8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology

MSIT-Privacy Engineering             Computation,
					       Organizations and
					       Society

Fall 2014: Tuesday and Thursday 3 - 4:20 pm, NSH 3002
Class web site: http://cups.cs.cmu.edu/courses/pplt-fa14/ [previous semesters]
Class mailing list: http://cups.cs.cmu.edu/mailman/listinfo/privacy-class

Instructor: Lorrie Cranor, Professor of Computer Science and Engineering & Public Policy

Teaching Assistant: Rebecca Balebako

Course Description

This course focuses on policy issues related to privacy from the perspectives of governments, organizations, and individuals. We will begin with a historical and philosophical study of privacy and then explore recent public policy issues. We will examine the privacy protections provided by laws and regulations, as well as the way technology can be used to protect privacy. We will emphasize technology-related privacy concerns and mitigation, for example: social networks, smartphones, behavioral advertising (and tools to prevent targeted advertising and tracking), anonymous communication systems, big data, and drones.

This course is part of a three-course series of privacy courses offered as part of the MSIT-Privacy Engineering masters program. These courses may be taken in any order or simultaneously. Foundations of Privacy (offered in the Fall semester) offers more indepth coverage of technologies and algorithms used to reason about and protect privacy. Engineering Privacy in Software (offered in the Spring semester) focuses on the methods and tools needed to design systems for privacy.

This course is intended primarily for graduate students and advanced undergraduate students (juniors and seniors) with some technical background. Programming skills are not required. 8-733, 19-608, and 95-818 are 12-unit courses for PhD students. Students enrolled under these course numbers will have extra assignments and will be expected to do a project suitable for publication. 8-533 is a 9-unit course for undergraduate students. Masters students may register for any of the course numbers permitted by their program. This course will include a lot of reading, writing, and class discussion. Students will be able to tailor their assignments to their skills and interests, focusing more on programming or writing papers as they see fit. However, all students will be expected to do some writing and some technical work. A large emphasis will be placed on research and communication skills, which will be taught throughout the course.

Required Text

Peter P. Swire and Kenesa Ahmad. Foundations of Information Privacy and Data Protection: A Survey of Global Concepts, Laws and Practices. IAPP: 2012. Order this book from the IAPP at https://privacyassociation.org/certify/get-started/cipt/. If you plan to take the IAPP CIPP exams, you will need to join the IAPP, so you might as well join now and get the book at a discount.

All online papers are either publicly available for free, available through the CMU library for free, or available in a password-protected part of this website to students in this course. (The CMU library provides a VPN for off-campus and wireless access to library materials.)

Optional texts

JC Cannon. Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals. (Order this book from the IAPP as well. If you plan to take the CIPT exam, this book is recommended. If you plan to take other IAPP certification exams, get the recommended book for those exams.)

Dave Eggers. The Circle. Knopf, 2013.

Objectives:

By the end of this course, students should:

Course Schedule

Note, this schedule is subject to change. The class web site will have the most up-to-date version of this calendar. Assignments will be finalized at least one week before due date or as announced in class.

Date

Topics

Assignment

Tuesday, August 26

Overview [slides]

  • Introductions
  • Syllabus
  • Topics to be covered
  • Course preview picture tour

No required reading

Thursday, August 28

Conceptions of privacy [slides]

  • What is privacy? What does privacy mean to you?
  • How has privacy been conceptualized over time?

Required reading:

Optional reading

Tuesday, September 2

Privacy harms [slides]

  • Types of privacy harms
  • Why does privacy matter?

Research and communication skills

Required reading:

Optional reading:

  • Daniel Solove, A Taxonomy of Privacy, University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477, January 2006.

Thursday, September 4

Debate on the virtue of forgetting [slides]

Homework 1 discussion

 

Required reading:

Optional reading:

Homework 1 due

Tuesday, September 9

Privacy economics, attitudes, and behavior [slides]

Research and communications skills

Required reading:

Optional reading:

Thursday, September 11

Fair information practices and privacy principles [slides]

Introduce course project

Research and communication skills

Required reading:

  • Swire and Ahmad, Foundations of Information Privacy and Data Protection Chapter 1 p 15-23
  • Lorrie Faith Cranor, I Didn't Buy it for Myself, in Designing Personalized User Experiences in eCommerce, 2004.

