SlideShare a Scribd company logo
Privacy in computing
What is privacy?
•How would you define it?
•What do you think its aspects are?
– Three key aspects:
• Controlled disclosure.
• Sensitive data
• Affected subject.
Computer Related Privacy Problems
• Data collection: what issue do you see?
• No informed consent:
– Examples: real age.
• Loss of control: class discussion.
– Example: posting on a blog.
• What are the ramifications vs. writing a letter?
• Ownership of data.
Computer Related Privacy Problems
• Data collection: what issue do you see?
• No informed consent:
– Examples: real age.
• Loss of control: class discussion.
– Example: posting on a blog.
• What are the ramifications vs. writing a letter?
• Ownership of data.
Protections provided
• Privacy Policies;
– First step: fair information policies:
• Regulate these;
– Collection of information.
– Data quality.
– Purpose specification (use of information)
– Use limitation.
– Security safeguards.
– Openness.
– Individual participation.
– Accountability.
U.S privacy laws
– Are usually applied to individual data types:
– HIPAA
– Financial organizations: Gramm-Leach-Bliley Act
(GLBA)
– Important in Radford: Federal Educational Rights and
Privacy Act (FERPA).
• Somethings are not clear: example class
discussion.
U.S govt. websites.
• Privacy laws controlled by the FTC.
• Address 5 factors:
– Notice (must be informed)
– Choice
– Access (contest accuracy of data collected)
– Security. (data collectors must secure against
unauthorized use).
– Enforcement (sanctions on noncompliance)
• In 2002, the US e-government act.
What about commercial
websites?
• Federal trade commission can prosecute for
deceptive practices. (e.g., false advertising)
– E.g., JetBlue and the DOD.
Other issues with Privacy
• Anonymity.
– Issues with anonymity.
• Multiple identities (online id)
How to protect against privacy
loss?
• Get/give as little data as possible.
• Data anonymization.
• Audit trail: record who has accessed what
data.
• Security and controlled access
• Training, quality, Restricted usage, data left
in place.
• Policy.
Issues in Computer Security:
Data mining and privacy.
• Government data mining.
• Privacy preserving data mining:
– Data mining is “extracting hidden patterns from
large amounts of data”
– Solutions to preserve privacy:
• Remove id information. Doesn’t work.
– E.g., Sweeney’s report: > 87% US population can be
identified by: 5 digit zip code, gender and date of birth.
• Data perturbation. Example. Needs to be done
carefully.
Privacy on the web
• Think about this:
– On the web: every word you speak (blog) can
be read
– Someone selling something may have ads on
their site for something else.
– Identity of the other person may not be known!
• Some issues on the web are protected.
– Can you name them?
Privacy on the web
• Credit card payments are protected.
– But not necessarily private.
– Paypal etc.. May solve the privacy issues.
• Site and portal registrations:
– Beware of “we will enhance your browsing experience”
– Using email as id on some sites. Issues?
• Third party ads.
• Contests and offers: Free Iphones!
Privacy issues
• Cookies:
– Be-aware
• Third party cookies. E.g., Double Click and online profiling.
• Adware
• Web-bug.
• Spyware: keystroke loggers.
Email security
• Interception of email.
– Can be encrypted using PGP or S/MIME
– Email monitored legallly.
• Anonymous E-mail and remailers
– Sending anonymous emails.
• Spoofing and spamming.
Digital Rights Management
(DRM)
History of DRM
• In the pre-digital era, people's ability to do various things to or with content
were limited.
• The networked digital age makes it possible to do just about anything to digital
content, instantaneously and at virtually no cost.
• While this is a great opportunity for new content business models, it threatens
the livelihood of content creators by making rampant piracy possible
• Also, more and more public and private entities are going digital and doing
business online. Information is increasing retrieved through computer networks
by customers, employees and partners etc.
 Thus, we see the need for a technology that enables the secure creation,
management, distribution and promotion of digital content on the Internet.
DRM
 Set of technologies that enable content owners to specify and control:
 the access they want to give consumers and
 the conditions under which it is given.
 It includes:
– Persistent Protection: Technology for protecting files via encryption and allowing access
to them only after the entity desiring access has had its identity authenticated and its rights
to that specific type of access verified
– Business rights: Capability of associating business rights with a content by contract, e.g.
author’s rights to an article or musician’s rights to a song
– Access tracking: Capability of tracking access to and operations on content
– Rights licensing: Capability of defining specific rights to content and making them
available by contract
DRM Functional
Architecture
• IP Asset Creation and Capture Module
– Rights Validation to ensure content being created
includes the rights to do so
– Rights Creation to allow rights to be assigned to new
content
– Rights Workflow to allow for content to be processed
through series of workflow steps
• IP Asset Management Module
– Repository functions to enable the access/retrieval of
content in potentially distributed databases and the
access/retrieval of metadata
– Trading functions to enable assignment of licenses to
parties who have traded agreements for rights over
content, including payments from licensees to rights
Interested Players in
DRM• Government Agencies
– Interested in controlled viewing and sharing of highly secure and
confidential documents, audio and video data.
