updated 2014 March 03

also Bill C-6 aka PIPEDA
the Personal Information Protection and Electronic Documents Act

also Bill C-37 the DO NOT CALL registry

also IPC  www.ipc.on.ca office of the Information & Privacy Commissioner, Province of Ontario

see also Privacy Issues re: Social Media  www.witiger.com/ecommerce/privacyissues-social-media.htm
see also Email Filtering  www.witiger.com/ecommerce/emailfiltering.htm
 
This web page has audio clips - just click on the icon (like the one to the left) and you can hear Prof. Richardson's voice adding additional information to topics on the page. turn on your speakers to hear audio clips
..
. This page used in the following courses taught by Prof. Richardson
.
MGT D06
CCT 322
MGD 415
MRK 410, MRK 610
BCS 555
BIT 704
.
.
For U of T students at the Mississauga Campus taking either CCT322 or MGD415 - be advised that Prof. Wensley covers Privacy Issues and the PIPEDA Act (Cdn Bill C 6) in his course CCT 206.

In the case were students going through this unit are students who have previously taken CCT 206, we will not duplicate the topics you discussed with Dr. Wensley, rather we will touch on other aspects of Privacy Issues

..
LEARNING
OBJECTIVES
After reading this unit students will be able to:
  • identify what are the current issue in online Privacy
  • determine how some of those Privacy Issues will effect 
    • e-commerce and e-business
    • customer relationship management
    • online communities
    • internet communications
  • know the basics of the "legal environment" effecting Canadian privacy regulations
    • Bill C6, Bill 88
.

page 284 in the 
Schneider/Perry 
book 3rd edition

Privacy Rights 

"The Issue of online privacy is continuing to evolve as the Internet and the Web grow in importance as tools of communication and commerce. Many legal and privacy issues remain unsettled and are hotly debated in various forums".
 
KEY
POINTS
http://people.senecac.on.ca/tim.richardson/audio/audiprivacy1.wav
Bottom-line; privacy issues are 
   o a hot topic
   o many people have strong opinions about the consequences
   o government agencies have widely varying responses

WTGR

"Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and World Wide Web."

..
 
Why do we care about privacy violations?

What does it matter if someone knows information about me?

As Bruce Schneier points out in his book "Secrets & Lies: Digital Security in a Networked World" "Privacy violations can easily lead to fraud

Prof. Richardson explains that when criminally intent people have access to personal information about a target, they can combine sources of data to come up with a profile that will allow them to plan and attack people who are unprepared. Sometimes the risk may come from a person on the outside who has illegally obtained personal profile information for criminal purposes, or sometimes the risk may come from people within positions of trust.
http://people.senecac.on.ca/tim.richardson/audio/audiprivacy9.wav There have been several stories about how personnel at credit card agencies and financial information processing companies can use cardholder information they have access to, in order to obtain services and products fraudulently.
The difficulty citizens have with keeping track of the integrity of their personal profiles in the various data banks, is that in some federal and state / provincial jurisdictions, your personal profile information is not the property of the person - but rather the property of the organization that collected it, or bought it; which they then have the right to do with as they please.

Growing public awareness of these issues is one of the reasons why in Canada we have the new Bill C-6 federally and Bill 88 provincially.

.
.s
Privacy 

pressure for businesses to be more effective protecting customer profile information

"Protecting privacy makes business sense"
is the title of a special article written by John Gustavson for the Toronto Star July 30th, 2007
Gustavson is president and CEO of the Canadian Marketing Association  www.the-cma.org

Gustavson notes:

"businesses are facing a groundswell of pressure from consumers, governments and privacy advocates wanting to know how they collect, use and share a consumer's personal information in the marketplace."

Gustavson explains:

Two key developments are fuelling this:

  • high-profile cases where consumer records were lost or stolen.
  • distrust and annoyance with some marketing practices.
permission to quote communicated with Gustavson by email 2007 Sept 12th - copies on file in permissions binder
n
Privacy 

pressure for businesses to be more effective protecting customer profile information

"Protecting privacy makes business sense"

consumer records lost or stolen

Gustavson notes that in the U.S. "...more than 40 states have introduced data security breach laws"

The consequence, for American companies (and Canadian companies doing business in the U.S.) is "... a patchwork of varying requirements that many marketers are struggling to comply with." This adds a further burden to the job of "Chief Compliance Officer" that is a title which has just become known since 2002.
 en.wikipedia.org/wiki/Chief_Compliance_Officer

n
Privacy 

pressure for businesses to be more effective protecting customer profile information

consumer records lost or stolen - employees fired
 
http://m.itworldcanada.com/story.aspx?id=142297 Jan 2011 in Arizona
U.S. congress rep Gabrielle Gifford and others were shot in a sensational public event.

