Privacy


Introduction


A futuristic example


Final Cut - Watch the video sections and identify from this futuristic what the issues are about ‘The Final Cut’.

Exagerated example


Play the video clip at the following: www.aclu.org/pizza/index.html

Watch and listen to the video clip and describe the issue raised by this pizza order.

Read Gift of Fire Chapter 2

Main Risks
· Unauthorized use by insiders, the people who maintain the info
· Inadvertent leakage of info through negligence or carelessness and access my intruders
· Propagation of errors and the harm caused by them
· Intentional uses (marketing, decision making and surveillance) that some people find objectionable

3 key aspects of Privacy
· Freedom from intrusion, being left alone
· Control of information about oneself
· Freedom from surveillance (being watched)


Discuss the risks and key aspects of privacy

Real Life Examples

In the news there have been numerous examples where privacy rights have been invaded.

In 2005, there were concerns about cookies, ‘Google Desktop’; The Sony BMG system XCP which protected the copying of their cds.

In 2006 they were looking at the iTunes store as being a problem.
Visit the BBC News Technology pages and search for the following article:
Snooping fears plague new iTunes.
If you wish – look up these issues.

Identity Theft
In 2007, experts identify that the biggest threat to Internet users identify is themselves. More and more personal data is given by users to register for sites.

  1. Read Feature: Identity Theft PC Pro June 2007 p 140 – 142
..and answer the following questions:
a How would someone gather personal information about you on the Internet?
b. Describe some of the personal details that we easily give away?
c. Describe some of the uses for this information and by whom
d. Describe the sorts of sites that we give our information to
e. How can you have privacy on a social networking site

f. What should you look for in a site before giving personal information

Privacy and the Internet & Social Networking Sites

The Information Commissioners Office, revealed in a press release 23 Nov 07 that 4.5 million young Brits’ futures could be compromised by their electronic footprint. The survey reveals that content from SNS could damage prospects of young people and leave them open to identity fraud.

2. Visit the site http://www.ico.gov.uk/youth.aspx and read about how to stay safe while on a SNS.

a. Outline the top tips to stay safe online
b. Outline the purpose of the Data Protection Act

Inside Story: watch DVD and answer worksheet on Power and Privacy

Privacy & RFID Tags

Are you being watched? RFID tags and an invasion of privacy.
3. Read the article ‘Are you being watched? PC Pro 2004 and answer the following questions.
http://www.pcpro.co.uk/features/58487/are-you-being-watched/page5.html

    1. What does RFID stand for?
    2. Describe the three types of RFID Tags?
    3. How did M&S satisfy the potential privacy concerns?
    4. Describe how RFID tags work.
    5. Describe the privacy concerns.

And a more recent article: Everywhere at Once, PC Magazine p5, Malaysia, March 2007 and a more indepth read on RFID tags read How Stuff Works How RFID Works?
http://www.howstuffworks.com/rfid.htm/printable

4. Describe the issues raised in this article about using RFID tags in passports.

For more on this topic visit: http://www.spychips.com/

Big Brother Britain

More than 4 million surveillance cameras monitor our every move, making Britain the most watched nation in the world. Even in Brunei, more CCTV cameras are being installed, Giant Supermarket in Rimba has them by the checkouts and HSBC bank has them fitted in the ceilings. No signs indicate that CCTV cameras are in operation. Is this an invasion of our privacy? Are we being filmed without our permission? What happens to the video footage? Who has access to it? What is it being used for.

5. In class discuss the increased use of CCTV in Brunei.

Privacy and Storage of data
2008 BBC News, Anger over pupils database Plan, 13/02/08 The British Govt are planning on setting up a database of pupils exam results and personal information. The aim is to give employers access to this information so that school leavers cannot fake their qualifications.

6. Describe why critics are up in arms about this plan?


Also in 2008, British Government announced that they are going to set up a giant database to store all the information about our calls, texts, emails and website hits.

7. Read the article Daily Mail, 16th July 2008 – Big Brothers Gone too far.
c. Outline the purpose of this database
d. Identify the data recorded.
e. Outline the concerns raised by critics.

Read the article: ITPro Data thefts and loss is in the UK – Timeline to support the view that we cannot trust the government to keep data secure


Google’s Tracking Service Raises Privacy Concerns,

February 2009. A new google service Google Latitude allows users to share their physical locations among a network of friends from their smart phones. Concerns include whether or not Google will have to give Govts this information if asked; lack of safeguards from someone secretly opting into the tracking system on someone elses device.

Phorm – is it a privacy risk?
Phorm’s online ad-tracking service called Webwise. This is when adverts that appear on the webpage you are viewing, takes into account what you are reading, what you read before and uses this to make assumptions about what you might want to buy and plugs adverts of these products.

Read the following article to find out more:
http://www.guardian.co.uk/technology/2008/mar/06/internet.privacy/print


Back