Recent advances in technology with cloud computing and big data have brought major. In their book Privacy in the Age of Big Data: Recognizing Threats,

Similar documents
Growing the Digital Business: Spotlight on the Internet of Things. Accenture Mobility Research 2015

Japan Library Association

The BIGGEST. The 2 nd Saudi International Exhibition & Conference for Internet of Things February 2019

Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance

IS MOBILE TV (MTV) REALLY A MOBILE DELIVERY VEHICLE (MDV)

IoT Egypt Forum A Catalyst for IoT Ecosystem in Egypt

Internet of Things (IoT) Vikram Raval GSMA

The School Counselor: Broker of Services in the Own the Turf Community Webinar

Samsung Electronics Presents: Internet of Things: Transforming the Future June 21, 2016

adfh Digital Crime and Digital Terrorism

Securing IoT in the Enterprise

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

Internet of Things (IoT)

Memo. To: Mayor and Council From: Douglas K. Holland, Chief of Police CC: Tracey E. Nicholson, City Administrator Date: May 9, 2016

Internet of Things ( IoT) Luigi Battezzati PhD.

Moving Beyond Interaction Analytics to an Omnichannel World

London Environment Directors Network

What You Need to Know About Addressing GDPR Data Subject Rights in Primo

AND GOES THE PROGRAM

Breakthrough - Additional Educational Material for the Exhibition in Chicago

Vice President, Development League of American Orchestras

Westmount Secondary School Think Tank Policy Proposal

Contents. Editorial Note. ISA Forum, Vienna ISA World Congress Publication Highlights. Announcements

Increasing Retail Brick-and-Mortar Traffic With Innovative Digital Signage

Internet of Things: Cross-cutting Integration Platforms Across Sectors

ITU-T Y Functional framework and capabilities of the Internet of things

Corporate IDENTITY and BRANDING Standards Manual

The Chorus Impact Study

Article begins on next page

`Health Literacy Quizzes Project

Stalking ~~~~~ Presented by: Heather Putnam Danyel Albert

What Is The Internet of Things?

The National Traffic Signal Report Card: Highlights

Legal Research Refresher: Secondary Authority Guide

Beyond the screen: Emerging cinema and engaging audiences

2011 Census: Lessons learned

Matthew Janik Second-Year Student (Bachelor of Arts, Honours, Music and History) School of Fine Art and Music, University of Guelph, CANADA

ADVANCED PATENT ISSUES AND ACCELERATED EXAMINATION. Presented by: Theodore Wood

When I was fourteen years old, I was presented two options: I could go to school five

Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n

Before the Federal Communications Commission Washington, D.C ) ) ) ) ) REPLY COMMENTS OF PCIA THE WIRELESS INFRASTRUCTURE ASSOCIATION

SPRING MICROSERVICES IN ACTION BY JOHN CARNELL DOWNLOAD EBOOK : SPRING MICROSERVICES IN ACTION BY JOHN CARNELL PDF

Written by İlay Yılmaz and Gönenç Gürkaynak, ELIG, Attorneys-at-Law

Building Your DLP Strategy & Process. Whitepaper

Annie, Get Your Gun, But Please Don t Bring It to the Depo

Defining the profession: placing plain language in the field of communication.

PAROLES BY PREVERT JACQUES

Policy on the syndication of BBC on-demand content

EDITORIAL POLICY. Open Access and Copyright Policy

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission

Session 12 POLEMICAL TRICKS AND RHETORICAL PLOYS

nature knows best essay

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )

Maintenance and upgrade of a BARCO video wall installed in the Crisis Room of the ECML

How to grab attention:

Smart Communities Using GIS

SIX STEPS TO BUYING DATA LOSS PREVENTION PRODUCTS

Learning to Listen.. and Defusing a Hostile Situation. Course Outline

AABB Trademark Usage Guidelines

Medieval Art. artwork during such time. The ivory sculpting and carving have been very famous because of the

Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study

THE BAHAMAS EXPERIENCE. Contents. In this brief presentation we will give you:

