Privacy

Chapter 5. Privacy

Table of Contents

5.1

Scenarios......................................................................................................................................

2

 

5.1.1

Scenario 1: Fund Raising and Potential Do no r s ...........................................................

2

 

5.1.2 Scenario 2: Taking work home........................................................................................

2

 

5.1.3 Scenario 3: Workplace Monitoring..................................................................................

3

 

5.1.4 Scenario 4: Data Mining..................................................................................................

3

5.2

Is there anything new here?..........................................................................................................

3

 

5.2.1

Max’s case .......................................................................................................................

3

 

5.2.2

Access to data ..................................................................................................................

4

5.3

Understanding the ‘Computer and Privacy’ Issue........................................................................

4

 

5.3.1

Personal Privacy ..............................................................................................................

4

 

5.3.2 Individual – Organizational Relationships.......................................................................

5

 

5.3.3

Global Perspective...........................................................................................................

5

 

5.3.4 Proposal for better Protection ..........................................................................................

6

5.4

Effects of IT on recording keeping ..............................................................................................

7

5.5

Privacy Issues in the workplace ...................................................................................................

7

 

5.5.1 Arguments for Computer Monitoring in the Workplace..................................................

7

 

5.5.2 Arguments against Computer Monitoring in the Workplace...........................................

7

5.6

Interception Act versus Privacy Act (South Africa).....................................................................

8

 

5.6.1

The Interception Act ........................................................................................................

8

 

5.6.2

The Privacy Act ...............................................................................................................

9

5.7

Protect Your Online Privacy ........................................................................................................

9

 

5.7.1 Do not reveal personal information inadvertently ...........................................................

9

5.7.2Turn on cookie notices in your Web browser, and/or use cookie management software 9

5.7.3

Keep a "clean" e-mail address .......................................................................................

10

5.7.4

Don't reveal personal details to strangers or just met "friends" .....................................

10

5.7.5Beware sites that offer some sort of reward or prize in exchange for your contact or

other information .......................................................................................................................

10

5.7.6 Do not reply to spammers, for any reason .....................................................................

11

5.7.7 Be conscious of Web security........................................................................................

11

5.7.8

Be conscious of home computer security ......................................................................

11

5.7.9

Examine privacy policies and seals ...............................................................................

11

5.7.10Remember that YOU decide what information about yourself to reveal, when, why,

 

and to whom...............................................................................................................................

12

 

5.7.11

Use encryption.............................................................................................................

12

5.8

More on Encryption ...................................................................................................................

12

 

5.8.1

PGP (Pretty Good Privacy)............................................................................................

12

 

5.8.2

How It Works ................................................................................................................

12

 

5.8.3 Where Can You Use PGP..............................................................................................

13

5.9

Review Questions ......................................................................................................................

13

5.10

Discussion and Answers ........................................................................................................

13

 

5.10.1 Discussion on Activity 9..............................................................................................

13

 

5.10.2 Discussion on Activity 10............................................................................................

14

 

5.10.3 Solutions to Review Questions ....................................................................................

14

1

Privacy

5.1 Scenarios

5.1.1 Scenario 1: Fund Raising and Potential Donors

Jan studies computer science at university but does not major in it. She wishes to be involved in public service and so accepts a fund-raising job for a big university. She is asked to get information on Frank – a potential donor. Frank has been recommended by another donor who said that Frank is keen on providing some funds to the university but has not previously donated to this university.

Jan was asked to find out about all the information on Frank, with special focus on his wealth and the likely area where Frank will be most keen. Using the Internet and databases, Jan was able to find out the following:

Via a public database, his board memberships

Via databases of associated organisations, contributions he has made to others and his support for any religious organisations

Newspaper archives – information written about Frank

Governmental records – if he has had any encounter with the law

Credit card agencies – his credit history

Other routes that Jan tried to get information include:

Contacting Amazon.com about the types of books he read

Wonders if his ISP will tell her about his online activities

From the university records she finds that he was treated at the university hospital.

She finds that she can access his medical records and discovers that he was treated successfully for a kidney complaint

She then proceeds to recommends that he be approached for a donation for kidney research.

Activity 1

Discuss whether or not you think she has done anything wrong?

