{"id":155,"date":"2014-06-23T09:00:00","date_gmt":"2014-06-23T13:00:00","guid":{"rendered":"http:\/\/web.thinkingcat.com\/wordpress?p=155&#038;preview_id=155"},"modified":"2014-06-20T12:36:35","modified_gmt":"2014-06-20T16:36:35","slug":"regulating-internet-privacy","status":"publish","type":"post","link":"https:\/\/www.thinkingcat.com\/wordpress\/2014\/06\/regulating-internet-privacy\/","title":{"rendered":"RIP &#8212; Regulating Internet Privacy"},"content":{"rendered":"<p>RIP, Privacy?\u00a0 I certainly hope not.\u00a0\u00a0\u00a0\u00a0\u00a0 The dictionary.com definition of privacy includes &#8220;the state of being free from intrusion or disturbance in one&#8217;s private life or affairs &#8220;.\u00a0\u00a0\u00a0\u00a0\u00a0 In that light,\u00a0 the suggestion that &#8220;you have zero privacy anyway, get over it&#8221; (<a href=\"http:\/\/en.wikiquote.org\/wiki\/Scott_McNealy\">attributed to Scott McNealy<\/a>) is kind of scary:\u00a0 if we&#8217;re trying to make the world a better place, we should have fewer intrusions and\u00a0 disturbances in our private life, rather than expecting that they should be the norm.<\/p>\n<p>What we&#8217;ve seen over the last decade is an explosion in the exposure of personal data, due to:<\/p>\n<ul>\n<li>data being shared in electronic form (especially, via the Internet)<\/li>\n<li>cheap computer storage making it feasible to collect and retain massive quantities of data<\/li>\n<li>cheap, fast computing that facilitates processing the masses of data to draw correlations and inferences<\/li>\n<\/ul>\n<p>While privacy has traditionally\u00a0 been achieved through <em>confidentiality<\/em> <em>of data, <\/em>the factors above have outstripped our rational ability to develop appropriate means to act given how little data exposure it takes in order to lead to an impact on privacy.<\/p>\n<p>In early June, I gave a talk to a George Mason University class, &#8220;Privacy and Ethics in an Interconnected World&#8221;\u00a0 in the Applied Information Technology department.\u00a0\u00a0 The assigned subject of the talk was &#8220;Regulating Internet Privacy&#8221;.<\/p>\n<p>In preparing for the talk, I want through 5 &#8220;case studies&#8221; of data exposure and privacy impacts:<\/p>\n<p style=\"padding-left: 30px;\"><em>So-called Public Data:\u00a0 <\/em><em>E.g., <\/em>is it okay that everyone knows how much you paid for your house?<\/p>\n<ul style=\"padding-left: 30px;\">\n<li>At least in some jurisdictions, it is \u201cpublic data\u201d<\/li>\n<li>It does help inform\u00a0 future buyers in the area<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">But &#8212; it can create tense times with your family, friends and neighbours, which is most certainly an intrusion on your personal life.<\/p>\n<p style=\"padding-left: 30px;\">And then along comes Zillow and takes individual pieces of public data to paint a picture of your neighbourhood, which paints a whole different picture of you,\u00a0 your worth, etc.<\/p>\n<p style=\"padding-left: 30px;\"><em>Personal Data in Corporate Hands:\u00a0 <\/em>Your usage at a particular service means you wind up sharing personal data.<\/p>\n<ul style=\"padding-left: 30px;\">\n<li>In part, this is an inevitable consequence of carrying out a business transaction.<\/li>\n<li>An argument is that it helps tailor your service to your interests.<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">But, when a history is maintained,\u00a0 your usage is tracked,\u00a0 and data is sold to third parties, the implications may catch you by surprise.\u00a0 (Should you be denied health care coverage if you don&#8217;t walk 10,000 steps a day?).<\/p>\n<p style=\"padding-left: 30px;\"><em>Identity Data<\/em>: \u00a0 Data that identifies you personally undermines any opportunity for\u00a0 anonymity.<\/p>\n<p style=\"padding-left: 30px;\">Freedom of speech means different things in different parts of the world, and being able to voice an opinion without fear of repercussion follows with that<\/p>\n<p style=\"padding-left: 30px;\"><em>Accountability:\u00a0<\/em> On the flip side, some ability to attach actions to individuals who are responsible for them.<\/p>\n<ul style=\"padding-left: 30px;\">\n<li>When someone does something bad on or to the Internet, it should be possible to track them down<\/li>\n<li>Of course, \u201csomething bad\u201d is in the eye of the beholder<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">This is, of course, the complement of the desire to be able to provide anonymity.<\/p>\n<p style=\"padding-left: 30px;\"><em>Pervasive Monitoring:<\/em> collecting any and all data about Internet connections, irrespective of source or destination or accountable person.<\/p>\n<ul style=\"padding-left: 30px;\">\n<li>Governments demanding access\u00a0 \u2013to metadata of Internet connections, and sometimes content.<\/li>\n<li>From reports, they have no <i>a priori <\/i>reason to track you, but it\u2019s easier to collect all the data and figure out what they want later<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">But, inferences from data mining are not always correct, and if you don\u2019t know they are being made, you have no recourse to fix them.<\/p>\n<p>One thing that all of the points above have in common is that the data is being used for purposes beyond which people originally understood or expected it to be.<\/p>\n<p>It&#8217;s pretty hard to function in today&#8217;s society without sharing some data some of the time &#8212; so complete confidentiality is not an effective option.\u00a0\u00a0 But being cautious about what you share, when, is necessary in this day and age.\u00a0 The Internet Society has some useful guidance on that front:<\/p>\n<ul>\n<li>Understanding the Personal Data Bargain \u2013 <a href=\"http:\/\/www.internetsociety.org\/blog\/2013\/02\/understanding-personal-data-bargain\">http:\/\/www.internetsociety.org\/blog\/2013\/02\/understanding-personal-data-bargain<\/a><\/li>\n<\/ul>\n<p>And the other side of the coin is making sure that the data that is shared is treated appropriately.<\/p>\n<ul>\n<li>We Need to Re-Think How We Fight for Privacy \u2013 <a href=\"http:\/\/lifehacker.com\/we-need-to-re-think-how-we-fight-for-privacy-1582572323\">http:\/\/lifehacker.com\/we-need-to-re-think-how-we-fight-for-privacy-1582572323<\/a><\/li>\n<\/ul>\n<p>And we should, indeed, be able to &#8220;rest in peace&#8221; &#8212; peace of mind that our lives are not being undermined by misuse of our data.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RIP, Privacy?\u00a0 I certainly hope not.\u00a0\u00a0\u00a0\u00a0\u00a0 The dictionary.com definition of privacy includes &#8220;the state of being free from intrusion or disturbance in one&#8217;s private life or affairs &#8220;.\u00a0\u00a0\u00a0\u00a0\u00a0 In that light,\u00a0 the suggestion that &#8220;you have zero privacy anyway, get over it&#8221; (attributed to Scott McNealy) is kind of scary:\u00a0 if we&#8217;re trying to make [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_ef_editorial_meta_date_first-draft-date":"","_ef_editorial_meta_paragraph_assignment":"","_ef_editorial_meta_checkbox_needs-photo":"","_ef_editorial_meta_number_word-count":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,6],"tags":[],"class_list":["post-155","post","type-post","status-publish","format-standard","hentry","category-general","category-internet"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbjRsG-2v","_links":{"self":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts\/155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":10,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts\/155\/revisions"}],"predecessor-version":[{"id":171,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts\/155\/revisions\/171"}],"wp:attachment":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/media?parent=155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/categories?post=155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/tags?post=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}