Sie sind auf Seite 1von 17

PRIVACY

What is privacy? The concept of privacy is broad, and would vary across individuals, groups, and cultures. Its meaning may also vary depending on the context where it is applied. However, privacy in general pertains to freedom from intrusion or interference1, and the right to be free in determining whether, when, how, and to whom, one's personal or organizational information is to be revealed2. Privacy however is not merely secrecy or concealment of information3. The words etymology also suggests privacy as being single or private and thus excluded from a public sphere. In a historical context, the Latin derivation privatus means withdrawn from public life.4 As mentioned above, the encompassing concept of privacy depends on the individual, the circumstance, and the context. Privacy, then, is the capacity to negotiate social relationships by controlling access to personal information.5 With that in mind, there are some general types of privacy we can list down.

Types of Privacy Individual or personal privacy: Pertains to the inherently strong sense of privacy present in or experienced by an individual, usually arising from the sense of modesty. Many of todays privacy laws came about as a response to changes in information and communication technologies6. Others are rooted in cultural sensitivity, personal dignity, or individual preferences o Natural examples of the inherent sense of privacy Exposure of the body, or bodily privacy The use of clothing for the purpose of modesty Physical intimacy or sexual intimacy: nudity or sexual intercourse considered a private matter o Physical privacy or territorial privacy The use of physical partitions for the sake of modesty e.g. urinal partitions, walls inside the home or workplace, bedroom sheets and blankets, curtains, use of cubicles

1 2 3

http://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/what-is-privacy.html http://www.businessdictionary.com/definition/privacy.html

http://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1021&context=lectures_pre_arch_lectures_sibley 4 http://books.google.com.ph/books?id=yEq5KRs-tYC&pg=PA116&lpg=PA116&dq=privacy+etymology&source=bl&ots=pGXzhLzeDB&sig=j50py6DfhNPKsaNM0HQrjgXQ80&hl=en&sa=X&ei=DKp4UZqhAemQiQe6pICoDA&ved=0CF0Q6AEwBQ#v=onepage&q=pri vacy%20etymology&f=false 5 http://polaris.gseis.ucla.edu/pagre/landscape.html 6 http://www.law.louisville.edu/library/collections/brandeis/node/225

Is privacy explicitly stated in the US Constitution? http://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofpriv acy.html Privacy in Legislations, Legal Principles, and Documents Privacy in the 4 Amendment of the US Constitution http://www.time.com/time/specials/packages/article/0,28804,2 080345_2080344_2080374,00.html Privacy according to the UN Universal Declaration of Rights http://gilc.org/privacy/survey/intro.html http://www.hrweb.org/legal/cpr.html#Article 17.1
th

Informational Privacy: The interest an individual has in controlling, or at least significantly influencing, the handling of data about themselves.7 This exists wherever there are concerns over personally identifiable information is collected and stored in digital form or otherwise.8 Informational privacy encompasses an individual's freedom from excessive intrusion in the quest for information and an individual's ability to choose the extent and circumstances under which his or her beliefs, behaviors, opinions, and attitudes will be shared with or withheld from others.9

Personally Identifiable Information

Information that can be used to identify, contact, or locate an individual, either alone or combined with other easily accessible sources http://www.med.miami.edu/hipaa/public/x476.xml

Organizational Privacy: Organizations private companies, government agencies, groups or societies to name a few adopt security measures to keep their activities in private, and to keep information crucial to their operations safe
Security classification levels http://www.fas.org/sgp/library/quist2/chap_7.html Access to classified information http://www.fas.org/sgp/clinton/eo12968.html What is classified information? http://www.wisegeek.com/what-is-classifiedinformation.htm A copy of the Uniform Trade Secrets Act http://euro.ecom.cmu.edu/program/law/08732/TradeSecrets/utsa.pdf Definition of the UTSA according to the Legal Institute of Cornell University

Classified Information

Trade Secrets

7 8

http://www.rogerclarke.com/DV/Intro.html#InfoPriv http://en.wikipedia.org/wiki/Information_privacy 9 http://www.amstat.org/committees/pc/keyterms.html

Trade Secrets

http://www.law.cornell.edu/wex/trade_secret Definition of a trade secret according to the World Intellectual Property Organization http://www.wipo.int/sme/en/ip_business/trade_secrets/tra de_secrets.htm

Right to Privacy Although expressed in many binding legal principles like a constitution, the right to privacy emerged as a response to changing information and communications technologies. According to Warren and Brandeis, it is the right to be let alone10, as a response to the threats of their time, in particular sensationalist journalism. The right to be let alone is not a claim rather a part of the natural order.11 According to Warren and Brandeis, Political, social, and economic changes entail the recognition of new rights, and the common law, in its eternal youth, grows to meet the new demands of society. Thus, in very early times, the law gave a remedy only for physical interference with life and property, for trespasses vi et armis. The physical interference soon turned to less tangible rights, pertaining to intangible property, in t he products and processes of the mind, as works of literature and art, goodwill, trade secrets, and trademarks.12 At the time, the focus of privacy rights advocacy was on newspapers Definitions of Right to Privacy Source of Definition
A former Philippine senator opined about the Right To privacy Global Internet Liberty Campaign also offers a definition of the right to privacy Eurofund shows how right to privacy is defined in one the European powerhouse nations, Germany