Less than one week after the shooting, the local hospital that treated the victims fired 3 employees because they electronically accessed the medical records of Gifford and other victims. 

This swift "zero tolerance" reaction is a good reflection of how some companies are taking privacy very seriously and making sure employees understand the serious consequences of infractions.
n
Privacy 

pressure for businesses to be more effective protecting customer profile information

"Protecting privacy makes business sense"

distrust and annoyance with some marketing practices

Gustavson notes that "Contrary to some commonly held beliefs, legitimate businesses don't buy a consumer's personal secrets using covert means. Instead, they rent marketing lists of consumers who have either permitted the sharing of their personal information, or from demographically selected lists sourced from public information."

but, adds WTGR, the circumstance that puts consumers in a vulnerable situation is when MEGA-databases take information from several lists (some acquired legally, some illegally) and combine this to create detailed personal profiles on customers - the problem being when these profiles are inaccurate, or give misleading information which may cause a customer to be denied credit, or pay a higher interest rate.

Do Not Call Lists
Most people are sceptical of telling companies they do not want to be on a DO NOT CALL list because they believe that their name will be passed around anyway.
 ifg-inc.com/Consumer_Reports/TeleCall.shtml
also
 www.donotcall.gov
also the American FCC (Federal Communications Commission) official 
National Do-Not-Call Registry www.fcc.gov/cgb/donotcall/

n
DO NOT CALL lists
http://www.cfrb.com/
(part of Astral Media)
During the 3rd week of September 2008 Richardson was interviewed, live on air, by host Jim Richards on CFRB newstalk 1010 for a short segment on the upcoming "Do Not Call List".   Richardson answered questions live on air, the segment can be heard by clicking on the link below
 http://people.senecac.on.ca/tim.richardson/audio/CFRB2008Sept22DoNotCallList.mp3
(link works 2014)
.s
Privacy 

DO NOT CALL lists

Bill C-37

"Protecting privacy makes business sense"

distrust and annoyance with some marketing practices

Bill C-37 (became law in 2005)
http://www2.parl.gc.ca/HousePublications/Publication.aspx?pub=bill&doc=C-37&parl=38&ses=1&language=E

Read 2005 article by Prof. Michael Geist
Canada's Do-Not-Hesitate-To-Call List
 michaelgeist.ca/index.php?option=com_content&task=view&id=951&Itemid=98&nsub
(link works 2014)

"Bill C-37 introduced Canada's proposed do-not-call legislation in December 2004. Amending the Telecommunications Act, the proposed legislation would allow the CRTC to establish a national bilingual do-not-call list to which individuals not wishing to receive unsolicited calls could add their telephone numbers. Telemarketers who call individuals on the national registry will be committing an offence and subject to monetary fines."
says Hearn and Isaacksz in a McMillan Binch article

..

first published by Scott Adams in Jan 1992
cc
Privacy 

DO NOT CALL lists

Ways to Annoy a Telemarketer 

Student Oksana C. in MGD415 at UTM in March 2011 provided a humourous list she found which gives great answers to annoying people who call you. I particularly like # 3.
original list at www.identafone.com/10ways.html

10 Ways to Annoy a Telemarketer 

10. When they ask "How are you today?" Tell them! "I'm so glad you asked
because no one these days seems to care, and I have all these problems; my
arthritis is acting up, my eyelashes are sore, my dog just died..."
 
9. If they say they're John Doe from XYZ Company, ask them to spell their name.
Then ask them to spell the company name. Then ask them where it is located. 
Continue asking them personal questions or questions about their company for as
long as necessary.

8. Cry out in surprise, "Judy! Is that you? Oh my God! Judy, how have you been?"
Hopefully, this will give Judy a few brief moments of pause as she tries to 
figure out where she could know you from.

7. If MCI calls trying to get you to sign up for the Family and Friends Plan,
reply, in as SINISTER a voice as you can, "I don't have any friends... would
you be my friend?"

6. If they want to loan you money, tell them you just filed for bankruptcy and
you could sure use some money.

5. Tell the telemarketer you are on "home incarceration" and ask if they could
bring you a case of beer and some chips

4. After the telemarketer gives their spiel, ask him/her to marry you. When
they get all flustered, tell them that you could not just give your credit
card number to a complete stranger.

3. Tell the telemarketer you are busy at the moment and ask them if they will
give you their HOME phone number so you can call them back. When the
telemarketer explains that they cannot give out their HOME number, you say "I
guess you don't want anyone bothering you at home, right?" The telemarketer
will agree and you say, "Now you know how I feel!" Say good by - and Hang up.

2. Insist that the caller is really your buddy Leon, playing a joke. "Come on
Leon, cut it out! Seriously, Leon, how's your mom?" 

