Chapter #5 Flashcards
(21 cards)
Three Privacy Types
(Things)
Consumer Privacy
Medical/Healthcare Privacy
Employee/Workplace Privacy
Privacy concerns have been (exacerbated) increased by cybertechnology in at least four ways
- amount of personal data that can now be collected
- speed at which personal information can now be transferred and exchanged
- duration of time in which personal information can be retained
- kind of personal information that can be acquired (ex transactional)
What is Personal Privacy? What can happen to it?
lost,
diminished,
intruded upon,
invaded,
violated,
breached.
Classic Theories of Privacy
non-intrusion (into one’s space),
non-interference (with one’s decisions),
having control over/restricting access to one’s personal information.
Non-intrusion theories view privacy as either:
or Accessibility Privacy
being left alone,
being free from government intrusion (into one’s physical space).
This view is also sometimes referred to as accessibility privacy.
Informational Privacy
is concerned with protecting personal information in computer databases
Most people wish to have some control over their personal information.
In some cases, “privacy zones” have been set up either to restrict or limit access to one’s personal data.
Decisional Privacy
Privacy is defined in terms of freedom from interface in ones choices and desisions.
Moor’s Comprehensive Theory of Privacy
“an individual has privacy in a situation if in that particular situation the individual is protected from intrusion, interference, and information access by others.”
Mary Examples
Nissenabum’s Theory of Privacy as “Contextual Integrity”
Helen Nissenbaum’s “privacy as contextual integrity” framework requires that the processes used in gathering and disseminating information are
“appropriate to a particular context”
comply with norms that govern the flow of personal information in a given context.
Is Privacy an Intrinsic or an Instrumental Value
Privacy does not seem to be valued for its own sake, and thus does not appear to have intrinsic worth.
But privacy also seems to be more than merely an instrumental value because it is necessary (rather than merely contingent) for achieving important human ends.
Moor believes that privacy can be viewed as an expression of a “core value” – viz., security, which is essential for “human flourishing.”
Privacy as a Universal Value
Privacy has at least some importance in all societies, but it is not valued the same in all cultures.
Privacy as an Important Social Value
Priscilla Regan notes that we tend to underestimate the importance of privacy as an important social value (as well as an individual value).
Regan also believes that if we frame the privacy debate in terms of privacy as a social value (essential for democracy), as opposed to an individual good, the importance of privacy is better understood.
Cybertechology-related Techniques that Threaten Privacy
Data-gathering techniques: used to collect and record personal information, often without the knowledge and consent of users.
Data analysis techniques: including data mining, used to manipulate large data sets of personal information to discover patterns and generate consumer profiles (also typically without the knowledge and consent of users).
Dataveillance
captures, surveillance (data-monitoring) and data-recording.
Big Data
Large volumes of data, but is also measured by variety, velocity, veracity.
Data Mining
Data mining involves the indirect gathering of personal information via an analysis of implicit patterns discoverable in data.
Data-mining activities can generate new and sometimes non-obvious classifications or categories.
Individuals whose data is mined could become identified with or linked to certain newly created groups that they might never have imagined to exist.
Ex: Data mining finds that someone lives in a area and doesnt give them a loan because of it. Or findout that they are more likely to start a buisness and fail in 3 months so they dont get a loan.
Non-Public Personal Information (or NPI)
refers to sensitive information such as in one’s financial and medical records.
NPI currently enjoys some legal protection.
Public Personal Information (or PPI).
is non-confidential and non-intimate in character, and is generally not legally protected.
Search engines can be used to:
- acquire personal information about individuals (as illustrated in the discussion of the Gawker/Stalker site in the text).
- reveal to search facilities data about which Web sites you have visited, as illustrated in the controversial incident in which describes how Google users’ search requests were subpoenaed by the U.S. Government.
Privacy Enhancing Technologies (PETs)
are tools that users can employ to protect:
their personal identity, while navigating the Web;
the privacy of their communications (such as email) sent over the Internet.
Other kinds of PETs, e.g., used in e-commerce contexts, include “trust marks/ seals” such as TRUSTe.
A Right to “Be Forgotten” or to “Erasure”
The right for your data to eventually disappear off the internet after a period of time. Since currently whatever is put on the internet is there forever.