team lecture presentation 2

39
Chapter 8: Big Data and Privacy The Social Cougars: Nick, Stephanie, Martina, Kevin, and Bennett

Upload: nick-buonvicino

Post on 26-Jan-2017

101 views

Category:

Education


3 download

TRANSCRIPT

Page 1: Team Lecture Presentation 2

Chapter 8: Big Data and Privacy

The Social Cougars: Nick, Stephanie, Martina, Kevin, and Bennett

Page 3: Team Lecture Presentation 2

Privacy DevelopmentConcept developed by Cooley (1888), who viewed privacy as “an absolute protection.”

Warren and Brandeis challenged the right of newspapers to invade domestic life through “words and flash photography.”

Brandeis’s theorized that the right of privacy should be left alone, and it was later developed into law.

Page 4: Team Lecture Presentation 2

Privacy DevelopmentIn the 20th century, the main

concern was focused on news media disclosing embarrassing fact, and notions of respectable behavior in the community

In today’s day in age, with new technologies like smartphones, aerial photography and satellite imagery, it sparked major concern.

At the same time, this “governmental intrusion by law enforcement,” raised more questions about the search and seizure privacy law.

Page 5: Team Lecture Presentation 2

Important Documents on PrivacyThe Electronic Communications Privacy Act of 1986 - criminalized interception of computer data.

The PATRIOT Act - passed after the September 11th Attacks; gave law enforcement agencies the right to monitor private personal data, and share it with other police powers trying to prevent future attacks.

Health Insurance Portability and Accountability Act of 1996 - Provides the ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose their jobs;

Reduces health care fraud and abuse;Mandates industry-wide standards for

health care information on electronic billing and other processes; and

Requires the protection and confidential handling of protected health information

Page 6: Team Lecture Presentation 2

The Fourth AmendmentThe right of the people to be secure in their persons, houses, papers, and effects, against unreasonable

searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause,

supported by Oath or affirmation, and particularly describing the place to be searched, and the persons

or things to be seized.

Page 7: Team Lecture Presentation 2

Why is the Fourth Amendment so Important?

It's one of the first and foremost securities that every American has - and takes for granted.

The Constitutionally-guaranteed right to feel safe and secure in our homes... without ever giving a second thought that our government will come bashing in our doors in the middle of the night.

Many people all over the world actually live in regimes where this is common.

In America - it is part of the foundation of this country that this government will NEVER have that power.

Page 8: Team Lecture Presentation 2

Edward Snowden and the NSAEdward Snowden: former CIA employee who copied and leaked classified information from the National Security Agency (NSA), revealing that they were engaged in broad surveillance of online communication, including social media practices.

Publication of this information from news outlets like the New York Times and the Washington Post forced the Obama Administration to defend its practices.

Page 9: Team Lecture Presentation 2

Privacy Policies of Top Social Media Sites

Page 10: Team Lecture Presentation 2
Page 11: Team Lecture Presentation 2

TwitterOne of the most public social

media sites

Users must have a public profile

Anyone may follow a user, but can also block users for spreading spam

Twitter limits each tweet up to 140 characters, stating that, “What you say on Twitter may be viewed all around the world instantly.”

Twitter users complained that if they cannot block users, they would feel unsafe to use it.

In late 2013, Twitter suspended blocking users, which lead to mass online protest with #RestoreTheBlock

Changes to the block feature would encourage online abuse and harassment to the service.

Page 12: Team Lecture Presentation 2

Twitter broadly collects data, and has a right to use it.

The Twitter default is public data, unless someone deletes information, or locks down their account in their privacy settings.

Twitter also tracks your interactions to “help improve our service,” and “provide more relevant advertising.”

Log Data - may include information such as your IP address, browser type, operating system (OS) etc.

Twitter users can delete their accounts, but the service holds your data for 30 days

Twitter users must be at least 13 years of age, and will delete data if it finds that the user is younger.

Page 13: Team Lecture Presentation 2
Page 14: Team Lecture Presentation 2

Like Twitter, Facebook has also received user criticism over changes to its default privacy settings over the last couple of years.

Users may not want to share their personal information outside of their friends list, however some data is difficult to protect.

Examples: Being tag in photos, or uploading your contact information

Facebook closely tracks user behavior

Examples include looking at another person’s profile, sending and receiving messages, or using the Facebook mobile app.

Page 15: Team Lecture Presentation 2

FacebookSocial media privacy concerns

mainly focus on data that has commercial value. On Facebook, their user data is tapped in many ways:

Location accuracy and GPS to tell you where there are nearby friends or events.

Offer deals in which you might be interested in.

When a user shares information to the public, data can be used with third party services and others off Facebook.