– “Need to know basis”
• Private Corporations
– Want to limit the sharing of their proprietary information
– Track accesses and any modifications made to it.
– E.g. news agencies like Reuters
• Owners of commercial content
– Content owners, artists, and publishers want to gain revenue through sale and
promotions
– But are concerned about protecting their copyrighted works from illegal use
Interested Players in DRM
contd.• Intermediaries (service providers, content distributors etc.)
– Concerned about minimizing costs of providing services
– Cautious about protecting themselves from lawsuits over illegal distribution
• Producers of end user equipment (PCs, players, etc.)
– Concerned about minimizing design and production costs
– Unwilling to pay for features that only some users need
• End users
– Interested in immediate access to desired content
– Want to use the content conveniently
Thus, we see…
 DRM can help ensure companies, corporations, and other
entities who share similar business that:
 Rights are tracked at ingestion
 Access is controlled during production processes
 Protection for the content extends throughout product lifecycles
 Additionally, DRM can integrate persistent content protection
with content management to ensure:
 Proper business practices
 Implementation of new business models
 Compliance with regulatory requirements in industries such as financial
services, healthcare, and government
Business Imperatives for DRM:
Control Access During Workflow
 Controlling allowed uses of digital content is a critical function of DRM
technology.
 By predetermining and controlling the exact use(s) for content, DRM
technology extends and enhances the traditional role-based access.
 Example: A draft manufacturing guideline is circulated among an international
standards committee and participating qualified companies. Using DRM
technology, this becomes a closed circulation.
The draft guidelines are in a tamper-proof format, with print-only user-rights,
limited to a pre-determined timeframe, after which the draft is withdrawn and
replaced by the final set of guidelines.
The owner of the content, in this instance the standards committee, can withdraw,
alter, or grant permissions related to the content at any time.
Business Imperatives for DRM:
Downstream Use
 Companies need to deliver controlled access downstream so that
content can be licensed, deployed and repurposed by business partners
in accordance with the terms of agreements.
 Example: Music publishers license DRM-enabled content to online
transactional or subscription services. The DRM-enabled content allows
both distributors and consumers to choose from multiple fee/free business
models.
For example, the content could be included in both the free-play list for one-
time use on multiple devices, or it could be licensed on a fee-for play use
by media companies, publishers corporate, government or institutional
users.
Further, with DRM-enabled content, owners may chose to permit licensees
the ability to re-distribute or enter into republication agreements.
Business Imperatives for DRM:
Modification of Rights Over Time
 Systems must be able to accommodate changes by updating parameters of rights and
usage as needed to accommodate new distribution models.
 Lack of ability to change access rights to content can be a serious business liability,
cost a lot of money and be a disincentive to customers.
 Example: The U.S. Supreme Court decision in New York Times v. Tasini (2001)
compelled content industry vendors to remove or modify core research records in
database archives, because creators of content in those archives were not being
properly compensated. Compliance costs for vendors included additional staffing
to re-code or remove records, systems development expenses, along with
increased demand on customer service and marketing departments.
 DRM, in such cases, can facilitate collaboration, creating the ‘trusted environment’
needed for collaboration by persistently protecting critical Intellectual Property (IP)
beyond the boundaries of business processes and corporate organizations.
Business Imperatives for DRM:
Regulatory and Business Standards
 Integrity, authentication, security, privacy and accountability are
‘watchwords’ for new legislative and regulatory standards.
 Example: HIPPA regulations mandate new levels for privacy and
authentication for document management in healthcare institutions and
the medical community.
 Example: Warranties and liability requirements demand strict
assurances that the latest, most comprehensive, and appropriate
instructions, product information and warning of potential hazards are
in the hands of the users.
 Integrated DRM-CMS solutions can offer corporations, public sector
institutions and regulated industries enterprise-wide assurance that
content and document operations comply with current regulatory
regimes, accountability, privacy, and security legislation.
Business Imperatives for DRM: Outsourcing
• Offshore processing and data-conversion service bureaus have long been a
staple of trade, technical, professional and database publishers.
• Software and entertainment products are routinely outsourced. There is a
growing trend to rely on outsourced personnel for the roles companies
traditionally reserved for employees.
• Bottom line is many people working on digital content products and processes
do not have long-term commitment or loyalty to the company.
• Security and communication become large issues and require a level of
embedded knowledge within core business processes.
 DRM ensures that information expressed in a standard format to minimize
uncertainty, provide an efficient and accurate way to update operational
routines, and assure appropriate levels of accountability.
Business Imperatives for DRM:
Protection throughout Content Lifecycles
 Piracy, whether of software, music, film, images, or text, costs
billions of dollars each year.
 It squanders valuable company time and resources by
requiring costly efforts to detect and deter theft.
 Further, it creates an atmosphere of distrust that can become
counterproductive to developing new business models for
digital content.
 DRM-enabled protection continues throughout the distribution
of the content, auditing its use and accounting for its fees and
licenses.
