DIGITAL FOOTPRINTS AND VULNERABILITIES: THE EVOLUTION OF PRIVACY IN THE INTERNET AGE

Similar documents
MINUTE TAKING TIPS. How to keep your minutes FIPPA friendly

University of Michigan School of Music, Theatre & Dance Conflicts of Interest and Conflicts of Commitment Staff Policy

Wearables, Information Sharing and Research in a Big Data World - Balancing Risks and Rewards

If s Ethics Policy main principles

Code of Conduct. Code of Conduct

Disclosure Statement: I have no industry relationships to disclose.

Thank you for the opportunity to join you here today.

WHISTLEBLOWERS Transparency International: experiences in reporting and protection mechanisms at the local level

DATA PROTECTION AND DATA STORAGE POLICY

DRAFT BILL PROPOSITION

Security Questions to Ask EHR Vendors

SCHOOL OF NURSING POLICY ON STAFF CONFLICTS OF INTEREST AND CONFLICTS OF COMMITMENT November Introduction

Information Security Adults Services. Practice guidance. Revised Version: 1.2 Effective from: August 2014 Next review date: August 2015

EFPIA position on Clinical Trials Regulation trialogue

Personal Information and consent - The New Normal

Managing Your Online Reputation

Information Protection Readiness for Securing Personal Information

1. Understanding Big Data

CORPORATE CODE OF ETHICS. Codes of corporate ethics normally have features including:

COLLEGE OF PHARMACY CONFLICTS OF INTEREST AND CONFLICTS OF COMMITMENT POLICY FOR STAFF. Introduction

SOCIAL MEDIA POLICY. Introduction

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

PIPEDA and Online Backup White Paper

HMG Security Policy Framework

Code of Ethics December 2013

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Big data: A lot to explore but little to share? Ways towards a regulatory regime for big data

Trends in Healthcare Payments Fifth Annual Report: 2014

CODE OF ETHICS. CARLO GAVAZZI IMPIANTI S.p.A

Results of the Task Team Privacy

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

005ASubmission to the Serious Data Breach Notification Consultation

An Executive Overview of GAPP. Generally Accepted Privacy Principles

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL]

A Mobile Phone and Camera Toolkit for Early Years Settings. Early Years Services April 2013 Version 1.0

Data Protection Policy

Agenda. 1. Understanding Insurance. 2. Life Insurance. 3. Risk Assessment/Classification. 4. Level of Insurability

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

The Economic Value of Certainty By Les McGuire, MBA August 19, 2003

SOCIAL MEDIA USE BY THE HOME MORTGAGE INDUSTRY: LEGAL RISKS AND CHALLENGES. Andrea Lee Negroni, Of Counsel BuckleySandler LLP

E-COMMERCE GOES MOBILE: SEEKING COMPETITIVENESS THROUGH PRIVACY

Strategic Action #13 Open Government by Design

Internet & Technology Usage in the Networked Workplace: Legal Implications

How can you help your employees get. pension world? Andrew Pennie May 2015

A hard problem: Disclosing how to break public key cryptosystems

Appendix B: Existing Guidance to Support HIE Implementation Opportunities

MySuper consultation working group

Data Access Policy for Members of the Public (Minnesota Statutes, section 13.03, subdivision 2)

Privacy and Security Protecting Personal Information Kim Hart and Bill Trott

Privacy & data protection in big data: Fact or Fiction?

STATE OF PLAY AND OUTLOOK FOR CROSS-BORDER TRADE IN INSURANCE. RELEVANCE AND IMPACTS OF DIFFERENCES IN INSURANCE CONTRACT LAW

Issue Number: 3. What Every Teacher Needs to Know About Social Media

What Are the Advantages of a Developmental Disability Home Improvement Program?

So what are these various insurances and when might you need them? A brief summary of the main types of cover is as follows.

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

COMMITMENT INTEGRITY LEADERSHIP. High Risk Update Information Security. August 2015

The Big Deal With Big Data: New Security Tools Are Needed

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

RE: ITI s Comments on Korea s Revised Proposed Bill for the Development of Cloud Computing and Protection of Users

Third-party Cookie Policy

Information Security in Business: Issues and Solutions

Code of Ethics for Pharmacists and Pharmacy Technicians

Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data

Bringing European values to the Internet of Things

GENERAL INSURANCE STATISTICAL AGENCY

Declaration of Internet Rights Preamble

The ICN Code of Ethics for Nurses

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

Privacy and Security Standards

debt collection software PRIVACY POLICY

Is There Such a Thing as Internet Privacy?

The Key in Driving the Future

The ICN CODE OF ETHICS FOR NURSES

Cyber-safety for Senior Australians. Inquiry Submission

Cloud Computing: The Gathering Storm

Staying Out of Trouble: Key Privacy, Data Security, and Advertising Mistakes That Can Put You in the Enforcement Crosshairs

EMBARCADERO ONLINE PRODUCT CERTIFICATION AGREEMENT

CELL PHONE LOCATION, PRIVACY AND INTIMATE PARTNER VIOLENCE. by Kaofeng Lee & Erica Olsen *

Annex 1. Call for proposals EACEA No 34/2015 Erasmus+ Key Action 3: Support for policy reform - Initiatives for policy innovation

A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be

sections 201 and 206 of the Public Health Law and sections 363-a and 365-a(2) of the Social

Issues in Information Systems Volume 16, Issue IV, pp , 2015

Parents recording social workers - A guidance note for parents and professionals

Universal Declaration on Bioethics and Human Rights

Introduction to The Privacy Act

Protecting Your Data On The Network, Cloud And Virtual Servers

Cloud Computing in a Government Context

Insurance Europe key messages on the European Commission's proposed General Data Protection Regulation

