Скачать презентацию Privacy Implications of Online Data Collection DIMACS Workshop Скачать презентацию Privacy Implications of Online Data Collection DIMACS Workshop

c6769ed32f19611ed2835b4e9be5a05d.ppt

  • Количество слайдов: 33

Privacy Implications of Online Data Collection DIMACS Workshop Lorrie Faith Cranor AT&T Labs-Research http: Privacy Implications of Online Data Collection DIMACS Workshop Lorrie Faith Cranor AT&T Labs-Research http: //www. research. att. com/~lorrie/

Recent headlines Activists charge Double. Click double cross Websites Pull Back From Doubleclick shelves Recent headlines Activists charge Double. Click double cross Websites Pull Back From Doubleclick shelves plan to tag Web surfers Senators Raise Privacy Issue In AOL-Time Warner Hearing Clinton Issues Privacy Warning To Technology Leaders 2

Online profiling in the comics! Cathy March 1, 2000 3 Online profiling in the comics! Cathy March 1, 2000 3

How do they get my data? n Browsers advertise «IP address, domain name, organization, How do they get my data? n Browsers advertise «IP address, domain name, organization, referring page «platform: O/S, browser «which information is requested n Information available to «end servers «local system administrators «other third parties (e. g. , doubleclick. com) n Cookies, Web bugs, advertising networks 4

Browsers like to chatter n A typical HTTP request GET http: //www. amazon. com/ Browsers like to chatter n A typical HTTP request GET http: //www. amazon. com/ HTTP/1. 0 User-Agent: Mozilla/3. 01 (X 11; I; Sun. OS 4. 1. 4 sun 4 m) Host: www. amazon. com Referer: http: //www. alcoholics-anonymous. org/ Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */* Cookie: session-id-time=868867200; session-id=6828 -2461327649945; group_discount_cookie=F 5

Servers record what they hear n Server logs «store host, time, date, requested URL, Servers record what they hear n Server logs «store host, time, date, requested URL, referrer ppp. bu. edu - - [09/Dec/1996: 20: 33: 22 -500] “Get /cgibin/wwwais? hemoglobin+gene HTTP/1. 0” 200 527 «affiliation: Boston University, probably working from home, probably student or faculty in biology 6

What about cookies? n Cookies can be useful «used like a staple to attach What about cookies? n Cookies can be useful «used like a staple to attach multiple parts of a form together «used to identify you when you return to a web site so you don’t have to remember a password «used to help web sites understand how people use them n Cookies can be harmful «used to profile users and track their activities, especially across web sites 7

YOU Search for medical information Buy book Set cookie Read cookie Ad Search engine YOU Search for medical information Buy book Set cookie Read cookie Ad Search engine Ad company can get your name and address from book order and link them to your search Ad Book Store 8

Referer log problems n. GET methods result in values in URL n. These URLs Referer log problems n. GET methods result in values in URL n. These URLs are sent in the referer header to next host n. Example: http: //www. merchant. com/cgi_bin/order? name= Tom+Jones&address=here+there&credit+car d=234876923234&PIN=1234& -> index. html 9

What Double. Click knows… … about Richard M. Smith n Personal data: «My Email What Double. Click knows… … about Richard M. Smith n Personal data: «My Email address «My full name «My mailing address (street, city, state, and Zip code) «My phone number n Transactional data: «Names of VHS movies I am interesting in buying «Details of a plane trip «Search phrases used at search engines «Health conditions 10

No clicks required “It was not necessary for me to click on the banner No clicks required “It was not necessary for me to click on the banner ads for information to be sent to Double. Click servers. ” – Richard M. Smith http: //www. tiac. net/users/smiths/privacy/banads. htm 11

