336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.
-
date post
19-Dec-2015 -
Category
Documents
-
view
218 -
download
3
Transcript of 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.
![Page 1: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/1.jpg)
336699
Presentation by Collie Moran, Jenna Barry, Celeste Bergin,
Órla Leland & Brendan Brophy.
![Page 2: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/2.jpg)
Introducing Privacy
• Privacy is a fundamental human right. • It is protected in the Universal Declaration of Human
Rights, the International Covenant on Civil and Political Rights
• Nearly every country in the world includes a right of privacy in its constitution.
• Most recently written constitutions include specific rights to access and control one's personal information.
• In many of the countries where privacy is not explicitly recognized in the constitution, the courts have found that right in other provisions.
![Page 3: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/3.jpg)
Defining Privacy
• Privacy is perhaps the most difficult to define.
• Definitions of privacy vary widely according to context and environment.
• In many countries, the concept has been fused with data protection.
• Privacy protection is frequently seen as a way of drawing the line at how far society can intrude into a person's affairs.
![Page 4: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/4.jpg)
Some viewpoints on privacy:
"The desire by each of us for physical space where we can be free of interruption, intrusion, embarrassment, or accountability and the attempt to control the time and manner of disclosures of personal information about ourselves." - Robert Ellis Smith, editor of the Privacy Journal
Privacy is an interest of the human personality. It protects the inviolate personality, the individual's independence, dignity and integrity. - Edward Bloustein, “Privacy as an Aspect of Human Dignity,” 39 New York University Law Review, p. 971 (1964)
The right of the individual to be protected against intrusion into his personal life or affairs, or those of his family, by direct physical means or by publication of information. - The Calcutt Committee in the United Kingdom
![Page 5: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/5.jpg)
Aspects of Privacy
• Information Privacy
• Bodily Privacy
• Privacy Communications
• Territorial Privacy
![Page 6: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/6.jpg)
Models of Privacy Protection
• Comprehensive Laws
• Sectoral Laws
• Self-Regulation
• Technologies of Privacy
![Page 7: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/7.jpg)
The Evolution of Data Protection
Interest in the right of privacy increased in the 1960s and 1970s with the advent of information technology.
The surveillance potential of powerful computer systems prompted demands for specific rules governing the collection and handling of personal information. The genesis of modern legislation in this area can be traced to the first data protection law in the world enacted in the Land of Hesse in Germany in 1970. This was followed by national laws in Sweden (1973), the United States (1974), Germany (1977), and France (1978).
![Page 8: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/8.jpg)
The expression of data protection in various declarations and laws varies. All require that personal
information must be:
• obtained fairly and lawfully;• used only for the original specified purpose;• adequate, relevant and not excessive to purpose;• accurate and up to date;• accessible to the subject;• kept secure;• destroyed after its purpose is completed.
![Page 9: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/9.jpg)
Privacy laws and the internet
![Page 10: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/10.jpg)
Contents of Laws
• Government records
• Privacy laws
• Amendment I
• Amendment IV
• The patriot act
• Electronic Communications Privacy
Act of 1986
• Communications Assistance for
Law enforcement Act 1994
![Page 11: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/11.jpg)
Government keep record of milestones in our lives
• Birth certificate,
• School exams
• Driving license
• Buying a house
• Getting married
• Death certificate
![Page 12: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/12.jpg)
First Amendment
• Congress shall make no law respecting
an establishment of religion, or
prohibiting the free exercise thereof; or
abridging the freedom of speech, or of
the press; or the right of the people
peaceably to assemble, and to petition
the government for a redress of
grievances.”
![Page 13: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/13.jpg)
Fourth Amendment
• The right of the people to be secure in their
persons, houses, papers, and effects,
against unreasonable searches and
seizures, shall not be violated, and no
warrants shall issue, but upon probable
cause, supported by oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be
seized.”
![Page 14: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/14.jpg)
Electronic Communications
• An electronic communication is the transfer of text, signals, signs, sound,
images, data of any character, transmitted by wire (i.e. the internet),
radio, photo-optical, photo-electronic or electromagnetic system. The only
electronic transmission it does not cover is a tracking device, electronic
and electronic funds transferred by a financial institution.
![Page 15: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/15.jpg)
Electronic Communications Privacy Act of 1986
• The issue of access, use, disclosure, interception
and privacy of electronic communications is
covered under the Electronic Communications
Privacy Act 1986 (ECPA). Effectively this covers any
information or communication that is transmitted
partly or wholly by wire, or some other form of
electronic means that affects interstate or foreign
commerce. Under this act, unlawful access or
disclosures of certain contents are prohibited. The
government are also subject to this act and
requires that they must follow certain appropriate
procedures in order to gain lawful access to
electronic communications
![Page 16: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/16.jpg)
The Patriot Act
• The US Patriot Act was passed as a
response to the terrorist attacks of
September 11, 2001. This act is put
in place to allow greater law
enforcement and foreign intelligence
gathering by Federal officials and
significantly increasing their
surveillance, authority in tracking
and intercepting communications by
monitoring private communications
and access personal information.
![Page 17: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/17.jpg)
Communications Assistance for Law enforcement Act 1994
• Congress enacted this law to protect public
safety ensure and national security on
October 25, 1994. Telecommunications
carriers are obliged to assist law
enforcement agencies in executing
electronic surveillance pursuant under
lawful authorisation, interception of
communications and the collection of call-
identifying information.