Data Protection Act. Conducting privacy impact assessments code of practice

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

Featuring industry research by. Produced by

State University of New York at Canton Institutional Review Board. Sample Informed Consent Document

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

Department of Defense DIRECTIVE

Creating a National Electronic Health Records (EHR) System

Bring your own device - Legal Whitepaper

Chapter 14: Customer Privacy Concerns and Privacy Protective Responses

Transcription:

DIGITAL FOOTPRINTS AND VULNERABILITIES: THE EVOLUTION OF PRIVACY IN THE INTERNET AGE Ritu Agarwal Professor and Dean s Chair of Information Systems Director, Center for Health Information and Decision Systems University of Maryland R. Agarwal, 2013 R. Agarwal, Future of the Internet, 2013 1

THE MESSAGE R. Agarwal, Future of the Internet, 2013 2

1. THE CONCEPT 2. THE REALITY 3. DILEMMAS and SOLUTIONS R. Agarwal, Future of the Internet, 2013 3

THE CONCEPT OF PRIVACY ACHIEVING COMMON GROUND R. Agarwal, Future of the Internet, 2013 4

What is privacy? the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information about them is communicated to others.. R. Agarwal, Future of the Internet, 2013 5

Core themes.the individual s ability to control the circulation of information relating to him...rather it is the control we have over information about ourselves..to have personal privacy is to have the ability to consent to the dissemination of personal information. R. Agarwal, Future of the Internet, 2013 6

The privacy journey in the US R. Agarwal, Future of the Internet, 2013 7

Framing the privacy narrative R. Agarwal, Future of the Internet, 2013 8

The ubiquity of digital footprints 2.1 billion connected people VOLUME VELOCITY VARIETY VERACITY R. Agarwal, Future of the Internet, 2013 9

The art of the possible It will soon be technologically feasible to access our financial, medical, social and personal histories and identities (constrained only by legal restraints) Does it matter if Google has our information? Does it matter if the government does? R. Agarwal, Future of the Internet, 2013 10

They're Watching You at Work What happens when Big Data meets human resources? The emerging practice of "people analytics" is already transforming how employers hire, fire, and promote. Every Step You Take As cameras become ubiquitous and able to identify people, more safeguards on privacy will be needed R. Agarwal, Future of the Internet, 2013 11

The Reality PRIVACY AND SOCIETY TODAY R. Agarwal, Future of the Internet, 2013 12

How did you know where I am? Jesper Anderson and checkin pictures Million check-ins in 2 weeks Individual location (home, shopping, picking up the kids..) Workaround on privacy settings R. Agarwal, Future of the Internet, 2013 13

How did you know that? Confidential health information of celebrity patients R. Agarwal, Future of the Internet, 2013 14

What did I do wrong? Lindsey Stone at Arlington National Cemetery R. Agarwal, Future of the Internet, 2013 15

I am now you Reconstruction of social security numbers using statistical techniques Memphis, Tennessee July 15, 1962 102-55-4433 R. Agarwal, Future of the Internet, 2013 16

Online faux pas Would you want to go to a college that stalks you online? When did it become wrong to be young and foolish? R. Agarwal, Future of the Internet, 2013 17

And of course.. R. Agarwal, Future of the Internet, 2013 18

The paradox We continually claim to want and value privacy, but we often act to compromise it R. Agarwal, Future of the Internet, 2013 19

The paradox: what we say Source: Pew Research Center R. Agarwal, Future of the Internet, 2013 20

Revealing ourselves online Source: Pew Research Center R. Agarwal, Future of the Internet, 2013 21

Do we really value privacy? Framing and priming effects Emotions and health Irrationality in privacy decisions The illusion of perceived control Inconsistent valuations Disclosure and trust Source: Various Academic Studies R. Agarwal, Future of the Internet, 2013 22

Us as consumers 1. Blissfully unaware 2. Willing to pay a premium for privacy protection 3. Willing to disclose for fair exchange: the WIIFM test R. Agarwal, Future of the Internet, 2013 23

To summarize Privacy breaches have significant consequences Individuals are irrational consumers of privacy Disclosure is complex and contingent Technology and privacy co-evolve R. Agarwal, Future of the Internet, 2013 24

Dilemmas and Solutions IMPERATIVES FOR GOVERNMENT AND BUSINESS R. Agarwal, Future of the Internet, 2013 25

Governments BALANCE Is eternal vigilance the price of freedom? The absence of market forces The national interest with individual liberty and political freedom The risks and benefits of regulation TRUST Reassure citizens of competence, integrity and benevolence Design institutions to curate and manage data LEGISLATION The phase mismatch challenge: leading, not lagging Is GDPR the right solution? Is a Consumer Privacy Bill of Rights the right solution? R. Agarwal, Future of the Internet, 2013 26

What societies stand to lose What kind of people would we be if deprived of our privacy? If people will forever be held responsible for their past actions, then perhaps they will be more careful about how they behave. Equally, this will impede the willingness to talk risks How do we collect data to enable the progress of scientific breakthroughs? R. Agarwal, Future of the Internet, 2013 27

Business INFORM Transparent and comprehensible privacy policy Place users in control over privacy settings: opt-out as the default PROTECT A pervasive culture of security Privacy protective technologies and privacy by design OFFER A QUID PRO QUO Acknowledge the calculus Tailor incentives to context and individual characteristics R. Agarwal, Future of the Internet, 2013 28

All human beings have three lives: public, private, and secret. Gabriel García Márquez, Gabriel García Márquez: a Life "Is the human right to privacy still protected in our digital world? And should everything that is technologically feasible, be allowed? Peter Wittig, Permanent Representative to the UN R. Agarwal, Future of the Internet, 2013 29

R. Agarwal, Future of the Internet, 2013 30