The Divide
• The content development industry, which consists of the recording industry
and the movie studios, has repeatedly emphasized the need for immediate
DRM solutions that stop all unauthorized copying and distribution.
• Meanwhile, the IT industry is emphasizing that DRM solutions should
support the concept of "fair use," which allows consumers to make copies
of some types of copyrighted content for their own personal use.
Fair Use
 Copyright principle based on the belief that the public is
entitled to freely use portions of copyrighted materials for
purposes of commentary and criticism.
 Unfortunately, if the copyright owner disagrees with your fair
use interpretation, the dispute will have to be resolved by
courts or arbitration.
 The four factors for measuring fair use:
 the purpose and character of your use
 the nature of the copyrighted work
 the amount and substantiality of the portion taken, and
 the effect of the use upon the potential market.
Digital Copyright Millennium Act (DCMA)
• 1998 law designed to increase copyright holders' rights.
• Creates civil and criminal penalties for creation or distribution of
DRM circumvention tools.
• As a result, a user attempting to circumvent copyright protection, even
for legitimate reasons, violates federal law.
• What this means?
– Open-source software developers rely on reverse engineering to write
programs that can interact with hardware. This practice is illegal under the
DCMA.
– Reverse Engineering and Cryptanalysis can also be interpreted as illegal
under the DCMA.
– Is Norton Anti-Virus illegal?
The Future of DRM
• DRM is emerging as a formidable new challenge, and it is essential for
DRM systems to provide interoperable services.
• Solutions to DRM challenges will enable untold amounts of new
content to be made available in safe, open, and trusted environments.
• The technology can be expected to be heavily used in the future to
support digital library collections, code and software development,
distance education, and networked collaboration, among other
applications.
The Future of DRM
contd.
• DRM standardization is occurring in a number of open
organizations.
• The OpenEBook Forum [OEBF] and the MPEG group
[MPEG] are leading the charge for the ebook and multimedia
sectors.
• The Internet Engineering Task Force [IETF] and the World
Wide Web Consortium [W3C] have also commenced work on
DRM issues.
• Their work will be important for the entire DRM sector, and
it is also important that all communities be heard during these
standardization processes in industry and sector-neutral
standards organizations.
Are you a thief?
Plagiarism
Plagiarism is THEFT!
It is theft of intellectual property
Plagiarism
Plagiarism is the use of other
people's ideas without due
acknowledgment.
It is about presenting other people's
ideas as your own.
Plagiarism
Plagiarism can be intentional – which is unethical and
totally unacceptable. It may also be illegal or actionable
and your employment prospects can be severely affected
Likewise your academic prospects!
Plagiarism
Plagiarism can be intentional – which is unethical and
totally unacceptable. It may also be illegal or actionable
and your employment prospects can be severely affected
Likewise your academic prospects!
Plagiarism can also be unintentional – you don't realise
you are doing it. This is lazy,sloppy and unprofessional
Plagiarism
Plagiarism can be intentional – which is unethical and
totally unacceptable. It may also be illegal or actionable
and your employment prospects can be severely affected
Likewise your academic prospects!
Plagiarism can also be unintentional – you don't realise
you are doing it. This is lazy,sloppy and unprofessional
Whatever the case, plagiarism is plagiarism and cases
are always treated in the same way
Plagiarism
Here are some examples:
Copying someone's project report, with or without
their knowledge
Claiming to have done something someone else did
Fabricating experimental results
Pasting text or pictures straight from the web
Typing in passages from text books
Plagiarism
The first is usually easy to spot and
the penalties can be severe
Complicit copying (collusion): 50% of mark down to zero
and possibly a note in student progress record - usually
up to module leader or Degree Programme Director.
Plagiarism
The first is usually easy to spot and
the penalties can be severe
Complicit copying (collusion): 50% of mark down to zero
and possibly a note in student progress record - usually
up to module leader or Degree Programme Director.
Explicit copying: usually zero marks plus a warning.
In repeat or outrageous cases, appearance before
HoS – perhaps even report to Registrar
Explicit copying also covers using a work from a
previous year
Plagiarism
Claiming someone else's work as
their own can also be spotted from
a knowledge of a student's capability
An example might be where a student submits a
design report using work that someone else in
the group actually did
Plagiarism
Fabricating results:
Some famous examples of scientists fabricating
results – but students also do it.
Miss the labs and make up the data.
Easy to spot – data is usually too good and the student
misses the obvious flaws of the equipment.
Plagiarism
Pasting text or pictures straight
from the web or typing in passages
from text books and journals
Plagiarism
Pasting text or pictures straight
from the web or typing in passages
from text books and journals
Nothing wrong with this if it is done correctly and the
audience knows what's going on.
Plagiarism
Pasting text or pictures straight
from the web or typing in passages
from text books and journals
Nothing wrong with this if it is done correctly and the
audience knows what's going on.
Sometimes you may need permisssion
Plagiarism
Text, quotations, ideas from other
sources may be used to support
your arguments – but they must
be referenced, and due credit given.