And first and foremost:

1. Tell them to talk VERY SLOWLY, because you want to write EVERY WORD down. 
 

n

advanced
technologies
revealing
privacy
vulnerabilities
CBC journalist Paul Jay wrote an article titled
"Hitting the target: Increased personalization of ads here to stay, despite privacy concerns"
The article ran on cbc.ca in the first week of October 2007 and quoted extensively from an interview given by Prof. Richardson 

The basics of the story is, as Paul outlined in the first sentance

"Social networking sites and advances in mobile technology are giving advertisers an unprecedented ability to focus their pitch to a very specific focus group: you."
 
"Increasingly, sophisticated mobile handsets are incorporating Global Positioning System satellite technology to provide users with mapping information. Tying mapping data into advertising is a natural move, said Richardson."
While such a capability may be possible Richardson says "People become a little nervous if they think you know too much information about them,"
the full article was at
 www.cbc.ca/news/background/tech/hightech/personalized-ads.html

n

advanced
technologies
revealing
privacy
vulnerabilities
Google's detailed streetscapes raise privacy concerns
written by journalist Carly Weeks for CanWest News Service 2007 Sept 11th

Weeks' story, carried in the National Post,
 http://www.canada.com/nationalpost/news/story.html?id=9e53df0f-3211-4cde-837c-90a6bb4d561d&k=49986
(link works 2014)

states that
"...Canada's Privacy Commissioner has raised concerns over a new Google program that lets users view and zoom in on street-level photographs that are so clear and precise, they can pinpoint an unknowing bystander and their exact location with the click of a mouse button. Google's new Street View application uses photographs captured at an earlier date to let computer users navigate through city streets and neighbourhoods in major cities quickly and easily."

Weeks' says that "... the program, which relies on pictures taken without the knowledge or consent of people in them, seems to violate many basic rights of citizens and poses a serious threat to personal privacy." according to Jennifer Stoddart, Canada's Privacy Commissioner.

n

advanced
technologies
revealing
privacy
vulnerabilities
Google's detailed streetscapes raise privacy concerns

Apparently there is a Canadian angle to this Google story. A Canadian company in Alberta  immersivemedia.com was the firm contracted by Google to video many of the city street scenes. On Immersive's website you can see (Sept 2007) an number of examples of how the camera works and the detail that is recorded. 

Weeks points out "the privacy commissioner is concerned that if the service is expanded into Canada, it could violate [Canadian] federal privacy laws designed to protect citizens from having their personal information easily accessible. The street-view application "does not appear to meet the basic requirements of knowledge, consent, and limited collection and use" of personal information that is set out in Canada's privacy laws, the commissioner wrote in her letter to Google's chief legal officer David Drummond. "

n

advanced
technologies
revealing
privacy
vulnerabilities
Google's detailed streetscapes raise privacy concerns
student Zane W. in MGD 415 at UTM in March 2008 found a good example of how the detailed images in Google's detailed streetscapes can catch some "interesting situations"
Zane emailed to say
"Here is a link I came across, reminded me of different ways people are using the current technology and also the rights these new technologies may be infringing on. It is an apparent drug deal caught by the street view cam in Google maps."
 http://maps.google.com/maps?hl=en&ie=UTF8&layer=c&cbll=41.823471,
-87.612699&cbp=1,167.75819312895956,0,3,12.173258141222098&ll=41.
837915,-87.609787&spn=0.047193,0.066605&t=k&z=14
Below is a screen capture you can view if the Google link is no longer active
click
n
Privacy 

new
technical solutions
proposed

Ontario Privacy Chief Endorses Microsoft's user ID system
written by journalist Nestor Arellano and published in itWorldCanada.com 2006 Oct 19

Arellano explains that "Ontario's Information and Privacy Commissioner has expressed support for Microsoft's user identification system dubbed CardSpace Identity Selector. Microsoft Corp. plans to launch CardSpace as a Windows component embedded in the company's Vista operating system (OS) expected to roll out in January [2007].
http://www.witiger.com/ecommerce/articleTRprivacy.jpg Click on the screen capture to the left to read some of the original article, including Prof. Richardson's comments.
see also  http://en.wikipedia.org/wiki/Windows_CardSpace
see also  http://cardspace.netfx3.com/content/introduction.aspx

n
Privacy 

new
technical solutions
proposed

Arellano writes that "Microsoft executives .... described CardSpace as an identity metasystem that allows a user to create multiple virtual ID cards. ...each virtual card created by the user will only contain the minimum amount of information that individual will need to divulge to carry out a transaction applicable to the card. "The system allows users to create a palette of cards. Users can choose which card they want to use depending on the context of the transaction to be carried out. For instance, if a CardSpace user wants to buy something from an online store, he or she can use a virtual card tagged for credit card purchases. The cards do not contain any data such as social insurance numbers or credit card information that could be used for Internet fraud. The virtual card will connect the online store to a bank's system that will vouch for the user's identity and inform the store if enough funds are available for the purchase."

full text of the article is at  witiger.com/ecommerce/articleIDcard.htm

n
.
In November of 2005 one of the most startling things to be discussed in the Canadian media was the stunt pulled by Maclean's magazine when they wrote a story about Privacy Issues and showed how they could obtain the personal cellphone call records of the Privacy Commissioner.

