You are on page 1of 3

Eric Gonnella

Internet and Society


September 21, 2015
MW 8:00-9:50
Chapter 2
.

2.1Whatdoesthetermpersonalinformationmean?
Personal information is any type of stored credentials, credit
cards. Its generally anything that you feel is information about
you that should be distributed only at your discretion, or with
consent of your knowing.
2.2Whatdoesthetermsecondaryusemean?Giveanexample.
Secondary use is the use of someone information being used for a reason
other than the person who supplied meant for it to be used. Such as Facebook
selling off peoples information and statistics to advertisers to have targeted
ads.

2.3Whatdoesthetermreidentificationmean?Giveanexample.
Re-identification means identifying someone from a pool of anonymous
data. The information becomes present from things such as searches in
web browsers and search engines.

2.4Explainthedifferencebetweenoptinandoptoutpoliciesforsecondaryusesof
personalinformation.
Opt-in policy means the company or collector may not use the information
gathered as secondary use as long as the individual signs or checks a
box indicating the used of it.
Opt-out policy means that the individual must check on a box, sign a
paper or do another form of confirmation to request that the collector
not use certain parts of information or use it in a certain way.

2.5Describeoneapplicationoffacerecognitionthatinfringesprivacy.
In the case of the 2001 Super Bowl police scanned and surveyed all
100,000 fans and employees as they entered the stadium, with no warning
or information returning to the individuals entering the stadium. The
police were scanning for criminals entering the stadium, but without
disclosure to any of the participants entering the stadium it was deemed
an infringement of privacy.

2.6DescribetwotoolspeoplecanusetoprotecttheirprivacyontheWeb.
Encryption, which is basically the idea of encoding a file with a
password or sequence that is only know to the individual and
select others to gain access to them.
Digital Cash, such as Bitcoin and Litecoin, are used to make
secure payments without the ability to be tracked back to a source
or to be compromised in a way that could destroy your livelihood.

2.7Describetwomethodsabusinessoragencycanusetoreducetheriskofunauthorized
releaseofpersonalinformationbyemployees.GeneralExercises
Just like the response to the previous question, better encryption can
be used to allow only access to members under surveillance with
knowledge of who accessed it and at what time.
Another method that could be used is

2.8AcompanyintheNetherlandsthatmakesnavigationdevicescollectslocationdata
fromthedevicestoproviderealtimeservicestoitscustomers.Italsoprovides
anonymousstatisticaldatatogovernmentagenciestoimproveroadsandtrafficflow.
Unknowntothecompanyanditscustomers,thepoliceusedthedatatochoosesitesfor
trafficcamerastocatchspeeders.Wasthisaprivacyviolation?Whyorwhynot?
The trick with this is what kind of terms of usage and conditions
were established before the user began using this technology. By
accepting terms and clicking the acceptance box they could have
full reign to use any collected data throughout the usage of the
device.
As far as the cameras being installed, any type of unannounced
monitoring of civilians or officials is entirely a breach of
privacy. Had they announced this and allowed for rebuttal and vote
it would be allowed.

2.44Locallawenforcementagenciesareincreasinglyusingdrones(small,relatively
inexpensive,remotecontrolledaircraft).Withtheircamerasandheatsensors,thedrones
canlocatemissinghikers,monitorcrowds,andtrackfleeingcriminals.Newsreporters
andotherprivateindividualsmightalsousetheminthenearfuture.Findareportofan
actualuseofadrone.Describeitbriefly.Doesitthreatenprivacy?
The article I found dealt with the trouble of drones and how inaccurate
they have been. With the adaption of newer technology, the efficiency of
the drones being used in emergency response has become outdate. EagleEye
has begun to rework the entire system and OS involved with the drones to

make them overly responsive and smarter.


This does not threaten privacy, as long as this does not being to
interfere with others and public directly.

2.45GoogleStreetViewscamerasoccasionallycapturepeopleinembarrassing
behaviorandinplacestheywouldpreferthewholeworldnotseethem.Manypeople
objectedthatStreetViewviolatedpeoplesprivacy.How,andhowwell,doesGoogle
addresstheprivacyconcerns?
On the Google Street view page the concern of privacy is addressed in
the following topics. Public access only, the site is not private to any
party and is open information to all. Street view is not real time; this
is due to the information needing to be processed over a couple of
months span. Lastly, individuals and license plates are blurred. This
allows for the protection and privacy of all users and by passers to be
secure in knowing that they wont lose their integrity on the site.

2.46ReadtheguidelinesforcomputersearcheswrittenbyJudgeAlexKozinskiinthe
decisioninUnitedStatesofAmericav.ComprehensiveDrugTesting(NinthCircuit,U.S.
CourtofAppeals,September13,2010).Summarizeandevaluatethem.

You might also like