Online privacy - Yale University
Download
Report
Transcript Online privacy - Yale University
Online Privacy
ECON 425/563 // CPSC 455/555
NOVEMBER 6, 2008
Outline
Large amounts of sensitive information
flow around the web.
Privacy-enhancing technology has been
developed and deployed (example:
P3P).
Economic approaches to the
management of private information
(Acknowledgements: L. Cranor, C. Lu, and
H. Varian)
2
Online privacy in the comics!
Cathy
February 25, 2000
3
Why is Cathy concerned?
Cathy
March 1, 2000
4
How did Irving find this out?
He snooped her email
He looked at the files on her computer
He observed the “chatter” sent by her
browser
He set cookies through banner ads and
“web bugs” that allowed him to track
her activities across web sites
5
What do browsers chatter about?
Browsers chatter
about
IP address, domain
name, organization,
Referring page
Platform: O/S,
browser
What information is
requested
URLs and search terms
Cookies
To anyone who might
be listening
End servers
System administrators
Internet Service
Providers
Other third parties
Advertising networks
Anyone who might
subpoena log files
later
6
A typical HTTP request
GET /retail/searchresults.asp?qu=beer HTTP/1.0
Referer: http://www.us.buy.com/default.asp
User-Agent: Mozilla/4.75 [en] (X11; U; NetBSD
1.5_ALPHA i386)
Host: www.us.buy.com
Accept: image/gif, image/jpeg, image/pjpeg, */*
Accept-Language: en
Cookie: buycountry=us; dcLocName=Basket;
dcCatID=6773; dcLocID=6773; dcAd=buybasket;
loc=; parentLocName=Basket; parentLoc=6773;
ShopperManager%2F=ShopperManager%2F=66FUQ
ULL0QBT8MMTVSC5MMNKBJFWDVH7; Store=107;
Category=0
7
What about cookies?
Cookies can be useful
used like a staple to attach
multiple parts of a form
together
used to identify you when
you return to a web site so
you don’t have to
remember a password
used to help web sites
understand how people use
them
Cookies can do
unexpected things
used to profile users and
track their activities,
especially across web sites
8
How do cookies work?
A cookie stores a small string of characters
A web site asks your browser to “set” a cookie
Whenever you return to that site your browser sends
the cookie back automatically
Cookies are only sent back to the site that set them
Please store
cookie xyzzy
site
Here is cookie
xyzzy
browser
First visit to site
site
browser
Later visits
9
YOU
Search for
medical
information
Buy book
Set
cookie
Read
cookie
Ad
Search
engine
Ad
Ad company
can get your
name and
address from
book order and
link them to
your search
Book
Store
10
Web bugs
Invisible “images” embedded in web pages
that cause cookies to be transferred
Work just like banner ads from ad networks,
but you can’t see them unless you look at the
code behind a web page
Also embedded in HTML formatted email
messages
For more info on web bugs see:
http://www.privacyfoundation.org/
education/webbug.html
11
Referer log problems
GET methods result in values in URL
These URLs are sent in the referer
header to next host
Example:
http://www.merchant.com/cgi_bin/o
rder?name=Tom+Jones&address=her
e+there&credit+card=23487692323
4&PIN=1234& -> index.html
12
A Technological Approach
The Platform for Privacy Preferences
(P3P) is a standard, computer-readable
format for privacy policies and a
protocol allowing web browsers and
other tools to read and process privacy
policies automatically.
13
Who created P3P?
World Wide Web Consortium (W3C) – a
nonprofit, industry-supported consortium
including researchers and engineers from
over 420 institutions.
Participants in the development of P3P came
from around the world, including
representatives from industry, government,
nonprofit organizations, and academia.
14
Why was P3P created?
To increase consumer trust.
“If the ability to spend is the fuel that propels the economic
engine, then consumers’ trust and confidence in that engine is
the lubricant.”
To protect privacy by allowing informed
choice.
Privacy is the ability of individuals to exercise control over the
disclosure and subsequent uses of their personal information.
Hence notice is fundamental to the individual’s ability to protect
his or her privacy.
To make choice easy.
Privacy policies are difficult and time-consuming to locate, to
read, and to understand; and they change frequently without
notice.
15
How does P3P work? (1)
1. User sets
personal
privacy
preferences on
a tool such as
a browser.