Plagiarism
Some examples
Plagiarism (Some examples)
It is a truism that everyone
cares about the environment and agrees that actions
must be taken but no one wants to take responsibility
for actions which directly affect members of the public
as individuals.
The recent statements emanating from
the USA that in fact global warming might well increase
agricultural production challenge popular opinion even
further. We do not concur with this point of
view ...........
Plagiarism
Chunks of actual text, such as quotations,
should be put between quote marks (“text”).
Use a referencing system or a footnote to
acknowledge.
According to Harvey [2004] “It is a truism that everyone cares about
the environment and agree that actions must be taken but no one
wants to take responsibility for actions which directly affect members
of the public as individuals. The recent statements emanating from
the USA that in fact global warming might well increase agricultural
production challenge popular opinion even further.” We do not concur
with this point of view ...........
Plagiarism
Alternatively, you may want to make a statement but the
statement is derived from some other work. The source
must be acknowledged (referenced).
........ Commitments from various countries to energy reduction
may have been perceived to be relevant to ordinary members of
the public until the refusal of the USA to implement the Kyoto
agreement challenged popular opinion [Fells, 2000]
Finally
Basic rules for students:
DO NOT:
+ write about someone else’s ideas as if they were your own
+ write about someone else’s ideas without giving a reference
+ use someone else’s words exactly without indicating
that it is a direct quote and referencing it
+ use more or less the same words as another writer even if you
acknowledge their work
+ copy another student’s work
+ submit work written for you by another person
+ cut and paste material from the internet, putting pieces of text together
to form an essay.
ALWAYS:
+ cite your references
Introduction to
Intellectual Property and
Intellectual Property
Rights
What is meant by “intellectual property” and
“intellectual property rights”?
Which are the IP protection tools available?
•Patent
•Utility Model
•Industrial Design
•Trademark
•Copyright
• What is meant by “intellectual property” and
“intellectual property rights”?
Intangible assets:
• Results of creative efforts from the human intellect
• Such creations cannot be materially measured
Business assets
• Tangible Assets e.g. buildings, machinery,
infrastructures ...
• Intangible Assets (intellectual property)
e.g. know-how, human resources, business
relationships, brands …
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
Privacy in computing & interlectual property
The IP Chain of Activities
• Creation
• Innovation
• Commercialization
• Protection
• Enforcement
IP as a property
• Can be sold
• Can be bought
• Can be lease or rent
• Can pass under a will
• Can be assigned
The Legal Framework for IP
• MyIPO is the legal custodian.
• Three machinery of administration
• - the IP office
• - the external machinery
• - the court
International Convention for IP
• Paris Convention for Protection of
Industrial Property 1967 ( 1989)
• Berne Convention for the Protection of
Literary and Artistic Works 1971 ( 1990)
• Trade-related aspects of Intellectual
Property Agreement 1994 ( 1995)
The Laws For Intellectual Property
Protection
• Copyright Act 1987
• Trademarks Act 1976
• Patent Act 1983
• Industrial Design Act 1996
• Geographical Indications Act 2000
• Law of Tort
• -passing-off
• Confidential information
References
benjaminvibez@gmail.com
END

More Related Content

PPTX
Digital Rights Management for Companies
PPTX
Digital Libraries
PPTX
Development of strategy for the e pub library of wu
PPT
S719a
PPT
Book 3 chap-8
 
PPT
Chap 8
 
DOC
Digital rights management
PDF
Digital Rights Management for Ebooks
Digital Rights Management for Companies
Digital Libraries
Development of strategy for the e pub library of wu
S719a
Book 3 chap-8
 
Chap 8
 
Digital rights management
Digital Rights Management for Ebooks

What's hot (20)

PPTX
Digital Rights Management PPT
PPT
Privacy and personal information
PPTX
Data set Legislation
PPT
legal and ethcal issues of e business
PPTX
Intellectual property rights (IPR) and digital
PPTX
Digital property rights
PDF
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
PPTX
Information Privacy
PPTX
Introduction to E commerce
PPT
Stallings ch18 privacy
PPTX
Information privacy and Security
PPT
Ethical, Social And Political Issues Raised By E Commerce
PPTX
Information Privacy
PDF
Data Privacy
PPTX
UOP - AET/531 - Legal and Ethical Issue PPT - Final
PPTX
Data Protection & Risk Management
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
PPTX
Information system ethics
PPTX
Big data privacy security regulation
Digital Rights Management PPT
Privacy and personal information
Data set Legislation
legal and ethcal issues of e business
Intellectual property rights (IPR) and digital
Digital property rights
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Information Privacy
Introduction to E commerce
Stallings ch18 privacy
Information privacy and Security
Ethical, Social And Political Issues Raised By E Commerce
Information Privacy
Data Privacy
UOP - AET/531 - Legal and Ethical Issue PPT - Final
Data Protection & Risk Management
Unit 6 Privacy and Data Protection 8 hr
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Information system ethics
Big data privacy security regulation
Ad

Similar to Privacy in computing & interlectual property (20)

PPT
Digital Rights Management
PDF
Presentazione
PPT