5.1.2 Scenario 2: Taking work home

Max works for a government department working against alcoholism and drug abuse. The department maintains a database of people with these problems. Max’s job is to track the success or failure of treatment programs. He has to prepare a report indicating:

Number of clients seen per month in each program

Length of client treatment

Criminal history of clients

Distribution addresses

He gets this information from various databases located in different locations. To do this, he downloads information to his computer in his office, then copies the data to a portable hard drive and takes that home to finish his report there. However, he also leaves a copy of the information and the report on his machine at home.

Activity 2

2

Privacy

Is he wrong to move the data to his house and is he wrong to leave the data there when he is done with the report. What policy should Max’s agency have concerning taking work home? Discuss.

5.1.3 Scenario 3: Workplace Monitoring

Estelle works for Medical Insurance Company. She supervises the claims department and her brief is to improve efficiency there – each unit must process a minimum number of claims per day. In order to achieve this goal, she installs a software system which monitors:

The number of claims processed by each clerk

Number of keystrokes done by each clerk

Log information on when each clerk is on or off his/her post

The system allows her to watch all the above information in real-time on her screen. She can also see all e-mails sent by each clerk regardless of whether the e-mail is business-related or not.

Activity 3

Should she use this system and if so should each of the clerk be informed? Do you think any limitations should be placed on companies employing such systems? Discuss.

5.1.4 Scenario 4: Data Mining

Ravi works for a credit card company, developing new products. He read about data mining and convinces his supervisor to buy this tool. With this tool Ravi can get information on customers’ buying habits, as well as finds out postal codes correlation to loan defaults. Based on this new information a new policy can be formulated resulting in his company refusing credits to clients in ‘bad’ postal code areas. Doing this could reduce his company’s exposure to bad loans.

Ravi also discovers that Zoroastrians who donate to charity charges a substantial amount to their credit cards. He promptly recommends a new policy of soliciting more Zoroastrians for credit card in hope of increasing his company’s profit.

Activity 4

Are either of these two recommendations wrong? What about the way Ravi use these information? Is the company wrong by implement these policies? Discuss.

5.2 Is there anything new here?

Panopticon of J. Bentham 1787 involves the design of prisons. By arranging the cells in circle (with the guard in the centre) in such a way that the guard can see prisoners but vice versa, the guard needs not even be there all the time. When individuals (in this case, prisoners) believe that they are being watched, they behave differently as they are concern with the observers and what they might think of them.

Many experts think that information gathering is like Panopticon. Information gather itself is not new – governmental and private organisations have always kept databases. The difference is that much more surveillance can be made with electronic databases because of their speed, types of information and scale of exchange of information between them.

Activity 5

Compare and contrast paper-based and electronic records in more detail – pay particular attention on the amount and type of data, who has access to them and the length of retention.

5.2.1 Max’s case

3

Privacy

Recall that Max takes sensitive data home. The movement of data can be problematic in itself – it is difficult to keep track and to ensure security of the data in different environments and locations. Taking work home is not new

companies have allowed their employee to take company’s resources home, make use of it in completed a tasks and then to bring it back. In these cases, companies have strict rules on how these resources should be handled. Computer data should be treated in a similar way – by either not allowing data to be copied from the main frame at all or by specifying data encryption to be used.

5.2.2 Access to data

Consider the case of Pat who took her landlord to court because of presence of pests in the flat. The landlord did not contest the case, but soon after Pat moved to another area but discovered that she always get turned down. Pat discovers that there is a list of people who has taken landlords to court and that this list can be purchased.

Activity 6

Do you think anyone is at fault here? Can you see the parallel between this lo-tech database and the use of much more sophisticated databases for similar reasons, as in Ravi’s case?

5.3 Understanding the ‘Computer and Privacy’ Issue

In essence the issue revolves around:

Collection and use of data.

Information obtained from data versus loss of privacy.

The needs of the organisation collecting and using the information versus individuals’ right of privacy (considered a social good).

An example is that Amazon collects information on its clients in order to be able to inform them of new books in their interest areas.

5.3.1 Personal Privacy

What is personal privacy and why is it valuable? Most people expect privacy in their personal space such as home

the domain in which government and other organisations should not interfere. Privacy is often seen as intrinsic good – good in itself – which can lead to other good. Kant’s theory is that privacy is essential to autonomy and that autonomy is inconceivable without privacy.

Technological development has not only changed how business is conducted, but also has had a huge impact on personal and community identities.

Activity 7

Read the following paragraph:

In order to establish a relationship with an individual one needs to be able to control information about oneself in order to maintain a relationship. Collecting and grouping of information into a database causes us to lose control of the information. This loss of control reduces our ability to form relationships.

