{"492471":{"#nid":"492471","#data":{"type":"news","title":"Protecting Privacy Takes Many Forms","body":[{"value":"\u003Ch5\u003EWhat is the true price of free and how much data are you willing to trade for convenience or security?\u003C\/h5\u003E\u003Cp\u003EThese are the looming questions that the \u003Ca href=\u0022https:\/\/staysafeonline.org\/\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Alliance\u003C\/a\u003E sought to address this week during its 8\u003Csup\u003Eth\u003C\/sup\u003E Annual \u201c\u003Ca href=\u0022https:\/\/staysafeonline.org\/data-privacy-day\/landing\/\u0022 target=\u0022_blank\u0022\u003ENational Data Privacy Day\u003C\/a\u003E,\u201d supported by the Georgia Institute of Technology School of Interactive Computing.\u0026nbsp; Professors \u003Cstrong\u003EAnnie Anton\u003C\/strong\u003E (IC) and \u003Cstrong\u003EPeter Swire\u003C\/strong\u003E (Scheller College of Business) serve on the National Cyber Security Alliance advisory board.\u003C\/p\u003E\u003Cp\u003E\u201cMost Americans are giving up a lot more data on a daily basis than they might think,\u201d says\u0026nbsp;\u003Cstrong\u003EAndrew Howard\u003C\/strong\u003E, director of the \u003Ca href=\u0022http:\/\/www.gtri.gatech.edu\/ctisl\u0022 target=\u0022_blank\u0022\u003ECyber Technologies \u0026amp; Information Security Lab\u003C\/a\u003E at the Georgia Tech Research Institute. \u201cBetween their cell phones, security cameras, and Internet browsers, the average person is trackable throughout most of their day.\u201d\u003C\/p\u003E\u003Cp\u003EDespite the prevalence of hacks or fears of overzealous surveillance, Swire, who is the Huang Professor of Law \u0026amp; Ethics at the Scheller College of Business, argues that the U.S. is still one of the safest places in the world with stringent safeguards of individual privacy.\u003C\/p\u003E\u003Cp\u003E\u201cThe 4\u003Csup\u003Eth\u003C\/sup\u003E Amendment applies to all wiretaps \u2013 it\u2019s a legal structure for any intercept of communication or information,\u201d Swire says, who served as the top privacy official under the Clinton administration and on Obama\u2019s cybersecurity review group. \u201cIf you violate the 4\u003Csup\u003Eth\u003C\/sup\u003E Amendment, you cannot use the evidence in court\u2026 What other countries have a legal order that is the same as the U.S.? Who in the world has a longer and stronger tradition of protecting fundamental rights than the U.S.?\u201d\u003C\/p\u003E\u003Cp\u003EThis week, Swire was in Brussels to debate European privacy activist Max Schrems, who has alleged that American companies too liberally trade personal data between the U.S. and Europe.\u003C\/p\u003E\u003Cp\u003EBut despite protections like the 4\u003Csup\u003Eth\u003C\/sup\u003E Amendment, Swire and others at Georgia Tech agree \u2013 current technology allows such a new breadth of data collection that individuals should be concerned about collection until that data is proven necessary and useful. We asked faculty, scientists and research engineers for their thoughts during National Data Privacy Day:\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003E\u003Cem\u003EWhat do too few Americans know about data privacy but should?\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u201cData brokers know much more about you than you can imagine, and there are few regulations for this industry. Data brokers \u003Ca href=\u0022https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014\/140527databrokerreport.pdf\u0022 target=\u0022_blank\u0022\u003Ecollect personal information about consumers\u003C\/a\u003E from a wide range of sources and provide it for a variety of purposes, mostly marketing and people search as documented by the Federal Trade Commission\u2026 Inferences these brokers data aggregators make include potentially sensitive things like \u2018expecting mother\u2019 or \u2018diabetes patient.\u2019 [Their] products can be used to facilitate harassment, or even stalking, and may expose domestic\u0026nbsp;violence victims,\u0026nbsp;law enforcement officers, prosecutors, public officials, or other individuals to\u0026nbsp;retaliation or other harm.\u201d\u003Cbr \/\u003E -- \u003Cstrong\u003EMichael Farrell\u003C\/strong\u003E, \u003Cem\u003Eassociate director, Institute for Information Security \u0026amp; Privacy\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003E\u003Cem\u003EWhat should every individual do at minimum to protect their data?\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u201cThink twice before in-putting data into different applications or giving online applications broad access to your online accounts through services such as Facebook, Twitter, or Google Mail. \u0026nbsp;Asking yourself a few quick questions before sharing data can go a long way towards avoiding problems: Is this a trustworthy service?\u0026nbsp;Who will have access to my data?\u201d\u003Cbr \/\u003E -- \u003Cstrong\u003EAndrew Howard\u003C\/strong\u003E, \u003Cem\u003Edirector, Cyber Technologies \u0026amp; Information Security Lab\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u201cRight now by default you will be tracked and you have to manually switch on the options to block your tracking (in Internet browsers, for example). Product developers should be focused on flipping that option so that by default you are not tracked. For most sites that we visit, we do not need to be tracked.\u201d\u0026nbsp;\u003Cbr \/\u003E -- \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, \u003Cem\u003Eprofessor of computer science and co-director of the Institute for Information Security \u0026amp; Privacy\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003E\u003Cem\u003EWho can best lead the development of new solutions for cybersecurity \u2014 government, industry or academia?