Privacy COMPUTING AT CARNEGIE MELLON SECTION I2 Introduction Lauren Milisits What is PRIVACY? The ability to seclude information and oneself Possible violations of privacy: Cookies Google Maps (street view) Criminal Registration Criminal justice & inmates Background Information Erika Tang History of Information Protection Pre-Digital Era primary modes of communication and exchange had physical evidence (i.e. paper trails) hard to invade a person's privacy without finding tangible records of personal information Dawn of the Digital Age new modes of communication and exchange social networking sites email on-line shopping greater avenues for the violation of privacy identity theft, fraud,etc. no longer need paper trail to invade privacy Positive Aspects and Benefits Emerson Hum Positive Aspects of Having Sufficient Privacy Individual can do work in seclusion without revealing certain information about themselves Individual has a level of security and confidentiality when on the computer Individual has protection in conducting interactions with others such as payment transactions or chatting Steps Taken to Improve Privacy and Lessen the Effects of Privacy Invasion Using non-common passwords HTTPS connections provide security to servers Ability to remove cookies Avoiding sites that seem unreliable or fishy Privacy invasion laws specific for computer crimes Internet regulation to prevent others committing frauds/scams to steal information Criticism Like Li Increased Internet Privacy? IN SUPPORT OF IN OPPOSITION OF Users should be able to Government know exactly how their data is being used Users should be able to express their views completely anonymously on the Internet intervention to protect consumer privacy would stifle innovation Having some way to track users decreases threats to safety (i.e. Internet stalkers, criminals, etc.) Opinion Lauren Milisits What do we think?