1. Business & Social sectors
1.1. marketing and personalization
1.1.1. data mining
1.1.2. targeted ads
1.1.3. informed consent
1.1.4. paying for consumer info
1.2. location tracking
1.2.1. GPS
1.2.2. cell phones are used for location tracking
1.2.3. there's pros and cons
2. Government system
2.1. databases
2.1.1. gov accountability office monitors gov's privacy policies
2.1.2. burden of proof
2.1.3. data mining and computer matching to fight terrorism
2.2. public records: access vs. privacy
2.2.1. public records - records available to general public
2.2.2. identity theft can arise when public records are accessed
2.3. national ic system
2.3.1. IC NUMBERS (card, hard to forge, have to carry only one card)
2.3.2. a lot of services use IC as main ID (eg: PTPTN, SPRM)
3. Protecting privacy
3.1. technology and market
3.1.1. privacy enhancing - tech for consumers
3.1.2. encyrption
3.1.3. business tools and policies for protecting data
3.2. rights and law
3.2.1. transaction
3.2.2. ownership of personal data
3.2.3. a basic legal framework: enforcement agreements and contracts
4. Expectation of privacy
5. Privacy Risk & Principal
5.1. Aspects
5.1.1. freedom from intrusion
5.1.2. control of info about oneself
5.1.3. freedom from surveillance
5.2. Threats
5.2.1. intentional uses of personal info
5.2.2. unauthorized use by "insiders"
5.2.3. theft of information
5.2.4. careless leakage of info
5.3. New Risk
5.3.1. gov and private database
5.3.2. sophisticated tools for surveillance
5.3.3. vulnerability of data
5.4. Terminologies
5.4.1. personal information
5.4.2. informed consent
5.4.3. invisible information gathering
6. Communication
6.1. wiretapping and email protection
6.1.1. telephone
6.1.2. email
6.2. National Security Agency (NSA)
6.2.1. foreign intelligence surveillance act
6.2.2. secret access to comm records