[People who are interested in subscribing to
this newsletter should contact John
Sheridan  @ [EMAIL PROTECTED] WEN]



Mfg.Trust is a monthly feature of the
        NCMS InfraGard Manufacturing Industry Association
                Infrastructure assurance for manufacturers.
                        Powered by NCMS.

<><><><><><><><><><>
This month - YOUR PRIVACY
Your personal privacy as it relates to information technology
<><><><><><><><><><>
Editor's Preface:

The NCMS InfraGard Manufacturing Industry Association's vision of
infrastructure assurance is a comprehensive process, backed by a plan, and
implemented by good people. People, process, and technology must work
together to succeed in business. Nowadays, many people choose to use
sophisticated information technology tools in our personal lives. So, even
if you are web shopping at home, or subscribing to email magazines, these
same precepts apply. You need some personal rules or processes to live by.

We encourage you to plan for your personal privacy, to take control of the
issue as it affects you personally. You can use the materials here and on
our resource page (http://trust.ncms.org) to consider the options, and
develop a personal level of disclosure that makes you comfortable. Of
course, "what makes people comfortable" varies enormously. You need to weigh
the costs and benefits for yourself.

This month's feature will address your personal privacy as it relates to
information technology. That's just one slice. The October 2001 Identity
Theft article covered another important aspect of privacy. Last month's
article on Industrial Strength Authentication is completely relevant to your
personal affairs. You can go to our web site (http://trust.ncms.org, select
Publications Index) to review the excellent web resources there. Corporate
Privacy practices (they affect you too) will be addressed in a future
article, so for now we'll bypass both the 1998 European Union Privacy Laws
and the U.S. HR 2975 - PATRIOT Act. Each is complex.

NCMS is dedicated to helping manufacturers develop robust systems (people,
process, and technology) that assure uninterrupted production. We hope you
find these resources useful both in your personal and business lives. Aware
and educated private citizens are also aware and educated employees!

        John Sheridan ([EMAIL PROTECTED] )

<><><><><><><><><><>
YOUR PRIVACY
<><><><><><><><><><>
"The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated,
and no Warrants shall issue, but upon probable cause, supported by Oath or
affirmation, and particularly describing the place to be searched, and the
persons or things to be seized." - Amendment IV, The United States
Constitution (1791)

You should be able to exercise control over how personal information you
provide will be used. If you provide personal information for one purpose,
you should be able to stop that personal information being used for other
unrelated purposes. Government regulators and responsible businesses are
converging on this very general norm, but it is very difficult to get any
sort of widespread agreement on critical implementation details.

What about personal information that you do not "willingly" or "knowingly"
provide? In their November 5th cover story, Business Week reports, "...Polls
taken since September 11 show that 86% of Americans are in favor of wider
use of facial-recognition systems; 81% want closer monitoring of banking and
credit-card transactions; and 68% support a national ID card. This quest for
"safety" will come at an incalculable cost to personal privacy." These
developments could wind up having profound implications for our democracy.
Privacy involves the most fundamental issue in governance: the relationship
of the individual to the state. By reducing our commitment to privacy, we
risk changing what it means to be Americans.

<><><><><><><><><><>
"Quid pro Quo" Privacy
The fight over privacy is often waged between two extremes: the government's
need to know vs. the individual's right to privacy. But some European
governments and companies are exploring a compromise path, in which
consumers voluntarily submit to greater data-gathering to get something they
want in return. Call it quid-pro-quo privacy.

Schiphol International Airport in Amsterdam is offering frequent fliers a
special deal: Give up a bit of personal privacy by submitting to an iris
scan, and breeze through passport control. Privacy groups complain that all
such systems create huge databases of information that governments could tap
without the knowledge or consent of citizens. Yet, participation is
voluntary (actually, there is also a fee for this service).

<><><><><><><><><><>
Banking - Does It Belong Online?
An individual's financial information is probably one of the most private
possessions one could have. This data contains so much confidential
information that if it were delivered into the wrong hands it could spell
disaster. There are currently about 4,100+ individual financial institutions
around the world utilizing some type of Internet Banking application.

Banks primarily rely on a system or a group of systems known as 'host
processors'. These host processors are responsible for the storage of all
financial information. When these host processors were originally developed,
Internet Banking was not an issue. Oops!! The full story is on our resources
page at http://trust.ncms.org. Be particularly careful with your online
banking, which is literally a rich target for crime. Ask lots of questions
of your bank, and expect these online banking systems to change / improve
over time.

<><><><><><><><><><>
Don't Get Sentimentally Attached to Your Computer Password
Computer passwords are intended to aid your privacy by certifying your
identity on a network. But people become sentimentally attached to them or
leave them taped underneath their keyboards or on their monitors, accessible
for both casual and truly malicious misuse.

