210 likes | 406 Views
Privacy on the WEB. Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme. Topics. Privacy Enablers of Privacy Invasion Methods of Protection Government Regulation. Privacy on the WEB. Is there really any? “You’ve got mail”, but is it secure?
E N D
Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme
Topics • Privacy • Enablers of Privacy Invasion • Methods of Protection • Government Regulation
Privacy on the WEB Is there really any? “You’ve got mail”, but is it secure? Does a company have the right to profile your Internet use? Do you have the right to know if your are being “watched”? Do others have the right to gather personal data without your knowledge or permission?
Privacy – Intro. Invasion of privacy intentional intrusion upon the solitude or seclusion of another that is highly offensive to a reasonable person (Webster’s) Privacy on the WEB Refers to security and confidentiality of personal and/or financial information
Privacy – Intro. • Forbes article • 56% of Americans are “very concerned” • 86% of computer user believe business should get explicit permission before collecting data • Expect federal and state regulatory agencies to take notice Forbes ASAP February 19,2001
Why the recent concern? • Profiling – on-line retailers collect data to target individual preferences for direct solicitation • Selling of marketing lists Data has always been available but not with the current easy of access
Privacy • Personal • Anonymity is still widespread on the Internet but information is collected • Workplace • 66% of 500 firms conduct electronic surveillance • 27% monitor email • Consumer Relationships • Collection of personal information for profiling
What has enabled the invasion? Wide spread use of the Internet & E-mail • Cooperative Browsers • Cookies • Track personal usage • Anonymous or customized • Persistent or Session
What has enabled the invasion? • WEB Banners • Can use cookies • Setup on many sites to track patterns • WEB Bugs • 1-pixel gif file setup on the WEB page or sent via email • Undetectable by ant-cookie filters • Can run executable code
What has enabled the invasion? • Spyware • Email monitoring • WEB use monitoring • Data interception • Email interception • Naïve Users • High-speed Internet access • Wireless Internet access • Free Internet access
What has enabled the invasion? • Inadequate Business Practices • Outdated email protocols • Trusted networks • Poor user maintenance on unused accounts • Instant messaging • Inadequate firewalls
What has enabled the invasion? • Vendor – Back Doors Code written into programs to allow the developer of the software to circumvent security • Examples • RealJukebox • Alexa • Cuecat • Microsoft • Barbie
Has your privacy been Compromised? • 411 Locate, InfoUSA, 555-1212 • List phone numbers and email addresses • Bigfoot • Email addresses • YBLost, Stalker Site • Links to just about anything
Methods of Protection • Individual • Anonymity • Education • Protection software • HW & SW • VPN (Virtual Private Network) • Encryption
Methods of Protection • Businesses • Good security • Control email • Monitor systems • Corporate Privacy Policies • Cybersurance
Government Regulation • Carnivore • FBI email monitoring • Federal Trade Commission • FTC Fair Information Practices • Notice • Choice • Access • Security
Government Regulation • USA does not have a comprehensive e-commerce privacy bill • Children's Online Privacy Protection Act • 13 years and younger • Parental consent to collect information • Refrain from re-distribution of identifiable information • Best effort to discourage posting of contact information • No special offers
Government Regulation • Privacy Bills Currently in Congress • Spyware Control and Privacy Protection Act • Electronic Privacy Protection Act • Consumer Online Privacy and Disclosure Act • Consumer Internet Privacy Enhancement Act
Government Regulation • Non-Government Privacy Organizations • CERT Coordination Center • Online Privacy Alliance • Platform for Privacy Preferences Project (P3P)
Government Regulation • International : European Union • 1998 law requiring personal information on the Internet to be: • Accurate • Current • Gathered fairly and lawfully • Processed and used for a specified legitimate purpose • Kept no longer than deemed necessary;y to fulfill the stated purpose
Conclusion • Need for strong laws • Consumers need to be fully informed and educated • Privacy Policies • Tenacious in fighting for privacy