Bringing an all-in-one solution to IoT prototype developers

THE CRITICAL CONSIDERATIONS OF OMNICHANNEL SUPPORT

House of Lords Select Committee on Communications

THE COMMUNICATION HANDBOOK: A DICTIONARY BY JOSEPH A. DEVITO

Cataloging Fundamentals AACR2 Basics: Part 1

End users' perceptions concerning computer applications implemented in broadcast stations

DATA LOSS PREVENTION: A HOLISTIC APPROACH

AFEM & CI METADATA BEST PRACTICE GUIDE

IOT Based Fuel Monitoring For Vehicles

Ex Libris Rosetta Privacy Impact Assessment

Before the FEDERAL COMMUNICATIONS COMMISSION Washington DC ) ) ) ) ) ) ) ) COMMENTS OF

Broadcasting Authority of Ireland Guidelines in Respect of Coverage of Referenda

Points to consider before agreeing to filming proposals

Autobiography and Performance (review)

CONRAD AND IMPRESSIONISM JOHN G. PETERS

Peer Review Process in Medical Journals

IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security

Modelling Prioritisation Decision-making in Software Evolution

STALKING PRESENTED BY: HEATHER PUTNAM JEN LACHANCE-SIBLEY

THE POLITICAL SPEECHWRITER'S COMPANION: A GUIDE FOR WRITERS AND SPEAKERS BY ROBERT LEHRMAN

Tender Brief for Hull on Film A project supported by the Heritage Lottery Fund

Collection Development Policy. Giovanni Mejia San Jose State University

Sitting on Artifacts of Gender

Memorandum of Understanding. between. The Ministry of Civil Defence & Emergency Management. and

Re: Live Streaming/Video Archiving of Board and Standing Committee Meetings

Springhead Road, Northfleet Kent, DA11 8HN Tel: web:

Introduction. The report is broken down into four main sections:

Ex Libris. Aleph Privacy Impact Assessment

Conflict Transformations in Business

IoT - Internet of Things. Brokerage event for Innovative ICT November, Varazdin, Croatia

Scouting and Sherlock holmes

TOURISM ECONOMICS AND POLICY (ASPECTS OF TOURISM) BY LARRY DWYER, PETER FORSYTH, WAYNE DWYER

iii iii georges king essay king king iii essay george iii Iii

Amazon s Kindle Fire. Anthony B. Fullerton. Due Oct 11, 2011 IT Professor: Dr. Steve Schorling. George Mason University

Comments of the Authors Guild, Inc. Submitted by Mary Rasenberger, Executive Director

Music Theory For Singers Level 1 By SANDVIG SARAH

REALITY IS A MATTER OF PERCEPTION

Transcription:

Protect Yourself in the Age of Big Data Review of: Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family Theresa M. Payton & Theodore Claypoole Rowman & Littlefield: Lanham, Maryland, 2014 ISBN 978-1-4422-2545-9 Price: $18.95, pp. 259 Reviewed By: Kaleigh Fitzpatrick Journal of High Technology Law Suffolk University Law School Smashing our gadgets like luddites or living unconnected in the woods like hermits would deprive us of the great advantages life in our own era offers: the advantages of infinite knowledge at our fingertips and constant connection to those we love. (p. 227) Recent advances in technology with cloud computing and big data have brought major benefits to society. 1 In their book Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family, Theresa Payton and Theodore Claypoole outline need-to-know information and provide tips to protect your privacy in light of these new technologies. 2 The authors depict a reality where data is gathered on individuals in a relentless and ubiquitous manner throughout their everyday lives. 3 However, the authors offer deliberate reassurances to their readers that the realities of our technology-driven world do not necessitate seclusion. 4 Instead, the authors attempt to arm their readers with strategies to increase privacy and security to allow the reader to continue to benefit from their use of modern technology. 5 Theresa M. Payton is the CEO and chief advisor for Fortalice, LLC, where she provides expertise in both the public and private sectors on matters of risk, compliance, security, and 1 See THERESA M. PAYTON & THEODORE CLAYPOOLE, PRIVACY IN THE AGE OF BIG DATA (Rowman & Littlefield ed., 2014). 2 See Payton, supra note 1, at 17. 3 See Payton, supra note 1, at 19. 4 See Payton, supra note 1, at 227. 5 See Payton, supra note 1, at 62. 1

