SlideShare a Scribd company logo
14
Most read
16
Most read
22
Most read
“ Privacy Today”
Overview What is privacy Ways to protect privacy Technology Law Markets What you do yourself 4 types of privacy harms Fair information practices Conclusion
I. What is Privacy? “ Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” Alan Westin: Privacy & Freedom,1967 Privacy is not an absolute We disclose, and we keep private
Privacy as a Process “ Each individual is continually engaged in a  personal adjustment process  in which he balances the desire for privacy with the desire for disclosure and communication….” - Alan Westin, 1967
Solitude  individual separated from the group and freed  from the observation of other persons Intimacy  individual is part of a small unit Anonymity  individual in public but still seeks and finds  freedom from identification and surveillance Reserve the creation of a psychological barrier against  unwanted intrusion - holding back communication Westin’s four states of privacy
II.  Ways to Protect Privacy There are four basic ways to protect privacy: Technology Law Markets Your choices as an individual
Example: Reducing Spam Unwanted e-mail can be an intrusion on your privacy and can reduce the usefulness of e-mail Technology:  Spam filters Law:  the CAN-SPAM Act Illegal to send commercial email with false headers You can unsubscribe from the sender Markets:  you choose an email provider that does a good job of reducing spam Your choices:  you decide not to open that e-mail with the unpleasant header
III. 4 Types of Privacy Harms   We’ll look more closely at 4 categories of privacy harms: Intrusions Information collection Information processing Information dissemination
Privacy Harms
Intrusions “ They” come into “your” space and contact you or tell you what to do Examples: Unwanted email (spam) Unwanted phone calls Technology: Caller ID to screen calls Law: National Do Not Call list Parents entering a teen’s room without knocking Government saying what you can or can’t do with your own body or property
Information Collection “ They” watch what you are doing, more than they should Surveillance & Interrogation Visual, such as peeping Toms Communications, such as wiretapping your phone or email Government, employers, or parents ask you “private” information Example of protections: with a warrant, the government can wiretap or search your house.  Having to get a warrant is a protection, though, against too much information collection.
Information Processing  “ They” have a lot of data, and do things with it Identification: they learn about your “anonymous” actions Data mining: they learn patterns, to decide if you are a good customer or a suspected terrorist Exclusion: they decide you are not a good potential employee or customer, or go on the no-fly list at the airport Secondary use: they collect the data for one reason, but use it for others Note: Information processing can be helpful, when it “personalizes” and gives you better service. But it can invade your privacy when it goes too far or is used in ways that break the rules.
Information Dissemination “ They” disclose data, perhaps more than “you” think they should Breach of confidentiality: a doctor or lawyer discloses more than you wish Transfer to third parties: a company or government shares data about you to persons you don’t expect Public disclosure of private facts: an intimate photo of you, or disclosure of intimate facts Disclosure of untrue facts: you are put in a false light Appropriation: they use your name or picture without your permission
Review: 4 Types of Privacy Harms
IV. Fair Information Practices We will examine five Fair Information Practices have been developed to protect against these sorts of privacy concerns The Federal Trade Commission principles: Notice/awareness Choice/consent Access/participation Integrity/security Enforcement/redress
Notice/Awareness Individuals need notice to make an informed choice about whether to provide information Who is collecting the data Uses for which the data will be used Who will receive the data The nature of the data and the means by which it is collected if not obvious The steps taken to preserve confidentiality, integrity, and quality of the data
Choice/Consent Choice may apply to “secondary uses” – uses beyond the original reasons you provided your data Sometimes choice is “opt in” – they won’t share your data unless you say you want them to HIPAA medical privacy rule – don’t share your data unless you give consent Sometimes choice is “opt out” – they can share your data or contact you, but you can tell them not to Do Not Call list – no telemarketing if you sign up at  www.donotcall.gov Many web sites will not share your data if you “opt out” (tell them not to share)
Access/Participation Individuals in some instances can access the data held about them, and correct any inaccuracies Fair Credit Reporting Act: no-fee credit report at  www.annualcreditreport.com  (some other sites advertise “free” reports that aren’t free) Privacy Act: right to see records held about you by the federal government
Integrity/Security Data should be secure and accurate Without security, can have good privacy policies but hackers gain entry Without accuracy, wrong decisions are made about individuals We should expect reasonable technical, physical, and administrative measures
Enforcement/Redress There is great variety in the ways that privacy principles are enforced Increasingly, companies and government agencies have  Privacy Professionals  to comply with their privacy promises Companies can be fined if they break the promises in their privacy policies (Section 5 of the FTC Act) For some kinds of data (medical, financial, stored communications), there is additional enforcement by individuals or government agencies
V. Conclusion Some themes from today: The link between privacy and freedom – a zone where “they” do not intrude upon “you” The challenges of protecting privacy in our emerging information society The need for the right mix of technology, laws, and markets
Finally: The emergence of privacy professionals A growing profession focused on managing privacy in the information economy We’re here  To ensure protection of privacy while also Helping create the many ways you want information to be used in our information society Thank you for your attention
Presentation written by: Professor Peter P. Swire Ohio State University Center for American Progress www.peterswire.net On behalf of the   International Association of Privacy Professionals www.privacyassociation.org
Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit  http://creativecommons.org/licenses/by/3.0/  or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.  Any use of these materials requires attribution to the IAPP and Peter Swire.