As expected, this resulted in a lot of inquiries from the Privacy Commissioners office about how the average citizen was vulnerable to people being able to obtain personal and private information.

In the case exposed here, journalists for Maclean's had bought the cell phone records from a large American media company that sells all kinds of information over the internet, as long as the buyer wants to pay the fee.

WTGR

"
Federal
Privacy 
Commissioner 
Exposed
Jonathon Gatehouse of Maclean's writes
"When police are investigating a crime and want phone records, they must seek a court order.  Most Canadians consider their call records privileged information, and the courts have backed them up time and time again. Yet Maclean's was able to purchase the privacy commissioner's phone logs online from a U.S. data broker, no questions asked. For about US$200 per order, Locatecell.com delivered months of long-distance records from her Bell Canada home and cottage accounts. They were also able to access her Telus Mobility cellphone call logs for October -- a monthly bill she probably hadn't even received at the time. And all the Internet requests were turned around in a matter of hours." says Gatehouse

Gatehouse adds "...in the wired world, almost anything is available for a price. A British teen recently tracked down his sperm-donor father using his own DNA and two different for-hire databases."

n
Privacy 
Commissioner 
Exposed
The circumstance of a U.S. company, collecting personal profile information throughout North America, raises the question of how "sovereign" our country can be when rules, laws and regulations passed by the Canadian federal and provincial governments have no limitation on a person who uses non-Canadian resources to access information.

Truly this is one of the consequences of the Information Age eliminating political boundaries whether we like it or not.

n
How to find that private info UTM student James B. in MGD415 in January 2006 searched some info related to the story and sent an email - some of which is included below.

Prof. Richardson,

    I was reading the competitor intelligence portion of your website tonight, which reminded me of a news article I saw the other day. It was about companies on the internet that for a fee, will provide you with a complete record of a person's cell calls; including out going/incoming number, date, time, etc. I did a bit of research, and checked out one of these sites (http://www.datatraceusa.com/products.asp, I know it's American, but I believe they will still search Canadian numbers), and they actually have services where if you know person's name & address, they can provide you with their cellphone number, or if you simply know a cell number, they can provide you with the name and address of the owner. I'm not sure if this would qualify under 'competitor intelligence or a 'security/privacy' section. This Chicago Sun Time's article looks at how this service is putting government/police informants at risk. I think that this service has the ability to be used to gather competitor intelligence if a company knew the name of several important employees at a competing company, where using their names could find out their cell phone numbers, and therefore find out the major numbers they are calling and other detailed information. This information could give the company an idea to possible suppliers, buyers, financiers, etc. Hope this information is relevant, and helps. BTW, here is the original Chicago Sun Times article: http://www.suntimes.com/output/news/cst-nws-privacy05.html

n
Enforcement
Issues
As journalist Jonathon Gatehouse wrote in the Maclean's exposure of the Privacy Commissioner, "The Canadian Radio-television and Telecommunications Commission, which regulates telecom companies, has a little more power to punish privacy breaches -- its rulings have the force of law. But the maximum fine for a corporation's first offence is $50,000 -- not much of a deterrent when you consider the multi-million-dollar penalties handed down by its American counterpart, the Federal Communications Commission. On very rare occasions, Canadian police will get involved in a privacy issue, but only if the breach results in a serious crime -- like the 2002 case of the Quebec government employee accused of helping the Bandidos motorcycle gang plan hits by providing them with the driver's licenses of rival Hells Angels."
..
Bill C-6
PIPEDA

Privacy
Issues
 

Bill C-6

 

http://www.thestar.com/ Torstar columnist Ellen Roseman
wrote an article April 5th, 2000

 titled  "Privacy law will affect e-commerce"

 Roseman's piece was about the effect of Bill C6 passing in 2000. Bill C6 is federal legislation. The legislation "requires Canadian companies and institutions to get informed consent before they collect or disclose personal information". Since so much of internet marketing is focused at target marketing - which is facilitated by gathering databanks of personal demographic information about on-line consumers, this legislated requirement will be a big topic in "e-commerce legal issues". 

permission to quote Roseman given by Joanne MacDonald, TORSTAR Syndicate Sales, in an email 2004 Dec 09

.
KEY
POINTS
http://people.senecac.on.ca/tim.richardson/audio/audiprivacy2.wav
Privacy Issues have to be dealt with effectively.
Privacy concerns remain one of the principal reasons consumers hesitate to purchase products through the web.

