๐Ÿ”’ Privacy in Cyberspace
Master mnemonic โ€” 4 ways cybertechnology changed privacy
A ยท S ยท D ยท K
"Always Stay Data-aware, Know your rights"
A
Amount
More personal data can be collected than ever before โ€” digitised, tiny storage
S
Speed
Records transferred between databases in milliseconds via wireless or cable
D
Duration
Electronic records can be kept indefinitely โ€” forever, with no expiry
K
Kind
Transactional data reveals patterns in preferences, habits, and places travelled
What is privacy? slides 2โ€“3
Privacy (general)The right to be let alone, or freedom from interference or intrusion.
Information PrivacyControl over the flow of one's personal information, including its transfer and exchange.
Privacy as a Social Value (slide 3)Privacy is not just a personal right โ€” it is a necessary condition for other rights such as freedom and personal autonomy. Without privacy, those rights cannot exist.
4 categories of private information โ€” "CHIP" slide 4
C โ€” Communications

Private Communications

All forms of personal communication which a person wishes to keep private โ€” messages, calls, letters.

H โ€” Health

Health / Medical Information

A person has the right to privacy about the nature of their illness. They cannot be forced to disclose it to others.

I โ€” Individual Data

Personal Information

Information referring only to that specific person โ€” e.g. financial information, academic performance.

P โ€” Possessions

Information About Possessions

Closely related to property rights. A person has control over information relating to their personal possessions in certain instances.

3 key cyber-privacy questions slide 7

What data should be collected?

Not all data collection is justified. The scope of collection must be questioned.

What info can be shared with whom?

Who is an authorised recipient? Under what conditions can info be passed on?

To what extent can individuals control it?

How it is gathered, stored, mined, combined, recombined, exchanged, and sold.

Also asked: How long should data be retained? This is a core unresolved question in cyber-privacy law and ethics.
How personal information is used slide 8โ€“9
1

Collected without knowledge or consent

Cybertechnology makes it possible to collect data about individuals without them ever knowing it is happening.

2

Merged โ€” creating electronic profiles

Unrelated pieces of information residing in separate databases can be merged together to construct electronic personal profiles.

3

Matched โ€” cross-database comparison

Information in one database is matched against records in other databases that contain information about us.

4

Mined โ€” revealing hidden patterns

Personal data is mined from databases and web activity to reveal patterns in behaviour that would have been very difficult to discern in the pre-computer era.

Therefore: We need protection to maintain informational privacy. (Slide 10)
Gathering personal data: monitoring, recording, and tracking slide 11
Dataveillance (slide 12โ€“13)The term "dataveillance" is made possible by computer technology. It refers to the use of digital tools to monitor individuals continuously. Examples include:

โ€ข Video cameras monitoring consumers' movements in retail stores
โ€ข Scanning devices used by "intelligent highway vehicle systems"
โ€ข "Invisible supervisors" software โ€” continuously monitors employee activities around the clock without ever failing to record a single action

People's privacy in the workplace is threatened by these devices. It can also lead to a feeling of fear and of always being watched.
Cybertechnology and government surveillance slides 14โ€“17

Government surveillance

Governments and government agencies monitor the activities of citizens โ€” a practice that raises serious privacy concerns. Another mode of surveillance associated with cybertechnology.

Surveillance tools

Some tools are installed using the same type of malicious malware and spyware used by online criminals. They can secretly turn on webcams built into personal laptops and microphones in cell phones that are not being used.

Surveillance Drones / UAS (slides 16โ€“17)
Unmanned Aerial Systems raise significant issues for privacy and civil liberties. Drones in use by law enforcement can carry:
โ€ข Live-feed video cameras  โ€ข Infrared cameras  โ€ข Heat sensors  โ€ข Radar

Some military versions can stay in the air for hours or days, and their high-tech cameras can scan entire cities. They can also carry:
โ€ข Wi-Fi crackers
โ€ข Fake cell phone towers that can determine your location or intercept your texts and phone calls
โ€ข Drone manufacturers even admit they are made to carry "less lethal" weapons such as tasers or rubber bullets.
Internet cookies slides 18โ€“22
DefinitionCookies are files that websites send to and retrieve from the computer systems of web users, enabling website owners to collect information about an individual's online browsing preferences whenever a person visits a website. Data recorded about the user is stored on a file placed on the hard drive of the user's computer system โ€” this can then be retrieved and resubmitted to a website the next time the user accesses that site.
First-party cookies

Legitimate / First-party

Used by legitimate websites to make special offers to returning users and to track the results of their advertising. Generally considered acceptable.

