Eric Gonnella Internet and Society September 21, 2015 MW 8:00-9:50 Chapter 2 .
2.1 What does the term personal information mean? Personal information is any type of stored credentials, credit cards. Its generally anything that you feel is information about you that should be distributed only at your discretion, or with consent of your knowing. 2.2 What does the term secondary use mean? Give an example. Secondary use is the use of someone information being used for a reason other than the person who supplied meant for it to be used. Such as Facebook selling off peoples information and statistics to advertisers to have targeted ads.
.
2.3 What does the term reidentification mean? Give an example. Re-identification means identifying someone from a pool of anonymous data. The information becomes present from things such as searches in web browsers and search engines.
.
2.4 Explain the difference between optin and optout policies for secondary uses of personal information. Opt-in policy means the company or collector may not use the information gathered as secondary use as long as the individual signs or checks a box indicating the used of it. Opt-out policy means that the individual must check on a box, sign a paper or do another form of confirmation to request that the collector not use certain parts of information or use it in a certain way.
.
2.5 Describe one application of face recognition that infringes privacy. In the case of the 2001 Super Bowl police scanned and surveyed all 100,000 fans and employees as they entered the stadium, with no warning or information returning to the individuals entering the stadium. The police were scanning for criminals entering the stadium, but without disclosure to any of the participants entering the stadium it was deemed an infringement of privacy.
.
2.6 Describe two tools people can use to protect their privacy on the Web. Encryption, which is basically the idea of encoding a file with a password or sequence that is only know to the individual and select others to gain access to them. Digital Cash, such as Bitcoin and Litecoin, are used to make secure payments without the ability to be tracked back to a source or to be compromised in a way that could destroy your livelihood.
.
2.7 Describe two methods a business or agency can use to reduce the risk of unauthorized release of personal information by employees. General Exercises Just like the response to the previous question, better encryption can be used to allow only access to members under surveillance with knowledge of who accessed it and at what time. Another method that could be used is
.
2.8 A company in the Netherlands that makes navigation devices collects location data from the devices to provide realtime services to its customers. It also provides anonymous statistical data to government agencies to improve roads and traffic flow. Unknown to the company and its customers, the police used the data to choose sites for traffic cameras to catch speeders. Was this a privacy violation? Why or why not? The trick with this is what kind of terms of usage and conditions were established before the user began using this technology. By accepting terms and clicking the acceptance box they could have full reign to use any collected data throughout the usage of the device. As far as the cameras being installed, any type of unannounced monitoring of civilians or officials is entirely a breach of privacy. Had they announced this and allowed for rebuttal and vote it would be allowed.
.
2.44 Local law enforcement agencies are increasingly using drones (small, relatively inexpensive, remote controlled aircraft). With their cameras and heat sensors, the drones can locate missing hikers, monitor crowds, and track fleeing criminals. News reporters and other private individuals might also use them in the near future. Find a report of an actual use of a drone. Describe it briefly. Does it threaten privacy? The article I found dealt with the trouble of drones and how inaccurate they have been. With the adaption of newer technology, the efficiency of the drones being used in emergency response has become outdate. EagleEye has begun to rework the entire system and OS involved with the drones to
make them overly responsive and “smarter”. This does not threaten privacy, as long as this does not being to interfere with others and public directly.
.
2.45 Google Street View’s cameras occasionally capture people in embarrassing behavior and in places they would prefer the whole world not see them. Many people objected that Street View violated people’s privacy. How, and how well, does Google address the privacy concerns? On the Google Street view page the concern of privacy is addressed in the following topics. Public access only, the site is not private to any party and is open information to all. Street view is not real time; this is due to the information needing to be processed over a couple of months’ span. Lastly, individuals and license plates are blurred. This allows for the protection and privacy of all users and by passers to be secure in knowing that they wont lose their integrity on the site.
.
2.46 Read the guidelines for computer searches written by Judge Alex Kozinski in the decision in United States of America v. Comprehensive Drug Testing (Ninth Circuit, U.S. Court of Appeals, September 13, 2010). Summarize and evaluate them.