Do you agree with what is being said there? Do not consider just personal relationships consider professional relationships as well. When you are chatting or emailing on the Net, nobody knows who you are by anything other than the name you have given as your identity. Your physical characteristics — skin colour, height, physical features — are unknown. Your on-line characteristics are formed by your messages. What is known about you is only the image that you choose to give of yourself.

4

Privacy

Impact on the Individual

Identity: Anonymity can be liberating. Other users you come in contact with on the Net cannot look at your physical self or hear your accent and make assumptions about you. You are judged on the opinions and information you express.

Intrusion on Privacy: Personal information can be captured at certain sites through the information you have provided when you make an on-line transaction, or by tracking the user by using cookies. Data may be captured and analyzed without either the user's knowledge or consent. Their surfing patterns are collected and analyzed to classify them into marketing categories. Many companies now monitor employee e-mail, their argument being that any email leaving the company is the business of the company. Should anyone wish to contact an employee with urgent personal information there is a risk that this could become public knowledge.

5.3.2 Individual – Organizational Relationships

It is said that information a person gives to an organisation empowers them over the person – for example, a credit card company. Organisations can establish this relationship without any action by the individual (e.g. Subscription information). This problem has been amplified by the introduction of computers. Government has tried to deal with this and to allay fears by passing laws that prevent different database from being joined (e.g. the Home Affairs’ and Police’s fingerprints databases). Laws have been passed on the privacy issues concerning medical and credit records amongst others.

In the mid1970s, the United States provided five principles to govern fair information gathering practices:

1.No secret personal data keeping.

2.Individual must be able to discover their personal information and how it is used.

3.Individual must be able to discover and stop information collected for one purpose but is used for another.

4.Individual must be able to correct wrong information.

5.Database administrator of personal information must take necessary precautions to prevent misuse and also to assure reliability of data.

Activity 8

Do you think that these principles are still appropriate today when it comes to electronic databases? What changes, if any, do you think needs to be made to this code? This issue of individual – organisation relationships is discussed further in the section on Privacy Issues on the workplace later in this chapter.

Activity 9

The objective of this exercise is to experiment with some ideas on privacy. Write down some ideas about the following:

How would you like to portray yourself to others?

Can this be achieved if contact is only by e-mail?

What aspect of yourself might others regard as 'detrimental'?

Can this be hidden if contact is only by e-mail?

What feature of email allows this type of privacy?

You can find some thoughts about this activity at the end of the unit.

5.3.3 Global Perspective

5

Privacy

Legislators, theologians, scientists, academics and business people are getting more interested in the impact of information technology on individuals, organizations and communities. The possible outcomes in the near future could be better — not necessarily stricter — legislation safeguarding user privacy, increased education in the proper use of the Internet, and more options for technological control that can be implemented based on user discretion. The alternative outcomes could be strict tracking of every user, together with numerous legislative bodies all imposing their own views on what information should be available. The challenge ahead of us is to ensure that the benefits of the Internet far outweigh the real and serious threats brought about by the information revolution.

The Internet expansion plays a large role in increasing the potential for misusing of information. The information is flowing across borders more readily and frequently. Irrespective of the individual nation’s policies, there is still a need for a global policy. European Union has a policy that is enforced amongst its members. Each member states must make sure that personal data must be:

Processed fairly and lawfully.

Collected for specific and legitimate purposes.

Not processed further (except for statistical, scientific or historical reasons and then with prior permission).

Adequate but not excessive for purpose required.

Kept up to date.

Accurate for purpose collected.

Kept no longer than required.

Activity 10

Read the articles supplied online as part of this unit (Guardian newspaper articles).

Do you think that a service that is free to users should be more secure? After all, you only get what you pay for.

Will this event change the way you use e-mail?

Do you think that independent bodies should check statements claiming privacy for these types of services?

You can find some thoughts about this activity at the end of the unit.

5.3.4 Proposal for better Protection

There have also been many proposals for better protection with broad conceptual changes and legislative initiatives:

Appreciate and action the principle that privacy is a social good.

Need for a comprehensive approach that is not a piecemeal approach but also integrate a global exchange of data?

Power of private corporations never envisaged – this is a new vacuum.

Sweden introduces the Data Inspection Board:

Licences all automated personal information systems in both public and private sectors.

Controls collection of personal data.

Can investigate completes.

Designs rules for personal data collection.