Digital Rights Management and Trusted Computing Base
DOCX
digital rights management for multimedia files
PDF
What is DRM_ The Ultimate Guide to Digital Rights Management.pdf
PPTX
ch 19- computer security prenciples and practice
PPT
Lec49 50 digital rights management
PPT
3999779.ppt
PPTX
Presentation on Information Privacy
PPT
Digital Right Management
PPT
Digital rights management an essential feature in the digital era
PPT
Enterprise Digital Rights Management (Persistent Security)
PPTX
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
PPTX
Chapter Tewlve
PPT
Drm and crypto
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
PPTX
Authorship Drm Seminar
PDF
What is DRM, Types of DRM
PDF
Guideline for the Production of Digital Rights Management (DRM)
PPTX
Presentation1.presentation presentation presenstat
Digital Rights Management
Presentazione
Digital Rights Management and Trusted Computing Base
digital rights management for multimedia files
What is DRM_ The Ultimate Guide to Digital Rights Management.pdf
ch 19- computer security prenciples and practice
Lec49 50 digital rights management
3999779.ppt
Presentation on Information Privacy
Digital Right Management
Digital rights management an essential feature in the digital era
Enterprise Digital Rights Management (Persistent Security)
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Chapter Tewlve
Drm and crypto
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Authorship Drm Seminar
What is DRM, Types of DRM
Guideline for the Production of Digital Rights Management (DRM)
Presentation1.presentation presentation presenstat
Ad

Recently uploaded (20)

PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
IFRS Notes in your pocket for study all the time
PDF
How to Get Funding for Your Trucking Business
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
Introduction to Generative Engine Optimization (GEO)
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
Blood Collected straight from the donor into a blood bag and mixed with an an...
PDF
Comments on Crystal Cloud and Energy Star.pdf
PPTX
sales presentation، Training Overview.pptx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
1911 Gold Corporate Presentation Aug 2025.pdf
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Slide gioi thieu VietinBank Quy 2 - 2025
Lecture 3344;;,,(,(((((((((((((((((((((((
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
NEW - FEES STRUCTURES (01-july-2024).pdf
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Astra-Investor- business Presentation (1).pptx
IFRS Notes in your pocket for study all the time
How to Get Funding for Your Trucking Business
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Module 2 - Modern Supervison Challenges - Student Resource.pdf
Introduction to Generative Engine Optimization (GEO)
Keppel_Proposed Divestment of M1 Limited
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Blood Collected straight from the donor into a blood bag and mixed with an an...
Comments on Crystal Cloud and Energy Star.pdf
sales presentation، Training Overview.pptx

Privacy in computing & interlectual property

  • 1. Privacy in computing What is privacy? •How would you define it? •What do you think its aspects are? – Three key aspects: • Controlled disclosure. • Sensitive data • Affected subject.
  • 2. Computer Related Privacy Problems • Data collection: what issue do you see? • No informed consent: – Examples: real age. • Loss of control: class discussion. – Example: posting on a blog. • What are the ramifications vs. writing a letter? • Ownership of data.
  • 3. Computer Related Privacy Problems • Data collection: what issue do you see? • No informed consent: – Examples: real age. • Loss of control: class discussion. – Example: posting on a blog. • What are the ramifications vs. writing a letter? • Ownership of data.
  • 4. Protections provided • Privacy Policies; – First step: fair information policies: • Regulate these; – Collection of information. – Data quality. – Purpose specification (use of information) – Use limitation. – Security safeguards. – Openness. – Individual participation. – Accountability.
  • 5. U.S privacy laws – Are usually applied to individual data types: – HIPAA – Financial organizations: Gramm-Leach-Bliley Act (GLBA) – Important in Radford: Federal Educational Rights and Privacy Act (FERPA). • Somethings are not clear: example class discussion.
  • 6. U.S govt. websites. • Privacy laws controlled by the FTC. • Address 5 factors: – Notice (must be informed) – Choice – Access (contest accuracy of data collected) – Security. (data collectors must secure against unauthorized use). – Enforcement (sanctions on noncompliance) • In 2002, the US e-government act.
  • 7. What about commercial websites? • Federal trade commission can prosecute for deceptive practices. (e.g., false advertising) – E.g., JetBlue and the DOD. Other issues with Privacy • Anonymity. – Issues with anonymity. • Multiple identities (online id)
  • 8. How to protect against privacy loss? • Get/give as little data as possible. • Data anonymization. • Audit trail: record who has accessed what data. • Security and controlled access • Training, quality, Restricted usage, data left in place. • Policy.
  • 9. Issues in Computer Security: Data mining and privacy. • Government data mining. • Privacy preserving data mining: – Data mining is “extracting hidden patterns from large amounts of data” – Solutions to preserve privacy: • Remove id information. Doesn’t work. – E.g., Sweeney’s report: > 87% US population can be identified by: 5 digit zip code, gender and date of birth. • Data perturbation. Example. Needs to be done carefully.
