Week 13: Privacy

1 / 21
About This Presentation
Title:

Week 13: Privacy

Description:

Portions of these s were taken from and lecture materials authored by ... 2003: MA Court on gay marriage: combo of privacy and equal protection. ... – PowerPoint PPT presentation

Number of Views:20
Avg rating:3.0/5.0
Slides: 22
Provided by: eric118

less

Transcript and Presenter's Notes

Title: Week 13: Privacy


1
Week 13 Privacy
  • Eric Cook
  • ericcook_at_umich.edu
  • Guest Lecture SI/SOC 110
  • Nov. 25, 2008

Portions of these slides were taken from slide
and lecture materials authored by Prof. Robert
Frost.
2
Privacy as space of tension
What is privacy in the information age? At the
boundaries between Hidden ? Public Individual ?
Collective Defined by interactions between Laws
Culture Norms Systems.
3
Photo of Sternlab Body-Laptop Interface from
http//www.flickr.com/photos/bekathwia/2414194397/
4
A few definitions
  • Lewis D. Brandeis, US Supreme Court (1929) the
    right to be left alone.
  • Ruth Gavison three elements in privacy secrecy,
    anonymity and solitude.
  • Fernando Volio Jimenez all human rights are
    aspects of the right to privacy.

5
Four Key Aspects of Privacy
  • Information privacy
  • Bodily privacy
  • Communications privacy
  • Territorial privacy
  • see http//www.privacyinternational.org/survey/ph
    r2003/overview.htmAspects20of20Privacy
  • in this weeks readings for more discussion

6
A Brief History of Privacy
  • The state vs. the people (notice the modern
    terminology) in the British Empire, 1640-1780
  • Traditionally based in security of ones goods
    and property freedom from, rather than freedom
    to. A mans home is his castle.
  • Fourth Amendment protects against unreasonable
    search and seizure there is no explicit right
    to privacy written into US Bill of Rights

7
Contemporary Legal Interpretations of Privacy
  • Fourth Amendment litigation since 1960
  • Griswold v. Connecticut, 1964 Sex information as
    private, restriction on its diffusion as
    invasion of privacy.
  • Roe v. Wade, 1973 The privacy of reproductive
    choice decisions.
  • Lawrence v. Texas, 2003 overturned Bowers v.
    Hardwick, 1986 privacy of choices about sexual
    orientation.
  • 2003 MA Court on gay marriage combo of privacy
    and equal protection.

8
Again, what is privacy in the information age?
  • Privacy as right.
  • Privacy as negotiation.
  • Privacy as trade-off.
  • Negotiations ongoing -- at level of the
    individual, and at the level of society

9
Example Medical Records
  • Legally vs. functionally private Only your
    doctor, your nurses, your hospital administrative
    staff, the billing company, the transcription
    services, the insurance company, and (if you're
    using Google Health) Google's servers have access
    to your secrets.
  • Under HIPAA, you can ask this information not be
    shared with other doctors in the same practice,
    but however, they do not have to agree to do
    what you ask. (quoting from http//www.hhs.gov/oc
    r/hipaa/consumer_rights.pdf)

10
More Examples
  • Online transactions Privacy settings in
    Facebook, secure banking, secure shopping,
    browser cookies.
  • Privacy and Security CCTV surveillance, airport
    watch lists, RFIDed passports.

11
Trade-offs and Tensions
  • Each of these involve different kinds of
    tradeoffs and tensions.
  • Tensions between different agendas of interests,
    agenda that may be opposing or at least not
    always aligned or considerate of one another.

12
Potential Benefits of Revealing Information
  • Personalized Services
  • Customization of Information
  • Payments (in form of discounts/customer loyalty
    programs)
  • Convenience
  • Safety/Security

13
Downsides of Revealing
  • Profiling (individually and in the aggregate)
  • Tracking (by govt, by companies, by individuals)
  • Unauthorized unexpected reuse in other contexts
  • Loss of control of your information

14
Technology New Opportunities, New Issues
  • Data mining in various forms Network science
    new modes of analysis on large datasets example,
    Netflix de-anonymization.
  • Breakdowns
  • at the technical level -- system "hiccups"
    revealing data.
  • at the people level -- people leaving laptops at
    the airport.
  • New contexts for negotiation example, Google
    maps street view

15
Localized Contexts are Now Globally Accessible
Google maps screenshot image from
http//blog.wired.com/27bstroke6/2007/05/request_f
or_urb.html
16
Illusions of privacy
  • Lack of transparency, or the illusion of privacy.
  • You can't see anyone looking at you, so you feel
    like a setting is safe/anonymous.
  • Except, er..

17
It isnt.
EtherPEG screengrab image from SXSW06 conference
(image source http//flickr.com/photos/riddle/11
1046761)
18
Reuse, transparency and expectations
  • Another example of unexpected reuse downstream
    Usenet data from the early 90s --gt reappears in
    Google groups a decade later.
  • New kinds of automated archives Google caches,
    Internet Archive, etc.
  • Once it is in these archives, how do you get it
    out? and should you? Who decides?

19
Broader Setting A Culture of Surveillance
?
Big Brother Poster image from http//blogs.zdnet.c
om/open-source/?cat72 Big Brother Season 8 cast
image from http//cavenger.wordpress.com
20
So what do we do about this?
  • Anything? Nothing? Give up our embarrassment?
    Webcam out our lives? Assume that government and
    corporations (and our neighbors) have our best
    interests in mind?
  • What do you do about managing your privacy?
  • Not idle questions, because

21
These are decisions.
  • Made by people, in professional settings like
    many of you will be in shortly.
  • Design decisions
  • Technology decisions
  • Management decisions
  • Legal decisions
  • Policy decisions
Write a Comment
User Comments (0)