Third-party cookies

Third-party / Tracking cookies

Communicate data about you to an advertising agency which in turn shares that data with other online marketers. Include "tracking cookies" which use your online history to deliver targeted ads.

Privacy concerns with cookies (slide 19)
โ€ข Monitoring and recording an individual's activities without informing the user crosses the privacy line
โ€ข Raises concerns of intrusion into a user's physical space
โ€ข Information gathered via cookies can be acquired by online advertising agencies, which then target that user for online ads

But cookies also provide a service: They customise the user's experience and provide a list of preferences for future visits. Some websites will not grant access unless you accept cookies.
Solutions for regular cookies (slide 20)
โ€ข Privacy-enhancing tools are available
โ€ข Most browsers now allow users to opt-in or opt-out of cookies
โ€ข Requires awareness of cookie technology AND knowledge of how to enable/disable it
โ€ข However: some websites will not grant users access unless they accept cookies.
Flash Cookies / Supercookies (slide 24)
More persistent than regular cookies. Normal procedures for erasing standard cookies, clearing history, erasing the cache, or choosing "delete private data" in the browser will NOT affect flash cookies. They cannot be deleted by any commercially available anti-spyware or adware removal program.

Exception: If you use the Firefox browser, an add-on called Better Privacy can assist in deleting flash cookies.
Fingerprinting slides 25โ€“26
Device Fingerprint / Machine FingerprintA summary of the software and hardware settings collected from a computer or other device. Each device has a different clock setting, fonts, software, and other characteristics that make it unique. When you go online, your device broadcasts these details โ€” they are collected and pieced together to form a unique "fingerprint." That fingerprint is assigned an identifying number and used for similar purposes as a cookie.
Why fingerprinting is replacing cookies (slide 26)
โ€ข Tracking companies are embracing fingerprinting because it is tougher to block than cookies
โ€ข Cookies are subject to deletion and expiration; rendered useless if user switches browsers
โ€ข Some browsers block third-party cookies by default; add-ons enable blocking/removal
โ€ข Unlike cookies and flash cookies, fingerprints leave NO evidence on a user's computer
โ€ข Therefore, it is impossible for you to know when you are being tracked by fingerprinting.
Cross-device tracking slide 27
Cross-Device TrackingOccurs when companies try to connect a consumer's activity across their smartphones, tablets, desktop computers, and other connected devices. The goal is to link a consumer's behaviour across all of their devices. Particularly valuable to advertisers.
Online behavioural tracking slide 28
Who knows what you're doing when you browse the web?
New web technology has created many unexpected ways for corporations to track your web activity without your knowledge. Countless advertising networks are able to secretly monitor you across multiple websites and build detailed profiles of your behaviour and interests.
RFID technology slides 29โ€“32
RFID (Radio Frequency Identification)Consists of a tag (microchip) and a reader. The tag has an electronic circuit which stores data, and an antenna that broadcasts data by radio waves in response to a signal from a reader. The reader contains an antenna that receives the radio signal and a demodulator that transforms the analog radio information into digital data.
Smart RFID

"Smart" RFIDs

Embedded in public transport payment systems. Can be read at limited distance โ€” hold in front of a reader rather than inserting. Also incorporated into automobile keys, inventory control systems, and passports.

Dumb RFID

"Dumb" RFIDs

Basically contain only a number. Used in many products as a replacement for the barcode and in logistics. Such chips could still be used to trace a person once it is known they carry an item containing the chip.