  • 10. Privacy on the web • Think about this: – On the web: every word you speak (blog) can be read – Someone selling something may have ads on their site for something else. – Identity of the other person may not be known! • Some issues on the web are protected. – Can you name them?
  • 11. Privacy on the web • Credit card payments are protected. – But not necessarily private. – Paypal etc.. May solve the privacy issues. • Site and portal registrations: – Beware of “we will enhance your browsing experience” – Using email as id on some sites. Issues? • Third party ads. • Contests and offers: Free Iphones!
  • 12. Privacy issues • Cookies: – Be-aware • Third party cookies. E.g., Double Click and online profiling. • Adware • Web-bug. • Spyware: keystroke loggers.
  • 13. Email security • Interception of email. – Can be encrypted using PGP or S/MIME – Email monitored legallly. • Anonymous E-mail and remailers – Sending anonymous emails. • Spoofing and spamming.
  • 15. History of DRM • In the pre-digital era, people's ability to do various things to or with content were limited. • The networked digital age makes it possible to do just about anything to digital content, instantaneously and at virtually no cost. • While this is a great opportunity for new content business models, it threatens the livelihood of content creators by making rampant piracy possible • Also, more and more public and private entities are going digital and doing business online. Information is increasing retrieved through computer networks by customers, employees and partners etc.  Thus, we see the need for a technology that enables the secure creation, management, distribution and promotion of digital content on the Internet.
  • 16. DRM  Set of technologies that enable content owners to specify and control:  the access they want to give consumers and  the conditions under which it is given.  It includes: – Persistent Protection: Technology for protecting files via encryption and allowing access to them only after the entity desiring access has had its identity authenticated and its rights to that specific type of access verified – Business rights: Capability of associating business rights with a content by contract, e.g. author’s rights to an article or musician’s rights to a song – Access tracking: Capability of tracking access to and operations on content – Rights licensing: Capability of defining specific rights to content and making them available by contract
  • 17. DRM Functional Architecture • IP Asset Creation and Capture Module – Rights Validation to ensure content being created includes the rights to do so – Rights Creation to allow rights to be assigned to new content – Rights Workflow to allow for content to be processed through series of workflow steps • IP Asset Management Module – Repository functions to enable the access/retrieval of content in potentially distributed databases and the access/retrieval of metadata – Trading functions to enable assignment of licenses to parties who have traded agreements for rights over content, including payments from licensees to rights
  • 18. Interested Players in DRM• Government Agencies – Interested in controlled viewing and sharing of highly secure and confidential documents, audio and video data. – “Need to know basis” • Private Corporations – Want to limit the sharing of their proprietary information – Track accesses and any modifications made to it. – E.g. news agencies like Reuters • Owners of commercial content – Content owners, artists, and publishers want to gain revenue through sale and promotions – But are concerned about protecting their copyrighted works from illegal use
  • 19. Interested Players in DRM contd.• Intermediaries (service providers, content distributors etc.) – Concerned about minimizing costs of providing services – Cautious about protecting themselves from lawsuits over illegal distribution • Producers of end user equipment (PCs, players, etc.) – Concerned about minimizing design and production costs – Unwilling to pay for features that only some users need • End users – Interested in immediate access to desired content – Want to use the content conveniently
  • 20. Thus, we see…  DRM can help ensure companies, corporations, and other entities who share similar business that:  Rights are tracked at ingestion  Access is controlled during production processes  Protection for the content extends throughout product lifecycles  Additionally, DRM can integrate persistent content protection with content management to ensure:  Proper business practices  Implementation of new business models  Compliance with regulatory requirements in industries such as financial services, healthcare, and government
  • 21. Business Imperatives for DRM: Control Access During Workflow  Controlling allowed uses of digital content is a critical function of DRM technology.  By predetermining and controlling the exact use(s) for content, DRM technology extends and enhances the traditional role-based access.  Example: A draft manufacturing guideline is circulated among an international standards committee and participating qualified companies. Using DRM technology, this becomes a closed circulation. The draft guidelines are in a tamper-proof format, with print-only user-rights, limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final set of guidelines. The owner of the content, in this instance the standards committee, can withdraw, alter, or grant permissions related to the content at any time.
  • 22. Business Imperatives for DRM: Downstream Use  Companies need to deliver controlled access downstream so that content can be licensed, deployed and repurposed by business partners in accordance with the terms of agreements.  Example: Music publishers license DRM-enabled content to online transactional or subscription services. The DRM-enabled content allows both distributors and consumers to choose from multiple fee/free business models. For example, the content could be included in both the free-play list for one- time use on multiple devices, or it could be licensed on a fee-for play use by media companies, publishers corporate, government or institutional users. Further, with DRM-enabled content, owners may chose to permit licensees the ability to re-distribute or enter into republication agreements.
