Privacy and Information Week 5. Computers and Government uThousands of government offices and...
-
Upload
elinor-mcdaniel -
Category
Documents
-
view
216 -
download
0
Transcript of Privacy and Information Week 5. Computers and Government uThousands of government offices and...
![Page 1: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/1.jpg)
Privacy and Information
Week 5
![Page 2: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/2.jpg)
Computers and Government
Thousands of government offices and departments exist
All use computers in some manner
![Page 3: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/3.jpg)
Most common uses
Data collection and maintenance
Research Code breaking Defense and?...
![Page 4: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/4.jpg)
Big Brother
More than 2000 government databases exist
We leave many data trails to facilitate the collection of information
Government pushes their rights to protect ours
![Page 5: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/5.jpg)
Law Enforcement
National Crime Information Center Help law-enforcement agencies share
info to catch criminals Benefits
any agency can access records lots of info available criminal histories info on existing warrants easy for intrastate usage
![Page 6: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/6.jpg)
Law Enforcement
Problems lack of control of entry lack of control of usage ease of access by employees
Abuse of power Invasion of privacy Inaccuracy Not every state is “in”
![Page 7: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/7.jpg)
National ID Cards
Multi-purpose cards Smart card -
microprocessor and memory
used when interacting with governments and banks, medical
![Page 8: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/8.jpg)
Benefits
Need to actual card to verify identity
Harder to forge Carry only one card Reduces fraud Prevents illegal work
![Page 9: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/9.jpg)
Civilian applications of government technologies
Economic espionage Sharing of technology
between law enforcement and other agencies
Military surveillance technology used in civilian applications
![Page 10: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/10.jpg)
Threats to Privacy
Government has wide scope of activities large amount a data
available power to require us to
provide information ability to use and misuse
databases
![Page 11: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/11.jpg)
Computers have facilitated....
the collection of data analysis of data storage of data access of data distribution of data Reasons - speed and anonymity Internet has broadened access to
information
![Page 12: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/12.jpg)
Database
Program to help you store, manage, search, analyze, and access large amounts of data
records fields Tree structure for search
![Page 13: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/13.jpg)
Other Databases
Employee ID scanners
Prescription drugs
Bank machines Cellular phone
calls Browsing on Net -
cookies Sweepstakes
Satellites Credit/Debit cards Supermarket
scanners Electronic tolls Mail-order
transactions E-mail
![Page 14: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/14.jpg)
Public records
DMV Voter registration Birth and death
certificates Marriage
certificates Property records Court records Divorce records
Arrest records
Postal address records
![Page 15: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/15.jpg)
Confidential Records
Social welfare information
Tax information
School records
Public library records
Criminal history
Health records
![Page 16: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/16.jpg)
Internet and data collection
Cookies Search engines - quicker more
available info open ended nature of net - no
rules to define what is personal info
newsgroup, chat rooms, e-mail remains available for years
![Page 17: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/17.jpg)
Purposes of Record Systems
Help agencies perform their functions efficiently
Determine eligibility for government job
Determine eligibility for benefits programs
Detect fraud Recover payments of delinquent
debt
![Page 18: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/18.jpg)
Acquisition of Data
Census Surveillance Identification Networking
![Page 19: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/19.jpg)
Methods Used
Computer matching Combining and comparing
information from different databases
Computer profiling using data in computer files to
determine characteristics of people most likely to engage in a certain behavior
![Page 20: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/20.jpg)
Data Mining
Analyze to perform data profiles
Create from customer files then matches are made
Businesses and governments keep records and sell them
![Page 21: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/21.jpg)
Data Mining Results
Analysis of data for relationships that have not been discovered Associations
one event can be correlated to another
Sequences One event leads to another
Classification Recognition of patterns resulting
in new organizations
![Page 22: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/22.jpg)
Data Mining Results Continued
Clustering Finding and visualizing groups
of facts not previously known Forcasting
Discovering patterns in the data that can lead to predictions about the future
![Page 23: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/23.jpg)
Data Mining Uses
Target customers Advertise to current
customers Manipulate markets Select, monitor, and
control employees
![Page 24: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/24.jpg)
Most common tool
Social security number
![Page 25: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/25.jpg)
Social Security Number
Major use for identification Linked to
banking data credit report driving record earnings history work history .......
![Page 26: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/26.jpg)
Credit Bureaus
Provide a central storehouse of information used to evaluate applicants for credit
data supplied by banks, stores, and other businesses
Public records - lawsuits, liens, bankruptcies
![Page 27: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/27.jpg)
Regulation of Credit Bureaus
Regulated by federal government Fair Credit Reporting Act
can give information to employers, government, and insurance companies, and those who need it for legitimate purposes involving customer
VAGUE?
![Page 28: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/28.jpg)
Changes
Legal right to get a copy of their own report for free, and a list of those who have requested it
Prohibit employers from obtaining reports without person’s permission or at all except for special kinds
of jobs
![Page 29: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/29.jpg)
Medical Records
Data is personal and sensitive Can be used for marketing
purposes Hard to restrict due to varying
laws in different states Insurance benefits require
that we tell all
![Page 30: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/30.jpg)
Technical and Management Protections
Each authorized user has unique ID code and password
Restrict operations of different users in areas where they do not need to go
Use audit trails to track usage by workers
Computer records reduce handling and potential reading
![Page 31: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/31.jpg)
Risks due to databases
Unauthorized use by people who maintain them
Access from intruders Mishandling Errors and potential
problems Unintentional side-effects
![Page 32: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/32.jpg)
Creep Phenomenon
If information is collected, it will probably be used for many purposes that were not intended when the project started
![Page 33: Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.](https://reader035.fdocuments.net/reader035/viewer/2022062421/56649e045503460f94aefb79/html5/thumbnails/33.jpg)
Biometrics
Verification through unique physical characteristics little fraud fingerprints DNA hand geometry facial recognition facial thermography Etc.