Академический Документы
Профессиональный Документы
Культура Документы
A Gift of Fire
Privacy and Personal Information
The Impact of Computer Technology Big Brother is Watching You Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation
Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean:
Freedom from intrusion. Control of information about oneself. Freedom from surveillance.
Q: Recall an occasion when a secondary use of your personal information was made.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 5
Regulations:
Privacy Act of 1974. Computer Matching and Privacy Protection Act of 1988.
Consumer Information
Consumer Databases
Gathering Information:
Warranty cards. Purchasing records. Membership lists. Web activity. Change-of-address forms. Much more
Privacy Challenges:
New sensing and surveillance technologies enable the government access to private premises without physical entry. New technologies provide the government with access to huge amounts of personal data in business databases. Courts allow some searches and seizures of computers without search warrants.
Consumer Information
Consumer Databases (contd)
Limiting Collection, Use, Sharing, and Sale of Personal Data:
Consumers can take measures to restrict the use of their personal information. Some information sharing is prohibited by law. Some information sharing is prohibited by published, privacy policies.
Consumer Information
Marketing: Using Consumer Information
Trading/buying customer lists. Telemarketing. Data Mining. Mass-marketing. Web ads. Spam (unsolicited e-mail).
Q: What measures do you take to limit consumer information gathered about you?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 12
Consumer Information
Credit Bureaus
Uses of consumer information:
Evaluate credit risk of applicant. Marketing.
Regulation:
FCRA (Fair Credit Reporting Act) Self-regulated by privacy principles.
Q: If you are denied credit, what are your rights based on the FCRA?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 14
Transactions:
Transactions have two parties, often with conflicting preferences about privacy.
Q: Have you read the privacy policies at Web sites you frequent?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 22
Q: How should rights to information about transactions between two parties be assigned?
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 23
Consumer-Protection View
Legal Regulations:
Determine effectiveness, direct and hidden costs, and any loss of services or inconvenience.
Q: Recall a situation where you exchanged personal information for some benefit.
A Gift of Fire, 2ed Chapter 2: Privacy and Personal Information 25
Freedom of speech
Prohibiting communication of information may violate the 1st Amendment.