Privacy
January 31, 2023
CS 195, Spring 2023 @ UC Berkeley
Lisa Yan https://eecs.link/cs195
1
LECTURE 03
Privacy and Universities
Privacy and Universities
Quick Ethics Primer
“Practical” Privacy
Policy: GDPR and CCPA
Apple and Privacy
2
Capture Higher Ed: Redefining Higher Education Marketing
3
“Student tracking, secret scores: How college admissions offices rank prospects before they apply”
Quotes from the article:
4
Poll Everywhere
Even before Coronavirus arrived, universities were increasingly tracking their students to help detect students at risk of harm or academic failure.
Is it ethical for universities to track the locations and activities of their students?
5
🤔
(individual)
6
“No Place to Hide: Colleges Track Students, Everywhere”
Universities also track students after they arrive. From a WSJ article:
7
On Campus Tracking (1/4): Emergencies
Universities also track students after they arrive. From “No Place to Hide: Colleges Track Students, Everywhere” (Link):
Examples:
8
On Campus Tracking (2/4): Sports Events
9
On Campus Tracking (3/4): Social Media and Personal Danger
10
On Campus Tracking (3/4): Academic Performance
“Stephen Fugale, chief information officer at Villanova University for 17 years until his departure last September, says learning-management systems in use at VU show whether students watch videos or read chapters they were assigned, and whether they participated in online discussions.”
11
Returning to the same question
Even before Coronavirus arrived, universities were increasingly tracking their students to help detect students at risk of harm or academic failure.
With these examples, is it ethical for universities to track the locations and activities of their students?
12
🤔
(individual)
13
Attendance Code
Your last submission must have all correct codes. We will not “frankenstein” submissions together.
14
✅
Attendance closes at the end of lecture.
Please submit your bCourse assignment by end of class (5:00pm Pacific).
Attendance Code (1/2)
Quick Ethics Primer
Privacy and Universities
Quick Ethics Primer
“Practical” Privacy
Policy: GDPR and CCPA
Apple and Privacy
15
Core ethical approaches relevant to data science/computing
You need them all!
You also need policy and regulation!
16
Slide Courtesy: Charis Thompson
Consequentialist: value of what happens
JUDGE OUTCOMES
Local Moral Worlds: cultural mores, standards, and norms
HONOR COMMUNITY
Social movements
COLLECTIVE ACTION FOR SOCIAL CHANGE
Deontological: Intrinsic value of an act or intention
JUDGE ACTORS
Social Justice: countering systemic harm/ discrimination
UNDO INEQUALITY
Solve grand social challenges
SOCIAL RESPONSIBILITY/�TECHNICAL SOLUTIONS
Breakout
What ethical approaches particularly resonate with you? Why?
Breakout activity: 10 minutes
17
🤔🤔🤔
(breakout)
“Practical” Privacy
Privacy and Universities
Quick Ethics Primer
“Practical” Privacy
Policy: GDPR and CCPA
Apple and Privacy
18
Privacy matters to everyone
THREATS
PROTECTIONS
19
Tracking
Long ago, the web was mostly plain text and images.
Internet is now ruled by a collection of powerful fiefdoms, each aggressively tracking their users.
20
Tracking
Facebook’s impression of your interests:
Google:
Amazon product recommendations.
�More spooky things like browser fingerprinting: http://panopticlick.eff.org
21
Policy: GDPR and CCPA
Privacy and Universities
Quick Ethics Primer
“Practical” Privacy
Policy: GDPR and CCPA
Apple and Privacy
22
GDPR: The Right to Be Forgotten
“This conception of the right to be forgotten is based on the fundamental the need of an individual to determine the development of his life in an autonomous way, without being perpetually or periodically stigmatized as a consequence of a specific action performed in the past, especially when these events occurred many years ago and do not have any relationship with the contemporary context.“
[Link]. From: The EU Proposal for a General Data Protection Regulation and the Roots of the ‘Right to Be Forgotten’
The “General Data Protection Regulation” in the EU was implemented in May 2018. Among many other things, it provides that people within the European Economic Area have a “Right to Erasure”.
23
GDPR Individual Rights and Business Obligations
24
[GDPR, graphic from BankingHub]
Breakout 2
What technical challenges do you see in implementing GDPR requirements?
Breakout activity: 5 minutes
25
🤔🤔🤔
(breakout)
California Consumer Privacy Act (CCPA)
In 2018, California passed a smaller law, the California Consumer Privacy Act (CCPA) which covers California residents.
26
Attendance Code
Your last submission must have all correct codes. We will not “frankenstein” submissions together.
27
✅
Attendance closes at the end of lecture.
Please submit your bCourse assignment by end of class (5:00pm Pacific).
Attendance Code (2/2)
Apple and Privacy
Privacy and Universities
Quick Ethics Primer
“Practical” Privacy
Policy: GDPR and CCPA
Apple and Privacy
28
Brief History of Encryption
Modern cryptography is strong enough that it cannot be broken by anyone.
In 2014, as a result of Snowden disclosures, Apple updated iOS 8 so that they were physically unable to decrypt user’s phones [WaPo, 2014].
29
Apple vs FBI Timeline
30
Apple vs FBI Timeline
Epilogue:
31
Your Alignment
32
Since then: Apple and CSAM (tw: references child abuse)
33
CSAM: child sexual abuse material
What do you think?
What is the tradeoff between privacy and safety?
34
🤔
(individual)
35
[Extra] Data breaches and leaks
Privacy and Universities
Is Social Media Healthy?
New and Enabled Social Capacity
Sustaining Digital Tools
Making Things Better
Time Well Spent
36
Database Leaks
In 2016, Wikileaks released an almost completely unredacted database of information about the ruling AKP party.
37
Data Breaches Happen All The Time
Uber was breached to its core, purportedly by an 18-year-old Dan Goodin, Ars Technica, Sept 2022
38
Deanonymization
2006: AOL releases pseudo-anonymized web search results of 650,000 users over a 3-month period. Each user is given a unique ID.
Other work exists to deanonymize:
39