1 / 7

A Simplistic View of Internet Privacy

A Simplistic View of Internet Privacy. Defining Internet Privacy. Sharing (data) in an explicit context with an expectation of scope. The Problem Space. Sharing Data. What gets shared? Volunteered data (user supplied) Network data (ip addresses, domain names, geo-location, etc)

marieclarke
Télécharger la présentation

A Simplistic View of Internet Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Simplistic View of Internet Privacy

  2. Defining Internet Privacy Sharing (data) in an explicit context with an expectation of scope.

  3. The Problem Space

  4. Sharing Data What gets shared? Volunteered data (user supplied) Network data (ip addresses, domain names, geo-location, etc) Hardware and software data(mac addresses, browser and OS details, etc.) Data Conditions In motion (network transit) At rest (stored or cached, local or remote,) Re-directed (data portability, redaction, delegation, etc.)

  5. Explicit Context Bounded Relationships May require assertion/authentication May carry assurances May require consent May be asymmetric Terms and Conditions Issues with notification Issues with transparency Issues with lack of consent Disclosure of collection practices Limitations on Use Clearly defined practices Identification of extended use

  6. Expectation of Scope • User Settings • Privacy controls • Profile data • Delegation • Service Agreements • Managed identity • Exchange models (direct payment, monetization of shared data, etc.) • Portability • Ability to transfer data • Ability to extract contacts, profiles, etc. • Cookies, Caching, and Tracking

  7. Added Complexity

More Related