More Related Content

PPTX
Presentation on Information Privacy
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
PDF
Privacy and Data Security
PPT
Personal privacy and computer technologies
PPTX
Information Privacy
PPTX
Privacy in simple
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
Data protection and privacy
Presentation on Information Privacy
Data Privacy: What you need to know about privacy, from compliance to ethics
Privacy and Data Security
Personal privacy and computer technologies
Information Privacy
Privacy in simple
Unit 6 Privacy and Data Protection 8 hr
Data protection and privacy

What's hot (20)

PPTX
Data Privacy Introduction
PPTX
Privacy & Data Protection
PPTX
Data protection ppt
PDF
Data Protection and Privacy
PDF
Data Privacy & Security
PDF
Overview on data privacy
PPTX
Data protection
PPTX
Privacy issues and internet privacy
PDF
Privacy & Data Protection in the Digital World
PPTX
Information privacy and Security
PPT
Data protection in_india
PPT
Data Protection (Download for slideshow)
PPT
Social media and Security risks
PPT
Data Protection Presentation
PPTX
Security Awareness Training.pptx
PPTX
Data security
PPTX
Right to privacy on internet and Data Protection
PPTX
Data Security Explained
PPTX
General Data Protection Regulation
Data Privacy Introduction
Privacy & Data Protection
Data protection ppt
Data Protection and Privacy
Data Privacy & Security
Overview on data privacy
Data protection
Privacy issues and internet privacy
Privacy & Data Protection in the Digital World
Information privacy and Security
Data protection in_india
Data Protection (Download for slideshow)
Social media and Security risks
Data Protection Presentation
Security Awareness Training.pptx
Data security
Right to privacy on internet and Data Protection
Data Security Explained
General Data Protection Regulation
Ad

Similar to “Privacy Today” Slide Presentation (20)

