SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Privacy
and data
protection
PREPARED BY Daudi Hissan Mwahasanga
1
What We Will Cover
PREPARED BY Daudi Hissan Mwahasanga
2
 Privacy and Computer Technology
 “Big Brother is Watching You”
 Privacy Topics
 Protecting Privacy
introduction
PREPARED BY Daudi Hissan Mwahasanga
3
 Privacy has become one of the hottest topics in
information security at the beginning of the 21st
century. Many organizations are collecting,
swapping, and selling personal information as a
commodity, and many people are looking to
governments for protection of their privacy.
 The ability to collect information, combine facts
from separate sources, and merge it all with other
information has resulted in databases of
information that were previously impossible to set
up.
What is Privacy?
PREPARED BY Daudi Hissan Mwahasanga
4
 Can you State which one is not observed or
free from public attention among the following?
i.e person, communication or information.
 Take a look on your phone!!!
 How much information do you have in it after
performing the following and how sure you
are, they are safe!
PREPARED BY Daudi Hissan Mwahasanga5
WHAT IS A PRIVACY?
PREPARED BY Daudi Hissan Mwahasanga
6
A state in which one is not observed or
disturbed by other people. or
right to control, edit, manage, and delete
information about themselves and decide when,
how, and to what extent information is
communicated to others.
Categories of privacy
1. physical: restriction on others to experience a
person or situation through one or
more of human senses.
2. information: restriction on searching for or
revealing facts that are
unknown or unknowble to others.
3. Decisional: restriction on interfering in
decisions that are exclusive to an entity.
4. Dispositional: restriction on attempts to know
an individual's state of mind.
PREPARED BY Daudi Hissan Mwahasanga
7
Key Aspects of Privacy
PREPARED BY Daudi Hissan Mwahasanga
8
 Freedom from intrusion (being left alone)
 Control of information about oneself
 Freedom from surveillance (being tracked,
followed, watched and eavesdrop upon)
Evolution o the concept
privacy
 Printing press era: individual thoughts need
not to be shared.
 Era of photography and Mass Media: right to
be left alone.
 Era of Databases: individuals, groups and
insititutions can control when, how and to what
extent their information is communicated.
 Era of Smart Environment: privacy linked
with identity and both emerge within a
particular context
PREPARED BY Daudi Hissan Mwahasanga
9
Example in fecebook
PREPARED BY Daudi Hissan Mwahasanga
10
 Although you might not pay anything upfront to go on face-
book but they still make money by selling your personal
information to the advertisers.
 How?
 By clicking AGREE to terms and services. This may create a
room for them to misuse them.
 Also the government monitor the conversation, transactions,
and location we visit in order to fight against cybercrime and
terrorism.
 How?
 By legally allowing companies to store peoples information for
a long period time in order to access them if needed.
Data brokers
PREPARED BY Daudi Hissan Mwahasanga
11
 These are businesses specialized in creating
the profiles for every individual and selling to
companies for advertisement purpose.
 Each profile can have up to 1500 data points
including personal sexuality, browsing history,
political view(affiliation) , and even medical
record.
 For example one US data broker ACXIOM
CLAIMS TO HAVE FILE OF 10% OF WORLD
POPULATION.
CASE STUDIES
PREPARED BY Daudi Hissan Mwahasanga
12
WHAT HAPPENED
PREPARED BY Daudi Hissan Mwahasanga
13
 FBI asked APPLE to modify the system but
apple refused. Why?
 Because of SECURITY VS PRIVACY:
 At the end FBI found a vulnerability to crack a
phone and the issue was over.
 but if the case could have gone to court then:
it could
AMBIGUITIES OF PRIVACY
PREPARED BY Daudi Hissan Mwahasanga
14
 In legal term privacy isn’t the absolute right.
Why?
 This means it can be restricted for certain
reason such as i. protection of national security
ii . Public safety
iii. Or if it contrast with other right
Threats to privacy may come as
PREPARED BY Daudi Hissan Mwahasanga
15
 Intentional institutional uses of personal data
 Unauthorized use or release by insiders
 Theft of information
 Inadvertent leakage through negligence
 One’s own actions (unaware of the risks and
tradeoffs)
 accidental (sometimes quite careless) loss.
 Cookies (i.e files a website stores on a visitor’s
computer.)
New Technology, New Risks:
WHY?
PREPARED BY Daudi Hissan Mwahasanga
16
 Government and private databases
 Sophisticated tools for surveillance and data
analysis
 Vulnerability of data
New Technology, New Risks
PREPARED BY Daudi Hissan Mwahasanga
17
 Computers, the Internet, and a whole array of
digital devices—with their astounding
increases in speed, storage space, and
connectivity—make the collection, searching,
analysis, storage, access, and distribution of
huge amounts of information and images
much easier, cheaper, and faster than ever
before.
 These are great benefits. But when the
information is about us, the same capabilities
threaten our privacy.
Cont…
PREPARED BY Daudi Hissan Mwahasanga
18
 Today there are thousands (probably millions)
of databases, both government and private,
containing personal information about us.
