1. Protecting Privacy
1.1. Technology and Markets
1.1.1. Privacy enhancing-technologies for consumers
1.1.2. Encryption
1.1.2.1. Public-key cryptography
1.1.3. Business tools and policies for protecting data
1.2. Right and laws
1.2.1. Contrasting Viewpoints
1.2.1.1. Consumer Protection View
1.2.1.1.1. Uses of personal information
1.2.1.1.2. Costly and disruptive results of errors in databases
1.2.1.1.3. Ease with which personal information leaks out
1.2.1.1.4. Consumers need protection from their own lack of knowledge, judgement, or interest
2. Communication
2.1. Wiretapping and E-mail Protection
2.1.1. Telephone
2.1.1.1. 1934 Communications Act prohibited interception of messages
2.1.1.2. 1968 Omnibus Crime Control and Safe Streets Act allowed wiretapping and electronic surveillance by law-enforcement (with court order)
2.1.2. E-mail and other new communications
2.1.2.1. -Electronic Communications Privacy Act of 1968 (ECPA) extended the 1968 wiretapping laws to include electronic communications, restricts government access to e-mail
2.1.3. Encryption Policy
2.1.3.1. Government ban on expert of strong encryption software in the 1990s (removed in 2000)
3. "Big Brother is Watching You"
3.1. Databases
3.1.1. Government Accountability Office (GAO)
3.1.1.1. Monitors government's privacy policies
3.1.2. Data mining and computer matching to fight terrorism
3.2. The Fourth Amendment, Expectation of Privacy and Surveillance Technologies
3.2.1. Weakening the Fourth Amendment
3.2.2. Supreme Court decisions and expectation of privacy
4. Privacy and Computer
4.1. Key Aspects of Privacy
4.1.1. Freedom from intrusion (being left alone)
4.1.2. Control of information about oneself
4.1.3. Freedom from surveillance (being tracked, followed, watched)
4.2. New Technology, New Risk
4.2.1. Government and private databases
4.2.2. Sophisticated tools for surveillance and data analysis
4.2.3. Vulnerability of data
4.3. Terminology
4.3.1. Data mining - searching and anaylzing masses of data to find patterns and develop new information of knowledge
4.3.2. Computer matching - combining and comparing information from different databases (using social security number, for example, to match records)
4.3.3. Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior
4.4. Principles for Data Collection and Use
4.4.1. Informed consent
4.4.2. Opt-in and opt-out policies
4.4.3. Fair Information Principles (or Practices)
4.4.4. Data retention
5. Diverse Privacy Topics
5.1. Marketing, Personalization and Consumer Dossiers
5.1.1. Targeted marketing
5.1.1.1. Data mining
5.1.1.2. Paying for consumer information
5.1.1.3. Data firms and consumer profiles
5.1.2. Credit records
5.2. Location Tracking
5.2.1. Global Positioning System (GPS) - computer or communication services that know exactly where a person is a t particular time
5.2.2. Cell phones and other devices are used for location tracking
5.2.3. Pros and cons
5.3. Stolen and Lost Data
5.3.1. Hackers
5.3.2. Physical theft (laptops, thumb-drives)
5.3.3. Requesting information under false pretenses
5.3.4. Bribery of employees who have access
5.4. What We Do Ourselves
5.4.1. Personal Information in blogs and online profiles
5.4.2. Pictures of ourselves and our families
5.4.3. File sharing and storing
5.4.4. Is privacy old fashioned?
5.4.4.1. Young people put less value on privacy than previous generations
5.4.4.2. May not understand the risks
5.5. Public records: Access vs. Privacy
5.5.1. Public Records - records available to general public (bankruptcy, property, and arrest records, salaries of government employees)
5.5.2. Identity theft can arise when public records are accessed
5.5.3. How should we control access to sensitive public records?
5.6. National ID System
5.6.1. Social Security Numbers
5.6.1.1. Too widely used
5.6.1.2. Easy to falsify
5.6.2. A new national system - Pros