Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Privacy
1ey concern of Internet !sers
To$ reason hy non!sers still avoid the Internet
6efinition
7The right to (e left alone8the most com$rehensive of
rights, and the right most val!ed (y a free $eo$le9
7The right of individ!als to control the collection and !se
of information a(o!t themselves9
Legal as$ects
Protection from !nreasona(le intr!sion !$on one:s
isolation
Protection from a$$ro$riation of one:s name or li*eness
Ethics in Information Technology, Second Edition %
The Right of Privacy
Legal as$ects
Protection from !nreasona(le $!(licity given to one:s
$rivate life
Protection from $!(licity that !nreasona(ly $laces one in
a false light (efore the $!(lic
Ethics in Information Technology, Second Edition &
The Right of Privacy (continued)
>ther initiatives
BBB >nline and TRCSTe
Inde$endent, non$rofit initiatives
#avor an ind!stry4reg!lated a$$roach to data $rivacy
Ethics in Information Technology, Second Edition )
Recent History of Privacy Protection
(continued)
>$t4o!t $olicy
3ss!mes that cons!mers a$$rove of com$anies
collecting and storing their $ersonal information
ReD!ires cons!mers to actively o$t o!t
#avored (y data collectors
>$t4in $olicy
/!st o(tain s$ecific $ermission from cons!mers (efore
collecting any data
#avored (y cons!mers
Ethics in Information Technology, Second Edition +
Recent History of Privacy Protection
(continued)
Ethics in Information Technology, Second Edition ,
u!!ary of the "#$% O&C' Privacy
(uide)ines
6ata encry$tion
Identity theft
-!stomer $rofiling
Wor*$lace monitoring
S$amming
-ry$togra$hy
Science of encoding messages
>nly sender and intended receiver can !nderstand the
messages
1ey tool for ens!ring confidentiality, integrity, a!thenticity
of electronic messages and online (!siness transactions
Encry$tion
Process of converting electronic messages into a form
!nderstood only (y the intended reci$ients
Ethics in Information Technology, Second Edition 1,
'ata &ncryption .
Encry$tion *ey
Earia(le val!e a$$lied !sing an algorithm to encry$t or
decry$t te5t
Information incl!desH
<ame
3ddress
6ate of (irth
Social Sec!rity n!m(er
Pass$ort n!m(er
6river:s license n!m(er
/other:s maiden name
Ethics in Information Technology, Second Edition 2"
-dentity Theft .
Phishing
3ttem$t to steal $ersonal identity data
By tric*ing !sers into entering information on a
co!nterfeit We( site
S$ear4$hishing 4 a variation in hich em$loyees are sent
$hony e4mails that loo* li*e they came from high4level
e5ec!tives ithin their organiFation
Ethics in Information Technology, Second Edition 2%
-dentity Theft .
S$yare
1eystro*e4logging softare
Ena(les the ca$t!re ofH
3cco!nt !sernames
Passords
-redit card n!m(ers
>ther sensitive information
>$erates even if an infected com$!ter is not connected to
the Internet
-oo*ies
Te5t files that a We( site $!ts on a !ser:s hard drive so
that it can remem(er the information later
Trac*ing softare
-amera s!rveillance
C.S. cities $lan to e5$and s!rveillance systems
7Smart s!rveillance system9
6ata encry$tion
P!(lic *ey encry$tion system
Private *ey encry$tion system
Identity theft
Ethics in Information Technology, Second Edition %%
u!!ary