 In the past, there was simply no record of
some of this information, such as our specific
purchases of groceries and books.
Privacy and Computer Technology
(cont.)
PREPARED BY Daudi Hissan Mwahasanga
19
Terminology:
 Invisible information gathering - collection of
personal information about someone without
the person’s knowledge
 Secondary use - use of personal information
for a purpose other than the one it was
provided for
Terminology (cont.):
PREPARED BY Daudi Hissan Mwahasanga
20
 Data mining - searching and analyzing
masses of data to find patterns and develop
new information or knowledge
 Computer matching - combining and
comparing information from different
databases (using social security number, for
example, to match records
Terminology (cont.):
PREPARED BY Daudi Hissan Mwahasanga
21
 Computer profiling - analyzing data in
computer files to determine characteristics of
people most likely to engage in certain
behavior
Principles for Data Collection and
Use:
PREPARED BY Daudi Hissan Mwahasanga
22
 Informed consent
 Opt-in and opt-out policies
 Fair Information Principles (or Practices)
 Data retention
Fair Information Principles
PREPARED BY Daudi Hissan Mwahasanga
23
Privacy and Computer Technology
Discussion Questions
PREPARED BY Daudi Hissan Mwahasanga
24
 Have you seen opt-in and opt-out choices?
Where?
 What are some common elements of privacy
policies you have read?
"Big Brother is Watching You"
PREPARED BY Daudi Hissan Mwahasanga
25
Databases/communication infrastructure:
 Most government offices collects/stores some
form of electronic data e.g. TRA, NIDA,
hospitals, etc.
 Use of communication infrastructure owned
partly/wholly by the government
 Surveillance cameras – increased security and
decreased privacy
"Big Brother is Watching You"
(cont.)
PREPARED BY Daudi Hissan Mwahasanga
26
 Article 16(1) ‘…every person is entitled to
respect and protection of his person, the
privacy of his own person, his family and of his
matrimonial life, and respect and protection of
his residence and private communications...’
"Big Brother is Watching You"
(cont.)
PREPARED BY Daudi Hissan Mwahasanga
27
 Article 16(2) ‘…for the purpose of preserving
the person’s right in accordance with this
Article, the state authority shall lay down legal
procedures regarding the circumstances,
manner and extent to which the right to
privacy, security of his person, his property
and residence may be enchroached upon
without prejudice...’
"Big Brother is Watching You"
(cont.) Discussion Questions::
PREPARED BY Daudi Hissan Mwahasanga
28
 What data does the government have about
you?
 Who has access to the data?
Diverse Privacy Topics
PREPARED BY Daudi Hissan Mwahasanga
29
Marketing, Personalization and Consumer
Dossiers:
 Targeted marketing
– Data mining
– Paying for consumer information
– Data firms and consumer profiles
 Credit records
Diverse Privacy Topics
CONTINUE…….
PREPARED BY Daudi Hissan Mwahasanga
30
Location Tracking:
 Global Positioning Systems (GPS) -computer
or communication services that know exactly
where a person is at a particular time
 Cell phones and other devices are used for
location tracking
 Pros and cons
What We Do Ourselves:
PREPARED BY Daudi Hissan Mwahasanga
31
 Personal information in blogs and online profiles
 Pictures of ourselves and our families
 File sharing and storing
 Is privacy old-fashioned?
– Young vs. old people
– May not understand the risks
 Identity theft
Diverse Privacy Topics
CONTINUE…….
PREPARED BY Daudi Hissan Mwahasanga
32
Children:
 The Internet
– Not able to make decisions on when to provide
information
– Vulnerable to online predators
 Parental monitoring
– Software to monitor Web usage
– Web cams to monitor children while parents are
at work
– GPS tracking via cell phones
Diverse Privacy Topics
Discussion Questions
PREPARED BY Daudi Hissan Mwahasanga
33
 Is there information that you have posted to
the Web that you later removed? Why did you
remove it? Were there consequences to
posting the information?
 Have you seen information that others have
posted about themselves that you would not
reveal about yourself?
Protecting Privacy
PREPARED BY Daudi Hissan Mwahasanga
34
Technology and Markets:
 Privacy enhancing-technologies for consumers
(s/w and h/w based solutions)
 Encryption
 Business tools and policies for protecting data
Protecting Privacy (cont.)
PREPARED BY Daudi Hissan Mwahasanga
35
Contrasting Viewpoints:
 Free Market View
– Freedom of consumers to make voluntary
agreements
– Diversity of individual tastes and values
– Response of the market to consumer preferences
– Usefulness of contracts
– Flaws of regulatory solutions
Protecting Privacy (cont.)
PREPARED BY Daudi Hissan Mwahasanga
36
Contrasting Viewpoints (cont.):
 Consumer Protection View
– Uses of personal information
– Costly and disruptive results of errors in
databases
– Ease with which personal information leaks out
– Consumers need protection from their own lack of
knowledge, judgment, or interest
Protecting Privacy (cont.)
PREPARED BY Daudi Hissan Mwahasanga
37
International agreements on protection of
privacy and personal information:
 Article 12 The Universal Declaration on Human
Rights 1948
 Article 4.3 Declaration of Principles on Freedom
of Expression in Africa 2002
THANKS FOR LISTENING
PREPARED BY Daudi Hissan Mwahasanga
38