fraud. 6 Previously, Payton was the first-ever female Chief Information Officer at the White House from 2006-2008. 7 In that role, she set the business and technology information strategy and direction for the Executive Office of the President. 8 Additionally, Payton is a leader in her community of Charlotte, North Carolina through her involvement with numerous organizations, while also serving as a trustee of her alma mater, Immaculata University. 9 Theodore F. Claypoole is a prominent attorney in the privacy and data security field. 10 Currently, he practices at the law firm of Womble Carlyle in Charlotte, North Carolina. 11 He is a Senior Partner in the Intellectual Property Practice Group and leads the firm s Privacy and Data Management Team. 12 In addition to this book, Payton and Claypoole previously collaborated to co-author another a privacy-related work titled Protecting Your Internet Identity: Are You Naked Online?. 13 In this most recent work, the authors begin with a discussion of the right to privacy in the United States. 14 The authors accurately identify the notion of privacy as complex and personal. 15 Privacy, as it is understood in the United States, is contrasted with the varying beliefs of other democratic countries. 16 The authors emphasize the idea that data privacy is a matter of choice and individuals should have the right to decide if a company can collect information on them. 17 Further, the authors make an important point that the current technology conversation cannot solely focus on policing the collection of data. The conversation must also address preserving the right of individuals to know what kind of information is being collected and what is being 6 See New Trustee: Theresa M. Payton, IMACULATA MAGAZINE, archived at http://perma.cc/duu7-umab. 7 See id. 8 See id. 9 See id. 10 See Theodore F. Claypoole, WOMBLE CARLYLE, archived at http://perma.cc/z552-kmfn. 11 See id. 12 See id. 13 See id. 14 See Payton, supra note 1, at 1. 15 See Payton, supra note 1, at xi. 16 See Payton, supra note 1, at 231. 17 See Payton, supra note 1, at xi. 2

done with that information. 18 At the outset, the book provides an analysis of the types of dangers and privacy issues that arise with technology devices typically used every day. 19 The authors then flag dangers to be aware of and ways to protect yourself against these dangers when using your devices. 20 The book next details the many opportunities throughout the day when information can be unknowingly collected on an individual. 21 The authors also evaluate data privacy issues that can occur both inside and outside your home. 22 For instance, these potential privacy issues can arise with your wi-fi network, gas and electric utility use, grocery shopping, or driving through an intersection with a traffic light. 23 After highlighting the common data privacy vulnerabilities confronting individuals today, the authors present numerous strategies to protect personal data. 24 To address the broader issues, the authors also provide recommendations for legislators and policy makers in an effort to encourage change on a larger scale. 25 Ultimately, the authors aim to empower private citizens to protect themselves and advocate for the necessary protections in today s technology-driven world. 26 The overall theme of the book is the need for individuals to be informed and aware of privacy dangers and the ways to protect yourself and your family in today s high-speed society. 27 The authors recognize the supreme benefits that accompany the recent advances in technology, however, with a serious realism; they present a world in which your data is at risk almost constantly throughout your day. 28 18 See Payton, supra note 1, at 3. 19 See Payton, supra note 1, at 17. 20 See Payton, supra note 1, at 33. 21 See Payton, supra note 1, at 57. 22 See Payton, supra note 1, at 77. 23 See Payton, supra note 1, at 196. 24 See Payton, supra note 1, at 23, 62, 107, 197. 25 See Payton, supra note 1, at 227. 26 See Payton, supra note 1, at 227. 27 See Payton, supra note 1, at xiv. 28 See Payton, supra note 1, at 227. 3