Jennifer Lee reports in her NY Times article (link below), "The problem is
that computer passwords have evolved into the personality test of a
networked society, as millions of people try to sum up their essence through
a few taps on the keyboard. As psychologists know, people and personalities
are often very predictable in the aggregate, and thus so are passwords a
reality that malevolent computer hackers often take advantage of."
Jennifer's eye-opening article will tell you which passwords are most
popular with middle-aged women, and young males. Take a look before you
select your next password.

<><><><><><><><><><>
Customer Data Means Money
With more than 200 million adults and more than 18 million businesses in the
United States, you can buy data on just about every kind of industry,
product, habit, trend, and interest. All that information can be filtered
and analyzed, massaged and repackaged in just about any manner that suits
your needs. Most of the consumer information available for sale is compiled
from public sources that are easy to locate, and most of the data is used to
create mailing lists that fuel the direct marketing of products and
services. Individual feelings vary widely on this topic, and emotions run
high. If you wish to exercise your "right to be left alone" see Junkbusters
(link below).

On the other hand, a new national survey (see Privacy Resources page at
http://trust.ncms.org for links to details) of commercial Internet sites
suggests that online privacy practices and policies are "continuing to
evolve, and, by at least some criteria, to improve." Among the most
important findings:
*   Web sites are collecting less information,
*   Privacy notices are more prevalent, more prominent and more complete,
and more sites offer choice,
*   P3P adoption is off to a rapid start (see text below), but seal programs
are growing relatively slowly.

Responsible companies do search for the right balance between delivering the
service customers want and the privacy they expect. On the commercial side,
IBM is one of the earlier large companies to appoint a Chief Privacy
Officer. "The evolution of e-business has made privacy and data protection
one of the biggest challenges for enterprises today," said Dr. Michael
Waidner institute executive at the IBM Privacy Institute (link below).
"Companies today are increasingly looking to design and offer personalized
services to their customers. We believe that technology will play a critical
role in enabling personalized services while protecting individual privacy."

<><><><><><><><><><>
Privacy on the Internet
The news in privacy protection this year is Platform for Privacy Preferences
(P3P), the standard created by the World Wide Web Consortium that lets Web
surfers screen Web-site privacy policies and prevent their PCs from sending
private information about themselves.

Microsoft built P3P into Internet Explorer 6.0, letting users select their
privacy preferences from a menu. For instance, they can tell the browser to
prevent Web sites from loading cookies onto their PCs. The browser also
warns users when Web sites don't live up to their privacy parameters. It has
been predicted that three-fourths of the top 100 U.S. Web sites will become
P3P-compliant in 2002.

With an estimated 10 million to 15 million copies of Internet Explorer 6.0
already in use, consumer awareness of privacy issues could heighten
dramatically in coming months. See the resources page at
http://trust.ncms.org for information on consumer and commercial privacy
products available.

<><><><><><><><><><>
Safire Warning on National ID - The "Discredit Card"
NY Times columnist William Safire editorializes convincingly, "...The
universal use and likely abuse of the national ID -- a discredit card --
will trigger questions like: When did you begin subscribing to these
publications and why were you visiting that spicy or seditious Web site? Why
are you afraid to show us your papers on demand? Why are you paying cash?
What do you have to hide?" (The link below is free, but you must register to
read the editorial. You can decide if that is too invasive.)

<><><><><><><><><><>
In Summary
The protection of your privacy while interacting in personal or business
commercial transactions will always be a matter of earned trust. Ultimately,
if you give information to someone, they have it and can give it to someone
else (or someone can take it from them!). Our attitudes are shaped by how
much we trust the government, the bank, the doctor, the grocery store, or
anyone else we interact with.

 "Those that would sacrifice their freedom for safety will find they inherit
neither." - Ben Franklin
<><><><><><><><><><>

Links:

Privacy in an Age of Terror, (Cover Story) Business Week; New York; November
5, 2001; Mike France and Heather Green in New York, with Jim Kerstetter in
San Mateo, Calif., Jane Black and Alex Salkever in New York, and Dan Carney
in Washington;
http://www.businessweek.com/magazine/content/01_45/b3756001.htm

And the Password Is . . . Waterloo, by Jennifer Lee, NY Times, 12/28/2001
http://www.nytimes.com/2001/12/27/technology/circuits/27PASS.html?todayshead
lines

IBM has formed the IBM Privacy Institute and the IBM Privacy Management
Council to focus exclusively on privacy and data protection challenges
facing its enterprise customers and the marketplace.
http://www.ibm.com/news/us/2001/11/121.html

Junkbusters: Materials on fighting junk mail, spam, telemarketing calls and
other privacy invasive marketing. Also tools to protect privacy.
http://www.junkbusters.org

Safire Warning on National ID - The "Discredit Card"
http://www.nytimes.com/2001/12/24/opinion/24SAFI.html
(There is no charge for this NY Times editorial, but you must register to
read it. You can decide if that is too invasive.)

<><><><><><><><><><>




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to