Weitere ähnliche Inhalte

Was ist angesagt?

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
DATA GOVERNANCE
DATA GOVERNANCEDATA GOVERNANCE
DATA GOVERNANCEVivastream
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three ActsLilian Edwards
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three ActsLilian Edwards
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulationcjw119
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?Stuart Bailey
 

Was ist angesagt? (18)

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
DATA GOVERNANCE
DATA GOVERNANCEDATA GOVERNANCE
DATA GOVERNANCE
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
The Death of Privacy in Three Acts
The Death of Privacy in Three ActsThe Death of Privacy in Three Acts
The Death of Privacy in Three Acts
 
the Death of Privacy in Three Acts
the Death of Privacy in Three Actsthe Death of Privacy in Three Acts
the Death of Privacy in Three Acts
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Big Data and You
Big Data and YouBig Data and You
Big Data and You
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 

Ähnlich wie Presentation3

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementClinosolIndia
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?ANSItunCERT
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Harsh Tripathi
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxsadia456189
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfDaviesParker
 
data privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacydata privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacyJohnFelix45
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 

Ähnlich wie Presentation3 (17)

PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data Management
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Privacy
PrivacyPrivacy
Privacy
 
Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
9th
9th9th
9th
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdf
 
data privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacydata privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacy
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 

Mehr von ITNet

lecture 8 b main memory
lecture 8 b main memorylecture 8 b main memory
lecture 8 b main memoryITNet
 
lecture 9.pptx
lecture 9.pptxlecture 9.pptx
lecture 9.pptxITNet
 
lecture 10.pptx
lecture 10.pptxlecture 10.pptx
lecture 10.pptxITNet
 
lecture 11.pptx
lecture 11.pptxlecture 11.pptx
lecture 11.pptxITNet
 
lecture 12.pptx
lecture 12.pptxlecture 12.pptx
lecture 12.pptxITNet
 
lecture 13.pptx
lecture 13.pptxlecture 13.pptx
lecture 13.pptxITNet
 
lecture 15.pptx
lecture 15.pptxlecture 15.pptx
lecture 15.pptxITNet
 
kandegeeee.pdf
kandegeeee.pdfkandegeeee.pdf
kandegeeee.pdfITNet
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01ITNet
 