Resources
http://salongacenter.org/2011/07/right-to-privacy/ http://gilc.org/privacy/survey/intro.html http://www.eurofound.europa.eu/emire/GERMANY/RIGHT TOPRIVACYOFTHEINDIVIDUAL-DE.htm http://books.google.com.ph/books?id=yeVRrrJwzAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0Ih TaWhEImsQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc =y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f= false http://www.un.org/en/documents/udhr/index.shtml http://www.amstat.org/committees/pc/keyterms.html

The Haifa Center of Law and Technology Publication Series

A definition from the United Nations Universal Declaration of Human Rights Key Terms/Definitions in Privacy and Confidentiality

10 11

http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://sc.judiciary.gov.ph/speech/03-12-08-speech.pdf 12 http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html

Value of Right to Privacy The right to privacy is a response to increasingly intrusive technologies that pose as a threat, or has already compromised critical personal or organizational information. It plays a vital role in data protection and the evolution of this area in the right to privacy may well be seen as the groundwork of the privacy in the digital age. The Philosophy Behind the Right The right to privacy stems from the theory of natural rights.1314 Catalysts: Technological Evolutions With the advent of computers came the ability to automate data processing, which sparked interest privacy issues.

Early Data Processing and Privacy Legislations

Resources
http://www.pabloouziel.com/Academic%20Essay/Protectin g%20Privacy%20or%20Justifying%20Surveillance.pdf

IT developed in 1960s and 1970s and evolution of privacy legislations in Europe The 1981 Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data The 1981 Organization for Economic Cooperation and Development (OECD) provided the Guidelines on the Protection of Privacy and Transborder Flows of Personal Data In 1997, the European Commission Legal Advisory Board passed the Directive Concerning the Processing of Personal Data and the Protection of Privacy in the Telecommunications Sector

http://gilc.org/privacy/survey/intro.html http://conventions.coe.int/Treaty/en/Treaties/Html/108.ht m http://www.oecd.org/internet/ieconomy/oecdguidelinesont heprotectionofprivacyandtransborderflowsofpersonaldata.h tm

http://www.echo.lu/legal/en/dataprot/protection.html

Privacy and Technology Powerful new computing technologies are changing the way data is collected, processes, and shared. Emerging technologies have been seen as persistent threats to privacy, and thus advocacies and campaigns for privacy rights are often seen as responses to these evolving technologies15.

13 14

http://expressliberty.blogspot.com/2005/10/natural-rights-of-property-and-privacy.html http://naturalrightsfoundation.org/right-privacy 15 http://www.gwu.edu/~ccps/etzioni/documents/A379-NewTechnologies.pdf

Warren and Brandeis publication on the Right to Privacy in 1890 focused on protecting individuals as photographs and newspapers increased due to developing printing technologies Warren and Brandeis considered privacy as an individual right, wherein communications had to be controlled, and a property right, wherein intangible properties such as thoughts, emotions, and sentiments deserved to be protected16 New technologies are radically advancing our freedoms but they are also enabling unparalleled invasions of privacy.17 An article by Paul M. Schwartz of the University of California, Berkeley - School of Law, entitled Property, Privacy, and Personal Data was published by the Harvard Law review and is available for download18. The article looks into guidelines that would address serious privacy concerns due to technology, as well as analyzing the promise and peril brought by the commodification of personal data. Changes in the technology landscape has presented benefits but also posed new dangers to privacy. According to a study by the Massachusetts Institute of Technology in 1997, Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging.19

The technological developments listed by the MIT study at the time were: 1. increases in communications bandwidths; 2. the widespread adoption of computer networking and public-key cryptography; 3. mathematical innovations that promise a vast family of protocols for protecting identity in complex transactions; 4. new digital media that support a wide range of social relationships; 5. a new generation of technologically sophisticated privacy activists; 6. a massive body of practical experience in the development and application of data-protection laws; and 7. the rapid globalization of manufacturing, culture, and policy making. Resources on Technological Intrusion of Privacy
10 Technologies Being Used to Invade Our Privacy Privacy Invasion Via Technology: I-Phone Keeps a Record of Everywhere you go Four ways your privacy is being invaded http://voices.yahoo.com/10-technologies-being-used-invadeour-privacy-7690018.html?cat=15 http://www.globalresearch.ca/privacy-invasion-viatechnology-i-phone-keeps-a-record-of-everywhere-yougo/24432 http://www.salon.com/2012/09/11/four_ways_your_privacy _is_being_invaded/

16 17

http://www.law.louisville.edu/library/collections/brandeis/node/225 https://www.eff.org/issues/privacy 18 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=721642 19 http://polaris.gseis.ucla.edu/pagre/landscape.html

Digital Revolution The digital revolution refers to transformations and developments in computing and communications technology that continues to this day. Central to this idea is the shift from analog and electronic technology, to digital technology. It is considered analogous to the Agricultural, and Industrial Revolution. By the 1970s and 80s, computers had become cheap and wide-spread enough that a research lab or large company would have their own mainframe.20 Prior to that, significant milestones in technology were achieved.21 The Internet has largely fueled this continuing revolution since the introduction of the World Wide Web in 1991.22 The very power of advanced computer systems makes them a serious threat to the privacy of the individual. If every significant action is recorded in the mass memory of a community computer system, and programs are available for analyzing them, the daily activities of each individual could become open to scrutiny.23

Privacy in The Digital Age


Internet usage statistics last 2012 The issue of collecting personal information in the digital age Medical privacy under assault in the digital age

Resources
http://www.internetworldstats.com/stats.htm http://education.illinois.edu/wp/privacy/persprivacy.html http://www.washingtonpost.com/wpsrv/national/longterm/exposed/exposed1.htm http://blog.trendmicro.com/trendlabs-securityintelligence/privacy-in-the-digital-age-whose-data-is-itanyway/?utm_source=twitter&utm_medium=shortlink&ut m_campaign=malwareblog

Privacy in the Digital Age: Whose Data Is It, Anyway?