One of the reasons the Canadian law (Bill C6) was enacted was due to pressure from the public, and then politicians, to address the situations of abuse created when private companies buy personal data information collected by government departments and agencies - and then get caught using that information in ways which can be considered harmful to the identities of the people listed.

Unfortunately, the law only applied to Canadians and Canadian companies and is not enforceable outside Canada.

..
Bill C-6

Privacy
Issues
 

Bill C-6

 

Geoffrey Downey, writing in Computing Canada, June 9th, 2000
 "Ottawa Updates Privacy Rules"

Bill C6  [2001] requires companies that collect and use personal information about customers, to comply with new regulations to safeguard what they can do with that information.
"Federally-regulated companies in the private sector as well as companies who  trade personal information where the information itself is the subject of the trade must comply with the Act starting Jan. 1, 2001. "

permission to quote from Computing Canada given by publisher Joe Tersigni of itbusiness.ca, the parent company, in May 2005. Copies of emails kept on file in the permissions binder

.
Bill C6

Basics

Jeremy F., Alanna J., and Solange A. of MRK410 in March 2004 chose to submit a pic of a threesome more famous than themselves

Jeremy, Alanna, and Solange found an article from www.cica.ca regarding new Canadian Privacy laws.

"Electronic Documents Act (PIPEDA). (informally referred to as Bill C6) The PIPEDA establishes new rules to recognize the privacy rights of individuals with respect to the collection, use, disclosure and retention of their personal information. The rules also recognize the obligations of organizations to protect personal information in a manner that a "reasonable" person would consider appropriate under the circumstances. 

To comply with the PIPEDA requirements, businesses must implement a privacy compliance regime. The federal government is phasing in the legislation to ease the transition for businesses and to give provincial governments an opportunity to come up with their own privacy legislation. By January 1, 2004, the privacy rights of all Canadians will be protected in one of two ways: by federal legislation or by provincial legislation that is "substantially similar" to the federal legislation. Those rights are to be enforced by the Privacy Commissioner of Canada who receives complaints about contraventions of the rules, conducts investigations and attempts to resolve such complaints. Unresolved disputes can be taken to the federal court for resolution and this may result in fines of up to $100,000. "

.
During the 2nd week of January 2007,  Richardson was interviewed by InterGovWorld.com for a story about Bill C6, (the PIPEDA Act) regarding new lesgislation about security breach notifications
mv
PIPEDA is currently [2007Jan] under review by the House of Commons Standing Committee on Access to Information, Privacy and Ethics. Richardson was quoted in the context of security breach notification requirements saying "This proposal is extremely important, otherwise PIPEDA would have no teeth,""The question now is, how will the law be enforced? "Richardson points out that it's yet unclear which agency would enforce the proposed law and how its enforcement would be handled.
.v
when a 
third
party 
gets a 
hold of 
your 
personal 
information

 

http://www.thestar.com/ "The importance of  anonymity"
Torstar columnist Carol Goar 2003 Feb 5th

Goar says "Anyone who uses a computer, owns a credit card, subscribes to a magazine or  donates to charity is in dozens of privately owned databases.  Anyone who applies for a passport, casts a ballot or visits a doctor is in government databases that may or may not be secure; may or may not be publicly managed; and may or may not be accessible to the police."
 

KEY POINTS
http://people.senecac.on.ca/tim.richardson/audio/audiprivacy3.wav
You'd think you were OK dealing with a large company, but what if the large company subcontracts part of their data management to a smaller firm, and that firm has a vulnerability that results in thousands of personal profile files being stolen on a hard drive.
Although Privacy Commissioner George Radwanski would never have wished for  such a grim backdrop to his annual report, it did get people listening. His message  that "the right to be anonymous, except when we choose to identify ourselves, is at the very core of human dignity, autonomy and freedom" suddenly seemed relevant. His warning that Canadians are too ready to relinquish their privacy, suddenly seemed apt."

"Bill C-17, which is now [Feb 2003] before  Parliament. It would give the RCMP and CSIS the right to delve into the background  of anyone booked on a domestic or foreign flight."
 

.
Privacy
Commissioner

Ontario

 

  the Ontario Privacy Commissioner www.ipc.on.ca
KEY POINTS the "political / legal regulatory environment" that effects Privacy Issues in e-commerce is not just federal, but also provincial.

The Ontario government has a privacy watchdog agency which also enforces rules and regulations which effect companies.