Cp 111 5 week
Cp 111 5 weekCp 111 5 week
Cp 111 5 weekITNet
 
Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020ITNet
 
Tn 110 lecture 8
Tn 110 lecture 8Tn 110 lecture 8
Tn 110 lecture 8ITNet
 
Tn 110 lecture 2 logic
Tn 110 lecture 2 logicTn 110 lecture 2 logic
Tn 110 lecture 2 logicITNet
 
Tn 110 lecture 1 logic
Tn 110 lecture 1 logicTn 110 lecture 1 logic
Tn 110 lecture 1 logicITNet
 
internet
internetinternet
internetITNet
 
Im 111 lecture 1
Im 111   lecture 1Im 111   lecture 1
Im 111 lecture 1ITNet
 
development study perspective full
development study perspective fulldevelopment study perspective full
development study perspective fullITNet
 
Gender issues in developement
Gender issues in developementGender issues in developement
Gender issues in developementITNet
 

Mehr von ITNet (20)

lecture 8 b main memory
lecture 8 b main memorylecture 8 b main memory
lecture 8 b main memory
 
lecture 9.pptx
lecture 9.pptxlecture 9.pptx
lecture 9.pptx
 
lecture 10.pptx
lecture 10.pptxlecture 10.pptx
lecture 10.pptx
 
lecture 11.pptx
lecture 11.pptxlecture 11.pptx
lecture 11.pptx
 
lecture 12.pptx
lecture 12.pptxlecture 12.pptx
lecture 12.pptx
 
lecture 13.pptx
lecture 13.pptxlecture 13.pptx
lecture 13.pptx
 
lecture 15.pptx
lecture 15.pptxlecture 15.pptx
lecture 15.pptx
 
kandegeeee.pdf
kandegeeee.pdfkandegeeee.pdf
kandegeeee.pdf
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Cp 121 lecture 01
Cp 121 lecture 01Cp 121 lecture 01
Cp 121 lecture 01
 
Cp 111 5 week
Cp 111 5 weekCp 111 5 week
Cp 111 5 week
 
Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020Teofilo kisanji university mbeya (TEKU) ambassador 2020
Teofilo kisanji university mbeya (TEKU) ambassador 2020
 
Tn 110 lecture 8
Tn 110 lecture 8Tn 110 lecture 8
Tn 110 lecture 8
 
Tn 110 lecture 2 logic
Tn 110 lecture 2 logicTn 110 lecture 2 logic
Tn 110 lecture 2 logic
 
Tn 110 lecture 1 logic
Tn 110 lecture 1 logicTn 110 lecture 1 logic
Tn 110 lecture 1 logic
 
internet
internetinternet
internet
 
Im 111 lecture 1
Im 111   lecture 1Im 111   lecture 1
Im 111 lecture 1
 
development study perspective full
development study perspective fulldevelopment study perspective full
development study perspective full
 
Gender issues in developement
Gender issues in developementGender issues in developement
Gender issues in developement
 