Our lives have become digital. As our dependence on these new technologies go deeper, we can map out how much personal information is online and most likely, accessible to everyone.24 Privacy and the Internet Similar to the heightened interest over privacy rights in the time of Warren and Brandeis, when printing technologies so an increase in newspapers and photographs, the Internets exponential growth has raised even more issues over privacy. At present, privacy concerns with the internet are focused on: signing up for Internet services, email, Internet browsing, interactive use of instant messaging applications, social networking sites, personal domains and blogs, and management of financial accounts and online banking. Weve also seen cybercriminals compromising online security to steal sensitive information for a variety of reasons: profit, vendetta, blackmailing etc. Recently, government involvement in Internet regulation also raised privacy concerns. The resources below look into how privacy is vanishing online.25

20 21

http://www.cs4fn.org/history/digitalrevolution2.php http://www.thepeoplehistory.com/electronics.html 22 http://www.pbs.org/transistor/background1/events/www.html 23 http://www.multicians.org/fjcc6.html 24 http://about-threats.trendmicro.com/us/infographics/infograph/mapping-out-your-digital-life 25 http://www.nytimes.com/2010/03/17/technology/17privacy.html

Internet Privacy Concerns


The Internets nature of recording everything presented new dangers in terms of individual and organizational information Internet users, the government, and tech companies have had contemporary online privacy concerns on their radar since 1995 Citizens of modern societies live in a world of digital data, generating an information trail as they e-mail, shop with loyalty cards, surf the Web, make wireless calls.

Resources
http://www.nytimes.com/2010/07/25/magazine/25privacyt2.html?_r=2&ref=technology& http://lippmannwouldroll.com/2010/08/02/privacy-privacywhere-for-art-thou-privacy/

http://www.wpp.com/wpp/marketing/digital/privacy-in-thedigital-age/ https://www.privacyrights.org/fs/fs18-cyb.htm http://compnetworking.about.com/od/workingwithipaddres ses/a/ipaddresses.htm http://www.ntia.doc.gov/legacy/ntiahome/privacy/files/smit h.htm http://www.justice.gov/criminal/cybercrime/docs/ssmanual2 009.pdf http://www.law.cornell.edu/uscode/text/18/part-I/chapter119 http://conferences.sigcomm.org/sigcomm/2009/workshops/ wosn/papers/p7.pdf http://www.bbc.co.uk/news/technology-12668552 http://adage.com/article/digital/sen-rockefeller-ready-a-realtrack-bill/227426/ https://www.privacyrights.org/fs/fs18-cyb.htm http://www.zdnet.com/blog/btl/ad-network-at-center-ofthird-flash-cookie-lawsuit/38346 http://panopticlick.eff.org/browser-uniqueness.pdf http://www.scientificamerican.com/article.cfm?id=I-worryabout-whos-watching https://www.privacyrights.org/fs/fs18-cyb.htm http://searchenginewatch.com/ http://www.worldprivacyforum.org/searchengineprivacytips. html http://news.cnet.com/2100-1029_3-6202068.html https://www.privacyrights.org/fs/fs18cyb.htm#Interactive_Use http://news.cnet.com/8301-13578_3-9962106-38.html http://www.justice.qld.gov.au/__data/assets/pdf_file/0019/ 21619/internet-photos-privacy.pdf

IP Address: The nature of the IP address and its inherent privacy issues/concerns Email: The use of email presents several privacy concerns as individuals consent to giving information to recipients and to whomever the recipient passes the message.

Cookies: HTTP Cookies can be used or abused to get Personal Identifiable Information

Ad network at center of third Flash Cookie lawsuit Fingerprints: Machine fingerprints send unique information to other computers Increase Internet usage may pose privacy concerns Search engine privacy is also a concern since it can record crucial personal information that could create situations for fraud and identity theft Search engine tips How search engines fare in terms of Privacy Interactive Messages as a source of privacy concerns How safe is instant messaging? A security and privacy survey Privacy in Instant Messaging: An Impression Management Model a study by the Department of Informatics, University of California, Irvine, CA, USA

Photographs and Internet privacy in Australia Unauthorized Photographs on the Internet And Ancillary Privacy Issues A Discussion Paper in Australia Domain Registration and Domain Name Privacy Issues The Privacy Conundrum in Domain Registration: What information is collected when you register a unique domain online Internet Domain Names: Background and Policy Issues A Congressional Research Service Report presented to Members and Committees of US Congress Online Financial and Bank Accounts: Could online hackers steal your cash? Privacy vs. Usability: A failure of Barclays online banking? Online banking continues to present challenges to your financial security and personal privacy Device identification in online banking is privacy threat, expert says What Is SOPA? Online Copy of the SOPA legislation Internet Privacy Threatened by the Stop Online Piracy Act Bastard Offspring of - SOPA SOPA/PIPA: CISPA Adopting SOPA is ending privacy on internet SOPA and PIPA Bills: Differences Between the Two Internet Privacy Acts 'Dead for now:' CISPA halted in the Senate US government prepares new attacks on Internet privacy Hunton & Williams LLP runs a blog providing resources, reports, information, and news on Privacy and Information Security law updates and analysis

