Privacy

Cards (13)

  • Edward Snowden: 'Saying you don't need privacy because you have nothing to hide, is like saying you don't need freedom of speech because you have nothing to say.'
  • Data privacy
    About access, use, collection of data, and the data subject's legal right to the data
  • Data privacy includes

    • Freedom from unauthorized access to private data
    • Inappropriate use of data
    • Accuracy and completeness of a person's data
    • Availability of data to the data subject
    • The right to inspect, update, and correct this data
  • There is no such thing as privacy on the internet
  • Ways to achieve data privacy
    • Technical – using software and hardware to safeguard data
    • Social – raising awareness among the internet userbase and the policy makers
    • Regulatory – complying with regulations such as the GDPR or the Hong Kong regulations
  • GDPR
    • Aims to shift power to the consumer by ensuring users know, understand, and consent to the data collected about them
    • Companies have to be clear and concise about what will be collected and why and also whether this data will be used to create profiles based on people's behaviour and habits
    • Allows users to request deletion of photos of them as a minor and requires companies to inform other websites and search engines to remove the photos
    • Limits the type of data companies can collect, e.g. a ride-sharing app may ask your name, address, and credit card number, but cannot ask your race, political affiliation, religion, or sexual orientation
  • The South African constitution states that we all have the right to privacy, which includes the right not to have our person or home searched, our property searched, our possessions seized, or the privacy of our communications infringed
  • The eight principles of the POPI Act
    • Personal information must be obtained in a lawful and fair manner
    • The information can only be used for the specified purpose it was originally obtained for
    • Processing may not be done for purposes beyond the original scope that was agreed to by the data subject
    • The person who processes the information must ensure that the information is complete, not misleading, up to date and accurate
    • There should be open communication between the information regulator and the data subject
    • The person processing the data is accountable to ensure that the measures that give effect to these principles are complied with when processing personal information
    • The data subject must be able to participate and access the personal information that a responsible party has on them and must be able to correct the information
    • The person processing data must ensure that the proper security safeguards and measures to safeguard against loss, damage, destruction and unauthorised or unlawful access or processing of the information, has been put in place
  • FICA (Financial Intelligence Centre Act) laws in South Africa govern financial information to prevent crimes such as money laundering, tax evasion, and other illegal financial acts
  • Privacy by design
    • Embedding data privacy into product design and development using 7 principles: 1) Proactive not reactive, 2) Privacy is the default, 3) Embed privacy into design, 4) Retain full functionality, 5) Ensure E2E security, 6) Maintain visibility and transparency, 7) Keep it user-centric
  • AI bias
    AI systems can contain racial, ideological, or gender bias due to the data they are trained on, a possible solution is to use contractual ethics where machines are taught certain principles and decision-making skills to apply certain values
  • Data breaches are sometimes caused by hackers breaking into a database but more often by carelessness or failure to follow good security practices
  • Major data breaches
    • 26 million records stolen from the US Veteran's Affairs with no encryption
    • PlayStation Network breach in 2011
    • Yahoo breach in 2015 where 500 million accounts were compromised
    • Zappos (a subsidiary of Amazon) had a major data breach where a cybercriminal gained access to names, email addresses, phone numbers, and encrypted passwords of 24 million customers