Throughout the book, the authors provide relevant examples of privacy implications associated with conventional technology use. 29 These scenarios presented have the potential to affect every reader because the usage of these technologies is so interwoven into our lives. 30 The examples are effective and memorable because they are relatable and leave a lasting impact on the reader. 31 Each example is followed by tips recommended by the authors to ensure better protections in each specific scenario. 32 This approach is effective in grabbing the reader s attention with a dramatic example, then encouraging the reader to continue to use the helpful technology, but be armed with the tools to protect themselves and their family. 33 The book is a quick and comprehensive overview of big data and the associated privacy issues that are relevant to nearly every person. 34 The authors present the highly technical material in an easy to understand manner with interesting examples and practicable tips. 35 The information presented can be reasonably understood and feasibly integrated into the reader s life. 36 The book s organization into sections associated with an individual s life allows the reader to think about their own life and process the information and suggestions in a systematic way. 37 The book provides examples of privacy concerns surrounding such technologies as mobile devices, online shopping, term-searching, and GPS on your phone and in your car. 38 The authors take an informal but knowledgeable tone in presenting this information. 39 This book demonstrates the authors own thorough understanding of the subject matter, yet presents the 29 See Payton, supra note 1, at 27. 30 See Payton, supra note 1, at 27. 31 See Payton, supra note 1, at 61. 32 See Payton, supra note 1, at 62. 33 See Payton, supra note 1, at 62. 34 See Payton, supra note 1, at 57. 35 See Payton, supra note 1, at 58. 36 See Payton, supra note 1, at 58. 37 See Payton, supra note 1, at 19. 38 See Payton, supra note 1, at 77. 39 See Payton, supra note 1, at 77. 4

information in a way that is palatable for those readers, and seemingly their targeted audience, who have little technical understanding of the advanced technologies (i.e. cloud computing, biometrics, data mining). 40 The examples the authors provide are slightly dramatic and sometimes seem extreme, however they are effective in being memorable, attention-grabbing, and hopefully drive the readers to implement the authors suggestions. 41 The authors empower the reader to define their own privacy boundaries and then advocate for those boundaries. 42 The authors note that when businesses are provided clear privacy limits, then companies tend to stay within those limits. 43 Issues arise when there are little to no limits on what these companies can collect on individuals and what they can do with the collected information. 44 The authors suggest that we, as a society, need to place limits in a manner that protects areas of privacy where we are losing the most privacy fastest, such as in geolocation. 45 An important point that the authors make is that addressing such issues as location privacy now would keep U.S. businesses from building business models around the collection of that data. 46 One major takeaway is that it is high time for these privacy limits to be put in place before invasions in our daily lives become out of control and irreversible. 47 This work is a valuable contribution to the field because it is timely and informative. The issues presented are worrying and seemingly pervasive; however individuals have the ability to better protect themselves through the tips recommended by the authors. It is readable and accessible to the masses with a compilation of examples that are informative, eye-opening, and 40 See Payton, supra note 1, at 139. 41 See Payton, supra note 1, at 175. 42 See Payton, supra note 1, at 203. 43 See Payton, supra note 1, at 228. 44 See Payton, supra note 1, at 228. 45 See Payton, supra note 1, at 234. 46 See Payton, supra note 1, at 234. 47 See Payton, supra note 1, at 227. 5

interesting. The authors were able to strike a balance between scaring the reader into renouncing technology and motivating the reader to take steps to protect themselves and their families. Overall, the book is entertaining, enlightening, and educational. The authors are successful in educating the reader on the advances in technology that are affecting privacy, especially those potential privacy invasions that commonly go undetected in our everyday lives. The key to the success of this book is the authors message that you can do a better job of protecting yourself, and although these privacy issues are scary and overwhelming, not all is lost as there are many reasonable protections that can be put in place. This book would be beneficial for everyone to read as it is essential to have an understanding of the greater implications of using these tech devices that are so integrated in our lives. Moreover, the information presented is also particularly important for parents. The authors specifically outline for parents the dangers that exist when children use these technologies and provide tips to help parents teach their children about the possible repercussions of their online activities. 6