Activity 11

Discuss the pro and con of a system such as that of Sweden’s Data Inspection Board is. Do you think that each country should go this route?

The ACM’s code of conduct considers privacy and seeks to:

• Minimise data collected.

6

Privacy

Only allow authorised access to data.

Provide proper security.

Determine required retention period.

Ensure proper disposal of the data.

5.4Effects of IT on recording keeping

Information keeping and handling is not new but information technology has changed record keeping in the following ways:

Scale of information keeping

New kinds of information kept

New scale of information distribution and exchange

Effect of erroneous data magnified

Information can endure for much longer

5.5Privacy Issues in the workplace

Recall scenario 2 with Estelle and her monitoring software. Were your generally for, against or undecided against computer monitoring in the workplace. Your feeling is likely to be different depending on whether you are an employer or an employee – but here are some arguments for and against:

5.5.1Arguments for Computer Monitoring in the Workplace

That it is also used to provide incentives for employees and effectively rewards individuals for true merit and reward. They also point out that what is being measured is factual and hard, and that workers tend to favour such systems, they have seen too many cases of the wrong people being promoted for the wrong reasons. With the facts that the computer gathers, diligent workers can legitimately argue a case for better pay and conditions and this case does not rely upon personal opinions and personalities. Furthermore, these systems can help eliminate rampant waste, for example, employees calling long distance for private uses, a team carrying the load for an unproductive team member, identifying the theft of materials by matching the stock used with the amount processed by line workers (and discovering discrepancies). Finally, monitoring on a computer network can assist in troubleshooting and fine tuning of a system, as well as streamlining job design and fairly apportioning workloads.

5.5.2Arguments against Computer Monitoring in the Workplace

However, there is also the danger of turning workers into better paid battery hens, denying them job satisfaction and eliminating the human element from their work. For example, although reservation clerks may be given an incentive to process more calls when they are being monitored, it may also eliminate any human spontaneity or friendliness in their communication. There is question of balance between the rights and expectations of employees versus the obligations and objectives of employers.

Forestor and Morrison (1990) state that clearly profits are important to the continued functioning of capitalist societies and profit itself is dependent upon competitiveness. However, just how far we are willing to proceed in the pursuit of competitiveness and profitability is a matter of judgement. For example, the use of cheap child

7

Privacy

labour was once regarded as a sensible business strategy, but now our ethical sense and labour protection laws prohibit this practice. It remains to be seen in which direction our ethical intuitions will take us in determining the nature of future employment, whether we can all be monitored in the interest of profit and accountability, or whether we shall see a renewed interest in designing jobs for people.

In addition, we need to ask what kind of precedent computer based monitoring of employees will set for other invasive practices. For example, similar arguments can be marshaled for the compulsory drug testing of key personnel such as pilots, train drivers, and power plant operators. If these people have the potential to kill thousands by accident, then do we not have the right to ensure that they are in a fit state to work? On the other hand, why not also monitor the alcohol purchases of convicted drunk drivers? This highlights the most contentious aspect of any form of computer based monitoring: it is not so much the harm it may currently be causing, but what it represents.

Activity 12

Has your view changed after reading the arguments above? What is your view now? Discuss this issue with other students if you can.

5.6 Interception Act versus Privacy Act (South Africa)

Two important acts concerning privacy were introduced to the South African public. The interception act was amended in 2010.

5.6.1 The Interception Act

The interception act came into full effect in September 2005 (http://www.justice.gov.za/legislation/acts/2002- 070.pdf). (Full title: the Regulation of Interception of Communications and Provision of Communication- related Information Act (RICA)). RICA seeks to regulate the interaction of certain communications, the monitoring of certain signals and radio frequency spectrums and the provision of certain communication-related information. In order to be able to monitor communication the following steps must be taken:

Law enforcement must be in possession of information or evident that electronic communications are being used in the commission of the crime.

They must approach the court and request an "interception direction". The sitting judge will then decide on the merit of the evident present and will grant or refuse this directive.

Once the interception direction is obtained, it can then be served to the relevant service provider who is then required by law to monitor any communication made by the individual or party concerned and then to forward all surveillance information to the law enforcement agency. Note that the person under surveillance needs not be informed.