http://www.privacy.gov.au/faq/business/gen-q5 http://www.justice.qld.gov.au/__data/assets/pdf_file/0019/ 21619/internet-photos-privacy.pdf http://www.techdirt.com/articles/20091029/1744166723.sht ml http://www.actnowdomains.com/the-privacy-conundrum-indomain-registration.htm http://www.fas.org/sgp/crs/misc/97-868.pdf

http://www.bankrate.com/finance/savings/could-bankhackers-steal-your-money-1.aspx http://www.bensmyth.com/files/Smyth10-attackingBarclays.pdf http://www.uscert.gov/sites/default/files/publications/Banking_Securely_O nline07102006.pdf http://news.cnet.com/8301-1009_3-10226742-83.html http://gizmodo.com/5877000/what-is-sopa http://judiciary.house.gov/hearings/pdf/112%20HR%203261. pdf http://slog.thestranger.com/slog/archives/2013/04/24/inter net-privacy-threatened-by-the-bastard-offspring-ofsopapipa-cispa http://www.euractiv.com/infosociety/adopting-sopa-privacyinternet-analysis-510289 http://www.ibtimes.com/sopa-pipa-bills-differencesbetween-two-internet-privacy-acts-397324 http://rt.com/usa/cispa-halted-senate-415/ http://www.wsws.org/en/articles/2012/05/cisp-m17.html http://www.huntonprivacyblog.com/

Notable Statistics on Usage, Privacy, and Issues


Some Interesting Statistics on Security Breaches on the Internet A list of breaches on health information in the US by the Department of Health and Human Services Privacy Rights lists down a chronological list of data breaches Internet World Stats provides up to date statistics and market trends on global Internet Usage An articles summarizing statistics on growing Internet privacy concerns The National Center for Missing and Exploited Children reports numbers on how online issues are translating into real-life concerns http://www.brighthub.com/internet/securityprivacy/articles/112421.aspx http://www.hhs.gov/ocr/privacy/hipaa/administrative/breac hnotificationrule/breachtool.html http://www.privacyrights.org/data-breach http://www.internetworldstats.com/

http://www.sfgate.com/business/article/Internet-privacy-agrowing-concern-Pew-finds-3407488.php http://www.netsmartz.org/safety/statistics

Privacy in Social Media & Social Networking Sites Along with the rise in Internet usage, of note would be the emergence of social media, and social networking sites. Social networking sites enable people to build connections and relationships with people online. 26 Individuals use social media and networking sites to build relationships, share interests, correspond, and upload and share media like photos, videos, and music. Considering this, social networking services have been under considerable scrutiny for the privacy issues they raise, especially in terms of how these websites store user data. This is especially highlighted as more and more people join such websites.2728 How is the data being used? How much user information is shared to third parties like application developers, advertisers etc.? Do I have rights against social media companies? Who can read or see my online presence?29 We can see how social media privacy concerns extend to real-life incidents like stalking, bullying, burglary, identity theft30, assault3132; employment concerns and work-environment issues; government and law-enforcement monitoring profiles for information and intelligence; as well as large-scale social ramifications infringing on freedom of expression33, political and economic implications like chaos, stock-market false alarms and the like34.

26 27

https://www.privacyrights.org/fs/fs18-cyb.htm#Interactive_Use http://money.cnn.com/2012/10/04/technology/facebook-billion-users/index.html 28 http://www.mckinseychina.com/2012/04/25/chinas-social-media-boom/ 29 http://bits.blogs.nytimes.com/2012/10/14/seeking-privacy-in-a-networked-age/ 30 https://www.privacyrights.org/fs/fs17-it.htm 31 http://m.theglobeandmail.com/news/national/police-prosecutors-failing-sex-assault-cyberbullying-victimsexperts-say/article11176341/?service=mobile 32 http://science.opposingviews.com/negative-effects-internet-copyright-privacy-breaches-4197.html 33 http://gizmodo.com/5877000/what-is-sopa 34 http://blog.hootsuite.com/ap-hack-social-media-security/

Our dependence on social media also makes us vulnerable to cybercriminals and online crooks that go beyond simple privacy intrusion. Many use social media platforms for illegal means. They employ social engineering techniques to get the better of the unknowing social media user.35 Relevant Resources on Privacy Concerns on Social Networking Services Links

