Privacy

=Privacy=

**A futuristic example**
Final Cut - Watch the video sections and identify from this futuristic what the issues are about ‘The Final Cut’.

**Exagerated example**
Play the video clip at the following: [|www.aclu.org/pizza/index.html]

Watch and listen to the video clip and describe the issue raised by this pizza order.

Read Gift of Fire Chapter 2  Main Risks · Unauthorized use by insiders, the people who maintain the info · Inadvertent leakage of info through negligence or carelessness and access my intruders · Propagation of errors and the harm caused by them · Intentional uses (marketing, decision making and surveillance) that some people find objectionable 3 key aspects of Privacy · Freedom from intrusion, being left alone · Control of information about oneself · Freedom from surveillance (being watched) // Discuss the risks and key aspects of privacy //
 * Real Life Examples**

In the news there have been numerous examples where privacy rights have been invaded.

In 2005, there were concerns about cookies, ‘Google Desktop’; The Sony BMG system XCP which protected the copying of their cds.

In 2006 they were looking at the iTunes store as being a problem. Visit the BBC News Technology pages and search for the following article: Snooping fears plague new iTunes. If you wish – look up these issues.

In 2007, experts identify that the biggest threat to Internet users identify is themselves. More and more personal data is given by users to register for sites. // ..and answer the following questions: // a How would someone gather personal information about you on the Internet? b. Describe some of the personal details that we easily give away? c. Describe some of the uses for this information and by whom d. Describe the sorts of sites that we give our information to e. How can you have privacy on a social networking site f. What should you look for in a site before giving personal information
 * Identity Theft**
 * 1) // Read Feature: Identity Theft PC Pro June 2007 p 140 – 142 //

Privacy and the Internet & Social Networking Sites

The Information Commissioners Office, revealed in a press release 23 Nov 07 that 4.5 million young Brits’ futures could be compromised by their electronic footprint. The survey reveals that content from SNS could damage prospects of young people and leave them open to identity fraud. 2. Visit the site [] and read about how to stay safe while on a SNS. a. Outline the top tips to stay safe online b. Outline the purpose of the Data Protection Act Inside Story: watch DVD and answer worksheet on Power and Privacy

// Are you being watched? RFID tags and an invasion of privacy. // //3. //// Read the article ‘Are you being watched? PC Pro 2004 and answer the following questions. // // [] // And a more recent article: Everywhere at Once, PC Magazine p5, Malaysia, March 2007 and a more indepth read on RFID tags read How Stuff Works How RFID Works? [] 4. Describe the issues raised in this article about using RFID tags in passports.
 * Privacy & RFID Tags**
 * 1) What does RFID stand for?
 * 2) Describe the three types of RFID Tags?
 * 3) How did M&S satisfy the potential privacy concerns?
 * 4) Describe how RFID tags work.
 * 5) Describe the privacy concerns.

For more on this topic visit: []


 * Big Brother Britain**

More than 4 million surveillance cameras monitor our every move, making Britain the most watched nation in the world. Even in Brunei, more CCTV cameras are being installed, Giant Supermarket in Rimba has them by the checkouts and HSBC bank has them fitted in the ceilings. No signs indicate that CCTV cameras are in operation. Is this an invasion of our privacy? Are we being filmed without our permission? What happens to the video footage? Who has access to it? What is it being used for. <span style="font-family: Verdana; mso-list: Ignore; msofareastfontfamily: Verdana; msobidifontfamily: Verdana; msolist: Ignore;">5. In class discuss the increased use of CCTV in Brunei.

2008 BBC News, Anger over pupils database Plan, 13/02/08 The British Govt are planning on setting up a database of pupils exam results and personal information. The aim is to give employers access to this information so that school leavers cannot fake their qualifications. <span style="font-family: Verdana; mso-list: Ignore; msofareastfontfamily: Verdana; msobidifontfamily: Verdana; msolist: Ignore;">6. Describe why critics are up in arms about this plan?
 * Privacy and Storage of data**

Also in 2008, British Government announced that they are going to set up a giant database to store all the information about our calls, texts, emails and website hits. <span style="font-family: Verdana; mso-list: Ignore; msofareastfontfamily: Verdana; msobidifontfamily: Verdana; msolist: Ignore;">7. Read the article Daily Mail, 16th July 2008 – Big Brothers Gone too far. <span style="font-family: Verdana; mso-list: Ignore; msofareastfontfamily: Verdana; msobidifontfamily: Verdana; msolist: Ignore;">c. Outline the purpose of this database <span style="font-family: Verdana; mso-list: Ignore; msofareastfontfamily: Verdana; msobidifontfamily: Verdana; msolist: Ignore;">d. Identify the data recorded. <span style="font-family: Verdana; mso-list: Ignore; msofareastfontfamily: Verdana; msobidifontfamily: Verdana; msolist: Ignore;">e. Outline the concerns raised by critics.

Read the article: ITPro Data thefts and loss is in the UK – Timeline to support the view that we cannot trust the government to keep data secure


 * Google’s Tracking Service Raises Privacy Concerns,**

February 2009. A new google service Google Latitude allows users to share their physical locations among a network of friends from their smart phones. Concerns include whether or not Google will have to give Govts this information if asked; lack of safeguards from someone secretly opting into the tracking system on someone elses device.

Phorm’s online ad-tracking service called Webwise. This is when adverts that appear on the webpage you are viewing, takes into account what you are reading, what you read before and uses this to make assumptions about what you might want to buy and plugs adverts of these products.
 * Phorm – is it a privacy risk?**

Read the following article to find out more: []

Back