SlideShare a Scribd company logo
1 of 30
‘With the rush to be online, is there still a place for privacy?’  May 15, 2009
We’ve moved beyond experimentation Forget about the 11 million Canadians on Facebook –  the Pope has a YouTube channel!
Community building and technology go hand-in-hand in Canada
Our idea of community is changing - rapidly
Many communities are subtly shaped  1/3 By marketers Sick boy w/ the Cool T shirt
Many communities are subtly shaped 2/3 By activists
Many communities are subtly shaped 3/3 By politicians
How are communities defined today? Not by shared history Not by vague affinities But by action
Canadians are learning how to: establish an online identity express themselves - forcefully expect more – from everybody
What is the effect on government? tech-savvy activists aren’t waiting for us to act they are creating the tools and the resources  they are making information free and flexible
The examples are international, pt. 1 In the United Kingdom, the government is experimenting with: Online consultations Ministerial blogs Twittering of Prime Ministerial visits abroad
The examples are international, pt. 2 In the United States, the administration is forcing: Increased transparency Open access to government data and info More responsive processes Implementing all the tools at once
Canadians are learning to expect a response: quickly with authority and with a solution
Which isn’t really our strength
What are WE doing in response? Monitoring  Developing pilot projects Rolling out tools appropriate to the situation
Crisis Communications: a perfect example Public Health Agency’s  H1N1 outreach efforts Public Safety’s  Emergency Preparedness Campaign
Public Education: digital tools prove flexible  youthprivacy.ca dpi.priv.gc.ca blog.privcom.gc.ca
What about privacy? The process of creating and maintaining an online identity is messy
Our understanding of privacy evolves over time cultural differences generational differences
What was that about messy? online tools are constantly evolving privacy protections vary from site to site, and from service to service Canadians are still learning what information to share, and what to safeguard
If Canadians were cautious, rational and unemotional, they would: second guess every decision to share personal information with their social networks constantly audit the information collected about them by online services, corporations and governments
Canadians face two significant privacy challenges Many sites continue to collect too much personal information They’re learning how build online relationships with friends, colleagues, businesses and governments
Their biggest obstacle? Every conversation online is treated just like a chat at the dinner table But there’s a permanent record of it
The repercussions are real employment risks social ostracism civil and criminal consequences
The particular risks of public sector participation Experience in the U.K. and the US has shown that public sector employees are reluctant to use social media. The U.K. and New Zealand governments have established very simple guidelines that encourage innovation but emphasize responsibility.
Conclusion Provide users with the tools to control their own personal information Establish an environment that encourages the use of these new tools – by citizens and by employees Set clear guidelines about how and when you will use these tools to communicate with Canadians.
Bridging the Gaps Aim for better mutual understanding and accommodation Provide clear, user-friendly information about privacy policies Give users tools to set and enforce privacy controls
Colin McKay cmckay@privcom.gc.ca

More Related Content

What's hot

Week 11 the digital divide
Week 11 the digital divideWeek 11 the digital divide
Week 11 the digital divide
tdcjackson
 
Raising awareness on the ramifications of digital divide
Raising awareness on the ramifications of digital divideRaising awareness on the ramifications of digital divide
Raising awareness on the ramifications of digital divide
NOMZAMO TYEKU
 
Ramifications of Digital Divide
Ramifications of Digital DivideRamifications of Digital Divide
Ramifications of Digital Divide
Kerry Thomas
 
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and HanutDigital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
smuench
 
Iamcr 2010 presentation
Iamcr 2010 presentationIamcr 2010 presentation
Iamcr 2010 presentation
davidbrake
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
smuench
 
Cmat 101 Group Project
Cmat 101 Group ProjectCmat 101 Group Project
Cmat 101 Group Project
darnay12
 

What's hot (19)

We Media - The Digital Divide
We Media - The Digital DivideWe Media - The Digital Divide
We Media - The Digital Divide
 
Week 11 the digital divide
Week 11 the digital divideWeek 11 the digital divide
Week 11 the digital divide
 
Digital divide
Digital divideDigital divide
Digital divide
 
Cyberhate Workshop: How Young People Use Social Media by Youth Cymru
Cyberhate Workshop: How Young People Use Social Media by Youth CymruCyberhate Workshop: How Young People Use Social Media by Youth Cymru
Cyberhate Workshop: How Young People Use Social Media by Youth Cymru
 
Raising awareness on the ramifications of digital divide
Raising awareness on the ramifications of digital divideRaising awareness on the ramifications of digital divide
Raising awareness on the ramifications of digital divide
 
Online Spiritual Civilization (1)
Online Spiritual Civilization (1)Online Spiritual Civilization (1)
Online Spiritual Civilization (1)
 
Sample essay on the future of digital media
Sample essay on the future of digital mediaSample essay on the future of digital media
Sample essay on the future of digital media
 
Ramifications of Digital Divide
Ramifications of Digital DivideRamifications of Digital Divide
Ramifications of Digital Divide
 
Digital divide pp
Digital divide ppDigital divide pp
Digital divide pp
 
Introduction to the Global Digital Divide
Introduction to the Global Digital DivideIntroduction to the Global Digital Divide
Introduction to the Global Digital Divide
 
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and HanutDigital Divide Powerpoint by Sam, Michael, Eduard and Hanut
Digital Divide Powerpoint by Sam, Michael, Eduard and Hanut
 