16
How does P3P work? (2)
2. Browser requests privacy policy from a
(P3P-compliant) Web site.
3. Browser compares the privacy policy with
the user’s privacy preferences and acts
accordingly. (Symbols, pop-up prompts,
etc.)
17
P3P Policy Elements Include:
Who is collecting these data?
What information is being collected?
For what purpose?
Which information is being shared with others?
Who are these data recipients?
Can users access their identified data?
Can users make changes in how their data is
used?
What is the policy for retaining data?
How are disputes resolved?
18
Purpose Specifications:
Completion and support of activity for which data was
provided
Web site and system administration
Research and development
One-time tailoring
Pseudonymous decision or analysis
Individual decision or analysis
Contacting visitors for marketing of services or
products
Historical preservation
Contacting visitors for marketing of services or
products via telephone
Other purpose
19
What P3P Accomplishes
Makes privacy notices easy to locate and easy
to understand.
Allows users to specify their privacy
preferences once so that they can be
automatically compared to a web site’s privacy
policy.
Assists users in making decisions about when to
disclose personal information, how much, and
to whom.
20
What P3P Does NOT
Accomplish
Does NOT replace privacy regulations.
Can NOT protect the privacy of users in
jurisdictions with insufficient data privacy
laws.
Can NOT ensure the companies or
organizations follow their stated privacy
policies.
“P3P does not protect privacy, in and of itself. It does,
however, help create a framework for informed choice
on the part of consumers. Any efficacy that P3P has is
dependent upon the substantive privacy rules
established through other processes – be they a result
of regulatory, self-regulatory, or public pressure.”
21
Controversy over P3P
“In the context of proper legislation, P3P is the
most promising solution to cyberspace privacy. It
will make it easy for companies to explain their
practices in a form that computers can read, and
make it easy for consumers to express their
preferences in a way that computers will
automatically respect.”
– Professor Lawrence Lessig, Stanford Law School.
22
Controversy over P3P
P3P is:
a) Pretty Poor Privacy,
b) a Pretext for Privacy Procrastination, and
c) “a tacit acceptance of the great increase in the
tracking and monitoring of our minor activities
that take place over the Web.”
– Karen Coyle, Information Technology Specialist,
University of California
23
Support for P3P
Provides notice and consent
Promotes transparency and accountability
Intuitive
Flexible and global
Worthwhile process
24
Criticism of P3P
Lack of enforcement
Used as a procrastination tool
Unclear legal consequences
Importance of default settings
Unable to maintain current experience
Expensive to implement and maintain
Overly broad and vague purpose
specifications
Ultimatum-style communication
25
More Criticism of P3P
Consumer and business confusion
Rejected by the European Union
Lack of actual choice
Assumes the need to gather information
Does not address third-party data
collection
Lack of control over an irreversible choice
26
Basic Conflict
What is the real problem?
Lack of knowledge about how
information will be used?
OR
The gathering of the data itself?
27
Universal Agreement
Enforcement mechanisms are needed.
“A technical platform for privacy protection…must
be applied within the context of a framework of
enforceable data protection rules, which provide a
minimum and non-negotiable level of privacy
protection for all individuals. Use of P3P in the
absence of such a framework risks shifting the
onus primarily onto the individual user to protect
himself” – European Commission, 1998.
28
Economic View of Privacy
Non-adoption of P3P and other privacyenhancing technologies is not due to
technological flaws. It is due to
economic incentives.
Rational consumers want some of their
personal information available to
producers. They will experience more
privacy (e.g., less intrusive marketing)
and reduced search costs if their true
preferences are known.
29
Complication: Secondary Use
Customers can benefit from collection
and analysis of personal information by
merchants with whom they transact
directly.
If that information is sold to a third
party that does not know the customers,
that third party will use it more clumsily
and reimpose cost on the customers.
The seller of this information has
externalized these costs.
30
Privacy as a Property Right
Data collectors can externalize the costs of
secondary use because current law gives them
property rights in the databases they construct.
Alternative: Vest the property rights in the data
subjects, and compensate them for use of their data.
Varian gives examples of how to structure
information markets and set prices:
http://people.ischool.berkeley.edu/~hal/Papers/privacy
Opponents of this approach would rather ban sale of
personal information altogether and establish a true
“right to privacy.” Relying on property rights to
control the dissemination and use of personal
information ensures that only the rich will have
privacy.
31