Optional reading:

Tuesday, September 16

Privacy law overview [slides]

Homework 2 Discussion

Introduce course project

Required reading:

  • Swire and Ahmad, Foundations of Information Privacy and Data Protection Chapters 2 and 3

Optional reading:

Homework 2 due

Thursday, September 18

Privacy regulation, self-regulation, and enforcement [slides]

Required reading:

Optional reading:

Tuesday, September 23

Privacy notice and choice [slides]

 

 

Required reading:

Optional reading:

Thursday, September 25

International Privacy Laws and Cultural Differences [slides]

Homework 3 discussion

Required reading:

Optional reading:

Homework 3 Due

Tuesday, Sept 29

Internet monitoring and web tracking [slides]

Required reading:

  • L. Cranor, M. Sleeper, and B. Ur. Chapter 7 Tracking and Surveillance. In Privacy Handbook for IT Professionals. 2013.
  • Swire and Ahmad, Foundations of Information Privacy and Data Protection Chapter 5

Optional reading:

Thursday, October 2

W3C

The Platform for Privacy Preferences (P3P) [slides]

Required reading:

Optional reading

Tuesday, October 7

Do Not Track [slides]

Homework 4 discussion

Required reading:

Optional reading

Homework 4 due

Thursday, October 9

Biometrics and facial recognition [slides]

Field Trip to CMU biometrics lab after brief lecture

 

Required reading

Optional reading:

Tuesday, October 14

Location tracking [slides]

Required reading:

Optional reading:

One-paragraph project description due

Thursday, October 16

Privacy on social networks [slides]

Homework 5 discussion

Required reading:

Optional reading:

Homework 5 due

Tuesday, October 21

Parents, teenagers, and student privacy issues [slides]

Required reading:

Optional reading:

Thursday, October 23

Smartphone privacy concerns [slides]

Required reading:

Optional reading:

Project proposal due

Tuesday, October 28

Identity and anonymity [slides]

Homework 6 discussion

Required reading:

Optional reading:

Homework 6 due

Thursday, October 30

Data privacy and big data [CANCELLED]

See November 6th

Tuesday, November 4

Election day

Mid-term

No new reading

Thursday, November 6

Data privacy and big data

[slides]

Required reading:

Optional reading:

Tuesday, November 11

Privacy engineering, privacy by design, privacy impact assessments, and privacy governance [slides]

 

Required reading:

Optional reading:

Thursday, November 13

Government surveillance [slides]

Required reading:

Optional reading:

Tuesday, November 18

Drones [Guest Speaker Nathan Michael] [slides]

Homework 7 discussion

Required Reading

Optional Reading

Homework 7 due

Thurs, November 20

Data breach and identity theft [slides]

Research and communications skills

Required reading:

Optional reading:

Draft project paper due

Tuesday, November 25

Health and genetic privacy [slides]

 

Required reading:

Optional reading:

 

Thursday, November 27

Thanksgiving break, no class

 

Tuesday, December 2

Exam Discussion [slides]

No required reading

Thursday, December 4

Poster fair
GHC 6115

No required reading

Dec 11

Final Exam

1-4pm

Friday, December 12, noon

Deadline

Final project due

Course Requirements and Grading

Your final grade in this course will be based on:

You are expected to complete the reading assignments before the class session for which they were assigned. Class discussions will often be based on these assignments and you will not be able to participate fully if you have not done the reading. It is suggested that you write up summaries and highlights as you read each chapter or paper and bring them with you to class.

Quizzes at the beginning of each class will be based on the readings for that day. It is suggested that you arrive on time in order to complete the daily quiz with sufficient time.

All homework assignments must be typed and submitted in hard copy in class on the day it is due. Every homework submission must include a properly formatted bibliography that includes all works you referred to as you prepared your homework. These works should be cited as appropriate in the text of your answers.

All homework is due at the beginning of class on the due date. You will lose 10% for turning in homework late (5 minutes or more after class has started) on the due date. You will lose an additional 10% for each late day after that. I reserve the right to take off additional points or refuse to accept late homework submitted after the answers have been discussed extensively in class. Reasonable extensions will be granted to students with excused absences or extenuating circumstances. Please contact me as soon as possible to arrange for an extension.

Cheating and plagiarism will not be tolerated. Students caught cheating or plagiarizing will receive no credit for the assignment on which cheating occurred. Additional actions -- including assigning the student a failing grade in the class or referring the case for disciplinary action -- may be taken at the discretion of the instructor. Please familiarize yourself with the CMU Policy on Academic Integrity.

A class mailing list has been setup for announcements, questions, and further discussion of topics discussed in class. Students will be expected to contribute to mailing list discussions. Students should post (non-personal) course-related questions to this mailing list rather than sending them to the instructor directly. Students are encouraged to post course-related items of interest to this mailing list.