ON SOCIAL MEDIA USAGE AND PRIVACY ACROSS THE GLOBE The Pew Internet Research reports on the number http://www.pewinternet.org/Reports/2009/Adults-andof adults joining social networking sites Social-Network-Websites.aspx The American Civil Liberties Union looks into http://aclunc-tech.org/files/lbs-privacy-checkin.pdf location-based networking site services and the privacy concerns they raise Mashable has a dedicated stream of news and http://mashable.com/category/social-media-privacy/ updated concerning Social Media Privacy The Stanford Law reviews focused on the myths http://stlr.stanford.edu/pdf/determannsurrounding social media privacy in this publication socialmediaprivacy.pdf The European Commission discusses, what is the http://ec.europa.eu/justice/dataright to be forgotten? How will the data protection/document/review2012/factsheets/3_en.pdf protection reform affect social networks? How does the large, social media market in China http://www.mckinsey.com/insights/marketing_sales/unders differ from those in the West? tanding_social_media_in_china Some key insights on social media usage in China http://socialmediatoday.com/maggiefox1/352488/quicklook-social-media-china This article discusses how the digital environment http://allthingsd.com/20130308/the-power-ofin China is evolving through social media usage connectedness-how-social-media-usage-among-chinasdigital-natives-is-evolving/ Georgia State University released a study entitled http://api.ning.com/files/s4d9Mrne5HdwcV3OQwprPYkq6u Security in the 21st Century: Examining the Link JU3YwHCAWAO2Fdk4KtcLlxgtnYFVafuibL1afpiCQ07Between Online Social Network Activity, Privacy, yGFzD7g*1iAxKFDEgSpnXKb4Zk/Securityinthe21stCentury.p and Interpersonal Victimization df The University of Tennessee released a study on http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article= the ethical considerations libraries take regarding 1250&context=libphilprac online social networking sites and the privacy issues they raise INFORMATION DISCLOSURE, STORAGE, SHARING Privacy Worries Hound Facebook Yet Again http://blog.trendmicro.com/trendlabs-securityintelligence/privacy-worries-hound-facebook-yet-again/ A noteworthy incident of a privacy breach in http://arstechnica.com/business/2010/05/understandingFacebook the-latest-facebook-privacy-train-wreck/ A 2010 report showcases how Facebook shares http://arstechnica.com/tech-policy/2010/05/latestuser information to advertisers facebook-blunder-secret-data-sharing-with-advertisers/ A research entitled On the Leakage of Personally Identiable Information Via Online Social http://web.cs.wpi.edu/~cew/papers/wosn09.pdf Networks looks into how third parties can access PIIs Here is a study on the Value of Behavioral http://www.networkadvertising.org/pdfs/Beales_NAI_Study Targeting, a tactic used by advertisers with the help .pdf of online user information Twitter admits peeking at address books, http://www.foxnews.com/tech/2012/02/16/twitter-admits35

http://blog.trendmicro.com/trendlabs-security-intelligence/shedding-light-on-social-engineering-schemes/

announces privacy improvements Twitter secrets for sale: Privacy row as every tweet for last two years is bought up by data firm Facebook's Response To Privacy Concerns: "If Youre Not Comfortable Sharing, Dont."

News: Facebook amend privacy settings following an unpleasant poke from EU privacy protectors INFORMATION DISCLOSURE IN SOCIAL MEDIA SITES TRANSLATE TO REAL-LIFE DANGERS https://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&so urce=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A% Carnegie Mellon University published a paper 2F%2Finference-reseauxInformation Revelation and Privacy in Online sociaux.googlecode.com%2Ffiles%2FInformation%2520Reve Social Networks focused on Facebook and lation%2520and%2520Privacy%2520in%2520Online%2520S highlighting the potential of real-life attacks ocial%2520Networks%2520%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg= AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.456457 96,d.aGc Social Network Profiles Help Identity Thieves Guess http://www.myid.com/social-network-profiles-help-thievesYour Social Security Number guess-your-social-security-number Thousands Of MySpace Sex Offender Refugees http://techcrunch.com/2009/02/03/thousands-of-myspaceFound On Facebook sex-offender-refugees-found-on-facebook/ Serial Sex Offender Admits Using Facebook To Rape http://www.huffingtonpost.com/2010/03/08/peterAnd Murder Teen chapman-admits-usin_n_489674.html The Guardian reported on how social networking http://www.guardian.co.uk/technology/2012/feb/01/socialsites are fueling a rising number of stalkers media-smartphones-stalking The National Center for Victims of Crime look into http://www.victimsofcrime.org/docs/src/social-networkinghow social networking sites coddle stalkers sites---a-bonanza-for-stalkers.pdf?sfvrsn=2 A study by the Crimes against Children Research http://www.unh.edu/ccrc/pdf/Am%20Psy%202-08.pdf Center entitled Online Predators and their Victims: Myths, Realities and Implications for Prevention and Treatment Pew Internet Research looks into Cyber bullying http://www.pewinternet.org/Reports/2007/Cyberbull resulting from privacy breaches online ying/1-Findings.aspx SOCIAL MEDIA, APIs, AND THIRD PART APPLICATIONS Third party applications present in social media http://www.eweek.com/c/a/Security/Social-Networks-Faceposes challenges to security and privacy Security-Challenge-From-ThirdParty-Applications/ Collaborative Privacy Management for Third-Party http://precog.iiitd.edu.in/psosm_www2012/a5Applications in Online Social Networks anthonysamy.pdf Privacy Protection for Social Networking APIs http://www.eecs.berkeley.edu/~afelt/privacybyproxy.pdf A consumer report on June of 2012 showed how http://www.consumerreports.org/cro/magazineapps in Facebook can take advantage of archive/2010/june/electronics-computers/socialpermissions to access personal information in a insecurity/apps-that-bite/index.htm profile GOVERNMENT AND LAW ENFORCEMENT USE OF SOCIAL NETWORKING SITES A list of incidents, reports, and other resources on https://www.eff.org/foia/social-network-monitoring social media monitoring EFF Posts Documents Detailing Law Enforcement https://www.eff.org/deeplinks/2010/03/eff-postsCollection of Data From Social Media Sites documents-detailing-law-enforcement

peeking-at-address-books-announces-privacyimprovements/ http://www.dailymail.co.uk/sciencetech/article2107693/Twitter-sells-years-everyones-old-vanishedTweets-online-marketing-companies.html http://www.businessinsider.com/facebooks-response-toprivacy-concerns-if-youre-not-comfortable-sharing-dont2010-5 http://www.shepwedd.co.uk/knowledge/?a=577