RICA provides that all forms of monitoring and interception of communications are unlawful unless the monitoring and interception takes place under one of the recognized exceptions in RICA. There are several exceptions to the general rule on the prohibition on intercepting communications, three of which apply to monitoring in the workplace:

Party to a communication: Section 4 of the RICA allows a party to a communication to monitor and intercept the communication if he/she is a party to the communication (for example, where the participants in a meeting consent to the meeting being recorded). This exception also applies where the interceptor is acting with the consent of one of the parties to the communication.

Written Consent: Section 5 allows for interception of any communication under any circumstances – i.e. no special motivation or reason is required for it provided the person whose communication is being intercepted has consented to it in writing prior to such interception.

Business Purpose Exception: Section 6 contains a so-called “business purpose exception” which involves the interception of “indirect communications in connection with the carrying on of business”. Section 6 authorises any person to intercept indirect communications in the course of carrying out their

8

Privacy

business by means of which a transaction is concluded in the course of that business, which “otherwise relates to that business” or which “otherwise takes place in the course of the carrying on of that business, in the course of its transmission over a telecommunication system”.

5.6.2 The Privacy Act

The protection of personal information Act [http://www.gov.za/sites/www.gov.za/files/37067_26- 11_Act4of2013ProtectionOfPersonalInfor_correct.pdf] is seen by some as a counterbalance to the Interception Act above. The act seeks to promote the protection of personal information of South Africans processed by public and private bodies. It also seeks to provide for the rights of persons regarding unsolicited electronic communications and automated decision making. It also seeks to regulate the flow of personal information across the borders of the Republic.

Activity 11

It is likely that by the time you are reading this set of notes that another draft of the proposed act has been released. The media might also be covering it in more detail. Try and get hold of the most recent draft or some analysis of it in the media. How has it changed?

Activity 12

Discuss if and how the interception and privacy counterbalance one another. Do you have concerns about either of the acts?

5.7 Protect Your Online Privacy

The Electronic Frontier Foundation (EFF) [http://www.eff.org] is an organisation that protects rights and promotes freedom in the electronic frontier, including an individuals basic right to privacy. They advocate the following twelve ways to protect your online privacy.

5.7.1 Do not reveal personal information inadvertently

You may be "shedding" personal details, including e-mail addresses and other contact information, without even knowing it unless you properly configure your Web browser. In your browser's "Setup", "Options" or "Preferences" menus, you may wish to use a pseudonym instead of your real name, and not enter an e-mail address, nor provide other personally identifiable information that you don't wish to share. When visiting a site you trust you can choose to give them your info, in forms on their site; there is no need for your browser to potentially make this information available to all comers. Also be on the lookout for system wide "Internet defaults" programs on your computer (some examples include Window's Internet Control Panel, and MacOS's Configuration Manager, and the third party Mac utility named Internet Config). While they are useful for various things, like keeping multiple Web browser and other Internet tools consistent in how the treat downloaded files and such, they should probably also be anonymised just like your browser itself, if they contain any fields for personal information. Households with children may have an additional security problem - have you set clear rules for your children, so that they know not to reveal personal information unless you OK it on a site-by-site basis?

5.7.2Turn on cookie notices in your Web browser, and/or use cookie management software

Cookies are a small amount of information that Web sites store on your computer, temporarily or more-or-less permanently. In many cases cookies are useful and innocuous. They may be passwords and user IDs, so that you do not have to keep retyping them every time you load a new page at the site that issued the cookie. Other cookies however, can be used for "data mining" purposes, to track your motions through a Web site, the time you spend there, what links you click on and other details that the company wants to record, usually for marketing purposes. Most cookies can only be read by the party that created them. However, some companies that manage online banner advertising are, in essence, cookie sharing rings. They can track which pages you load, which ads you

9

Privacy

click on, etc., and share this information with all of their client Web sites (who may number in the hundreds, even thousands.) It is unknown whether all of these cookie rings (some examples of which are Double Click and Link Exchange) do in fact share user data, but they certainly can do so potentially.

Browsers are starting to allow user control over cookies. Mozilla and Firefox, for example, allows you to see a notice when a site tries to write a cookie file to your hard drive, and gives you some information about it, allowing you to decide whether or not to accept it. (Be on the lookout for cookies the function of which is not apparent, which go to other sites than the one you are trying to load, or which are not temporary). It also allows you to automatically block all cookies that are being sent to third parties (or to block all cookies, entirely, but this will make some sites inoperable). Internet Explorer has a cookie management interface in addition to Netscape like features, allowing you to selectively enable or disable cookies on a site by site basis, even to allow cookies for a site generally, but delete a specific cookie you are suspicious about. With Internet Explorer you can also turn on cookies for a site temporarily then disable them when you no longer need them. For example, at an online bookstore that requires cookies to process an order, but whom you don't want to track what books you are looking at, what links you are following, etc., the rest of the time. Turning on cookie warnings will cause alert boxes to pop up, but after some practice you may learn to hit "Decline" so fast that you hardly notice them anymore. The idea is to only enable cookies on sites that require them AND whom you trust.