Kürzlich hochgeladen

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Presentation3

  • 1. Privacy and data protection PREPARED BY Daudi Hissan Mwahasanga 1
  • 2. What We Will Cover PREPARED BY Daudi Hissan Mwahasanga 2  Privacy and Computer Technology  “Big Brother is Watching You”  Privacy Topics  Protecting Privacy
  • 3. introduction PREPARED BY Daudi Hissan Mwahasanga 3  Privacy has become one of the hottest topics in information security at the beginning of the 21st century. Many organizations are collecting, swapping, and selling personal information as a commodity, and many people are looking to governments for protection of their privacy.  The ability to collect information, combine facts from separate sources, and merge it all with other information has resulted in databases of information that were previously impossible to set up.
  • 4. What is Privacy? PREPARED BY Daudi Hissan Mwahasanga 4  Can you State which one is not observed or free from public attention among the following? i.e person, communication or information.  Take a look on your phone!!!  How much information do you have in it after performing the following and how sure you are, they are safe!
  • 5. PREPARED BY Daudi Hissan Mwahasanga5
  • 6. WHAT IS A PRIVACY? PREPARED BY Daudi Hissan Mwahasanga 6 A state in which one is not observed or disturbed by other people. or right to control, edit, manage, and delete information about themselves and decide when, how, and to what extent information is communicated to others.
  • 7. Categories of privacy 1. physical: restriction on others to experience a person or situation through one or more of human senses. 2. information: restriction on searching for or revealing facts that are unknown or unknowble to others. 3. Decisional: restriction on interfering in decisions that are exclusive to an entity. 4. Dispositional: restriction on attempts to know an individual's state of mind. PREPARED BY Daudi Hissan Mwahasanga 7
  • 8. Key Aspects of Privacy PREPARED BY Daudi Hissan Mwahasanga 8  Freedom from intrusion (being left alone)  Control of information about oneself  Freedom from surveillance (being tracked, followed, watched and eavesdrop upon)
  • 9. Evolution o the concept privacy  Printing press era: individual thoughts need not to be shared.  Era of photography and Mass Media: right to be left alone.  Era of Databases: individuals, groups and insititutions can control when, how and to what extent their information is communicated.  Era of Smart Environment: privacy linked with identity and both emerge within a particular context PREPARED BY Daudi Hissan Mwahasanga 9
  • 10. Example in fecebook PREPARED BY Daudi Hissan Mwahasanga 10  Although you might not pay anything upfront to go on face- book but they still make money by selling your personal information to the advertisers.  How?  By clicking AGREE to terms and services. This may create a room for them to misuse them.  Also the government monitor the conversation, transactions, and location we visit in order to fight against cybercrime and terrorism.  How?  By legally allowing companies to store peoples information for a long period time in order to access them if needed.
  • 11. Data brokers PREPARED BY Daudi Hissan Mwahasanga 11  These are businesses specialized in creating the profiles for every individual and selling to companies for advertisement purpose.  Each profile can have up to 1500 data points including personal sexuality, browsing history, political view(affiliation) , and even medical record.  For example one US data broker ACXIOM CLAIMS TO HAVE FILE OF 10% OF WORLD POPULATION.
  • 12. CASE STUDIES PREPARED BY Daudi Hissan Mwahasanga 12
  • 13. WHAT HAPPENED PREPARED BY Daudi Hissan Mwahasanga 13  FBI asked APPLE to modify the system but apple refused. Why?  Because of SECURITY VS PRIVACY:  At the end FBI found a vulnerability to crack a phone and the issue was over.  but if the case could have gone to court then: it could
  • 14. AMBIGUITIES OF PRIVACY PREPARED BY Daudi Hissan Mwahasanga 14  In legal term privacy isn’t the absolute right. Why?  This means it can be restricted for certain reason such as i. protection of national security ii . Public safety iii. Or if it contrast with other right
  • 15. Threats to privacy may come as PREPARED BY Daudi Hissan Mwahasanga 15  Intentional institutional uses of personal data  Unauthorized use or release by insiders  Theft of information  Inadvertent leakage through negligence  One’s own actions (unaware of the risks and tradeoffs)  accidental (sometimes quite careless) loss.  Cookies (i.e files a website stores on a visitor’s computer.)
  • 16. New Technology, New Risks: WHY? PREPARED BY Daudi Hissan Mwahasanga 16  Government and private databases  Sophisticated tools for surveillance and data analysis  Vulnerability of data
  • 17. New Technology, New Risks PREPARED BY Daudi Hissan Mwahasanga 17  Computers, the Internet, and a whole array of digital devices—with their astounding increases in speed, storage space, and connectivity—make the collection, searching, analysis, storage, access, and distribution of huge amounts of information and images much easier, cheaper, and faster than ever before.  These are great benefits. But when the information is about us, the same capabilities threaten our privacy.
