You are on page 1of 18

IFS3204_SosPro/IFSS3204_SosPro

Privacy and Law


Week 13
Sem Genap 2017/2018

By:
Arlinta Christy Barus

1
SOURCE

www.aclu.org/
https://www.privacyinternational.org/node/974

2
Overview
• Definition of Privacy
• Privacy and the Law
• How to protect our online privacy

3
Objective
Students should be able to
• know what privacy is
• prevent the miss-use of private data
• keep the privacy of data maintained

4
What Is Privacy?
• Freedom from observation, intrusion, or attention of
others
• Society’s needs sometimes trump individual privacy
• Privacy rights are not absolute
• Balance needed
– Individual rights
– Society’s need

5
Privacy and the Law
• No constitutional right to privacy
– The word “privacy” is not in the Constitution
– Congress has passed numerous laws
• Not particularly effective
• Issue is pace of change
• Privacy is a function of culture
• Privacy means different things in different countries
and regions
– Serious problem on global Internet

6
Right to Privacy in Indonesia
• Indonesia's Constitution does not explicitly mention privacy.
• However, Article 28(g) protects the right to dignity and “to feel secure”,
concepts that are often related to the right to privacy in national
constitutions:
• Article 28(f) guarantees the right to communication, though does not
mention privacy
• Regional and international conventions
– The Indonesian government is party to a number of international human rights
instruments indirectly through domestic implementing legislation. These include:
• the Universal Declaration of Human Rights (UDHR);
• the International Covenant on Civil and Political Rights;
• the International Convention on the Elimination of All Forms of Racial Discrimination; and
• the ASEAN Human Rights Declaration.

7
UUD 45 Pasal 28F
• Setiap orang berhak untuk berkomunikasi dan
memperoleh informasi untuk
mengembangkan pribadi dan lingkungan
sosialnya, serta berhak untuk mencari,
memperoleh, memiliki, menyimpan,
mengolah, dan menyampaikan informasi
dengan menggunakan segala jenis saluran
yang tersedia.’’

8
UUD 45 Pasal 28G
(1) Setiap orang berhak atas perlindungan diri pribadi,
keluarga, kehormatan, martabat, dan harta benda
yang di bawah kekuasaannya, serta berhak atas rasa
aman dan perlindungan dari ancaman ketakutan untuk
berbuat atau tidak berbuat sesuatu yang merupakan
hak asasi.
(2) Setiap orang berhak untuk bebas dari penyiksaan
atau perlakuan yang merendahkan derajat martabat
manusia dan berhak memperoleh suaka politik dari
negara lain.’’
9
Collecting Personal Information
• Often voluntary
– Filling out a form
– Registering for a prize
– Supermarket “Rewards” cards
• Legal, involuntary sources
– Demographics
– Change of address
– Various directories
– Government records

10
Computer Related Privacy Problems
• Data collection: No informed
consent/protection
• Loss of control: argument in facebook or blogs
• Ownership of data: the regulation is not clear

11
Privacy on the web
• Credit card payments are protected.
– But not necessarily private.
– Paypal etc.. May solve the privacy issues.
• Site and portal registrations:
– Beware of “we will enhance your browsing experience”
– Using email as id on some sites.
• Third party ads.
• Contests and offers: Free Iphones!

12
Privacy issues
• Cookies:
– Be-aware
• Third party cookies. E.g., Double Click and online profiling.
• Adware: is software that generates revenue for its developer by automatically generating
online advertisements in the user interface of the software or on a screen presented to the
user during the installation process
• Web-bug.
– is one of various techniques used on webpages or email, to unobtrusively
(usually invisibly) allow checking that a user has accessed some content.
Common uses are email tracking and page tagging for web analytics.
• Spyware: keystroke loggers.
– software that aims to gather information about a person or organization
without their knowledge, that may send such information to another entity
without the consumer's consent, or that asserts control over a device without
the consumer's knowledge

13
Email security
• Interception of email.
– Can be encrypted using PGP or S/MIME
– Email monitored legally.
• Anonymous E-mail and remailers
– Sending anonymous emails.
• Spoofing and spamming.

14
How to protect against privacy loss?

• Get/give as little data as possible.


• Data anonymization.
• Audit trail: record who has accessed what
data.
• Security and controlled access
• Training, quality, Restricted usage, data left in
place.
• Policy.
15
Protecting Your Online Privacy
• Implement appropriate security measures
• Get a copy of your credit report
• Use:
– Junk e-mail account
– Anonymous remailer
– Stealth surfing service
– Common sense
• Deal with recognized, trusted e-retailers
• Keep important numbers and passwords secret
• Use good passwords
• If your computer acts strangely, find out why

16
TASK
• Please find out how these methods may protect our
online privacy !
– Junk e-mail account
– Anonymous remailer
– Stealth surfing service

17
Thank you !

18

You might also like