5.7.3 Keep a "clean" e-mail address

When mailing to unknown parties; posting to newsgroups, mailing lists, chat rooms and other public spaces on the Net; or publishing a Web page that mentions your e-mail address, it is best to do this from a "side" account some pseudonymous or simply alternate address, and to use your main or preferred address only on small, members only lists and with known, trusted individuals. Addresses that are posted (even as part of message headers) in public spaces can be easily discovered by spammers (online junk mailers) and added to their list of targets. If your public "throw away" address gets spammed enough to become annoying, you can simply kill it off, and start a new one. Your friends, boss, etc., will still know your "real" address. You can use a free (advertising supported) e-mail service provider like Google or Hotmail for such "side" accounts. It is best to use a "real" Internet service provider for your main account, and to examine their privacy policies and terms of service, as some "free mail" services may have poor privacy track records. You may find it works best to use an e-mail package that allows multiple user IDs and addresses (i.e. "personalities", "aliases") so that you do not have to switch between multiple programs to manage and use more than one e-mail address.

5.7.4Don't reveal personal details to strangers or just met "friends"

The speed of the Internet is often reflected in rapid online acquaintanceships and friendships. But it is important to realise that you don't really know who these people are or what they are like in real life. A thousand miles away, you don't have friends of friends or other references about this person. Be also wary of face-to-face meetings. If you and your new e-friend wish to meet in person, do it in a public place. Bringing a friend along can also be a good idea. One needn't be paranoid, but one should not be an easy mark, either. Some personal information you might wish to withhold until you know someone much better would include your full name, place of employment, phone number, and street address (among more obvious things like credit card numbers, etc.) Needless to say, such information should not be put on personal home pages. (If you have a work home page, it may well have work contact information on it, but you needn't reveal this page to everyone you meet in a chat room.) For this an (sic) other reasons, many people maintain two personal home pages, a work related one, and an "off duty" version.

Realise you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive files on your home computer. In most countries (including South Africa), employees have little if any privacy protection from monitoring by employers. When discussing sensitive matters in e-mail or other online media, be certain who you are talking you. If you replied to a mailing list post, check the headers - is your reply going to the person you think it is, or to the whole list? Also be aware that an increasing number of employers are monitoring and recording employee Web usage, as well as email. This could compromise home banking passwords and other sensitive information. Keep private data and private Net usage private, at home.

5.7.5 Beware sites that offer some sort of reward or

10

Privacy

prize in exchange for your contact or other information

There's a high probability that they are gathering this information for direct marketing purposes. In many cases your name and address are worth much more to them (because they can sell it to other marketers, who can do the same again - a snowball effect) than what you are (supposedly) getting from them. Be especially wary of sweepstakes and contests. You probably won't win, but the marketer sure will if you give them your information.

5.7.6 Do not reply to spammers, for any reason

Spam, or unsolicited bulk e-mail, is something you are probably already familiar with (and tired of). If you get a spammed advertisement, certainly don't take the sender up on whatever offer they are making, but also don't bother replying with "REMOVE" in the subject line, or whatever (probably bogus) unsubscribe instructions you've been given). This simply confirms that your address is being read by a real person, and you'll find yourself on dozens more spammer's lists in no time. If you open the message, watch your outgoing mail queue to make sure that a "return receipt" message was not generated, to be sent back to the spammer automatically. (It is best to queue your mail and send manually, rather than send immediately, so that you can see what's about to go out before it's actually sent.) If you have a good Internet service provider, you may be able to forward copies of spam e-mail to the system administrators. They can route a complaint to the ISP of the spammer (or if you know a lot about mail headers and DNS tools, you can probably contact these ISPs yourself to complain about the spammer.)