Even though Facebook has access to your information, you ALWAYS own all of your information. They will never share information they receive about you unless they have

Received your permission

Given you notice

Removed your name, and any other personally identifying information from it.

You can deactivate your account, but your data is stored for about 90 days.

Page 17: Team Lecture Presentation 2

Tumblr is a microblogging and social networking website founded by David Karp in 2007. The site allows its users to post multimedia and other content to a short- form blog. Users can follow other users blogs, as well as make their blogs private. Much of the website's features are accessed from the dashboard interface, where the option to post content and posts of followed blogs appear. As of April 1, 2016 Tumblr has over 287.6 million blogs and 555 million monthly visitors. Yahoo purchased Tumblr in June of 2013

Page 18: Team Lecture Presentation 2

Tumblr“When you use the Services, you are consenting to the collection, transfer, manipulation, storage, disclosure, and other uses of your information as described in this Privacy Policy; please read it carefully”“We also allow users to look for their friends by e-mail address; you can, however opt out of this feature through your Account Settings page, we do not expose your email address to the public or third parties, except in the limited circumstances.”

“While you are free to remove published published pieces of content from or delete your Account, because of the nature of Internet Sharing, the strong possibility of Reblogging of your content by others, and technological limitations inherent to the Services, copies of that content may exist elsewhere and be retained indefinitely, including in our systems”

Page 19: Team Lecture Presentation 2
Page 20: Team Lecture Presentation 2

Instagram- Information We CollectInformation you provide us directly(Username, Password, Email, Profile Information, Content & Communication

Finding your Friends on IG (Social Media Accounts, Device Contacts, Search Friends

Analytics Info (Measures Traffic & Usage)

Cookies & Similar Technologies (Pixels, Web Beacons, and Storage to Collect info on how you use IG and Provide Features to You). [ADVERTISEMENTS]

Log File Info

Device Identifiers (Access Data from your device(s) and store one or more “device identifiers”)

Metadata (Describes how, when, and by whom a piece of User Content was collected and how that content is formatted)

Page 21: Team Lecture Presentation 2

Instagram

How We Use Your Info- Helps the user access info after they login. Remember Login info. Provides Personalize Content. Improves Service, Monitor Metrics, Diagnose or Fix Tech Problems. Automatic Updates

How We Store your Info- “Your information collected through the Service may be stored and processed in the United States or any other country in which Instagram, its Affiliates or Service Providers maintain facilities.”

This also includes the transfer of Info to Countries in which you travel.

Your Choices About your Info- Updates of Account, Subscriptions, Termination of Account etc.

Children’s Policy- Children under the Age of 13 are not Allowed to use IG

How to Contact us About a Deceased User

How to Contact Us- IG HELP CENTER

Changes to Our Policy- Updates from Time to Time

Page 22: Team Lecture Presentation 2

Sharing of your Info

“We will not rent or sell your information to third parties outside Instagram (or the group of companies of which Instagram is a part) without your consent, except as noted in this Policy.”

Parties whom we may share your info- Businesses that are affiliates with IG, Service Providers, & Third Party Ad Networks. Mostly Cookies and Login Info.

Parties whom you may Share Content- Any Public Content based on your Privacy Settings

What Happens in the event of a change of Control- Your informations will be giving to the new “HBIC” (lol) however your content will remain yours.

Responding to legal request and preventing harm- Your information will be shared. Also when Fraud may be a concern as well as to prevent death, body harm, or the violation of the terms and policy.

Page 23: Team Lecture Presentation 2

LinkedIn“With your approval, your connections may provide recommendations and

endorsements of you”

The goal of the site is to allow registered members to establish and document networks of people they know and trust professionally.

Unlike facebook on LinkedIn you have connections instead of friends

With basic membership, a member can only establish connections with someone he has worked with, knows professionally (online or offline) or has gone to school with.

Page 24: Team Lecture Presentation 2

LinkedInTop Priority is Maintaining Trust

We protect your personal information and will only provide it to third parties:

(1) with your consent;

(2) where it is necessary to carry out your instructions;

(3) as reasonably necessary in order to provide LinkedIn features and functionality to you;

(4) as we reasonably believe is permitted by law or regulation;

(5) as necessary to enforce our User Agreement or protect the rights, property, or safety of LinkedIn, its Members, and the public.

Page 25: Team Lecture Presentation 2
Page 26: Team Lecture Presentation 2

VineOwned by Twitter

Vine is very open about their data collection

Receives your information through mobile apps, email notifications, websites, and other interactions.

When using their services, you are giving consent to the collection, transfer, manipulation, disclosure, and other uses of your information

You authorize vine to use your information in the United States, or any country that VIne operates.

Vine also collects and stores contact information by matching the information you provide with the contact information of other Vine users.