As explained in their own words "The role of the Information and Privacy Commissioner/Ontario (IPC) is set out in three statutes: 

.
Privacy
Commissioner

Ontario

 

from the website of the Ontario Privacy Commissioner Sept 2007
 
"Ontario’s Privacy Commissioner to launch groundbreaking graduate initiative at the University of Toronto on Identity, Privacy and Security"
Dr. Ann Cavoukian, the Privacy Commissioner in 2007, announced that she will be "presenting the inaugural lecture at the University of Toronto’s new interdisciplinary program called the Identity, Privacy and Security Initiative (IPSI), www.ipsi.utoronto.ca. This initiative links two new graduate concentrations in privacy and security, offered this fall through the Faculty of Applied Science and Engineering and the Faculty of Information Studies."
.
Protecting
Your
Online
Privacy
 
 

http://people.senecac.on.ca/tim.richardson/audio/audiprivacy4.wav
T I P

http://www.eff.orgwww.eff.org
EFF's Top 12 Ways to Protect Your Online Privacy

Jo C. in BCS 555, Nov 2003, found this helpful list of 12 Ways to Protect Your Online  Privacy. Some of the entries on the list are obvious, some are worth remembering.

the detailed list came from www.eff.org/Privacy/eff_privacy_top_12.html (link not working in 2013)

  1. Do not reveal personal information inadvertently
  2. Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries.
  3. Keep a "clean" e-mail address.
  4. Don't reveal personal details to strangers or just-met "friends".
  5. Realize you may be monitored at work,[email filtering] avoid sending highly personal e-mail to mailing lists, and keep sensitive files on your home computer.
  6. Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details
  7. Do not reply to spammers, for any reason
  8. Be conscious of Web security
  9. Be conscious of home computer security
  10. Examine privacy policies and seals
  11. Remember that YOU decide what information about yourself to reveal, when, why, and to whom
  12. Use encryption
permission to quote from, and use the EFF material was given by Kathy Ann, webmaster for the EFF in an email Dec 3rd, 2003. Copies of emails kept on file in the permissions binder.
.
 
Privacy
Issues
Globally

 
 
 
 
 
 
 

 

By Prof. Michael Geist 
in the Toronto Star 2007 Nov 26th

"Private email is not always Hush Hush

Professor Geist explains that sometimes U.S. government agencies have the power to use certain regulations and legal circumstances that result in Canadians having their expecation of privacy nulified.

Geist explains that "This past September [2007], the U.S. Drug Enforcement Agency launched "Operation Raw Deal", an initiative that targeted people purchasing raw steroid materials through the Internet from China and repackaging the steroids as drugs for domestic sale."

"The foundation of the DEA's case rested on hundreds of encrypted emails stored on the computer servers of Hush Communications, a company based in Vancouver.  A British Columbia court ordered the company to decrypt the emails and to send them to the U.S. law enforcement officials....the company complied, shipping 12 CDs filled with unencrypted personal email to investigators in California."

U.S. officials relied on the U.S.-Canada Mutual Legal Assistance Treaty, which is used by law enforcement agencies to expedite investigations that run across national borders.

Geist cautions "the use of the MLAT serves as a timely reminder that U.S. law enforcement wields a wide range of investigative tools to compel disclosure of private information held in Canada."
 

As explained in the Toronto Star "Hush Communications  www.hushmail.comis a free encrypted email service that allows users to blanket their electronic communications with privacy-protective encryption."
KEY
POINTS
Encrypted email can serve many legitimate purposes as people use the features to obtain some degree of privacy in their contacts - but, such technologies can be exploited by criminals which can cause a problem in police investigations
 thestar.com/printArticle/279786 and www.michaelgeist.ca/content/view/2410/159/
permission to quote given by Prof. Michael Geist in a May 2005 email, copies on file in the permissions binder
see also michaelgeist.ca
.
Privacy
Issues
Globally
 
 
 
 
 

Privacy
Issues
Globally

 

By D. Ian Hopper,  ASSOCIATED PRESS
carried in the Toronto Star 2002 Sept 9th
suggested by student Bhavini T. from BCS555

"Tighter surveillance worries privacy groups
 

KEY
POINTS
The issue is that worldwide, governments have enacted rules and regulations to allow law enforcement agencies to increasingly intercept and monitor communications in order to uncover criminal activity and terrorist plots.
.
"WASHINGTON — Governments worldwide have made it easier for authorities to augment citizen databases and eavesdrop on  telephone and online conversations in  order to fight terror, according to a survey of privacy regulations. The report, written by privacy activists Electronic Privacy Information Center   www.epic.org  and Privacy International, show the  United States was not alone in passing  new laws that value increased security over personal privacy.

permission to quote given by Joanne MacDonald, TORSTAR Syndicate Sales, in an email 2004 Dec 09

.
Privacy
Issues
Globally
 
 
 
 
 
 
 
 

Privacy
Issues
Globally

 

Here is the web page for the actual Report noted in the 2002 Star article
 http://www.privacyinternational.org/survey/phr2002/

"It's a general theme toward total identification," said Sarah Andrews, an author of the report, which was released last week. "When you're outside in public or when you're online, you can be identified.'That dismays privacy groups, which worry about free speech  restrictions and abuses of power. They have fought new laws like the   U.S. anti-terror legislation that lowered the bar on surveillance  requirements by authorities.
 