5.7.7 Be conscious of Web security

Never submit a credit card number or other highly sensitive personal information without first making sure your connection is secure (encrypted). In Firefox, look for an closed lock (Windows) or unbroken key (Mac) icon at the bottom of the browser window. In Internet Explorer, look for a closed lock icon at the bottom (Windows) or near the top (Mac) of the browser window. In any browser, look at the URL (Web address) line - a secure connection will begin "https://" instead of "http://". If you are at page (sic) that asks for such information but shows "http://" try adding the "s" yourself and hitting enter to reload the page (for Netscape or Internet Explorer; use whatever method is required by your browser to reload the page at the new URL). If you get an error message that the page or site does not exist, this probably means that the company is so clue less - and careless with your information and your money - that they don't even have Web security. Take your business elsewhere.

5.7.8 Be conscious of home computer security

On the other side of the coin, your own computer may be a trouble spot for Internet security. If you have an ADSL line or other connection to the Internet that is up and running 24 hours, unlike a modem and phone line connection, be sure to turn your computer off when you are not using it. Most home PCs have pitifully poor security compared to the Unix workstations that power most commercial Web sites. System crackers search for vulnerable, unattended ADSL connected home computers, and can invade them with surprising ease, searching through files looking for credit card numbers or other sensitive data. They can even take over the computer and quietly using it for their own purposes, such as launching attacks on other computers elsewhere - attacks you could initially be blamed for.

5.7.9 Examine privacy policies and seals

When you are considering whether or not to do business with a Web site, there are other factors than a secure connection you have to consider that are equally important to Web security. Does the site provide off-line contact information, including a postal address? Does the site have a prominently posted privacy policy? If so, what does it say? (Just because they call it a "privacy policy" doesn't mean it will protect you - read it for yourself. Many are little more than disclaimers saying that you have no privacy! So read them carefully.) If the policy sounds OK to you, do you have a reason to believe it? Have you ever heard of this company? What is their reputation? And are they backing up their privacy statement with a seal program such as TRUSTe [http://www.truste.org] or BBBonline [http:// www.bbbonline.org]? (Such programs hold Web sites to some baseline standards, and may revoke seal licenses, with much fanfare, of bad acting companies that do not keep

11

Privacy

their word.) If you see a seal, is it real? Check with the seal-issuing site to make sure that the seal isn't a fake. And examine terms carefully, especially if you are subscribing to a service rather than buying a product. Look out for auto rebilling scams and hidden fees.

5.7.10Remember that YOU decide what information about yourself to reveal, when, why, and to whom

Don't give out personally identifiable information too easily. Just as you might think twice about giving some clerk at the mall your home address and phone number, keep in mind that simply because a site asks for or demands personal information from you does not mean you have to give it. You do have to give accurate billing information if you are buying something, of course, but if you are registering with a free site that is a little too nosy for you, there is no law against providing them with pseudonymous information. (However, it would probably be polite to use obviously fake addresses, such as "123 No Such Street, Nowhere, NW 0010, Republic of Nowhereland". If they are generating mailings based on this information presumably in accordance with the terms of their privacy policy - they can probably weed such addresses out and not waste the postage on them.)

5.7.11 Use encryption

Last but certainly not least, there are other privacy threats besides abusive marketers, nosy bosses, spammers and scammers. Some of the threats include industrial espionage, government surveillance, identity theft, disgruntled former associates, and system crackers. Relatively easy to use e-mail and file encryption software is available for free, such as Pretty Good Privacy (PGP) [http://www.pgpi.org], which runs on almost all computers and even integrates seamlessly with most major e-mail software. Good encryption uses very robust secret codes, which are difficult if not impossible to crack, to protect your data. You can also use specialised services (some free, some pay), such as the Anonymizer [http:// www.anonymizer.com], which can completely disguise to Web sites where you are coming from and who you are (and block all cookies). Some ISPs are beginning to offer secure, encrypted dial up accounts and other security features. Hopefully some day soon, good encryption and computer security will simply be included in all such services, but for now you have to actively seek out good service.

5.8 More on Encryption

In an open network such as the Internet, message privacy, particularly for e-commerce transactions, requires encryption and decryption.

5.8.1 PGP (Pretty Good Privacy)

PGP is a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender's identity and know that the message was not changed en route. Available both as freeware and in a low-cost commercial version, PGP is the most widely used privacy-ensuring program by individuals and is also used by many corporations. Developed by Philip R. Zimmermann in 1991, PGP has become a de facto standard for e-mail security. PGP can also be used to encrypt files being stored so that they are unreadable by other users or intruders.