Double. Click examples Alta. Vista Yellow Pages – Complete home address (Fixed January 2000) Double. Click examples Alta. Vista Yellow Pages – Complete home address (Fixed January 2000) Banner ad URL: http: //live. av. com/scripts/search. dll? ep= 7&gca=address&orderby=distance&sstreet=172+mason+terr &scity=brookline&sstate=MA&szip=02446&scountry= USA&query=sinsa&qname=&sic=&ck=&userid=130782922& userpw=. &uh=130782922, 0, &ccity=brookline&cstate=MA&ver =hb 1. 2. 2 Travelocity – Email address Referring URL: http: //dps 1. travelocity. com/promoptout. ctl ? email=smiths@TIAC. NET 12

Merging online and offline data n In mid-February Double. Click announced plans to merge Merging online and offline data n In mid-February Double. Click announced plans to merge “anonymous” online data with personal information obtained from offline databases n By the first week in March the plans were put on hold 13

Public concern n April 1997 Louis Harris Poll of Internet users « 5% say Public concern n April 1997 Louis Harris Poll of Internet users « 5% say they have been the victim of an invasion of privacy while on the Internet « 53% say they are concerned that information about which sites they visit will be linked to their email address and disclosed without their knowledge n See also “Beyond Concern” study: http: //www. research. att. com/projects /privacystudy/ 14

International issues n European Union Data Directive prohibits secondary uses of data without informed International issues n European Union Data Directive prohibits secondary uses of data without informed consent «Creating personally-identifiable online profiles will have to be opt-in in most cases «Upfront notice must be given when data is collected – no web bugs «No transfer of data to non-EU countries unless there is adequate privacy protection 15

Children's issues n Children’s Online Privacy Protection Act (COPPA) requires parental consent before collecting Children's issues n Children’s Online Privacy Protection Act (COPPA) requires parental consent before collecting personally-identifiable data from children online 16

Subpoenas n Data on online activities is increasingly of interest in civil and criminal Subpoenas n Data on online activities is increasingly of interest in civil and criminal cases n The only way to avoid subpoenas is to not have data n Your files on your computer in your home have much greater legal protection that your files stored on a server on the network 17

Privacy concerns n Data is often collected silently «Web allows lots of data to Privacy concerns n Data is often collected silently «Web allows lots of data to be collected easily, cheaply, unobtrusively and automatically «Individuals not given meaningful choice n Data from many sources may be merged «Even non-identifiable daa can become identifiable when merged n Data collected for business purposes may be used in civil and criminal proceedings 18

Some solutions n Privacy policies n Voluntary guidelines and codes of conduct n Seal Some solutions n Privacy policies n Voluntary guidelines and codes of conduct n Seal programs n Infomediaries n Technologies for facilitating notice and choice «P 3 P 19

P 3 P 1. 0 – A First Step n Offers an easy way P 3 P 1. 0 – A First Step n Offers an easy way for web sites to communicate about their privacy policies in a standard machine-readable format «Can be deployed using existing web servers n This will enable users to use tools that: «Display symbols, play sounds, or provide snapshots of sites’ policies «Display symbols or prompts after comparing policies with user preferences 20

P 3 P is a Partial Solution n P 3 P 1. 0 helps P 3 P is a Partial Solution n P 3 P 1. 0 helps users understand privacy policies but is not a complete solution n Seal programs and regulations help ensure that sites comply with their policies n Anonymity tools reduce the amount of information revealed while browsing n Encryption tools secure data in transit and storage n Laws and codes of practice provide a base line level for acceptable policies 21

Implementing a P 3 P 1. 0 Server n Formulate privacy policy n Translate Implementing a P 3 P 1. 0 Server n Formulate privacy policy n Translate privacy policy into P 3 P format n Place P 3 P policy on web site « One policy for entire site or multiple policies for different parts of the site n Associate policy with web resources: « Configure server to insert P 3 P header with link to P 3 P policy; or « Insert link to P 3 P policy in HTML content 22

A simple HTTP transaction GET /x. html HTTP/1. 1 Host: foo. com. . . A simple HTTP transaction GET /x. html HTTP/1. 1 Host: foo. com. . . Request web page Web Server HTTP/1. 1 200 OK Content-Type: text/html. . . Send web page 23

