Tuesday, October 8, 2013

Chapter 2: Reading/Create critical questions

·     Brittany Murphy  11 am 

    Three key aspects of privacy
o   Freedom from intrusion
o   Control of one’s information about oneself
o   Freedom from surveillance
·         Not necessarily because of something to hide, rather just for safety or preference.
·         Threats
o   Intentional by instiutions (ie gov law enforment)
o   Unathorized use and release by those who have the infomarion
o   Theft
o   Leakadge through negligence
o   Our actions
*      Baase argues that complete privacy is not attainable as likely some people will know where you live, what you drive ect. Is this information something that should be kept private among the people that you have shared said information with, or is it acceptable for this information to be shared, particularly if the sharing of the information benefits you? For example, if there is a new job opening up in your field and friend knows that you are looking, would it be acceptable for them to give the employer you name and number? What about information about your education and past employment?
·         Technology proposes new risks to privacy as it opens up issues that society has yet to face
o   Databases storing personal information (ie. Purchases, perscriptions, spending)
o   Search records
o   Communications
·         Search query
o   Stored
o   Personalizes results of your search
*      Was it ethical for the government to issue a subpoena for two months of search queries from google? If not, justify the response of the privacy advocates.  If so, justify the government’s request.
·         Smart phones:
o   Send location data to towers to provide location services
o   Sometimes included the phone ID
o   50% of apps tested sent location to other companies. (some age and gender data)
o   Some copy contact lists, photos
·         Information gathering
o   Informed consent
o   Invisible information’s gather- gathering infomratin w/o that person’s knowledge.
o   Fingerprinting- recording of a devices use patterns
o   Cookies-files stored by websites on the visitor’s computer. “supercookies”- recreate deleted cookies and are difficult to find.
o   Secondary use is use by someone other than who info was supplied to (texts to solve a crime)
o   Data mining- searching data and forming patterns to create to info
o   Matching- combining/comparing date from diff databases using personal identifiers
o   Profiling-analyzing data to determine characteristics of people w/common behaviors.
·         Data trails allow easy government tracking
·         Olmstead v united states
o   Wiretaps were allowed as it is not physical intusion (covered by 4th amendment)
·         Kate v united states
o   4th amendments applies to conversations in public places, sometimes
·         Miller vs US
o   Information shared is not longer private(ie bank)

Kyllo v US In the Miller v. United States case, it was ruled that information that is shared is no longer private,

o   Thermo imaging can not be used to search a home w/o a warrant
·         US v Jones
o   GPS to a vehicle w/o warrant not allowed

o   Can use cell location w/o a warrant 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.