RFID in humans (slide 32)
โ€ข Although commercially intended for identifying real-world objects (e.g. supermarket items), tags can also be used to monitor those objects after they are sold
โ€ข Some nursing homes provide patients with RFID bracelets
โ€ข Chips can be implanted in children so they can be tracked if abducted
โ€ข Because RFID is now embedded in humans โ€” enabling them to be tracked โ€” it has raised serious concerns for privacy advocates.
All tracking technologies โ€” side-by-side comparison
Technology How it works Leaves trace? Can user remove it?
Regular cookies File placed on your hard drive by the website you visit; retrieved on return visits Yes โ€” file on hard drive Yes โ€” via browser settings. But some sites deny access without cookies.
Flash cookies (supercookies) Same concept but more persistent; survives all standard deletion methods Yes โ€” but survives deletion Only via Firefox "Better Privacy" add-on. Standard anti-spyware cannot remove.
Fingerprinting Collects device's unique settings (clock, fonts, software) broadcast when going online No trace at all No โ€” impossible to know you're being tracked
Cross-device tracking Links behaviour across all your devices to build one unified profile Varies Very difficult โ€” no single opt-out
RFID Microchip + antenna; broadcasts data via radio waves to a nearby reader Physical chip Only by removing/shielding the chip
Dataveillance software Runs silently on employer/device systems; records every action 24/7 Only on employer's server No โ€” employee has no control
Surveillance drones UAS with cameras, infrared, Wi-Fi crackers flying overhead No โ€” it's aerial No
Govt spyware Malware-like tools installed on devices; can activate webcam/mic remotely Hidden Rarely โ€” requires specialist detection
Data manipulation methods โ€” Merge, Match, Mine slides 8โ€“9, 47โ€“52
M

Merging (Data-Banking)

Extracting information from two or more unrelated databases and integrating it into a composite file. When organisations merge information about you in a way you did not specifically authorise, the "contextual integrity" of your information has been violated. Problems: the individual is not aware of integration; does not know the purpose; does not know who benefits or whether the information is accurate.

M

Matching (Record Matching)

Cross-checking information in two or more unrelated databases to produce matching records ("hits"). Used by government agencies to create lists of potential law violators. Key point: the user agrees to give information to individual agencies โ€” this does not mean they authorised that information to be exchanged with other agencies. Even if matching helps detect fraud, does that fact alone justify it?

M

Mining (Data Mining)

Employing algorithms to extract patterns from large datasets of user behaviour โ€” sites visited, links clicked, search terms entered. Decisions may affect only online experience (ads shown) or may impact the user in completely different contexts. Big Data profiling creates typical combinations of user properties to predict interests and behaviour โ€” which can lead to refusal of insurance or credit cards, or worse, targeted discrimination.

Exchanging personal data slides 47โ€“52
Core reality (slide 47)
Much of the personal data gathered electronically by one organisation is later exchanged with other organisations. Indeed, the very existence of certain institutions depends on the exchange and sale of personal information.
Merging computerised records slides 48โ€“49
Computer Merging / Data-BankingThe technique of extracting information from two or more unrelated databases that contain information about some individual or group, and integrating that information into a composite file. It occurs whenever two or more disparate pieces of information contained in separate databases are combined.
The main problems with merging (slide 49)
1. The individual is not aware of personal information being integrated into a central database
2. The individual does not know the purpose(s) for which the integration is effected
3. They do not know by whom or for whose benefit the new database is constructed
4. They cannot verify whether the information is accurate
Matching computerised records slides 50โ€“52
Computer MatchingA variation of the technology used to merge computerised records. Involves cross-checking information in two or more unrelated databases to produce matching records, or "hits." Used by government agencies to create lists of potential law violators and individuals who have broken or are suspected of breaking the law.
The key ethical tension (slide 51)
The user agrees to give information to individual agencies. This does NOT mean the user authorised information given to any one agency to be exchanged with other agencies.
The defenders' argument vs the ethical objection (slide 52)
Defenders justify matching because it enables tracking deadbeat parents, welfare cheats, etc. But the question remains: Even if computerised record matching does help extract governmental waste and fraud, would that fact alone justify such a practice?
Cloud computing slide 35

Cloud Computing โ€” new privacy concerns

  • Previously, user data and programs were stored locally โ€” vendors had no access to usage data
  • In cloud computing, both data and programs are online ("in the cloud")
  • It is not always clear what user-generated and system-generated data are used for
  • As data is located elsewhere in the world, it is not always obvious which law applies, or which authorities can demand access
Social media slides 36โ€“37

Default privacy settings

One way to limit over-sharing is requiring default privacy settings to be strict. But even then, this limits access for other users ("friends of friends") โ€” it does not limit access for the service provider itself. Such restrictions also reduce the value and usability of the network.

