1 / 12

Lecture 3

Lecture 3. Privacy and Freedom of Speech in Cyberspace. The Value of Privacy.

jasongarcia
Télécharger la présentation

Lecture 3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 3 Privacy and Freedom of Speech in Cyberspace

  2. The Value of Privacy The topic of privacy is a very touchy subject. Often the question is raised about when should a person’s privacy be respected. Is it the school of thought that privacy should supersede all things regardless of the outcome? Or should we be saying that we need to protect the person against themselves?

  3. The value of privacy continued • This debate continues. • Therefore, it brings into question: what is personal information? Is information personal even if it exists on equipment that is considered public or not belonging to the person who stores this information on such an equipment?

  4. Where is the line on privacy drawn? • Do we say that as long as it is stored on a computer, then the user loses the right to call his/her information private? Or do we say as long as we use the public airwaves to communicate with each other, then that conversation or data transfer done over the airwaves is everyone’s business?

  5. What is invisible information gathering? • This is compiling information from a person without telling him/her each time that this is being done. Another question is this: “Do the licensing agreement state that the user may be subject to data privacy intrusion – well, not necessarily in those words. • What are your views on this?

  6. Government information banks • What are these? Why was this being initiated? Did it only start happening with the “9-11” attacks in the U.S. • What are the sources of these Gov’t Info Banks? • Is is politically or governmentally tied?

  7. Releasing private data • How can the releasing of someone’s personal data threaten their safety? • What if this person is in a witness protection programme? • What if this person is suspected of creating public mayhem (gang)

  8. Consumer Information • Many business collect private data on their customers. Is it ethical to share this data with telemarketers without the express permission of the consumers? • What are the effects on the business and on the consumer for disseminating this type of information?

  9. Medical Records • Who has the right to know? • How much detail should be shared? • What type of medical info should be shared: • Mental health (stigma factors present?) • STD (lifelong types), HIV/AIDS • Epilepsy, heart condition etc

  10. Privacy in consumer information • Databases and personal records (who should have access in terms of staff and levels of staff) • Email privacy – we all know that email is not private, but what about levels of confidentiality of network administrators and ISP workers who so happen to know you or know your email address?

  11. Web Privacy • Tracking cookies • Monitoring your browsing habits • Spyware (good ones do exist?) • MI6, FBI, CIA, CIB, NIB…. Where does it stop. What about their collaborations? • Monitoring website searches via Google (etc) – a new type of “homeland” security?

  12. Web privacy tools • Describe tools that can be used to protect a person’s privacy on the Web.

More Related