PPT
2008 12 08 2008 Privacy
PPT
U.S. Federal Privacy Protection: An Overview (Concepts and History of the Fed...
PPT
Consumer Privacy
PPT
ethcpp04-Unit 3.ppt
PPTX
Privacy and data protection primer - City of Portland
PPTX
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
PPTX
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
PPT
ethcpp04-Unit 3.ppt
PDF
Privacy in the Virtually Legal Context
PPTX
Privacy and personal information presention of professional practice.pptx
PPTX
Privacy and Civil Liberties
PPTX
Exploring Data Privacy - SQL Saturday Louisville 2011
PDF
PPT
Tech Topic Privacy
PPT
Ecommerce Chap 10
PPT
Chapter2
PPT
Training for managers and supervisors presentation
PDF
pp_101_notes_eng.pdf
PPTX
Privacy and Data Protection CLE Presentation for Touro Law Center
PPTX
GDPR and Cyber Security LW.pptx
2008 12 08 2008 Privacy
U.S. Federal Privacy Protection: An Overview (Concepts and History of the Fed...
Consumer Privacy
ethcpp04-Unit 3.ppt
Privacy and data protection primer - City of Portland
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
ethcpp04-Unit 3.ppt
Privacy in the Virtually Legal Context
Privacy and personal information presention of professional practice.pptx
Privacy and Civil Liberties
Exploring Data Privacy - SQL Saturday Louisville 2011
Tech Topic Privacy
Ecommerce Chap 10
Chapter2
Training for managers and supervisors presentation
pp_101_notes_eng.pdf
Privacy and Data Protection CLE Presentation for Touro Law Center
GDPR and Cyber Security LW.pptx
Ad

More from tomasztopa (7)

PPT
Biznes w 140/160 znakach. Mikroblogowanie.
PPT
Bezpieczenstwo Danych W Firmie
PPT
Blogi firmowe i eksperckie
PPS
OTOZ Animals - schronisko w Dabrowce k. Wejherowa
PDF
Teen Privacy Online
PPT
How NOT To Make Presentations
PPT
Wizerunek w internecie
Biznes w 140/160 znakach. Mikroblogowanie.
Bezpieczenstwo Danych W Firmie
Blogi firmowe i eksperckie
OTOZ Animals - schronisko w Dabrowce k. Wejherowa
Teen Privacy Online
How NOT To Make Presentations
Wizerunek w internecie

Recently uploaded (20)

PPT
Data mining for business intelligence ch04 sharda
PDF
Training And Development of Employee .pdf
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Business model innovation report 2022.pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
Business Ethics - An introduction and its overview.pptx
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
IFRS Notes in your pocket for study all the time
Data mining for business intelligence ch04 sharda
Training And Development of Employee .pdf
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Business model innovation report 2022.pdf
New Microsoft PowerPoint Presentation - Copy.pptx
340036916-American-Literature-Literary-Period-Overview.ppt
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Deliverable file - Regulatory guideline analysis.pdf
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
MSPs in 10 Words - Created by US MSP Network
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
COST SHEET- Tender and Quotation unit 2.pdf
HR Introduction Slide (1).pptx on hr intro
Business Ethics - An introduction and its overview.pptx
Belch_12e_PPT_Ch18_Accessible_university.pptx
Unit 1 Cost Accounting - Cost sheet
WRN_Investor_Presentation_August 2025.pdf
Probability Distribution, binomial distribution, poisson distribution
IFRS Notes in your pocket for study all the time