Web 2.0 & user-generated content

The interactive web poses additional challenges. Social network sites invite users to generate more data to increase the site's value ("your profile is X% complete"). Users exchange personal data for free services, providing both their data and their attention as payment. Users may not be aware of what information they are providing โ€” e.g. the "Like" button on other sites.

Mobile devices slide 38

Mobile privacy risks

  • Mobile devices collect and send more and more data as users become more networked
  • Contain a range of data-generating sensors: GPS (location), movement sensors, cameras
  • Transmit resulting data via the internet or other networks
  • Location data is especially sensitive โ€” links the online world to physical environment
  • Even without GPS, approximate location can be derived by monitoring available wireless networks
  • Physical harm risks: stalking, burglary during holidays, etc.
Data mining slides 39โ€“41
Data MiningUsers generate loads of data when online โ€” not only data explicitly entered, but also statistics on user behaviour: sites visited, links clicked, search terms entered. Data mining extracts patterns from such data, which can then be used to make decisions about the user.
Sources of data that get mined (slide 40)
โ€ข Shopping data  โ€ข Surveillance camera recordings (public and private spaces)  โ€ข Smartcard-based public transport systems

All these data could be used to profile citizens and base decisions upon such profiles. Example: shopping data could be used to send information about healthy food habits โ€” but also for decisions on insurance.
Big Data profiling and discrimination (slide 41)
Big Data may be used in profiling by creating patterns of typical combinations of user properties, which can then be used to predict interests and behaviour. Examples of harm:
โ€ข Profiling could lead to refusal of insurance or a credit card, where profit is the main motive for discrimination
โ€ข Profiling could be used by organisations or governments to discriminate against particular groups โ€” finding targets, denying access to services, or worse.
Internet of Things slide 42

Internet of Things (IoT)

Devices connected to the internet are not limited to user-owned computing devices like smartphones. Many devices contain chips and/or are connected in the so-called Internet of Things. In the home:

  • Smart meters for automatically reading and sending electricity consumption
  • Thermostats and other devices remotely controlled by the owner
  • Such devices generate statistics that can be used for mining and profiling
  • User autonomy is a central theme in considering the privacy implications of IoT devices
E-government slide 43

E-Government

Government and public administration have undergone radical transformations as a result of advanced IT systems. Examples:

  • Biometric passports
  • Online e-government services
  • Voting systems
  • Online citizen participation tools and platforms
  • Online access to recordings of sessions of parliament and government committee meetings
Biometrics slides 44โ€“46
Biometric SystemsDesigned to identify or verify the identity of people by using their intrinsic physical or behavioural characteristics. Biometric identifiers include: fingerprints; iris, face and palm prints; voice; and DNA, among others.

Government case for biometrics

Can be used effectively for border security, to verify employment, to identify criminals, and to combat terrorism.

Private companies' case

Biometrics can enhance our lives by helping us identify friends more easily and by allowing access to places, products, and services more quickly and accurately.

Biometrics' biggest privacy risks (slides 45โ€“46)
โ€ข Government's ability to use biometrics for surveillance โ€” face recognition + high-detail cameras = surreptitious identification and tracking becoming the norm
โ€ข Large standardised collections of biometrics increase the risk of data compromise from which it may be almost impossible to recover
โ€ข In the near future, biometrics could stand in for your driver's licence or social security number
โ€ข Could be required for renting an apartment or seeing a doctor โ€” leading to many vulnerable copies of linked data, potentially in the hands of identity thieves
โ€ข Any data compromise would be catastrophic: unlike a credit card or social security number, your biometric data cannot be revoked or re-issued
Ethical guidelines for the information professional slides 53โ€“57
Core principle (slide 53)
All personal and private information handled by the information professional is regarded as confidential. This implies that the information professional acknowledges the right of the client to control โ€” to a certain extent โ€” any personal and private information, based on the norm of freedom.
Guideline 1 โ€” Merging with caution slide 54