A simple HTTP transaction With P 3 P 1. 0 added GET /x. html A simple HTTP transaction With P 3 P 1. 0 added GET /x. html HTTP/1. 1 Host: foo. com. . . Request web page Web Server HTTP/1. 1 200 OK Opt: http: //www. w 3. org/2000/P 3 Pv 1/; ns=11 HTTP/1. 1 200 OK 11 -Policy: http: //foo. com/p 3 p. xml Content-Type: text/html web page. . . Send web page GET /p 3 p. xml HTTP/1. 1 Host: foo. com. . . Request P 3 P Policy HTTP/1. 1 200 OK. . . Send P 3 P Policy 24

Implementing a P 3 P 1. 0 Client n Client can be implemented as Implementing a P 3 P 1. 0 Client n Client can be implemented as browser, proxy, plugg-in, part of an electronic wallet, java applet, javascript, etc. «Can be entirely server side n Look for link to P 3 P policy and fetch policy with HTTP GET request n Parse policy and take appropriate action «Display symbol, play sound, prompt user, etc. «Action can optionally be based on user preferences «Action can optionally allow data to be automatically filled into form or transferred from electronic wallet 25

Some P 3 P Client Ideas n Symbols for how data is used « Some P 3 P Client Ideas n Symbols for how data is used « complete transaction « R&D « Customization « marketing n Symbols to indicate whether data is shared n Symbols to indicate site has privacy seal n Symbols to indicate compliance with laws and regulations « complies with German law if user gives informed consent « does not comply with German law n Symbols to indicate match/mismatch with user preferences « information about cause of mismatch on mouse-over 26

P 3 P Policies n Machine-readable (XML) version of web site privacy policies n P 3 P Policies n Machine-readable (XML) version of web site privacy policies n Use P 3 P Vocabulary to express data practices n Use P 3 P Base Data Set to express type of data collected n Capture common elements of privacy policies but may not express everything (sites may provide further explanation in humanreadable policies) 27

The P 3 P Vocabulary n Who is collecting data? n What data is The P 3 P Vocabulary n Who is collecting data? n What data is collected? n For what purpose will data be used? n Is there an ability to change preferences about (opt-in or opt-out) of some data uses? n Who are the data recipients (anyone beyond the data collector)? n To what information does the data collector provide access? n What is the data retention policy? n How will disputes about the policy be resolved? n Where is the humanreadable privacy policy? 28

Example Privacy Policy The. Cool. Catalog of 123 Main Street, Bethesda, MD 20814, USA, Example Privacy Policy The. Cool. Catalog of 123 Main Street, Bethesda, MD 20814, USA, makes the following statement for the Web page at http: //www. The. Cool. Catalog. com/catalog/. We have a privacy seal from Privacy. Seal. org. Our privacy policy is posted at http: //www. The. Cool. Catalog. com/Privacy. Practice. html. We do not provide access capabilities to information we have about you. We use cookies and collect your gender, information about your clothing preferences, and (optionally) your home address to customize our entry catalog pages and for our own research and product development. We retain this information indefinitely. We also maintain server logs that include information about visits to the http: //www. The. Cool. Catalog. com/catalog/ page, and the types of browsers our visitors use. We use this information in order to maintain and improve our web site. We retain this information indefinitely. 29

P 3 P/XML Encoding <POLICY xmlns= P 3 P/XML Encoding a site with clothes you would appreciate 30

Privacy. Bank. Com Privacy. Bank bookmark 31 Privacy. Bank. Com Privacy. Bank bookmark 31

Infomediary example: Privacy. Bank bookmark 32 Infomediary example: Privacy. Bank bookmark 32

Challenge n Data is useful for research, targeting potential customers, building relationships with customers, Challenge n Data is useful for research, targeting potential customers, building relationships with customers, etc. n Privacy laws make data collection more difficult n Data collectors have personal privacy concerns too n How can we collect data in ways that reduce privacy concerns while remaining useful for research and business? 33