  • 18. Cont… PREPARED BY Daudi Hissan Mwahasanga 18  Today there are thousands (probably millions) of databases, both government and private, containing personal information about us.  In the past, there was simply no record of some of this information, such as our specific purchases of groceries and books.
  • 19. Privacy and Computer Technology (cont.) PREPARED BY Daudi Hissan Mwahasanga 19 Terminology:  Invisible information gathering - collection of personal information about someone without the person’s knowledge  Secondary use - use of personal information for a purpose other than the one it was provided for
  • 20. Terminology (cont.): PREPARED BY Daudi Hissan Mwahasanga 20  Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge  Computer matching - combining and comparing information from different databases (using social security number, for example, to match records
  • 21. Terminology (cont.): PREPARED BY Daudi Hissan Mwahasanga 21  Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior
  • 22. Principles for Data Collection and Use: PREPARED BY Daudi Hissan Mwahasanga 22  Informed consent  Opt-in and opt-out policies  Fair Information Principles (or Practices)  Data retention
  • 23. Fair Information Principles PREPARED BY Daudi Hissan Mwahasanga 23
  • 24. Privacy and Computer Technology Discussion Questions PREPARED BY Daudi Hissan Mwahasanga 24  Have you seen opt-in and opt-out choices? Where?  What are some common elements of privacy policies you have read?
  • 25. "Big Brother is Watching You" PREPARED BY Daudi Hissan Mwahasanga 25 Databases/communication infrastructure:  Most government offices collects/stores some form of electronic data e.g. TRA, NIDA, hospitals, etc.  Use of communication infrastructure owned partly/wholly by the government  Surveillance cameras – increased security and decreased privacy
  • 26. "Big Brother is Watching You" (cont.) PREPARED BY Daudi Hissan Mwahasanga 26  Article 16(1) ‘…every person is entitled to respect and protection of his person, the privacy of his own person, his family and of his matrimonial life, and respect and protection of his residence and private communications...’
  • 27. "Big Brother is Watching You" (cont.) PREPARED BY Daudi Hissan Mwahasanga 27  Article 16(2) ‘…for the purpose of preserving the person’s right in accordance with this Article, the state authority shall lay down legal procedures regarding the circumstances, manner and extent to which the right to privacy, security of his person, his property and residence may be enchroached upon without prejudice...’
  • 28. "Big Brother is Watching You" (cont.) Discussion Questions:: PREPARED BY Daudi Hissan Mwahasanga 28  What data does the government have about you?  Who has access to the data?
  • 29. Diverse Privacy Topics PREPARED BY Daudi Hissan Mwahasanga 29 Marketing, Personalization and Consumer Dossiers:  Targeted marketing – Data mining – Paying for consumer information – Data firms and consumer profiles  Credit records
  • 30. Diverse Privacy Topics CONTINUE……. PREPARED BY Daudi Hissan Mwahasanga 30 Location Tracking:  Global Positioning Systems (GPS) -computer or communication services that know exactly where a person is at a particular time  Cell phones and other devices are used for location tracking  Pros and cons
  • 31. What We Do Ourselves: PREPARED BY Daudi Hissan Mwahasanga 31  Personal information in blogs and online profiles  Pictures of ourselves and our families  File sharing and storing  Is privacy old-fashioned? – Young vs. old people – May not understand the risks  Identity theft
  • 32. Diverse Privacy Topics CONTINUE……. PREPARED BY Daudi Hissan Mwahasanga 32 Children:  The Internet – Not able to make decisions on when to provide information – Vulnerable to online predators  Parental monitoring – Software to monitor Web usage – Web cams to monitor children while parents are at work – GPS tracking via cell phones
  • 33. Diverse Privacy Topics Discussion Questions PREPARED BY Daudi Hissan Mwahasanga 33  Is there information that you have posted to the Web that you later removed? Why did you remove it? Were there consequences to posting the information?  Have you seen information that others have posted about themselves that you would not reveal about yourself?
  • 34. Protecting Privacy PREPARED BY Daudi Hissan Mwahasanga 34 Technology and Markets:  Privacy enhancing-technologies for consumers (s/w and h/w based solutions)  Encryption  Business tools and policies for protecting data
  • 35. Protecting Privacy (cont.) PREPARED BY Daudi Hissan Mwahasanga 35 Contrasting Viewpoints:  Free Market View – Freedom of consumers to make voluntary agreements – Diversity of individual tastes and values – Response of the market to consumer preferences – Usefulness of contracts – Flaws of regulatory solutions
  • 36. Protecting Privacy (cont.) PREPARED BY Daudi Hissan Mwahasanga 36 Contrasting Viewpoints (cont.):  Consumer Protection View – Uses of personal information – Costly and disruptive results of errors in databases – Ease with which personal information leaks out – Consumers need protection from their own lack of knowledge, judgment, or interest
  • 37. Protecting Privacy (cont.) PREPARED BY Daudi Hissan Mwahasanga 37 International agreements on protection of privacy and personal information:  Article 12 The Universal Declaration on Human Rights 1948  Article 4.3 Declaration of Principles on Freedom of Expression in Africa 2002
  • 38. THANKS FOR LISTENING PREPARED BY Daudi Hissan Mwahasanga 38