11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

privacy in the digital age 383cally, so it can be reused indefinitely. Finally, the ability toaccess data anywhere on h<strong>and</strong>held or laptop computers mayalso reduce the need to make printouts.Further ReadingHarris, Tom. “How Laser Printers Work.” Available online. URL:http://home.howstuffworks.com/laser-printer.htm. AccessedAugust 17, 2007.“Printer Buying Guide” (Cnet Reviews). Available online. URL:http://reviews.cnet.com/4520-7604_7-1016838-1.html.Accessed August 17, 2007.“Printers: The Essential Buying Guide.” PC Magazine. Availableonline. URL: http://www.pcmag.com/article2/0,1895,1766,00.asp. Accessed August 17, 2007.Tyson, Jeff. “How Inkjet Printers Work.” Available online. URL:http://www.howstuffworks.com/inkjet-printer.htm. AccessedAugust 17, 2007.privacy in the digital ageQuoted in Fred H. Cate’s Privacy in the Information Age,legal scholar Alan F. Westin has defined privacy as “theclaim <strong>of</strong> individuals, groups, or institutions to determinefor themselves when, how, <strong>and</strong> to what extent informationabout themselves is communicated to others.”Since the mid-19th century, advances in communicationstechnology have raised new problems for people seekingto protect privacy rights. During the Civil War telegraphlines were tapped by both sides. In 1928, the U.S. SupremeCourt in Olmstead v. U.S. refused to extend Fourth Amendmentprivacy protections to prevent federal agents from tappingphone lines without a warrant. Almost 50 years later,the court would revisit the issue in Katz v. U.S. <strong>and</strong> rulethat telephone users did have an “expectation <strong>of</strong> privacy.”The decision also acknowledged the need to adapt legalprinciples to the realities <strong>of</strong> new technology.In the second half <strong>of</strong> the 20th century the growing use<strong>of</strong> computers would raise two basic kinds <strong>of</strong> privacy problems:surveillance <strong>and</strong> misuse <strong>of</strong> data.Surveillance <strong>and</strong> EncryptionSince much sensitive personal <strong>and</strong> business informationis now transmitted between or stored on computers, suchinformation is subject to new forms <strong>of</strong> surveillance or interception.Keystrokes can be captured using surreptitiouslyinstalled s<strong>of</strong>tware <strong>and</strong> e-mails can be intercepted from serversor a user’s hard drive. Many employers now routinelymonitor employees’ computer activity at work, includingtheir use <strong>of</strong> the World Wide Web. When this practice ischallenged, courts have generally sided with the employer,accepting the argument that the computers at work exist forbusiness purposes, not private communications, <strong>and</strong> thusdo not carry much <strong>of</strong> an expectation <strong>of</strong> privacy. Employers,however, have been encouraged to spell out their employeemonitoring or surveillance policies explicitly. Outside theworkplace, some protection is <strong>of</strong>fered by the ElectronicCommunications Privacy Act (ECPA), passed in 1986.Shadowy accounts about a secret system called Echelonhave suggested that the National Security Agency has inplace a massive system that can intercept worldwide communicationsranging from e-mail to cell phone conversations.Apparently, rooms full <strong>of</strong> supercomputers can siftthrough this torrent <strong>of</strong> communication, looking for keywords that might indicate a threat to the United States or itsallies. (Much communication is in “clear” text; the ability <strong>of</strong>the government to crack strong encryption is unclear.)<strong>Technology</strong> can be used to penetrate privacy, but it canalso be used to safeguard it (see encryption). Public keyencryption programs such as Pretty Good Privacy (PGP)can encode text so that it cannot be read without a veryhard-to-crackkey. The U.S. government, whose agenciesenjoyed powerful surveillance capabilities, initially foughtto suppress the use <strong>of</strong> encryption, but a combination <strong>of</strong>unfavorable court decisions <strong>and</strong> the ability to spread s<strong>of</strong>twareacross the Internet has pretty much decided the battlein favor <strong>of</strong> encryption users.In the aftermath <strong>of</strong> the terrorist attacks <strong>of</strong> September11, 2001, the federal government pressed for exp<strong>and</strong>ed surveillancepowers, some <strong>of</strong> which were granted in the USAPATRIOT Act <strong>of</strong> 2001. (The Foreign Intelligence SurveillanceAct [FISA] regulates wiretapping <strong>of</strong> U.S. persons toobtain foreign intelligence information, requiring that awarrant be obtained from a secret court. In 2008 after revelationsthat the administration was engaging in warrantlessdomestic surveillance outside <strong>of</strong> FISA, Congress passedan amendment that required FISA permission to wiretapAmericans living abroad.) <strong>Computer</strong>ized surveillance <strong>and</strong>identification systems (see biometrics) are also likely to beexp<strong>and</strong>ed in airports in other public places as part <strong>of</strong> the“War on Terrorism.”Information PrivacyMany privacy concerns arise not from the activities <strong>of</strong> spyor police agencies, but from the potential for the misuse <strong>of</strong>the many types <strong>of</strong> personal information now collected bybusinesses or government agencies. As far back as 1972, theAdvisory Committee on Automated Personal Data Systemsrecommended the following st<strong>and</strong>ards to the secretary <strong>of</strong>the Department <strong>of</strong> Health, Education, <strong>and</strong> Welfare:1. There must be no personal data record-keeping systemswhose very existence is secret.2. There must be a way for an individual to find outwhat information about him/her is on record <strong>and</strong>how it is used.3. There must be a way for an individual to correct oramend a record <strong>of</strong> identifiable information abouthim/her.4. There must be a way for an individual to preventinformation about him/her that was obtained forone purpose from being used or made available forother purposes without his/her consent.5. Any organization creating, maintaining, using, ordisseminating records <strong>of</strong> identifiable personal datamust guarantee the reliability <strong>of</strong> the data for theirintended use <strong>and</strong> must take precautions to preventmisuse <strong>of</strong> the data.The Federal Privacy Act <strong>of</strong> 1974 generally implementedthese principles with regard to data maintained by federal

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!