“Privacy Today” Slide Presentation

  • 2. Overview What is privacy Ways to protect privacy Technology Law Markets What you do yourself 4 types of privacy harms Fair information practices Conclusion
  • 3. I. What is Privacy? “ Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” Alan Westin: Privacy & Freedom,1967 Privacy is not an absolute We disclose, and we keep private
  • 4. Privacy as a Process “ Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication….” - Alan Westin, 1967
  • 5. Solitude individual separated from the group and freed from the observation of other persons Intimacy individual is part of a small unit Anonymity individual in public but still seeks and finds freedom from identification and surveillance Reserve the creation of a psychological barrier against unwanted intrusion - holding back communication Westin’s four states of privacy
  • 6. II. Ways to Protect Privacy There are four basic ways to protect privacy: Technology Law Markets Your choices as an individual
  • 7. Example: Reducing Spam Unwanted e-mail can be an intrusion on your privacy and can reduce the usefulness of e-mail Technology: Spam filters Law: the CAN-SPAM Act Illegal to send commercial email with false headers You can unsubscribe from the sender Markets: you choose an email provider that does a good job of reducing spam Your choices: you decide not to open that e-mail with the unpleasant header
  • 8. III. 4 Types of Privacy Harms We’ll look more closely at 4 categories of privacy harms: Intrusions Information collection Information processing Information dissemination
  • 10. Intrusions “ They” come into “your” space and contact you or tell you what to do Examples: Unwanted email (spam) Unwanted phone calls Technology: Caller ID to screen calls Law: National Do Not Call list Parents entering a teen’s room without knocking Government saying what you can or can’t do with your own body or property
  • 11. Information Collection “ They” watch what you are doing, more than they should Surveillance & Interrogation Visual, such as peeping Toms Communications, such as wiretapping your phone or email Government, employers, or parents ask you “private” information Example of protections: with a warrant, the government can wiretap or search your house. Having to get a warrant is a protection, though, against too much information collection.
  • 12. Information Processing “ They” have a lot of data, and do things with it Identification: they learn about your “anonymous” actions Data mining: they learn patterns, to decide if you are a good customer or a suspected terrorist Exclusion: they decide you are not a good potential employee or customer, or go on the no-fly list at the airport Secondary use: they collect the data for one reason, but use it for others Note: Information processing can be helpful, when it “personalizes” and gives you better service. But it can invade your privacy when it goes too far or is used in ways that break the rules.
  • 13. Information Dissemination “ They” disclose data, perhaps more than “you” think they should Breach of confidentiality: a doctor or lawyer discloses more than you wish Transfer to third parties: a company or government shares data about you to persons you don’t expect Public disclosure of private facts: an intimate photo of you, or disclosure of intimate facts Disclosure of untrue facts: you are put in a false light Appropriation: they use your name or picture without your permission
  • 14. Review: 4 Types of Privacy Harms
  • 15. IV. Fair Information Practices We will examine five Fair Information Practices have been developed to protect against these sorts of privacy concerns The Federal Trade Commission principles: Notice/awareness Choice/consent Access/participation Integrity/security Enforcement/redress
  • 16. Notice/Awareness Individuals need notice to make an informed choice about whether to provide information Who is collecting the data Uses for which the data will be used Who will receive the data The nature of the data and the means by which it is collected if not obvious The steps taken to preserve confidentiality, integrity, and quality of the data
  • 17. Choice/Consent Choice may apply to “secondary uses” – uses beyond the original reasons you provided your data Sometimes choice is “opt in” – they won’t share your data unless you say you want them to HIPAA medical privacy rule – don’t share your data unless you give consent Sometimes choice is “opt out” – they can share your data or contact you, but you can tell them not to Do Not Call list – no telemarketing if you sign up at www.donotcall.gov Many web sites will not share your data if you “opt out” (tell them not to share)
  • 18. Access/Participation Individuals in some instances can access the data held about them, and correct any inaccuracies Fair Credit Reporting Act: no-fee credit report at www.annualcreditreport.com (some other sites advertise “free” reports that aren’t free) Privacy Act: right to see records held about you by the federal government
  • 19. Integrity/Security Data should be secure and accurate Without security, can have good privacy policies but hackers gain entry Without accuracy, wrong decisions are made about individuals We should expect reasonable technical, physical, and administrative measures
  • 20. Enforcement/Redress There is great variety in the ways that privacy principles are enforced Increasingly, companies and government agencies have Privacy Professionals to comply with their privacy promises Companies can be fined if they break the promises in their privacy policies (Section 5 of the FTC Act) For some kinds of data (medical, financial, stored communications), there is additional enforcement by individuals or government agencies
  • 21. V. Conclusion Some themes from today: The link between privacy and freedom – a zone where “they” do not intrude upon “you” The challenges of protecting privacy in our emerging information society The need for the right mix of technology, laws, and markets
  • 22. Finally: The emergence of privacy professionals A growing profession focused on managing privacy in the information economy We’re here To ensure protection of privacy while also Helping create the many ways you want information to be used in our information society Thank you for your attention
  • 23. Presentation written by: Professor Peter P. Swire Ohio State University Center for American Progress www.peterswire.net On behalf of the International Association of Privacy Professionals www.privacyassociation.org
  • 24. Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Any use of these materials requires attribution to the IAPP and Peter Swire.