They do not retain your address book information after theses matches.

Page 27: Team Lecture Presentation 2
Page 28: Team Lecture Presentation 2

Snapchat is designed to send “point-to-point brief videos that appear to disappear after being viewed.”

Snapchat’s privacy policies explain that the data is stored for viewing before messages are even opened.

Most of Snapchat’s infrastructure is hosted on App Engine, Google’s cloud computing service.

Most of the data are kept in App Engine’s datastore until they are deleted.

Page 29: Team Lecture Presentation 2

Data Retrieval

Capable of retrieving unopened snaps from the datastore

Does not manually retrieve and look at Snaps under ordinary circumstance.

If Snaps are on their servers, they must comply with the Electronic Communication Privacy Act (ECPA).

If law enforcement gets involved, they must produce and hand over unopened snaps to help the investigation.

Page 30: Team Lecture Presentation 2
Page 31: Team Lecture Presentation 2

Google+It integrates all Google services and displays a new Google+ menu bar on other Google

services when you're logged into a Google account.

Circles is just a way of setting up personalized social circles, whether they be centered around work or personal activities.

Huddle is a group chat for phones. Rather than individually sending SMS messages, Huddle can pool them together to make a group chat which is still private to outside viewers, unlike Twitter.

Hangouts is just video chat and instant messaging.With Hangout, you can signal availability to some or all of your circles.

Sparks is a suggestion engine that finds interesting Web items based on your interests. You can pick from categories of interest and share items you find with others in your stream.

Google says it uses data to “make those services even better— to show you more relevant search results and ads, to help you connect with people or to make sharing with others quicker and easier”

Page 32: Team Lecture Presentation 2

Google+“We may collect information about the services that you use and how

you use them, like when you visit a website that uses our advertising services or you view and interact with our ads and content”

Collects Location data from Mobile phones and wifi hotspots.

Collects data through cookies

“We will share personal information with companies, organizations or individuals outside of Google when we have your consent to do so”

Page 33: Team Lecture Presentation 2

Overall Conclusion on Analysis1.Social media communication

tends to be public, except where sites allow users to dial back and opt out of specific features.

2.Social Media Sites (SMS) track user data for system improvement, user direction, and advertising.

3.Data tend to be retrievable, and copied, which makes deleting the content time consuming.

4. Users need to understand the implications of privacy policies, opt out of what is possible and not use social media if they desire privacy.

5. User should consider “site purpose and context” when deciding to participate.

6. When it comes to privacy, the rule of thumb is “buyer beware.”

Page 35: Team Lecture Presentation 2

Big Data and PrivacyBig data definition is not clear, but it is related to predictive analytics,

data mining and trends

For Example:Facebook and Advertising

Over all people continue to give intimate information over social medias for different reasons which could be self-

interested, altruistic, or civil minded reasons.

Allen (2013) believes that assertive consumers do not give social media business and government a pass on privacy and

ethics, but rather create the potential for a stronger system of safeguards.

Page 36: Team Lecture Presentation 2

Germany and Privacy Leader in online data privacy protection since 1970’s

Avoid ABUSE of personal data which citizens had experienced under Hitler and saw in the east, before the fall of the

Berlin Wall.

The U.S. NSA PRISM spy Program was not legal in Germany’s Terms

The BDN is not allowed to register and store communications data on a wide scale or randomly tap phone conversations.

Page 37: Team Lecture Presentation 2

However the German Government cannot protects people's’ privacy from social medias because sites like facebook and other media sites locate their European operations in Ireland, who have weaker data privacy laws.

Google and many large companies use their size and power to ignore concerns.

Suspension of SAFE HARBOR rules that allow sharing of European Union banking information with companies in the U.S.

Page 38: Team Lecture Presentation 2

FTC Regulation In the U.S., the strongest privacy protections for social media consumers come from the Federal Trade Commission regulation, and have called upon Congress to create laws that would address data security measures.

FTC identified 3 critical areas to address1. Privacy by Design - companies should build in consumers’ privacy protection at every

stage in developing their products

2. Simplified Choice for Businesses and Consumers - companies should give consumers the option to decide on what information is shared about them,and with whom.

3. Greater Transparency - companies should give details about their collection and use of consumers’ information, and provide the consumers access to the data collected about them.

Page 39: Team Lecture Presentation 2

Discussion Questions1.How have your expectations for personal privacy changed, if at all, in the age of social media? What are your most important concerns

2.What do you think can be done to align United States privacy policies with those in the European Union? What are the advantages and disadvantages of global policies?

3.What are the significant implications for privacy based upon use of mobile smartphones and tablets to access social media sites? Which areas might lead to litigation or changes in law?