2. What We Will Cover
PREPARED BY Daudi Hissan Mwahasanga
2
Privacy and Computer Technology
“Big Brother is Watching You”
Privacy Topics
Protecting Privacy
3. introduction
PREPARED BY Daudi Hissan Mwahasanga
3
Privacy has become one of the hottest topics in
information security at the beginning of the 21st
century. Many organizations are collecting,
swapping, and selling personal information as a
commodity, and many people are looking to
governments for protection of their privacy.
The ability to collect information, combine facts
from separate sources, and merge it all with other
information has resulted in databases of
information that were previously impossible to set
up.
4. What is Privacy?
PREPARED BY Daudi Hissan Mwahasanga
4
Can you State which one is not observed or
free from public attention among the following?
i.e person, communication or information.
Take a look on your phone!!!
How much information do you have in it after
performing the following and how sure you
are, they are safe!
6. WHAT IS A PRIVACY?
PREPARED BY Daudi Hissan Mwahasanga
6
A state in which one is not observed or
disturbed by other people. or
right to control, edit, manage, and delete
information about themselves and decide when,
how, and to what extent information is
communicated to others.
7. Categories of privacy
1. physical: restriction on others to experience a
person or situation through one or
more of human senses.
2. information: restriction on searching for or
revealing facts that are
unknown or unknowble to others.
3. Decisional: restriction on interfering in
decisions that are exclusive to an entity.
4. Dispositional: restriction on attempts to know
an individual's state of mind.
PREPARED BY Daudi Hissan Mwahasanga
7
8. Key Aspects of Privacy
PREPARED BY Daudi Hissan Mwahasanga
8
Freedom from intrusion (being left alone)
Control of information about oneself
Freedom from surveillance (being tracked,
followed, watched and eavesdrop upon)
9. Evolution o the concept
privacy
Printing press era: individual thoughts need
not to be shared.
Era of photography and Mass Media: right to
be left alone.
Era of Databases: individuals, groups and
insititutions can control when, how and to what
extent their information is communicated.
Era of Smart Environment: privacy linked
with identity and both emerge within a
particular context
PREPARED BY Daudi Hissan Mwahasanga
9
10. Example in fecebook
PREPARED BY Daudi Hissan Mwahasanga
10
Although you might not pay anything upfront to go on face-
book but they still make money by selling your personal
information to the advertisers.
How?
By clicking AGREE to terms and services. This may create a
room for them to misuse them.
Also the government monitor the conversation, transactions,
and location we visit in order to fight against cybercrime and
terrorism.
How?
By legally allowing companies to store peoples information for
a long period time in order to access them if needed.
11. Data brokers
PREPARED BY Daudi Hissan Mwahasanga
11
These are businesses specialized in creating
the profiles for every individual and selling to
companies for advertisement purpose.
Each profile can have up to 1500 data points
including personal sexuality, browsing history,
political view(affiliation) , and even medical
record.
For example one US data broker ACXIOM
CLAIMS TO HAVE FILE OF 10% OF WORLD
POPULATION.
13. WHAT HAPPENED
PREPARED BY Daudi Hissan Mwahasanga
13
FBI asked APPLE to modify the system but
apple refused. Why?
Because of SECURITY VS PRIVACY:
At the end FBI found a vulnerability to crack a
phone and the issue was over.
but if the case could have gone to court then:
it could
14. AMBIGUITIES OF PRIVACY
PREPARED BY Daudi Hissan Mwahasanga
14
In legal term privacy isn’t the absolute right.
Why?
This means it can be restricted for certain
reason such as i. protection of national security
ii . Public safety
iii. Or if it contrast with other right
15. Threats to privacy may come as
PREPARED BY Daudi Hissan Mwahasanga
15
Intentional institutional uses of personal data
Unauthorized use or release by insiders
Theft of information
Inadvertent leakage through negligence
One’s own actions (unaware of the risks and
tradeoffs)
accidental (sometimes quite careless) loss.
Cookies (i.e files a website stores on a visitor’s
computer.)
16. New Technology, New Risks:
WHY?
PREPARED BY Daudi Hissan Mwahasanga
16
Government and private databases
Sophisticated tools for surveillance and data
analysis
Vulnerability of data
17. New Technology, New Risks
PREPARED BY Daudi Hissan Mwahasanga
17
Computers, the Internet, and a whole array of
digital devices—with their astounding
increases in speed, storage space, and
connectivity—make the collection, searching,
analysis, storage, access, and distribution of
huge amounts of information and images
much easier, cheaper, and faster than ever
before.
These are great benefits. But when the
information is about us, the same capabilities
threaten our privacy.
18. Cont…
PREPARED BY Daudi Hissan Mwahasanga
18
Today there are thousands (probably millions)
of databases, both government and private,
containing personal information about us.
In the past, there was simply no record of
some of this information, such as our specific
purchases of groceries and books.
19. Privacy and Computer Technology
(cont.)