  • 23. Business Imperatives for DRM: Modification of Rights Over Time  Systems must be able to accommodate changes by updating parameters of rights and usage as needed to accommodate new distribution models.  Lack of ability to change access rights to content can be a serious business liability, cost a lot of money and be a disincentive to customers.  Example: The U.S. Supreme Court decision in New York Times v. Tasini (2001) compelled content industry vendors to remove or modify core research records in database archives, because creators of content in those archives were not being properly compensated. Compliance costs for vendors included additional staffing to re-code or remove records, systems development expenses, along with increased demand on customer service and marketing departments.  DRM, in such cases, can facilitate collaboration, creating the ‘trusted environment’ needed for collaboration by persistently protecting critical Intellectual Property (IP) beyond the boundaries of business processes and corporate organizations.
  • 24. Business Imperatives for DRM: Regulatory and Business Standards  Integrity, authentication, security, privacy and accountability are ‘watchwords’ for new legislative and regulatory standards.  Example: HIPPA regulations mandate new levels for privacy and authentication for document management in healthcare institutions and the medical community.  Example: Warranties and liability requirements demand strict assurances that the latest, most comprehensive, and appropriate instructions, product information and warning of potential hazards are in the hands of the users.  Integrated DRM-CMS solutions can offer corporations, public sector institutions and regulated industries enterprise-wide assurance that content and document operations comply with current regulatory regimes, accountability, privacy, and security legislation.
  • 25. Business Imperatives for DRM: Outsourcing • Offshore processing and data-conversion service bureaus have long been a staple of trade, technical, professional and database publishers. • Software and entertainment products are routinely outsourced. There is a growing trend to rely on outsourced personnel for the roles companies traditionally reserved for employees. • Bottom line is many people working on digital content products and processes do not have long-term commitment or loyalty to the company. • Security and communication become large issues and require a level of embedded knowledge within core business processes.  DRM ensures that information expressed in a standard format to minimize uncertainty, provide an efficient and accurate way to update operational routines, and assure appropriate levels of accountability.
  • 26. Business Imperatives for DRM: Protection throughout Content Lifecycles  Piracy, whether of software, music, film, images, or text, costs billions of dollars each year.  It squanders valuable company time and resources by requiring costly efforts to detect and deter theft.  Further, it creates an atmosphere of distrust that can become counterproductive to developing new business models for digital content.  DRM-enabled protection continues throughout the distribution of the content, auditing its use and accounting for its fees and licenses.
  • 27. The Divide • The content development industry, which consists of the recording industry and the movie studios, has repeatedly emphasized the need for immediate DRM solutions that stop all unauthorized copying and distribution. • Meanwhile, the IT industry is emphasizing that DRM solutions should support the concept of "fair use," which allows consumers to make copies of some types of copyrighted content for their own personal use.
  • 28. Fair Use  Copyright principle based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism.  Unfortunately, if the copyright owner disagrees with your fair use interpretation, the dispute will have to be resolved by courts or arbitration.  The four factors for measuring fair use:  the purpose and character of your use  the nature of the copyrighted work  the amount and substantiality of the portion taken, and  the effect of the use upon the potential market.
  • 29. Digital Copyright Millennium Act (DCMA) • 1998 law designed to increase copyright holders' rights. • Creates civil and criminal penalties for creation or distribution of DRM circumvention tools. • As a result, a user attempting to circumvent copyright protection, even for legitimate reasons, violates federal law. • What this means? – Open-source software developers rely on reverse engineering to write programs that can interact with hardware. This practice is illegal under the DCMA. – Reverse Engineering and Cryptanalysis can also be interpreted as illegal under the DCMA. – Is Norton Anti-Virus illegal?
  • 30. The Future of DRM • DRM is emerging as a formidable new challenge, and it is essential for DRM systems to provide interoperable services. • Solutions to DRM challenges will enable untold amounts of new content to be made available in safe, open, and trusted environments. • The technology can be expected to be heavily used in the future to support digital library collections, code and software development, distance education, and networked collaboration, among other applications.
  • 31. The Future of DRM contd. • DRM standardization is occurring in a number of open organizations. • The OpenEBook Forum [OEBF] and the MPEG group [MPEG] are leading the charge for the ebook and multimedia sectors. • The Internet Engineering Task Force [IETF] and the World Wide Web Consortium [W3C] have also commenced work on DRM issues. • Their work will be important for the entire DRM sector, and it is also important that all communities be heard during these standardization processes in industry and sector-neutral standards organizations.
  • 32. Are you a thief? Plagiarism Plagiarism is THEFT! It is theft of intellectual property
  • 33. Plagiarism Plagiarism is the use of other people's ideas without due acknowledgment. It is about presenting other people's ideas as your own.
  • 34. Plagiarism Plagiarism can be intentional – which is unethical and totally unacceptable. It may also be illegal or actionable and your employment prospects can be severely affected Likewise your academic prospects!