\u0026nbsp;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u0026nbsp;\u201cIt\u2019s academia and industry working together. Our research is based on understanding what is going in the real world and the threats that are there. We call it \u2018ground truth driven research.\u2019 A lot of the data that enables this form of research is there in industry, so academic and industry working together is important, as well as the government supporting forward-looking, longer-term goals.\u201d\u003Cbr \/\u003E -- \u003Cstrong\u003EMustaque Ahamad\u003C\/strong\u003E, \u003Cem\u003Eprofessor of computer science and director of educational outreach, Institute for Information Security \u0026amp; Privacy\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u201cIndustry is best positioned to lead the way due to the market pressures placed on them; however, without academic research and government support, they are unlikely to succeed. \u0026nbsp;Like most hard problems, solutions will require a partnership.\u201d\u003Cbr \/\u003E -- \u003Cstrong\u003EAndrew Howard\u003C\/strong\u003E, \u003Cem\u003Edirector, Cyber Technologies \u0026amp; Information Security Lab\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003E\u003Cem\u003EWhat are you most excited about that could advance cybersecurity?\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u201cI am excited that debate is in the public sphere at this time, and that people are talking about cybersecurity.\u201d\u003Cbr \/\u003E -- \u003Cstrong\u003EPeter Swire\u003C\/strong\u003E, \u003Cem\u003EHuang Professor of Law \u0026amp; Ethics, Scheller College of Business\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u201cMany open-source \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/available-tools\u0022 target=\u0022_blank\u0022\u003Esolutions are being created here\u003C\/a\u003E at Georgia Tech, which anyone can use to create more secure systems, software and hardware. Our projects like \u003Ca href=\u0022http:\/\/wenke.gtisc.gatech.edu\/papers\/ucognito.pdf\u0022 target=\u0022_blank\u0022\u003EUCOGNITO\u003C\/a\u003E can help people truly browse privately. Other research is exposing new places where information is being leaked, for example, between mobile app developers and ad networks. We need to educate consumers to apply pressure to overzealous businesses, and as researchers we can focus on creating the tools that enable customers to protect themselves.\u201d\u003Cbr \/\u003E -- \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, \u003Cem\u003Eprofessor of computer science and co-director of the Institute for Information Security \u0026amp; Privacy\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"January 28th was recognized as \u201cNational Data Privacy Day\u201d and supported by the Georgia Institute of Technology School of Interactive Computing.  Professors, researchers and scientists and Georgia Tech comment on data collection and privacy concerns."}],"uid":"27490","created_gmt":"2016-01-28 16:56:44","changed_gmt":"2016-10-08 03:20:31","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-01-28T00:00:00-05:00","iso_date":"2016-01-28T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}},"492481":{"id":"492481","type":"image","title":"IISP - identity art","body":null,"created":"1454090400","gmt_created":"2016-01-29 18:00:00","changed":"1475895248","gmt_changed":"2016-10-08 02:54:08","alt":"IISP - identity art","file":{"fid":"204486","name":"identity_for_web.jpg","image_path":"\/sites\/default\/files\/images\/identity_for_web_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/identity_for_web_0.jpg","mime":"image\/jpeg","size":328531,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/identity_for_web_0.jpg?itok=ycRbE9k-"}},"492491":{"id":"492491","type":"image","title":"IISP - required security poster","body":null,"created":"1454090400","gmt_created":"2016-01-29 18:00:00","changed":"1475895248","gmt_changed":"2016-10-08 02:54:08","alt":"IISP - required security poster","file":{"fid":"205850","name":"required_security.jpg","image_path":"\/sites\/default\/files\/images\/required_security.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/required_security.jpg","mime":"image\/jpeg","size":174490,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/required_security.jpg?itok=XkOTjjaW"}},"447071":{"id":"447071","type":"image","title":"Dr. Wenke Lee, IISP","body":null,"created":"1449256246","gmt_created":"2015-12-04 19:10:46","changed":"1475895187","gmt_changed":"2016-10-08 02:53:07","alt":"Dr. Wenke Lee, IISP","file":{"fid":"203234","name":"lee_iisp_sm.jpg","image_path":"\/sites\/default\/files\/images\/lee_iisp_sm_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/lee_iisp_sm_0.jpg","mime":"image\/jpeg","size":1130772,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/lee_iisp_sm_0.jpg?itok=_p3MZ7Pb"}},"40339":{"id":"40339","type":"image","title":"Mustaque Ahamad","body":null,"created":"1449174185","gmt_created":"2015-12-03 20:23:05","changed":"1475894317","gmt_changed":"2016-10-08 02:38:37"}},"media_ids":["451391","492481","492491","447071","40339"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"416","name":"GTRI"},{"id":"167089","name":"Scheller College of Business"},{"id":"166848","name":"School of Interactive Computing"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, Marketing Communications Manager\u003C\/p\u003E\u003Cp\u003E404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}