PREPARED BY Daudi Hissan Mwahasanga
19
Terminology:
Invisible information gathering - collection of
personal information about someone without
the person’s knowledge
Secondary use - use of personal information
for a purpose other than the one it was
provided for
20. Terminology (cont.):
PREPARED BY Daudi Hissan Mwahasanga
20
Data mining - searching and analyzing
masses of data to find patterns and develop
new information or knowledge
Computer matching - combining and
comparing information from different
databases (using social security number, for
example, to match records
21. Terminology (cont.):
PREPARED BY Daudi Hissan Mwahasanga
21
Computer profiling - analyzing data in
computer files to determine characteristics of
people most likely to engage in certain
behavior
22. Principles for Data Collection and
Use:
PREPARED BY Daudi Hissan Mwahasanga
22
Informed consent
Opt-in and opt-out policies
Fair Information Principles (or Practices)
Data retention
24. Privacy and Computer Technology
Discussion Questions
PREPARED BY Daudi Hissan Mwahasanga
24
Have you seen opt-in and opt-out choices?
Where?
What are some common elements of privacy
policies you have read?
25. "Big Brother is Watching You"
PREPARED BY Daudi Hissan Mwahasanga
25
Databases/communication infrastructure:
Most government offices collects/stores some
form of electronic data e.g. TRA, NIDA,
hospitals, etc.
Use of communication infrastructure owned
partly/wholly by the government
Surveillance cameras – increased security and
decreased privacy
26. "Big Brother is Watching You"
(cont.)
PREPARED BY Daudi Hissan Mwahasanga
26
Article 16(1) ‘…every person is entitled to
respect and protection of his person, the
privacy of his own person, his family and of his
matrimonial life, and respect and protection of
his residence and private communications...’
27. "Big Brother is Watching You"
(cont.)
PREPARED BY Daudi Hissan Mwahasanga
27
Article 16(2) ‘…for the purpose of preserving
the person’s right in accordance with this
Article, the state authority shall lay down legal
procedures regarding the circumstances,
manner and extent to which the right to
privacy, security of his person, his property
and residence may be enchroached upon
without prejudice...’
28. "Big Brother is Watching You"
(cont.) Discussion Questions::
PREPARED BY Daudi Hissan Mwahasanga
28
What data does the government have about
you?
Who has access to the data?
29. Diverse Privacy Topics
PREPARED BY Daudi Hissan Mwahasanga
29
Marketing, Personalization and Consumer
Dossiers:
Targeted marketing
– Data mining
– Paying for consumer information
– Data firms and consumer profiles
Credit records
30. Diverse Privacy Topics
CONTINUE…….
PREPARED BY Daudi Hissan Mwahasanga
30
Location Tracking:
Global Positioning Systems (GPS) -computer
or communication services that know exactly
where a person is at a particular time
Cell phones and other devices are used for
location tracking
Pros and cons
31. What We Do Ourselves:
PREPARED BY Daudi Hissan Mwahasanga
31
Personal information in blogs and online profiles
Pictures of ourselves and our families
File sharing and storing
Is privacy old-fashioned?
– Young vs. old people
– May not understand the risks
Identity theft
32. Diverse Privacy Topics
CONTINUE…….
PREPARED BY Daudi Hissan Mwahasanga
32
Children:
The Internet
– Not able to make decisions on when to provide
information
– Vulnerable to online predators
Parental monitoring
– Software to monitor Web usage
– Web cams to monitor children while parents are
at work
– GPS tracking via cell phones
33. Diverse Privacy Topics
Discussion Questions
PREPARED BY Daudi Hissan Mwahasanga
33
Is there information that you have posted to
the Web that you later removed? Why did you
remove it? Were there consequences to
posting the information?
Have you seen information that others have
posted about themselves that you would not
reveal about yourself?
34. Protecting Privacy
PREPARED BY Daudi Hissan Mwahasanga
34
Technology and Markets:
Privacy enhancing-technologies for consumers
(s/w and h/w based solutions)
Encryption
Business tools and policies for protecting data
35. Protecting Privacy (cont.)
PREPARED BY Daudi Hissan Mwahasanga
35
Contrasting Viewpoints:
Free Market View
– Freedom of consumers to make voluntary
agreements
– Diversity of individual tastes and values
– Response of the market to consumer preferences
– Usefulness of contracts
– Flaws of regulatory solutions
36. Protecting Privacy (cont.)
PREPARED BY Daudi Hissan Mwahasanga
36
Contrasting Viewpoints (cont.):
Consumer Protection View
– Uses of personal information
– Costly and disruptive results of errors in
databases
– Ease with which personal information leaks out
– Consumers need protection from their own lack of
knowledge, judgment, or interest
37. Protecting Privacy (cont.)
PREPARED BY Daudi Hissan Mwahasanga
37
International agreements on protection of
privacy and personal information:
Article 12 The Universal Declaration on Human
Rights 1948
Article 4.3 Declaration of Principles on Freedom
of Expression in Africa 2002