Social media surveillance helps the government read your mind See this video on how a government can employ technology to gather information about you through social media The government is reading your tweets

http://www.networkworld.com/community/blog/socialmedia-surveillance-helps-government-read-your-mind http://securencrypt.com/blog/1374/

http://edition.cnn.com/2012/03/09/opinion/obeidallahsocial-media How the Dearth of Social Networking Privacy Rights http://papers.ssrn.com/sol3/papers.cfm?abstract_id=17822 Revolutionized Online Government Surveillance. 67 SOCIAL NETWORKS AND JOB SEARCHES How social media can affect your job search http://edition.cnn.com/2012/10/09/living/real-simplesocial-media-job http://www.policymic.com/articles/23860/can-facebookCan Facebook Get You Fired? get-you-fired-why-complaining-about-work-on-socialmedia-is-protected-speech Employer Access to Social Media Usernames and http://www.ncsl.org/issues-research/telecom/employerPasswords 2013 access-to-social-media-passwords.aspx Social Media Policies Database: A Collection of http://www.compliancebuilding.com/about/publications/so Social Media Policies of Various Companies cial-media-policies/ This article reports on how Social Sentry Lets http://readwrite.com/2010/03/24/social_sentry_track_emp Employers Track Their Workers Across the loyees_across_the_web Internet The employment law dangers of Social Networking http://www.opportunitypeterborough.co.uk/bondholder/ev ents/the-employment-law-dangers-of-social-networking SOCIAL MEDIA LEVERAGES BY CYBERCRIMINALS Social Networking Threats to Think About As 2012 http://blog.trendmicro.com/trendlabs-securityEnds intelligence/social-networking-threats-to-think-about-as2012-ends/ Impact of Cyber Crime and Security on Social Media http://socialmediatoday.com/freelancewriter/995206/impa ct-cyber-crime-and-security-social-media Cyber criminals target mobile users, social media http://www.smh.com.au/digital-life/consumersecurity/cyber-criminals-target-mobile-users-social-media20130208-2e2nv.html Trend Micro Security Blog monitors and reports on http://blog.trendmicro.com/trendlabs-securitysocial media attacks intelligence/?s=social+media&Submit=+Go+

Relevant Statistics on Social Media Usage By including the social media usage statistics, we can incorporate, compare, and create rooms for discussion on how increasing use of the avenue relates to social media privacy issues.
A list of 100 Fascinating Social Media Statistics and Figures From 2012 100 more social media statistics for 2012 The Pew Internet Research also looks into statistics of social media use by young adults Social Media Statistics for 2013 How We Use Social: Highlights from the Social Media Report 2012 http://www.huffingtonpost.com/brian-honigman/100fascinating-social-me_b_2185281.html http://thesocialskinny.com/100-more-social-mediastatistics-for-2012/ http://www.pewinternet.org/Reports/2010/SocialMedia-and-Young-Adults.aspx http://www.digitalbuzzblog.com/infographic-socialmedia-statistics-for-2013/ http://www.brandwatch.com/2012/12/how-we-usesocial-highlights-from-the-social-media-report-2012/

Relevant Infographics on Social Media Use, Social Networking Privacy and Security
Are Twitter And Facebook A Serious Threat To Your Privacy? [INFOGRAPHIC] How Can Social Media Get You Fired? Facebook, Twitter, Pinterest, Instagram Social Media Statistics And Facts 2012 Social Media Engagement and increasing threats against it The Risks of Posting in Social Networks http://www.mediabistro.com/alltwitter/social-mediaprivacy_b18922 http://www.mediabistro.com/alltwitter/firedinfographic_b36436 http://www.mediabistro.com/alltwitter/social-mediastats-2012_b30651 http://aboutthreats.trendmicro.com/us/infographics/infograph/areyou-safe-online http://aboutthreats.trendmicro.com/us/infographics/infograph/therisks-of-posting-in-social-media-networks http://aboutthreats.trendmicro.com/us/infographics/infograph/thegeography-of-social-media-threats

The Geography of Social Media Threats look into how cybercriminals use the popular online medium for their own good

Privacy and Smart Devices The exponential growth of social media can also be correlated to the emergence of smart devices36. By the end of 2013, it is expected that mobile devices will outnumber the global human population. 37 Smartphone devices are useful, but they also carry a massive amount of data38. A 2012 study revealed that majority of smartphone owners do not password-protect their devices, thus exposing them to a number of privacy issues and data breaches39. Other powerful mobile devices like tablets have also emerged and along with the smartphones, they continue to transform society at astonishing rates. There are several social ramification of the smart device revolution40, but privacy remains a key concern in this area41. Cybercriminals are now targeting mobile devices to steal the crucial data stored in them: financial accounts, corporate data, social security numbers etc.

