📓 Privacy vs Security

Ian O’Byrne provides a comparison between privacy and security:

Privacy is often defined as the right of an individual to keep his/her individual information from being disclosed. This is typically achieved through policies and procedures. Privacy encompasses controlling who is authorized to access your information; and under what conditions information may be accessed, used and/or disclosed to a third party.Security is defined as the mechanism in place to protect the privacy of information. This includes the ability to control access to information, as well as to safeguard information from unauthorized disclosure, alteration, loss or destruction. Security is typically accomplished through operational and technical controls. source

Doug Belshaw visually represents this to get the point home:

Mike Caulfield discusses the future of privacy and suggests that there is work that needs to be done in regards to participatory culture:

I’m sure that the powers that be in Silicon Valley believe in “the end of privacy”, just like they believe in technocratic meritocracy. The most attractive thing for any programmer to believe is that new technologies will render the messiness of social relations obsolete. But this idea, that privacy is antiquated, will lead to institutional and organizational collapse on a massive scale, which is why a transparency organization like Wikileaks is the favorite tool of dictators.source

Lizzie O’Shea explains how Mark Zuckerberg’s call for increase in privacy fails to capture the agency associated with it all:

A better understanding of privacy will not be limited to design concepts generated by highly profitable social media platforms. It needs to encompass how privacy is an essential component of our agency as human beings. Agency, to be explored and expressed fully, requires that we have space outside the influence of capitalism—to have freedom from market forces seeking to manipulate our unconscious. Privacy demands that human emotions like shame, joy, guilt, and desire be explored without someone seeking to profit from the process without us noticing.source

5 responses on “📓 Privacy vs Security”

  1. Manoush Zomorodi leads an exploration of what we mean by privacy by taking a dive into privacy policies. Charlie Warzel, the editor behind the New York Times’ Privacy Project, argues that Privacy has become an impoverished word. Another option for this is a ‘hyperobject’, as James Bridle explains in the New Dark Age,

    The philosopher Timothy Morton calls global warming a ‘hyperobject’: a thing that surrounds us, envelops and entangles us, but that is literally too big to see in its entirety.Page 77

    The argument in the end is that with the rise of surveillance capitalism, we have moved over time from ‘we might use’ your data to ‘we will’ use your data, therefore making privacy policies seemingly null and void.
    For more on privacy policies, Bill Fitzgerald argues that we need to move beyond compliance to focus on privacy:

    The more we can ground these conversations [around privacy] in personal elements the better: what do you want to show? Why? How? Do you ever want to retract it?

    Alternatively, Amy Collier provides the follow list to consider:

    Audit student data repositories and policies associated with third-party providers
    Have a standard and well-known policy about how to handle external inquiries for student data and information.
    Provide an audit of data to students who want to know what data is kept on them, how the data is kept, where it is kept, and who else has access.
    Have clear guidelines and regulations for how data is communicated and transmitted between offices.
    Take seriously the data policies of third-party vendors.
    Closely examine and rethink student-tracking protocols.
    Give students technological agency in interacting with the institution.

    In regards to privacy policies associated with third-party vendors, Fitzgerald suggests looking for the following search words associated with consent: third party, affiliatuons, change, update and modify.
    For a different approach, Amy Wang reports on the terms of services associated with Instagram. She also includes extracts from a lawyer, Jenny Afia, who rewrote the document in plain English. This is similar to Terms of Service, Didn’t Read, a site designed to not only summarise Terms of Services, but also highlight aspects to consider.

Leave a Reply

Your email address will not be published. Required fields are marked *