Download - Privacy And Copyrights
![Page 1: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/1.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
IntroductionIntroduction
Group Members:
14: M Ali Shirwany
72: M Ali
1
![Page 2: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/2.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
ContentsContents
Privacy
Copyrights
2
![Page 3: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/3.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 3
OutlineOutlineWhat is privacy?
Privacy laws and self-regulation
Privacy risks from personalization
Reducing privacy risks
![Page 4: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/4.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 4
What is privacy?What is privacy?
![Page 5: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/5.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 5
Hard to defineHard to define“Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.”
Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087 (2001).
![Page 6: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/6.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 6
Realizing limited access and controlRealizing limited access and controlLimited access
• Laws to prohibit or limit collection, disclosure, contact
• Technology to facilitate anonymous transactions, minimize disclosure
Control• Laws to mandate choice (opt-in/opt-out)• Technology to facilitate informed consent, keep
track of and enforce privacy preferences
![Page 7: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/7.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 7
Privacy laws and self-regulationPrivacy laws and self-regulation
![Page 8: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/8.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 8
Privacy policiesPrivacy policiesPolicies let consumers know about site’s
privacy practices
Consumers can then decide whether or not practices are acceptable, when to opt-in or opt-out, and who to do business with
The presence of privacy policies increases consumer trust
What are some problems with privacy policies?
![Page 9: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/9.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 9
Privacy policy problemsPrivacy policy problemsBUT policies are often
• difficult to understand • hard to find• take a long time to read• change without notice
![Page 10: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/10.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 10
Risks may be magnified in futureRisks may be magnified in futureWireless location tracking
Semantic web applications
Ubiquitous computing
![Page 11: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/11.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
WHAT IS COPYRIGHT?WHAT IS COPYRIGHT?
Copyright is a form of protection given to authors/creators of original works.
This property right can be sold or transferred to others.
11
![Page 12: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/12.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT LAWCOPYRIGHT LAW Copyright is a form of protection grounded in the
U.S. Constitution and granted by law for original works of authorship.
The current copyright law, the Copyright Act of 1976, is codified in Title 17 of the U.S. Code.
12
![Page 13: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/13.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
AUTHOR´S RIGHTSAUTHOR´S RIGHTS Copyright law assures ownership, which comes with several
rights, that the author has exclusively. For example:
• Make copies of the work
• Distribute copies of the work
• Perform the work publicly
• Display the work publicly
• Make derivative works
13
![Page 14: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/14.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
The law provides certain ways in which copyright works may be used without the need to first obtain permission from the copyright holder - these include:
• Fair use (e.g. to make copies)• Public domain• Library privilege• Copying for examinations and copying for instruction
14
![Page 15: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/15.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT PROTECTIONCOPYRIGHT PROTECTION Copyright covers both published and unpublished
works.
Copyright protection is automatic at the moment the work is created and fixed in a tangible form that it is perceptible
15
![Page 16: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/16.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHTABLE WORKS COPYRIGHTABLE WORKS Literary works
Dramatic works
Musical works
Artistic works
16
![Page 17: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/17.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
NON-COPYRIGHTABLE WORKSNON-COPYRIGHTABLE WORKSNot everything is protected by copyright
law.
Copyright does not protect facts, ideas, systems, or methods of operation.
17
![Page 18: Privacy And Copyrights](https://reader035.vdocuments.us/reader035/viewer/2022071815/55a7d2361a28ab6d0f8b46d5/html5/thumbnails/18.jpg)
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
Copyright VS. Patent and Copyright VS. Patent and TrademarkTrademark Copyright protects original works of authorship,
while a patent protects inventions or discoveries.
A trademark protects words, phrases, symbols, or designs identifying the source of the goods or services of one party and distinguishing them from those of others.
18