Privacy In An Age of Smart Devices

Links

Information Contained in Your Devices Privacy Rights lists down the data that can be contained https://www.privacyrights.org/fs/fs2bin your smartphone cellprivacy.htm#smartphonedata Privacy Issues With Smart Devices Don't Be Dumb About Smartphone Privacy http://www.forbes.com/sites/nextavenue/2013/03/05/
36 37

http://www.digby.com/mobile-statistics/ http://mashable.com/2013/02/06/mobile-growth/ 38 http://about-threats.trendmicro.com/us/infographics/infograph/this-is-your-life 39 http://blog.usa.gov/post/34104330685/protect-your-identity-when-using-mobile-devices 40 http://www.guardian.co.uk/technology/2012/jun/03/john-naughton-smartphone-revolution-cost 41 http://www.infosecisland.com/blogview/13078-The-Rise-of-Smartphones-and-Related-Security-Issues.html

Smartphones Becoming Gateways to Identity Theft Online, smartphone privacy changing: Does it matter to you? Stolen iPhones And Other Smartphones Have Become A Nationwide Problem A study by the University of California in Berkley looks into user confidence with smartphone privacy Privacy Leakage in Mobile Online Social Networks Security and Privacy Concerns Remain for Smartphone and Tablet Users NetworkWorld looks into how GPS technology can compromise user privacy in both smartphones and tablets Concerned about tablet security issues? Some are, others not so much

dont-be-dumb-about-smartphone-privacy/ http://spectrum.ieee.org/riskfactor/telecom/wireless/s martphones-becoming-gateways-to-identity-theft http://www.newsnet5.com/dpp/news/science_tech/On line-smartphone-privacy-changing-Does-it-matter-toyou http://www.huffingtonpost.com/2012/10/20/stoleniphones_n_1992843.html http://www.cs.stonybrook.edu/~vyas/papers/soups_m obilestudy.pdf http://web.cs.wpi.edu/~cew/papers/wosn10.pdf http://www.emarketer.com/Article/Security-PrivacyConcerns-Remain-Smartphone-Tablet-Users/1008901 http://www.networkworld.com/news/2012/082112gps-261824.html

http://www.computerweekly.com/news/2240111939/ Concerned-about-tablet-security-issues-Some-areothers-not-so-much Mobile Malware Mobile malware threats are increasing at an http://www.trendmicro.com/us/boxes/videos/2012052 exponential rate 5062712.html Android has attracted the most number of malware and http://www.neowin.net/news/trend-micro-claims-1-inother security threats 10-android-apps-are-malware Apples iOS is has mobile vulnerabilities that could be http://www.trendmicro.com/cloudtargeted by malware content/us/pdfs/security-intelligence/reports/rptrepeating-history.pdf Smartphones malware-free glory days may soon be http://bgr.com/2013/03/05/smartphone-malwareover analysis-359347/#disqus_thread Behind the Android Menace: Malicious Apps http://aboutthreats.trendmicro.com/us/infographics/infograph/beh ind-the-android-menace-malicious-apps ZeuS malware targets Blackberry OS http://blog.trendmicro.com/trendlabs-securityintelligence/zeus-targets-mobile-users/ 42 Geotagging Compromises Smartphone User Privacy Geotagging: Information that maybe disclosed without https://www.privacyrights.org/geotagging-privacy your knowledge The US Army also sees geotagging as a security threat http://www.army.mil/article/75165/ Kansas State University reported that Smartphones http://www.kstatecollegian.com/2011/06/15/smartpho geotagging feature causes potential privacy issues nes-geotagging-feature-causes-potential-privacy-issues/ Cybercasing the Joint: On the Privacy Implications of http://www.icsi.berkeley.edu/pubs/networking/cyberc Geo-Tagging asinghotsec10.pdf 43 Advertisers, Applications, Behavioral Marketing In 2011, Computerworld looked into the privacy issues http://www.computerworld.com/s/article/9218163/Sm involving smartphone applications artphone_apps_Is_your_privacy_protected_ Mobile ads can hijack your phone and steal your http://money.cnn.com/2012/07/10/technology/mobile contacts -ad-networks/ The Wall Street Journal reported a federal investigation

42 43

http://webtrends.about.com/od/glossary/a/what-geotagging.htm http://www.cbsnews.com/8301-505125_162-51199800/what-is-behavioral-targeting/

on the data collected and transmitted by smartphone applications BusinessNews reported on 10 surprising apps sharing your data Smartphone apps pose 'significant' privacy risks Smartphone apps pose privacy concerns Expectation and Purpose: Understanding Users Mental Models of Mobile App Privacy through Crowdsourcing TrendMicros TrendLabs released a whitepaper on the security risks of mobile ad networks Increasingly virulent adware threatens Android user privacy The Hidden Dangers in Third-Party App Sites

http://blogs.wsj.com/wtk-mobile/ http://www.businessnewsdaily.com/3768smartphones-apps-share-personal-data.html http://www.independent.ie/business/world/smartphon e-apps-pose-significant-privacy-risks-29131797.html http://www.wpri.com/dpp/news/12_for_action/sweep s-feb13-privacy-apps-for-smartphones http://www.winlab.rutgers.edu/~janne/privacyasexpect ations-ubicomp12-final.pdf http://aboutthreats.trendmicro.com/us/mobilehub/mobilereview/r pt-monthly-mobile-review-the-hidden-risk-behindmobile-ad-networks-201212.pdf http://www.csoonline.com/article/719744/increasingly -virulent-adware-threatens-android-user-privacy http://blog.trendmicro.com/trendlabs-securityintelligence/the-hidden-dangers-in-third-party-appsites/ http://www.futureofprivacy.org/2011/05/12/fpf-findsnearly-three-quarters-of-most-downloaded-mobileapps-lack-a-privacy-policy/ http://online.wsj.com/article/SB1000142405274870469 4004576020083703574602.html http://mostconf.org/2012/papers/15.pdf http://www.clickz.com/clickz/column/2097411/whatsbehavioral-targeting-mobile-advertising http://privacylaw.proskauer.com/articles/behavioralmarketing/ http://www.adweek.com/news/technology/ftcrestricts-behavioral-targeting-kids-146108 http://www.enisa.europa.eu/activities/identity-andtrust/library/deliverables/privacy-considerations-ofonline-behavioural-tracking