5.8.2 How It Works

PGP uses a variation of the public key system. In a public key system, each user has a publicly known encryption key and a private key known only to that user. You encrypt a message you send to someone else using their public key. When they receive it, they decrypt it using their private key. Since encrypting an entire message can be time-consuming, PGP uses a faster encryption algorithm to encrypt the message and then uses the public key to encrypt the shorter key that was used to encrypt the entire message. Both the encrypted message and the short key are sent to the receiver who first uses the receiver's private key to decrypt the short key and then uses that key to decrypt the message. (In other words this is a two stage-encryption process.)

PGP comes in two public key versions - RSA and Diffie-Hellman. The RSA version, for which PGP must pay a license fee to RSA, uses the IDEA algorithm to generate a short key for the entire message and RSA to encrypt the short key. The Diffie-Hellman version uses the CAST algorithm for the short key to encrypt the message and the Diffie-Hellman algorithm to encrypt the short key.

12

Privacy

For sending digital signatures, PGP uses an efficient algorithm that generates a hash code from the user's name and other signature information. This hash code is then encrypted with the sender's private key. The receiver uses the sender's public key to decrypt the hash code. If it matches the hash code sent as the digital signature for the message, then the receiver is sure that the message has arrived securely from the stated sender. PGP's RSA version uses the MD5 algorithm to generate the hash code. PGP's Diffie-Hellman version uses the SHA-1 algorithm to generate the hash code.

To use PGP, you download or purchase it and install it on your computer system. Typically, it contains a user interface that works with your customary e-mail program. You also need to register the public key that your PGP program gives you with a PGP public key server so that people you exchange messages with will be able to find your public key. Network Associates maintains an LDAP / HTTP public key server that has 300,000 registered public keys. This server is mirrored at other sites around the world.

5.8.3 Where Can You Use PGP

Originally, the U.S. government restricted the exportation of PGP technology. Today, however, PGP encrypted e- mail can be exchanged with users outside the U.S if you have the correct versions of PGP at both ends. Unlike most other encryption products, the international version is just as secure as the domestic version.

The freely available PGP cannot legally be used for commercial purposes - for that, one must obtain the commercial version from Network Associates (formerly PGP, Inc.). There are several versions of PGP in use. Add-ons can be purchased that allow backward compatibility for newer RSA versions with older versions. However, the Diffie-Hellman and RSA versions of PGP do not work with each other since they use different algorithms. This term was originally written by Sabrina Dei Giudici from Web Marketing, Perth, Western Australia.

5.9 Review Questions

1.How can we ensure privacy when using e-mail?

2.What does PICS stand for?

3.Briefly outline two ways in which censorship ratings can be made.

4.Discuss briefly something we could do, if we found an unsuitable website with misleading ratings.

5.Why would a company censor Internet use?

6.What is blocking software?

You can find answers to these review questions at the end of the unit.

5.10Discussion and Answers

5.10.1Discussion on Activity 9

1.Tall, dark, handsome, blonde, pretty, honest, cheerful, short, fun, intelligent, average, nice eyes ? (the list goes on ....!)

2.You can be all of these: nobody can tell unless you are using a Web cam (as part of video conferencing), or you tell them.

3.Glasses, big feet, spots, green hair!

4.You cannot tell if the sender of an e-mail message is wearing glasses!

13

Privacy

The time to think about your response. In contrast, this is something that is not always possible when we are talking to a friend. It also can be difficult in a chat room to take time.

5.10.2 Discussion on Activity 10

1.There are no clear answers. Those who are aware of e-mail systems know that no e-mail can be totally secure. It is possible for somebody who has access to an Internet server to intercept and pass on e-mail. When the system is Web based the risks are greater, as the mail sits on a Web server until it is collected.

Security could be terrible but still acceptable if the users were aware of the risks and made sure that any sensitive messages were encrypted.

2.This is your decision. A decision to be cautious is probably a good one.

3. In many countries there are standards set for advertising. This could be extremely useful for consumers as well as advertisers, who would possibly gain credibility if they had registered their advertisement. In the case study, the claim regarding 'privacy' could be removed.

5.10.3 Solutions to Review Questions

These may not be the ultimate answers to the review questions. You should also check with other resources including your textbooks and the Internet.

1.By using a strong encryption method.

2.Platform for Internet Content Selection.

3.The website can be rated by an independent ratings organisation or the author of the site.

4.We could inform our Internet Service provider and inform some of the search engines...Etc.

14