Telecommunications companies should also
have the required capability and adequate
capacity to help law enforcement agencies
![Page 18: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/18.jpg)
Next ………………….
There are many cases in the US at the moment where the government are using different forms of technology and software to infringe on peoples privacy rights for example cookies, chat-room software, wire-tapping, keystrokes and data-mining.
Celeste is now going to discuss the software involved and cases
related to the usage of them.
![Page 19: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/19.jpg)
UNCLE SAM IS TAPPING INTO
YOUR PERSONAL BUSINESS
![Page 20: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/20.jpg)
DATAINTEGRATION•Pressure on companies
•Data-Mining programs
•Purchase from private sector
![Page 21: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/21.jpg)
INTERNET WIRETAPPING
•FBI – “Carnivore”
•Broadband and Internet phone services
![Page 22: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/22.jpg)
COOKIES
•Drug Enforcement
•Government agency's non-compliance
![Page 23: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/23.jpg)
CHATROOMS
Software funding and the CIA
![Page 24: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/24.jpg)
KEYSTROKE RECORDER
The Case of Nicodemo Scarfo Jr. (Little Nicky)
Other keystroke methods
![Page 25: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/25.jpg)
Computer Ethics & Privacy
“Computer ethics is a branch of practical philosophy, which deals with how computing professionals should make decisions regarding professional and social conduct.”www.wikipedia.org.
![Page 26: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/26.jpg)
Computer Ethics & Privacy
• Introduction of computers
• Introduction of laws
• Introduction of Ten Commandments.– Dr. Ramon C. Barquins paper “In pursuit of a Ten
commandments for computer ethics”.
![Page 27: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/27.jpg)
The 10 Commandments of Computer Ethics www.brook.edu
• 1. Thou shalt not use a computer to harm other people. • 2. Thou shalt not interfere with other people's computer work. • 3. Thou shalt not snoop around in other people's computer files. • 4. Thou shalt not use a computer to steal. • 5. Thou shalt not use a computer to bear false witness. • 6. Thou shalt not copy or use proprietary software for which you
have not paid. • 7. Thou shalt not use other people's computer resources
without authorization or proper compensation. • 8. Thou shalt not appropriate other people's intellectual output. • 9. Thou shalt think about the social consequences of the
program you are writing or the system you are designing. • 10. Thou shalt always use a computer in ways that insure
consideration and respect for your fellow humans
![Page 28: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/28.jpg)
The 10 Commandments of Computer Ethics• Commandment 1) Thou shalt not use a computer to
harm other people – Environment?– Animals?
• Commandment 1 & 10: Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.V’sArticle 19 of the Universal declaration of Human Rights:Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
![Page 29: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/29.jpg)
The 10 Commandments of Computer Ethics
• Commandment 3) Thou shalt not snoop around in other people's computer files. – Finger Tool?– Crime?
• Commandment 7) Thou shalt not use other people's computer resources without authorization or proper compensation. – What about in an emergency?
![Page 30: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/30.jpg)
The 10 Commandments of Computer Ethics
• The dilemma of the Internet:
What we have a right to do V’s
What is right to do…….
The Right to Privacy: No one shall be subjected to arbitrary interference
with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
![Page 31: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/31.jpg)
Rights Ethics & Privacy
• Non-Consequential
• Moral rights rather than Legal Rights
• Example: – The FBI Wiretap.– Wiretapping the Government
![Page 32: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/32.jpg)
Utilitarianism & Privacy
• The greater good• Example: Data mining can lead to the capture of
terrorists…..
![Page 33: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/33.jpg)
Kant & Privacy
• Universality of actions
• Example:– The surveillance of chat rooms
![Page 34: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/34.jpg)
Rule & Act Utilitarianism
• Rule:• Following rules will maximise happiness• Following the 10 commandments
– Example:Commandment 3 Thou shalt not snoop around in other people's computer files.
• Act: Consequences of Individual acts.– Example: Commandment 9 Thou shalt think about
the social consequences of the program you are writing or the system you are designing.
– Thinking V’s Acting
![Page 35: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/35.jpg)
The 10 Commandments of Computer Ethics
• Good Starting Point
• Brief
• Lack of Detail
• Conclusion
![Page 36: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/36.jpg)
Conclusion
![Page 37: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/37.jpg)
Colin
• Introduced privacy and defined it.
• Different forms of privacy
• The four main laws of privacy
![Page 38: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/38.jpg)
Jenna
• The legal end of Privacy
• Amendment 1 & 4
• Act 1 & 2
![Page 39: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/39.jpg)
Celeste
• Issues & Examples
• Wiretapping
• Chat Rooms
• Cookies
![Page 40: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/40.jpg)
Orla
• Ethics & Morality
• The Ten Commandments of Computer Ethics
• Rights Ethics
![Page 41: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/41.jpg)
Ireland on Privacy
• Article 40.3.1
“The State guarantees in its laws to respect, and, as far as practicable, by its laws to defend and vindicate the personal rights of the citizens”
![Page 42: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/42.jpg)
Ireland on Privacy
• Internet Society Commission
![Page 43: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/43.jpg)
Ireland on Privacy
• Protection of Privacy • Data Retention• ICTs
![Page 44: 336699 Presentation by Collie Moran, Jenna Barry, Celeste Bergin, Órla Leland & Brendan Brophy.](https://reader036.fdocuments.net/reader036/viewer/2022062714/56649d265503460f949fdbe6/html5/thumbnails/44.jpg)
References