CS 340 Test 3 review sheet, Fall 2015 Major topics material, notes and reading: Information and data privacy o Material starting Oct 22‐Nov3 Government Data Collection o Posted for Nov 5 Intellectual Property (Copyright, Fair Use, Trademark, Patent, Trade Secret, & Software issues) o Notes posted for Nov 10, 12, and 17 1. Information Privacy a. Information as a Commodity i. The change to record all possible data about a transaction (class example Batman toy purchase 1975 v. 2015) b. “How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did.” i. Read that article listed above (shopping habits Target pdf): looking for chunking; the febreze & habit connection; life events and market vulnerability; pregnancy predictor score; kinds of items; targeted pregnancy trimester c. The four concerns tech has exacerbated d. Privacy vocabulary/concepts: i. Profiling ii. Secondary use of information 1. When are ethical dilemmas raised iii. Re‐identification(!!) iv. Data mining v. Computer matching e. Examples: i. Iknowhereyourcatlives.com ii. Samsung TVs are listening iii. Spokeo 2. Online Privacy, Behavioral Targeting a. http://live.wsj.com/video/how‐advertisers‐use‐internet‐cookies‐to‐track‐you/92E525EB‐ 9E4A‐4399‐817D‐8C4E6EF68F93.html#!92E525EB‐9E4A‐4399‐817D‐8C4E6EF68F93 b. Business harnessing the information gathered i. Cookies, then and now 1. Traditional cookie purpose 2. Third party cookie ii. Beacon 1. What it is 2. How it works 3. What it can potentially capture c. Case Study from WSJ, Ashley Hayes‐Beaty http://cs340.cs.ua.edu/wp‐ content/uploads/2014/01/WSJ‐Ashley‐Hayes‐Beaty‐case‐study.pdf i. What things were collected ii. Profiling iii. Monetary worth to data sellers/resellers iv. WSJ findings d. Tracking companies side of the story i. Why is it considered anonymous information? (hmmm) ii. Opt out iii. Ghostery e. US approach to privacy (piecemeal law creation) f. Texas’ handling of DNA from infant testing g. Robbins v. Lower Merion School District h. EU’s Right to be Forgotten i. https://www.google.com/transparencyreport/removals/europeprivacy/ ii. General policy iii. Overall stats on removals i. Mobile OS changes for privacy j. Google Streetview i. Wardriving ii. Other issues related to capturing images and height of camera used for Streets view capture iii. Google v. Joffe case k. Facebook study on contagion of user emotions l. iCloud hack i. What does two factor authentication mean? ii. Is a password two factor authentication? NO iii. Examples of 1. Something you know 2. Something you have 3. Something you are 3. Privacy and the Government Collection of Data a. Public records; how has tech changed access to this public data b. 1974 Privacy Act: i. Principles ii. What kind of databases does this act apply to? c. Patriot Act d. Snowden, NSA, FISC and your privacy i. Edward Snowden 1. Watch his interview from June 2. What did he do? 3. Why does he say he did it? 4. Why didn’t he chose to be anonymous with his leak? 5. What is his biggest fear? 6. Why does he say you should care about these data collection programs? 7. Fallout/Consequences of the Leak a. What had this information changed? b. Where is he now 8. Did he win the Nobel Prize? NO ii. NSA programs 1. Special attention to a. PRISM b. BULLRUN iii. NSA 1. Can the NSA legally spy on Americans? 2. The Third Party Doctrine 3. Smith v. Maryland iv. The FSIC Court 1. Operates how? 2. Approval rate (from Wikipedia) e. Wikileaks i. Major players: Julian Assange, Chelsea (née Bradley) Manning ii. General understanding of happened (any charges, trial/verdicts, controversies, asylum, etc. ) and where is each now iii. Who is Daniel Ellsberg? 4. Intellectual Property: a) Background i) Theories that support giving IP (1) Labor desert (2) Utilitarian (3) Personality theory ii) Constitutional foundation, Art. 1 §8 language iii) Difficulties: balancing of interest, how long, tech challenge iv) What is protected? Defining creative expression b) Copyright i) 4 exclusive rights ii) Who can claim iii) When does copyright begin? iv) Duration v) Copyrightable work test: meaning and examples of each facet: (1) Original (2) Work of Authorship (3) Fixed in a tangible medium c) Fair Use general concepts (FAIR USE IS ONLY AN EXCEPTION TO COPYRIGHT) (1) 4 factor fair use test (a) Purpose of the new use (private or commercial; private uses more likely fair uses; commercial less likely) (b) Nature of the original work (non‐fiction or creative; creative less likely to be fair use; non‐fiction more likely) (c) Amount and substantiality of the portion copied (more copied, or more important, less likely to be fair) (d) ***Effect of the new use on the market for the original work (is the new work a replacement for the old? Less likely to be fair use) (2) Fair use balancing of interests: incentive to make new work, encouraging new work and free exchange of ideas (3) Common fair use characteristics: (a) Incidental (b) Proportional (c) Transformative (4) Cases & examples (a) Sony v. Universal (b) Evolution of Dance & I’m Shakin’ in class analysis (c) Kelly v. Arriba Soft (d) Galoob v. Nintendo (e) RIAA v. Diamond Multimedia (f) Metallica v. Napster (i) Arguments of each side (ii) DMCA (5) Other music cases (a) MGM v. Grokster (b) BMG v. Gonzalez (c) Capitol/Virgin Records et al. v. Thomas (d) Sony BMG v. Tenenbaum (e) Harper (i) Innocent infringer 1. Comparing statutory damages (f) Current RIAA strategy (g) Kim Dotcom & Megaupload & MEGA d) Patents i) 3 exclusive rights of a patent holder, right to exclude others from ii) disclosure of information iii) The quid pro quo iv) 2 part test to qualify for a patents v) kinds and time frames vi) Business method patent examples e) Trademark i) what it is, why do you want a trademark ii) test for getting trademark? iii) term of protection iv) What happens if your mark becomes generic? v) Dilution vi) *** Understanding the factors in a trademark infringement case vii) Example cases (EA Sports, King Candy Crush, Ty, Chewy, UA v. Daniel Moore) viii) Cybersquatting. What is it? Intent required? ix) Legitimate uses of others trademark examples f) Trade Secret i) what kind of information makes up a trade secret? ii) what steps do companies take to protect trade secrets? iii) how long does protection last? iv) what happens if someone reverse engineers your trade secret ‐ is that illegal? g) MISC IP topics/terms: US v. LaMacchia No Electronic Theft Act (NET act) Audio Home Recording Act Digital Millennium Copyright Act (DMCA) Doctrine of First Sale DRM Vicarious infringement & contributory infringement h) IP – Software Issues: a. software typically gets IP protection in form of copyright, trademark, patent and trade secret b. Comparing Lotus v. Borland & the Atari v. Philips case c. Fair use in software: Sega v. Accolade d. Open Source: i. What does that mean ii. General pros cons e. Creative commons licensing