Majority of the most downloaded mobile applications have no privacy policies A Wall Street Journal Investigation finds that iPhone and Android apps are breaching the privacy of smartphone users Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications What's New in Behavioral Targeting for Mobile Advertising The Privacy law blog looks into behavioral marketing both in the Internet and smartphone age FTC Restricts Behavioral Targeting of Kids

The European Network and Information Security Agency or ENISA released a report in 2012 on Privacy considerations of online behavioral tracking available for download Columbia University also published a report entitled http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1 Balancing Consumer Privacy with Behavioral 693029 Targeting available for download Government Surveillance The American Civil Liberties Union looks into how http://www.aclu.org/national-security/surveillancegovernment surveillance of various devices, privacy smartphones included, breach privacy rights Secrets of FBI Smartphone Surveillance Tool Revealed in http://www.wired.com/threatlevel/2013/04/verizonCourt Fight rigmaiden-aircard/all/ Defend Yourself Against Cell Phone Tracking https://ssd.eff.org/wire/protect/cell-tracking Fighting unconstitutional stingray phone surveillance http://blogs.computerworld.com/privacy/21204/fightin that tracks innocent people g-unconstitutional-stingray-phone-surveillance-tracksinnocent-people

Privacy Guides, Laws & Policies Due to the massive amount of information being collected, processed, and shared across all platforms, in particular through digital and mobile technologies, campaigns defending and advocating for privacy rights are also gaining track. Several resources are available online to serve as privacy guides. Concerned organizations and government agencies continue to develop, hone, and update privacy legislations across the globe. Below are the notable resources on privacy guides, laws, and policies. Resources
One of the most comprehensive resources for privacy rights in the about and beyond the digital environment would be Privacy Rights.org. The organization covers a wide-range of topics on rights to privacy in relation to both existing and emerging technologies. Their website also provides links to legal resources, reports on privacy legislations, as well as in-depth explanations of how technologies breach user privacy. A noteworthy legislation on privacy would be the Childrens Online Privacy Protection Act (COPPA) which gives parents control over what information websites can collect from their kids. The US Bureau of Consumer Protection also provides information on the legal resources on privacy and security The Center for Democracy & Technology provides is a 501(c)(3) nonprofit public policy organization and the leading Internet freedom organization working at the critical edge of policy innovation The Electronic Privacy Information Center provides in detail what cookies do and how they work IT Services provides a broad scope of Safe Social Networking Practices The US Office for Government Ethics exemplifies a social media policy framework in a government setting The Portland Press Herald published an article on how business can establish clear social media policies Blas Ur, of Carnegie Mellon University, and Yang Wang of Syracuse University, released a study entitled A Cross-Cultural Framework for Protecting User Privacy in Online Social Media that proposes a framework for evaluating the extent to which social networking sites privacy options are offered and communicated in a manner that supports diverse users from around the world. Trend Micro looks into safe social media practices courtesy of an Infographic

Links
https://www.privacyrights.org/ https://www.privacyrights.org/fs/fs1-surv.htm https://www.privacyrights.org/fs/fs18-cyb.htm https://www.privacyrights.org/fs/fs2bcellprivacy.htm https://www.privacyrights.org/socialnetworking-privacy

http://www.ftc.gov/ogc/coppa1.htm

http://www.business.ftc.gov/privacy-and-security

https://www.cdt.org/about

http://epic.org/privacy/internet/cookies/ https://itservices.uchicago.edu/page/practice-safesocial-networking http://www.oge.gov/About/Management-Reports-andPolicies/Social-Media-Policies/Third-Party-WebsitePrivacy-Statement---Social-Media/ http://www.pressherald.com/business/social-mediapolicy-is-your-friend_2011-01-25.html http://precog.iiitd.edu.in/events/psosm2013/ur_wang_ psosm13_culturalframework.pdf

http://blog.trendmicro.com/trendlabs-securityintelligence/files/2012/04/stayingsafeinSocialMedia_W EB.jpg

Simiarly, Trend Micro runs several blogs on security intelligence that monitors and reports security threats and developments in the digital landscape A study by several Microsoft employees looks into Keeping Information Safe from Social Networking Apps In Barcelona, Spain, the Departament dArquitectura de Computadors published a study on Secure Management of Social Networks Applications Data In the UK, the Information Commissioners Office looks into upholding information rights in the public interest, promoting openness by public bodies and data privacy for individuals. The cross-industry Self-Regulatory Program for Online Behavioral Advertising was developed by leading industry associations to apply consumer-friendly standards to online behavioral advertising across the Internet. The Electronic Frontier Foundation on the other hand continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.

http://blog.trendmicro.com/trendlabs-securityintelligence/ http://conferences.sigcomm.org/sigcomm/2012/paper/ wosn/p49.pdf http://www.academia.edu/1394909/Secure_Managem ent_of_Social_Networks_Applications_Data http://www.ico.org.uk/

http://www.iab.net/insights_research/public_policy/be havioral-advertisingprinciples

https://www.eff.org/about

Das könnte Ihnen auch gefallen