Globalisation
GlobalisationGlobalisation
Globalisation
 
Join the Coalition: Media Justice is Social Justice
Join the Coalition: Media Justice is Social JusticeJoin the Coalition: Media Justice is Social Justice
Join the Coalition: Media Justice is Social Justice
 
Iamcr 2010 presentation
Iamcr 2010 presentationIamcr 2010 presentation
Iamcr 2010 presentation
 
From digital consumption to production and interaction
From digital consumption to production and interactionFrom digital consumption to production and interaction
From digital consumption to production and interaction
 
Digital Divide Powerpoint
Digital Divide PowerpointDigital Divide Powerpoint
Digital Divide Powerpoint
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cmat 101 Group Project
Cmat 101 Group ProjectCmat 101 Group Project
Cmat 101 Group Project
 
All In: The Internet's Turbulent Next Decade
All In: The Internet's Turbulent Next DecadeAll In: The Internet's Turbulent Next Decade
All In: The Internet's Turbulent Next Decade
 

Similar to Social media, activism and privacy

8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
sodhi3
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
blondellchancy
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideas
nelliesk
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
The Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docxThe Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docx
mehek4
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
Kelly Ratkovic
 

Similar to Social media, activism and privacy (15)

Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 
Pillars of the Digital Age 2015
Pillars of the Digital Age 2015Pillars of the Digital Age 2015
Pillars of the Digital Age 2015
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
 
Emtech2.pptx
Emtech2.pptxEmtech2.pptx
Emtech2.pptx
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideas
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Ppt2
Ppt2Ppt2
Ppt2
 
The Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docxThe Digital Divide Revisited Opportunity for all requires som.docx
The Digital Divide Revisited Opportunity for all requires som.docx
 
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Social Media And The Public Service Part1and2
Social Media And The Public Service Part1and2Social Media And The Public Service Part1and2
Social Media And The Public Service Part1and2
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
 
A Deferred Action For Childhood Arrivals (DACA) Report
A Deferred Action For Childhood Arrivals (DACA) ReportA Deferred Action For Childhood Arrivals (DACA) Report
A Deferred Action For Childhood Arrivals (DACA) Report
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Social media, activism and privacy

  • 1. ‘With the rush to be online, is there still a place for privacy?’ May 15, 2009
  • 2.
  • 3. We’ve moved beyond experimentation Forget about the 11 million Canadians on Facebook – the Pope has a YouTube channel!
  • 4. Community building and technology go hand-in-hand in Canada
  • 5. Our idea of community is changing - rapidly
  • 6. Many communities are subtly shaped 1/3 By marketers Sick boy w/ the Cool T shirt
  • 7. Many communities are subtly shaped 2/3 By activists
  • 8. Many communities are subtly shaped 3/3 By politicians
  • 9. How are communities defined today? Not by shared history Not by vague affinities But by action
  • 10. Canadians are learning how to: establish an online identity express themselves - forcefully expect more – from everybody
  • 11. What is the effect on government? tech-savvy activists aren’t waiting for us to act they are creating the tools and the resources they are making information free and flexible
  • 12. The examples are international, pt. 1 In the United Kingdom, the government is experimenting with: Online consultations Ministerial blogs Twittering of Prime Ministerial visits abroad
  • 13. The examples are international, pt. 2 In the United States, the administration is forcing: Increased transparency Open access to government data and info More responsive processes Implementing all the tools at once
  • 14. Canadians are learning to expect a response: quickly with authority and with a solution
  • 15. Which isn’t really our strength
  • 16. What are WE doing in response? Monitoring Developing pilot projects Rolling out tools appropriate to the situation
  • 17. Crisis Communications: a perfect example Public Health Agency’s H1N1 outreach efforts Public Safety’s Emergency Preparedness Campaign
  • 18. Public Education: digital tools prove flexible youthprivacy.ca dpi.priv.gc.ca blog.privcom.gc.ca
  • 19.
  • 20. What about privacy? The process of creating and maintaining an online identity is messy
  • 21. Our understanding of privacy evolves over time cultural differences generational differences
  • 22. What was that about messy? online tools are constantly evolving privacy protections vary from site to site, and from service to service Canadians are still learning what information to share, and what to safeguard
  • 23. If Canadians were cautious, rational and unemotional, they would: second guess every decision to share personal information with their social networks constantly audit the information collected about them by online services, corporations and governments
  • 24. Canadians face two significant privacy challenges Many sites continue to collect too much personal information They’re learning how build online relationships with friends, colleagues, businesses and governments
  • 25. Their biggest obstacle? Every conversation online is treated just like a chat at the dinner table But there’s a permanent record of it
  • 26. The repercussions are real employment risks social ostracism civil and criminal consequences
  • 27. The particular risks of public sector participation Experience in the U.K. and the US has shown that public sector employees are reluctant to use social media. The U.K. and New Zealand governments have established very simple guidelines that encourage innovation but emphasize responsibility.
  • 28. Conclusion Provide users with the tools to control their own personal information Establish an environment that encourages the use of these new tools – by citizens and by employees Set clear guidelines about how and when you will use these tools to communicate with Canadians.
  • 29. Bridging the Gaps Aim for better mutual understanding and accommodation Provide clear, user-friendly information about privacy policies Give users tools to set and enforce privacy controls