Title: Privacy
1Seating plan for today
Front of room
Front 3 rows Last name ends in A..H
Middle N rows Last name ends in I..Q
Back 3 rows Last name ends in R..Z
Back of room
2What is Privacy?
3Contents
- What are rights (continued)
- Rights claims and obligations
- Sidebar Hohfeld in cyberspace
- What is privacy?
- Activity Privacy vs. freedom of expression
- Sidebar conceptual metaphors for abstract
ideas - Privacy and security metaphors used in policies
- Fair Information Practices privacy by design
- Activity Consumer information
- The right to be let alone
- Activity Definining Spam
4Contents
- What are rights (continued)
- Rights claims and obligations
- What is privacy?
- Activity Privacy vs. freedom of expression
- Sidebar conceptual metaphors for abstract
ideas - Privacy and security metaphors used in policies
- Fair Information Practices privacy by design
- Activity Consumer information
- The right to be let alone
- Activity Definining Spam
5What is a right?
By the way, did anyone find out which
philosopher's mummy is on display?
- Inherent in being human?
- Human rights vs. nonsense on stilts
- Right to do/right to demand
- Negative vs. positive
- Rights as shorthand for mutual obligation/permissi
on relationships - Rights claims
- Can we develop a logic of rights or obligations
- Deontic logic for policy enforcement
6Hohfeld Krogh on rights
- Claim(i,j,A)
- I have a claim from them that A
- Im entitled that data about me be accurate
- Liberty(i,j,A)
- Im free to A (if I want to)
- We can decide to use the data you give us, but we
dont have to - Power(i,j,A)
- I am empowered by them to see to it that A (but
its up to me whether I do). - Immunity(i,j,A)
- They grant me A as an immunity
- Govt. is obliged not to do anything that leads to
my not being protected from self-incrimination
- NoRight(i,j,A)
- I have no right to happiness (but Im not
forbidden it either) - Duty(i,j,A)
- I have a duty to them to A
- Eckerd is obliged to store the data securely
- Disability(i,j,A)
- Obligation to refrain from seeing to it that
not A - Liability(i,j,A)
- I am liable to them for A
- Or They are not obliged to refrain from
requiring A of me
7Privacy is...
- Security
- Privacy Confidentiality
- Autonomy
- Privacy The right to be let alone
- Property
- Privacy Freedom from intrusion
8Slipperiness of concepts
- Perhaps we mean too many different things?
- Perhaps we cannot formalize (and therefore
enforce through code) unless we restrict
application? - Perhaps we need to understand how people really
think about abstract concepts like privacy?
9Contents
- What are rights (continued)
- Rights claims and obligations
- What is privacy?
- Activity Privacy vs. freedom of expression
- Sidebar conceptual metaphors for abstract
ideas - Privacy and security metaphors used in policies
- Fair Information Practices privacy by design
- Activity Consumer information
- The right to be let alone
- Activity Definining Spam
10Some grounded metaphors (Lakoff Johnson)
- important big
- difficulty burden
- more up
- type of inside
- similar near
- degree position
- arch. phys. struct.
- help support
- time motion
- change motion
- state place
- action self-propulsion
- purpose destination
- purpose desired thing
- cause force
- relationship enclosure
- control be above
- know see
- understand grasp
- see touch
11Intrusion is movement inside
My information
Unwelcome intrusion
12Access/Intrusion is movement inside
Regardless of whether Eckerd uses your
information, we will store it securely and will
not allow it to be accessed or used by any person
or entity not affiliated with Eckerd Corporation,
other than under the conditions described below...
My information
Access
13Disclosure is movement away
Hackers PC
My PC
My credit card number
14Disclosure is movement away
Other parties
In addition, we may ask you if you would like to
receive information about health care issues or
other products and services. If you indicate
that you would, we may also use your personal
identifying information to ... or (2) create
customer lists or other data summaries which may
be shared with the companies within the J.C.
Penney family of companies.
Company
Personal information
15Retraction is movement back
Other parties
You may remove your personal identifying
information from our records. If you have
submitted personal identifying information to
Eckerd, and you wish to have it removed from our
records, please tell us by sending an e-mail to
us at the following address In addition, if
you have given consent for Eckerd or other
members of the J.C. Penney family of companies to
contact you, and you decide that you do not wish
to be contacted any further, please e-mail us to
let us know. Your request will be processed with
all reasonable speed. You will be notified when
the removal has been completed.
Company
Personal information
16Disclosure is social exchange
Disclosed information
Service in return
Information Subject
Business/ Govt.
17Disclosure is social exchange
Disclosed information
If you do send personal identifying information
to Eckerd, we may use it for reasonable business
purposeswithout further consent from you or
obligation to you.
Service in return
Information Subject
Business/ Govt.
18Disclosure is social exchange
Disclosed information
In addition, we may ask you if you would like to
receive information about health care issues or
other products and services. If you indicate
that you would, we may also use your personal
identifying information to (1) contact you about
Eckerd programs and/or to seek additional
input from you regarding your experiences with
Eckerd
Service in return
Information Subject
Business/ Govt.
19Rights and obligations are magnitudes
20Rights and obligations are magnitudes
Confidential pharmacy information will not be
used by Eckerd, Express Pharmacy Services, or
Eckerd Health Services, except for those
limited purposes currently permitted under state
and federal law, such as for review by a treating
physician, for purposes of processing
payment, pursuant to subpoena or court order, or
to provide you with health information that you
may find useful, and the like.
21Contents
- What are rights (continued)
- Rights claims and obligations
- What is privacy?
- Activity Privacy vs. freedom of expression
- Sidebar conceptual metaphors for abstract
ideas - Privacy and security metaphors used in policies
- Fair Information Practices privacy by design
- Activity Consumer information
- The right to be let alone
- Activity Definining Spam
22Fair Information Principles
- Notice and awareness
- Choice and consent
- Adequate security and integrity
- Access and participation
- Enforcement and/or redress
- Related concepts
- Anonymity and pseudonymity
- Proximity and locality
23Fair Information Practices (1)
- Openness and transparency
- No secret record keeping
- Individual participation
- subject can access challenge
- Collection limitation
- Data collection proportional and not excessive
given purpose - Data quality
- Data relevant to purposes and kept up to date
24Fair Information Practices (2)
- Use limitation
- For specific purpose
- By authorized personnel
- Reasonable security
- Adequate safeguards given datas sensitivity
- Accountability
- Record keepers accountable for compliance
25Privacy-relevant Properties of Ubiquitous
computing (contrast Mgt. Info. Sys.)
- Ubiquity
- (gt accountability, choice)
- Invisibility
- (gt secrecy/choice)
- Sensory augmentation
- (gt use limitations)
- Memory amplification
- (gt use limitations)
26Contents
- What are rights (continued)
- Rights claims and obligations
- What is privacy?
- Activity Privacy vs. freedom of expression
- Sidebar conceptual metaphors for abstract
ideas - Privacy and security metaphors used in policies
- Fair Information Practices privacy by design
- Activity Consumer information
- The right to be let alone
- Activity Definining Spam
27Points to take away
- Concepts arent clear
- Morality/legality of rights as logic vs. concepts
of privacy as metaphors - Privacy isnt just security
- Rights over information use, accuracy, personal
representation, freedom from intrusion - Privacy conflicts with other rights
- If it is a right
- Privacy by design imposes big information
management requirements on systems - Spam, Spam, Spam, Spam
28For next time
- Read chapter on encryption
- We will be concerned mainly with privacy from
Government - Especially law-enforcement uses of personal
information - And Government-mandated privacy policy
- Especially healthcare records under HIPAA