KEY
POINTS
There are two sides for every story - while the privacy activities are concerned about individual rights of privacy, other people are concerned about the greater picture of safety and security for society.
.
"Stewart Baker, a former general counsel for the NSA, said increased data sharing might have helped identify the  Sept. 11 hijackers. He said many surveillance proposals were already moving toward passage, and speeded up by legitimized fears of a terrorist threat. "They're really complaining about changes in the world rather than changes in the law," said Baker.
.
Privacy
Issues

5
things

http://www.ecommercetimes.com/news/special_reports/privacy.shtml Randi Barshack, Vice President, TeaLeaf Technology,  writing in the E-Commerce Times  August 28, 2000
 ecommercetimes.com/story/4135.html

Barshack explains that "for e-businesses that want to sell successfully online and instill trust in their customers, privacy is not always a black and white matter. The shades of gray inherent in the privacy debate are many, which is why different approaches to Web privacy can be appropriate and important for different types of consumers and the online businesses that serve them."

..b
Privacy
Issues

5
things

Barshack: "five things that e-businesses need to think about when tackling the big "P."

 1. "Privacy means different things to different audiences". 

In B2B companies accept that the seller keep s as much detailed information about the customer as possible to facilitate reordering. In B2C customers think detailed information on their previous product purchases and demographic information about them is an infringement and can be abused if the information is shared
WTGR
permission to quote from ecommercetimes.com given by publisher Richard Kern in an email Dec 10th, 2004. Prof. Richardson is also a contributing writer to ecommercetimes.com. Copies of emails kept on file in the permissions binder.
.
Privacy
Issues

5
things
 

 

 2. "Honesty is always the best policy, period."
"Companies need to clearly and conspicuously disclose their  privacy policies." says Barshack

Sounds simple, but the best way to NOT get caught telling a lie, is to not tell a lie in the first place.

Why?
Well you could use a "faith based" argument that it is good NOT to lie

Or you could suggest that with particular advances in technology in Y2K and the intense competitive environment, there is always going to be a way for people to discover a lie in these times; and when you get found out lying, it is extremely bad for customer relations.
WTGR

.
Privacy
Issues

5
things

 3. "Show your Web visitors that knowledge and a better  understanding of them can work in their favor."
You can be more successful at asking for, and receiving detailed information on customers' interests if you can prove to them it is an advantage to do so - either saving money or more accurate product selection.

Some stores ask for a customer's postal code without explaining first that all they want to do is plan more stores closer to where their customers are coming from - as opposed to knowing something private about the customer
WTGR

.
Privacy
Issues

5
things

 

 4. "Separate business from the personal without sacrificing  personalization."
"There's a big difference between understanding buying patterns on a business-to-business or business-to-consumer commerce site for the purpose of improving the site and the visitor's experience (i.e. personalization) on the one hand, versus following Web surfers into chat rooms and through Internet activities completely unrelated to their commercial interests."
.
Privacy
Issues

5
things

 5. "The flip side of privacy: It's a two-way street."
"E-businesses have privacy concerns, just as consumers do. Especially with B2B sites, companies are often opening up their  entire enterprise to the public, a potentially vulnerable situation...Show your customers that you are serious about  protecting their information, just as you are serious about protecting your own"
.
Privacy
Issues

Corporate Considerations

by Poonam Khanna
June 2001
The point is made by Khanna that since the new economy is predicated on information, privacy of information has become an information management tool.

Handling privacy issues well can mean your company has a competitive advantage over companies that handle privacy issues poorly.
http://people.senecac.on.ca/tim.richardson/audio/audiprivacy5.wav

.
Privacy
Issues
 

examples
of violations

 

Yahoo carried an Associated Press story
Sept 2003 about an airline company that gave its passenger list info away. The original story was written by Brad Foss for AP

 
"Violating its own privacy policy, JetBlue Airways gave 5  million passenger itineraries to a Defense Department contractor that used the information as part of a study seeking ways to identify "high risk" airline customers. 