  • 35. Plagiarism Plagiarism can be intentional – which is unethical and totally unacceptable. It may also be illegal or actionable and your employment prospects can be severely affected Likewise your academic prospects! Plagiarism can also be unintentional – you don't realise you are doing it. This is lazy,sloppy and unprofessional
  • 36. Plagiarism Plagiarism can be intentional – which is unethical and totally unacceptable. It may also be illegal or actionable and your employment prospects can be severely affected Likewise your academic prospects! Plagiarism can also be unintentional – you don't realise you are doing it. This is lazy,sloppy and unprofessional Whatever the case, plagiarism is plagiarism and cases are always treated in the same way
  • 37. Plagiarism Here are some examples: Copying someone's project report, with or without their knowledge Claiming to have done something someone else did Fabricating experimental results Pasting text or pictures straight from the web Typing in passages from text books
  • 38. Plagiarism The first is usually easy to spot and the penalties can be severe Complicit copying (collusion): 50% of mark down to zero and possibly a note in student progress record - usually up to module leader or Degree Programme Director.
  • 39. Plagiarism The first is usually easy to spot and the penalties can be severe Complicit copying (collusion): 50% of mark down to zero and possibly a note in student progress record - usually up to module leader or Degree Programme Director. Explicit copying: usually zero marks plus a warning. In repeat or outrageous cases, appearance before HoS – perhaps even report to Registrar Explicit copying also covers using a work from a previous year
  • 40. Plagiarism Claiming someone else's work as their own can also be spotted from a knowledge of a student's capability An example might be where a student submits a design report using work that someone else in the group actually did
  • 41. Plagiarism Fabricating results: Some famous examples of scientists fabricating results – but students also do it. Miss the labs and make up the data. Easy to spot – data is usually too good and the student misses the obvious flaws of the equipment.
  • 42. Plagiarism Pasting text or pictures straight from the web or typing in passages from text books and journals
  • 43. Plagiarism Pasting text or pictures straight from the web or typing in passages from text books and journals Nothing wrong with this if it is done correctly and the audience knows what's going on.
  • 44. Plagiarism Pasting text or pictures straight from the web or typing in passages from text books and journals Nothing wrong with this if it is done correctly and the audience knows what's going on. Sometimes you may need permisssion
  • 45. Plagiarism Text, quotations, ideas from other sources may be used to support your arguments – but they must be referenced, and due credit given.
  • 47. Plagiarism (Some examples) It is a truism that everyone cares about the environment and agrees that actions must be taken but no one wants to take responsibility for actions which directly affect members of the public as individuals. The recent statements emanating from the USA that in fact global warming might well increase agricultural production challenge popular opinion even further. We do not concur with this point of view ...........
  • 48. Plagiarism Chunks of actual text, such as quotations, should be put between quote marks (“text”). Use a referencing system or a footnote to acknowledge. According to Harvey [2004] “It is a truism that everyone cares about the environment and agree that actions must be taken but no one wants to take responsibility for actions which directly affect members of the public as individuals. The recent statements emanating from the USA that in fact global warming might well increase agricultural production challenge popular opinion even further.” We do not concur with this point of view ...........
  • 49. Plagiarism Alternatively, you may want to make a statement but the statement is derived from some other work. The source must be acknowledged (referenced). ........ Commitments from various countries to energy reduction may have been perceived to be relevant to ordinary members of the public until the refusal of the USA to implement the Kyoto agreement challenged popular opinion [Fells, 2000]
  • 50. Finally Basic rules for students: DO NOT: + write about someone else’s ideas as if they were your own + write about someone else’s ideas without giving a reference + use someone else’s words exactly without indicating that it is a direct quote and referencing it + use more or less the same words as another writer even if you acknowledge their work + copy another student’s work + submit work written for you by another person + cut and paste material from the internet, putting pieces of text together to form an essay. ALWAYS: + cite your references
  • 51. Introduction to Intellectual Property and Intellectual Property Rights
  • 52. What is meant by “intellectual property” and “intellectual property rights”? Which are the IP protection tools available? •Patent •Utility Model •Industrial Design •Trademark •Copyright
  • 53. • What is meant by “intellectual property” and “intellectual property rights”? Intangible assets: • Results of creative efforts from the human intellect • Such creations cannot be materially measured
  • 54. Business assets • Tangible Assets e.g. buildings, machinery, infrastructures ... • Intangible Assets (intellectual property) e.g. know-how, human resources, business relationships, brands …
  • 74. The IP Chain of Activities • Creation • Innovation • Commercialization • Protection • Enforcement
  • 75. IP as a property • Can be sold • Can be bought • Can be lease or rent • Can pass under a will • Can be assigned
  • 76. The Legal Framework for IP • MyIPO is the legal custodian. • Three machinery of administration • - the IP office • - the external machinery • - the court
  • 77. International Convention for IP • Paris Convention for Protection of Industrial Property 1967 ( 1989) • Berne Convention for the Protection of Literary and Artistic Works 1971 ( 1990) • Trade-related aspects of Intellectual Property Agreement 1994 ( 1995)
  • 78. The Laws For Intellectual Property Protection • Copyright Act 1987 • Trademarks Act 1976 • Patent Act 1983 • Industrial Design Act 1996 • Geographical Indications Act 2000 • Law of Tort • -passing-off • Confidential information