410 likes | 517 Views
SwE 2642 Professional Practices and Ethics. August 29 Chapter Two: Privacy and Personal Information. About Assignment 1– Due Wed. Questions? Professionals must stay current & this assignment lets you learn about that
E N D
SwE 2642Professional Practices and Ethics August 29 Chapter Two: Privacy and Personal Information
About Assignment 1– Due Wed. Questions? Professionals must stay current & this assignment lets you learn about that Don’t forget that I may be asking for your reference list and article summaries as we go along the course.
Try Hornet Connecthttp://connect.spsu.edu sduggins@spsu.edu sduggins Same as email password
September 5… …is not Labor Day, and we will have a class meeting. Group 8 will present Examples supporting Chapter Two. Please email me your slides and put your name on the slides.
Health and Medicine Computer-aided imaging Monitoring Computer-enhanced instruments Drugs Designing Dispensing Patient records Telemedicine
Assistive Technology Screen readers Speech controls, speech to text Nerve or brain implants Aids in locating things Locating people
Automation Automation of repetitive or dangerous tasks Improvements in product quality Assembly Inspection Automation and jobs
Identifying, Sensing and Tracking Scanners For checkers Self-scanning Smart cards Sensors and active ID tags
Reducing Paper Use and Waste On-line storage Good points Less good points Office automation increasespaper use
Observations Imagining life without computers War and Peace The Brooklyn Bridge Automobiles, airplanes, ships
Data and Privacy What data are collected about individuals? What is the effect of computers on this?
Aspects of Privacy The right to be let aloneMr. Justice Louis D. Brandeis The right to control information about oneself Freedom from surveillance http://www.swiss.ai.mit.edu/classes/6.805/articles/privacy/Privacy_brand_warr2.html
What are the Limits of Privacy? What are the limits? • Your neighbors and friends • Companies and enterprises • Government Is privacy a good thing?
Privacy and Personal Information What is personal information? What is not?
The Risks of Technology To what extent does technology threaten privacy? • Invisible information gathering • Data leakage • Matching and profiling(Whatis profiling, anyway?) • Location and technology
Surveillance Is “Big Brother” watching you? • Constitutional restrictions • Databases • The Privacy Act of 1974 • Computer Matching and Privacy Protection Act of 1988
The Census • Purpose of the Census • Census of 1890 • Use (and abuse?) of Census data • Other “fishing expeditions”
Unauthorized Uses of Information Quis custodiet ipsos custodes?(Who will guard the guards themselves?) –Juvenal Abuses by those authorized to have access • Government • Private businesses
The Fourth Amendment About the Bill of Rights The Fourth Amendment: “the right of the people to be secure in their persons, houses, papers, and effects…
The Weakening of the Fourth Amendment • The USA PATRIOT Act • HIPAA (Health Insurance Portability and Accountability Act) The notion of “expectation of privacy”
Technology and Surveillance • Satellite surveillance • Thermal imaging(Thermal imaging is a “search” that requires a warrant. Kyllo v. United States) • Toll collection • Purchase records • Cell phones
The Supreme Court and the Expectation of Privacy • Olmstead v. United States (1928)Wiretaps • Katz v. United States (1967) Restrictive interpretation on expectation of privacy
Electronic Searches • Metal detectors • Bomb-sniffers • Backscatter X-Ray machines Trade-offs of security and privacy
Your Picture • Security cameras • Face recognition systems • CCTV cameras in England and Canada
Fighting Terrorism What techniques should we use • Profiling ? • Surveillance ? • Photographs and fingerprints ? Where did security break down?
Databases and Marketing How much “junk mail” do you get? Why? How is data mining (comparison of databases by private industry) like database matching by government? How is it different? Why were people opposed to DoubleClick’s matching project?
Children and the Web “On the Internet, nobody knows you’re a dog.” Are children exposed to potentially dangerous situations because of Internet interactions? Is it ethical for an FBI agent to pose as an eleven year old girl on the Internet? What about collection of personal information from children by businesses? Cartoon by Peter Steiner, reproduced from page 61 of July 5, 1993 issue of The New Yorker, (Vol.69 (LXIX) no. 20)
The Social Security Number Social Security Number as ID number Matching Access to information Identity theft The SSN as a national ID number?
National ID Cards Benefits of a national ID card fewer cards to carry(?) harder to forge deter identity theft And the down side? “Your papers, please!” Do you need an ID to work? What about the “Real ID” law? (Passed in 2005; implementation by 2008.)
Health Information Medical databases are replacing paper records Are databases easier or harder to protect? What are the legitimate uses of medical records? Medical records and payment for health care. Medical records and sensitive conditions.
Laws about Medical Privacy HIPAA: Health Insurance Portability and Accountability Act (Administrative Simplifications) Privacy protections Security requirements And also… standardization of identifying codes …government access without a consent requirement
National Health Insurance Can Medicare patients see a “private” doctor? Should there be a national medical record database? Would a national health card turn into a de facto national ID card?
Public Records • Property ownership records • Marriage licenses • Bankruptcy records • Criminal records • What is the effect of computers? • Aircraft flight plans • Judges’ financial disclosures
Public vs. Anonymous • Should any record available “publicly” be available anonymously? • How do you decide? • For on-line records, how do you verify the identity of the person requesting the record?
“Black Boxes” and Surveillance • Many new cars have event data recorders • GPS sensor / recorders • IEEE Spectrum reports that 25% of rental cars now have GPS devices
RFID Tags • Passive radio devices that respond to queries from scanners • 128-bit code (about 31038 codes; enough to identify just about everything on earth!) • Required by Wal-Mart for cartons, pallets in 2005 • Scenario: You visit an anti-war protest with a friend. Later, at the airport, a government database identifies your sweater as havingbeen at the protest.
About Assignment 2 • You will be asked to pick one of five current issues. • “Black boxes” for cars • RFID tags and surveillance • Read ID • New warrantless wiretapping law • “phishing” scams • You will research the issue you pick and follow the directions in the assignment. Note if you pick “phishing”, there are different instructions.
Telemarketing How has the Federal “do not call list” changed the telemarketing business? Is telemarketing a free-speech issue? Why are charities, surveys and political candidates exempt?
Electronic Mail Do you use a business e-mail account? Is it monitored in any way? How do you know? Is spam a free-speech issue?
Children and the Web “On the Internet, nobody knows you’re a dog.” Are children exposed to potentially dangerous situations because of Internet interactions? Is it ethical for an FBI agent to pose as an eleven year old girl on the Internet? What about collection of personal information from children by businesses? Cartoon by Peter Steiner, reproduced from page 61 of July 5, 1993 issue of The New Yorker, (Vol.69 (LXIX) no. 20)