goal of COPPA is to
place parents in control (consent)
over what information is collected
from their young children online.
• The Rule was designed to protect
children under age 13 while
accounting for the dynamic nature of
the Internet.
Aurora Computer Studies
(www.auroracs.lk)
25
26. FERPA - 1974
• Family Education Rights and Privacy
Act
• Assigns rights to parents regarding
their children’s education records
• Rights transfer to student once
student becomes 18
Aurora Computer Studies
(www.auroracs.lk)
26
27. Gramm-Leach-Bliley Act -1999
• Also known as the Financial Modernization Act
of 1999
• A federal law enacted in the United States to
control the ways that financial institutions deal
with the private information of individuals.
• companies that offer consumers financial
products or services like loans, financial or
investment advice, or insurance requires to
explain their information-sharing practices to
their customers and to safeguard sensitive data.
Aurora Computer Studies
(www.auroracs.lk)
27
29. Thank You !
Presented by
Aurora Computer Studies
(auoracs.lk)
Aurora Computer Studies
(www.auroracs.lk)
29
30. "We are what we repeatedly do.
Excellence, then, is not an act,
but a habit."
~ Aristotle.
Aurora Computer Studies
(www.auroracs.lk)
30
31. You may also interested in
“How to be a real professional”
http://www.slideshare.net/auroracslk/how-to-
be-a-real-professional
Aurora Computer Studies
(www.auroracs.lk)
31
32. Contact Information
Premier Study Center
Aurora Computer Studies,
Summerset College,
# 135, 3rd Floor,
DFCC Building,
High Level Road,
Maharagama.
0115 690 290
City Study Center
Aurora Computer Studies,
Summerset College,
# 88/2, 2nd Floor,
BOC Building,
High Level Road,
Kirulapone, Colombo 06
0703 001 010
For further details and enquiries :
Call - 0719 842030
E-mail – info@auroracs.lk
Web - www.auroracs.lk
Aurora Computer Studies www.auroracs.lk 32