"Details of the study and JetBlue's involvement were reported Thursday 2003 Sept 18, by  Wired.com, which credited privacy activist Bill Scannell for bringing attention to the issue on his Web site, Don't Spy On.Us. Marc Rotenberg, executive director of the Electronic Privacy Information Center in Washington, said that by violating its privacy policy, JetBlue could be sued for "deceptive trade practices." "

Permission to quote from Yahoo!, use the Yahoo! logo, and use screen captures, was given in an email by Debbie Macleod, Yahoo! Marketing Manager Jan 21st, 2005. Copy of the email is kept in the permissions binder.

.
 
Privacy
Issues

Technology 
Used
For 
Gathering
Info
- at odds with privacy rights

.
KEY
POINTS
Below is described a specific example of how one's privacy can be compromised without you even knowing it is happening.
.
"Privacy on the Internet"
by Penney Kome, originally at www.womenspace.ca/magazine/51ws/vol51f.html

Kome explains "In November 1999, RealNetworks acknowledged that its Real Jukebox software secretly gathered and transmitted data about consumer listening habits. If Sally Jones listened to the new Sarah McLaughlan song thirty-six times in a row, RealNetworks knew."

"The free version of RealJukebox, which has about 13.5 million registered users, prompts new users for their names and e-mail addresses before they are assigned an identifying number," according to an E-Commerce Times story by Mary Hillebrand on November 9, 1999. 
.
"RealPlayer registrants also received unsolicited email alerts every time RealPlayer upgraded a product."

.
Privacy
Issues

Technology 
Used
For 
Gathering
Info
- at odds with privacy rights

.
http://www.boston.com SONY Spying with its music CDs ?

Hiawatha Bray of the Boston Globe wrote a story published online November 8th, 2005 titled

"Sony CDs secretly install spyware"

Bray wrote "Computer Associates International Inc. said that new anticopying software Sony is using to discourage pirating of its music also secretly collects information from any computer that plays the discs. The software works only on computers running Microsoft Corp.'s Windows operating system. It limits listeners' ability to copy the music onto their computers, and locks copied files so they cannot be freely distributed over the Internet. But Computer Associates said the antipirating software also secretly communicates with Sony over the Internet when listeners play the discs on computers that have an Internet connection. The software uses this connection to transmit the name of the CD being played to an office of Sony's music division in Cary, N.C. The software also transmits the IP address of the listener's computer..."

.
 
Global Positioning System
-Privacy Issue
http://people.senecac.on.ca/tim.richardson/audio/audiprivacy7.wav
 
Hui J., Peng Z. and Shani B. of MRK 410 in March 2004, found a site www.wirelessweek.com which discusses GPS Privacy Issue in games
How that information will be used has raised some privacy advocate eyebrows. Will the users of these location-based games know what they're getting into?"
.
This website  www.wirelessweek.com  is about privacy issues regarding GPS-based games, which are popular in some countries.

"In many countries around the world, a GPS-based game called "geocaching" is growing in popularity. As precise location capabilities become part of wireless networks, these kinds of
applications conceivably can pinpoint a subscriber's location."
 

.
Marketing Opportunity Vs Privacy Issues
 
 

 

Mobile Commerce Privacy Issues
 
Brad K., Mariezel  N. and Allison B. of MRK 410 in March 2004 found an article on Mobile commerce and privacy issues
The following information was originally taken from: www-2.cs.cmu.edu/~sadeh/mobilecomm.htm

ISRI - School of Computer Science - Carnegie Mellon University 
Mobile Commerce, or m-Commerce, is about the explosion of applications and services that are becoming accessible from Internet-enabled mobile devices. It involves new technologies, services and business models. It is quite different from traditional e-Commerce. Mobile phones or PDAs impose very different constraints than desktop computers. 
But they also open the door to a slew of new applications and services. They follow you wherever you go, making it possible to access the Internet while walking down the street with friends and family or while driving, looking for a nearby restaurant or gas station. 

"As the Internet finds its way into our purses or shirt pockets, the devices we use to access it are becoming more personal too. Already today, mobile phones and PDAs know the phone numbers of our friends and colleagues. They are starting to track our location. Tomorrow, they will replace our wallets and credit cards. One day, they may very well turn into intelligent assistants capable of anticipating many of our wishes and needs, such as automatically arranging for taxis to come and pick us up after business meetings or providing us with summaries of relevant news and messages left by colleagues. But, for all these changes to happen, key issues of interoperability, usability, security, and privacy still need to be addressed. "

permission to link and quote was given by Prof. Norman M. Sadeh, Director, Mobile Commerce Lab.
Director, e-Supply Chain Management Lab./ Co-Director, PhD Program in Computation, Organizations and Society

..
.
witiger.com
  CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE
.
  MISTAKES I TEXTS USED I IMAGES I RANK I DISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I PUBLICATIONS I TIPSfor those On The Level who believe in faith, hope and charity
.
.

  Prof. W. Tim G. Richardson © www.witiger.com