Escolar Documentos
Profissional Documentos
Cultura Documentos
Michael Liu
University of Waterloo
Textbook Chapter 04
Responsibility
Accountability
Liability
Due process
1.
2.
3.
4.
5.
Technology Trends
10
Relationship Awareness
Google and
Privacy
Online
Surveillance
Video source: YouTube
11
12
Name
Gender
Age
Your
Name:
Birthplace
(aaway
famous
Get
from
School
attended
my daughter,
Hobby/Interest
your freak!
Photo
Su Shiyou
Chinese
general)
Hug?
Hollywood
actress Gwyneth
Paltrow named
her daughter
Apple.
Image Source: http://globelogger.com/2009/11/uncovering-steve-jobs-presentation-secrets.html
http://photos.ibibo.com/photo/4731301/funny-baby-pictures-kissing-a
15
Source:
http://www.escapistmagazine.com/forums/r
ead/7.79407-Student-Teacher-Fired-LosesCollege-Degree-for-Drunken-MySpace-Pic
16
How it is interpreted
Misunderstood, embarrassed, intentional or accidental
17
18
20
Dual
Dual ownership
Glass
21
Image Source:
http://www.someecards.com/usercards/viewcard/MjAxMi
1jNjFkOTEyMjE4NDQ4YzQ2
22
Challenges
Image Source: http://www.theadminzone.com/forums/showthread.php?p=672116
23
Figure 4-4
24
25
The users favorite movies include "The Princess Bride," "50 First
Dates" and "10 Things I Hate About You." It knows she enjoys the "Sex
and the City" series. It knows the user browses entertainment news
and likes to take quizzes.
Source:
http://online.wsj.com/article/SB1000142405274870394090457
5395073512989404.html
A study done by AT&T in fall 2009 found tracking technologies
on 80% of the top 1000 popular sites
Challenges
26
http://www.usadata.com/
http://www.charitybase.net/
Selling and buying data is a multibillion dollar
business, largely unregulated
Choicepoint is one of the largest data broker in
the world
IRS signed a five-year $200M contract to access its
data
Data source: public filing, financial records, loan
applications provided by police department, school
district, department of motor vehicles, local courts.
27
29
Source: http://www.marketingpilgrim.com/2013/04/online-privacy-is-dead-says-study-and-millennials-are-okay-with-that.html
30
Better product
and service
Invasion of
privacy
31
Information is the new sugar. Big data, Big sugar. Get candy, get candy, get
candy.
Because big data is like big sugar. The more ubiquitous, abundant, pleasurable,
efficient, and profitable it is, the more we want it. And, sometimes, the more we want it,
the more blinded we are by its consequences.
In short, the architecture of every technology includes a number of design choices. Some
design choices create default positions. For example, a cars default position is stop.
When we enter a car and turn it on, the car is in park. For safetys sake, its design
requires that we consciously put it in gear in order to go. Although it would be possible to
design things the other way around, we recognize the danger of a car that defaults to go
rather than stop. And we have regulated against it.
Under current law, almost all of the privacy safeguards built into privacy legislation can be
easily circumvented by anyone who provides goods or services by way of standard form
agreements. By requiring users click I agree to their terms on a take-it-or-leave-it basis,
companies can use contract law to sidestep privacy obligations. In short, this is based on a
mistaken approach to the issue of consent.
Source: http://iankerr.ca/content/2012/06/18/my-appearance-beforeethi/#more-1541
32
33
Trade Secret
Intellectual work or product belonging to
business, provided it is not in the public
domain
Supreme Court test for breach of confidence:
1. Information conveyed must be confidential
2. Information must have been
communicated in confidence
3. Information must have been misused by
the party to whom it was communicated
34
Unsettled issue
Apple vs. Microsoft
Apple vs. Samsung
Reverse engineering
35
36
37
The
Center for Copyright Information employs the services of
http://readwrite.com/2013/03/12/isp-sixMarkMonitor (often doing business as DtecNet) to detect and monitor
strikes-anti-piracy-systemsuspected
copyright infringement activity. The system of alerts is as
follows:
infographic#awesm=~o8EpVsljnJ0UCJ
The first and second alerts will notify ISP subscribers that their
account has allegedly been used for copyright infringement
Internet
http://en.wikipedia.org/wiki/Copyright_Alert
via the use of bittorrent and provide an explanation of how to avoid
_System
future offenses, as well as direct users to lawful media content
site.[14]
If the users behavior persists, a third and fourth alert will be sent.
These alerts will ask the subscriber to acknowledge receipt of the
messages by clicking a notice.
After a fifth alert, ISPs will be allowed to take "mitigation measures"
to prevent future infringement.
If the ISP did not institute a mitigation measure following the fifth
alert, it must enact one after the sixth alert.
38
39
40
42
43
44
Figure 4-8
45
Figure 4-7
46
47
48
49
Picture source:
http://www.canadiandesignresource.ca/officialgallery/wp-content/uploads/2010/07/logo.jpg
http://www.cba.org/nb/Images/logo_main.gif
http://www.cips.ca/
50
http://www.thestar.com/business/article/10
54396--playing-angry-birds-at-work-costsemployers-1-5-billion
51
Figure 4-3
52
53
US allows Opt-out
But PIPEDA (Canada) requires opt-in, same
for European countries
54
Industrial Solution
- Privacy Seal
IBM
MS
AC
FB
55
56
57
P3P Standard
Figure 4-6
58