Merging personal information into a different database requires caution

Specifically applicable in situations where the client is not aware of such merging or its implications. The appropriate action is:

  • Inform the client about such merging and its implications
  • Give the client the right of access to the information on the central database
  • Give the client the opportunity to change incorrect information
  • Give the client the right to know who is using the information and for what purpose
  • Based on the norms of human rights, freedom, and truth
Guideline 2 โ€” Informed consent slide 55

Notify clients and obtain permission

The information professional must explicitly notify the client of the intended purposes of all personal and private information. This implies the client's permission.

Implicit informed consent: Companies must diligently inform the person about various uses of the information. Clients must then be given an opportunity to consent or withhold consent. A lack of response implies consent โ€” but the burden is on the client to respond. However, the client must always be granted the opportunity to withdraw consent, based on the norms of human rights.

Guideline 3 โ€” Minimum necessary data slide 56

No unnecessary private information

  • No unnecessary private information must be gathered โ€” not only for logistical reasons but also to prevent the unnecessary violation or exposure of a person's privacy
  • Personal and private information that is no longer necessary for the function for which it was collected must be destroyed
  • When a service or product is refused on the grounds of personal information (e.g. creditworthiness), the reason for denial must be made known to the person, based on human rights
Guideline 4 โ€” Confidentiality and privacy policy slide 57

A formal privacy policy must exist

A person's information must be handled with the necessary confidentiality โ€” implying security and control of access, of the right to use it, and of the right to change or add information.

A private policy must consist of the following elements:

  • The categories of information that must be regarded as private and personal
  • The levels of confidentiality (who has access and use of which information)
  • A clear explanation of the purposes of the use of the information
  • A description of procedures to ensure the accuracy of the information
  • Based on the norms of truth and human rights
Ethics mnemonic โ€” "NPC-A"
Ethical duties of the information professional
N ยท P ยท C ยท A
"Never Probe Clients' Affairs"
N
Notify
Notify clients of all intended uses of their data
P
Permission
Obtain permission (explicit or implicit informed consent)
C
Collect minimum
Collect only what's necessary; destroy when done
A
Access control
Maintain confidentiality, security, and a formal privacy policy
Solutions to protect online privacy slides 21, 33โ€“34
Solutions mnemonic
A ยท F ยท E ยท R ยท P
"A Firewall Encrypts Really well with Preferences"
A
Anti-virus
Anti-virus software to detect and remove malicious programs
F
Firewalls
Firewall protection to block unauthorised access
E
Encryption
Encryption tools to protect data in transit and at rest
R
Raise Awareness
Raise awareness of privacy issues among users
P
P3P
Platform for Privacy Preferences โ€” browser-based policy matching
P3P โ€” Platform for Privacy Preferences slide 34
P3P โ€” What is it?Developed by the World Wide Web Consortium (W3C). A protocol allowing websites to declare their intended use of information they collect about browsing users. Allows users to configure their browsers or other software tools so they are notified whether a web site's privacy policy matches their pre-set preferences.
Cookie-specific solutions slide 20โ€“22

Opt-in / opt-out

Most browsers now allow users to enable or disable cookies entirely. Requires: (1) awareness of cookie technology, and (2) knowledge of how to enable/disable it. Limitation: some websites deny access without cookies.

Browser add-ons

Your browser and some software products enable you to detect and delete cookies, including third-party cookies. For Flash cookies specifically โ€” Firefox's "Better Privacy" add-on is the primary solution. No commercial anti-spyware can remove flash cookies.

Learn to safeguard your own privacy
Self-protection steps (slide 33)
โ€ข Use anti-virus software and keep it updated
โ€ข Enable firewalls on all devices
โ€ข Use encryption tools for sensitive communications
โ€ข Raise your own awareness about how tracking works
โ€ข Actively learn how to configure privacy settings in all your tools and browsers
Flashcards โ€” tap any card to reveal
Loading...
Tap to reveal definition
1 / 18
Test your knowledge