8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology

MSIT-Privacy Engineering            

Fall 2015: Tuesday and Thursday 3 - 4:20 pm, NSH 3002
Class web site: http://cups.cs.cmu.edu/courses/pplt-fa15/ [previous semesters]
Class mailing list: http://cups.cs.cmu.edu/mailman/listinfo/privacy-class

Instructor: Lorrie Cranor, Professor of Computer Science and Engineering & Public Policy

Instructor: Rebecca Balebako, Adjunct instructor, Institute of Software Research

Teaching Assistant: Abby Marsh

Course Description

This course focuses on policy issues related to privacy from the perspectives of governments, organizations, and individuals. We will begin with a historical and philosophical study of privacy and then explore recent public policy issues. We will examine the privacy protections provided by laws and regulations, as well as the way technology can be used to protect privacy. We will emphasize technology-related privacy concerns and mitigation, for example: social networks, smartphones, behavioral advertising (and tools to prevent targeted advertising and tracking), anonymous communication systems, big data, and drones.

This course is part of a three-course series of privacy courses offered as part of the MSIT-Privacy Engineering masters program. These courses may be taken in any order or simultaneously. Foundations of Privacy (offered in the Fall semester) offers more indepth coverage of technologies and algorithms used to reason about and protect privacy. Engineering Privacy in Software (offered in the Spring semester) focuses on the methods and tools needed to design systems for privacy.

This course is intended primarily for graduate students and advanced undergraduate students (juniors and seniors) with some technical background. Programming skills are not required. 8-733, 19-608, and 95-818 are 12-unit courses for PhD students. Students enrolled under these course numbers will have extra assignments and will be expected to do a project suitable for publication. 8-533 is a 9-unit course for undergraduate students. Masters students may register for any of the course numbers permitted by their program. This course will include a lot of reading, writing, and class discussion. Students will be able to tailor their assignments to their skills and interests, focusing more on programming or writing papers as they see fit. However, all students will be expected to do some writing and some technical work. A large emphasis will be placed on research and communication skills, which will be taught throughout the course.

Required Texts

Peter P. Swire and Kenesa Ahmad. Foundations of Information Privacy and Data Protection: A Survey of Global Concepts, Laws and Practices. IAPP: 2012.

J.C. Cannon. Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals. IAPP: 2014.

Order these books from the IAPP at https://privacyassociation.org/certify/get-started/cipt/.

All online papers are either publicly available for free, available through the CMU library for free, or available in a password-protected part of this website to students in this course. (The CMU library provides a VPN for off-campus and wireless access to library materials.)

Note on the IAPP certification exam:

This year IAPP is offering CMU students a Student Certification Package which includes: 1 year IAPP membership + textbooks + online training materials + practice exam + 1 Computer Based Test Exam for $120 per student.

Normally you would have to pay $50 for student membership, $550 to take the exam, over $100 for the books, and over $1000 for access to the online training materials and practice tests. So this is a good deal. If you are taking 8-533 / 8-733 / 19-608 / 95-818 Privacy Policy, Law and Technology you will need these books for class, so even if you don't plan to take the exam you might want to get the student package.

Exams will take place at local Kryterion testing centers (see http://www.kryteriononline.com/Locate-Test-Center - the most convenient center to CMU is at 118 52nd Street 15201). You can schedule the exam whenever you want. If you are taking CMU privacy engineering classes this fall, we recommend you take the exam in December or January.

If you would like to sign up for the student certification package, please fill out the form at: http://goo.gl/forms/omLXMjgpJ4. We will send this information to IAPP and they will contact you to collect your payment information. We would like to get people signed up by September 4 so that everyone who needs their books for class will get them promptly.

Optional texts

Dave Eggers. The Circle. Knopf, 2013.

Objectives:

By the end of this course, students should:

Course Schedule

Note, this schedule is subject to change. The class web site will have the most up-to-date version of this calendar. Assignments will be finalized at least one week before due date or as announced in class.

Date

Topics

Assignment

Tuesday, Sept. 1



LFC

Overview [slides]

  • Introductions
  • Syllabus
  • Topics to be covered
  • Course preview picture tour
  • Privacy Illustrated drawings

No required reading


Thursday, Sept. 3


LFC

Conceptions of privacy [slides]

  • What is privacy? What does privacy mean to you?
  • How has privacy been conceptualized over time?

Required reading:

Optional reading

Tuesday, September 8


RHB

Privacy harms [slides]

  • Types of privacy harms
  • Why does privacy matter?

Research and communication skills

Required reading:

Optional reading:

  • Daniel Solove, A Taxonomy of Privacy, University of Pennsylvania Law Review, Vol. 154, No. 3, p. 477, January 2006.

Thursday, September 10


RHB

Debate on the virtue of forgetting [slides]

Homework 1 discussion

 

Required reading:

Optional reading:

Homework 1 due

Tuesday, September 15



LFC


Privacy economics, attitudes, and behavior [slides]

Research and communications skills

Required reading:

Optional reading:

Thursday, September 17


LFC

Fair information practices and privacy principles [slides]

Introduce course project

Research and communication skills

Required reading:

Optional reading:

Tuesday, September 22


RHB

Privacy law overview [slides]

Homework 2 Discussion

Required reading:

  • Swire and Ahmad, Foundations of Information Privacy and Data Protection Chapters 2 and 3

Optional reading:

Homework 2 due

Thursday, September 24


RHB

Privacy regulation, self-regulation, and enforcement slides]

Required reading:

Optional reading:

Tuesday, September 29


LFC

Privacy notice and choice slides

 

Project selection form due before class

 

Required reading:

Optional reading:

Thursday, Oct. 1



RHB

International Privacy Laws and Cultural Differences [slides]

Homework 3 discussion

Required reading:

Optional reading:

Homework 3 Due

Tuesday, October 6


RHB

Internet monitoring and web tracking [slides]

 

Project teams formed

Required reading:

  • L. Cranor, M. Sleeper, and B. Ur. Chapter 7 Tracking and Surveillance. In Privacy Handbook for IT Professionals. 2013.
  • Swire and Ahmad, Foundations of Information Privacy and Data Protection Chapter 5
  • JC Cannon, Privacy in Technology, Chapter 6.3 through 6.6, pages 147-164.

Optional reading:

Thursday, October 8


LFC

W3C

The Platform for Privacy Preferences (P3P) and Do Not Track [slides]

Required reading:

Optional reading

Tuesday, October 13


ACM

Parents, teenagers, and student privacy issues [slides]


One-paragraph project description due


Homework 4 discussion

Required reading:

Optional reading:



Homework 4 due

Thursday, October 15



ACM

Mid-term



Midterm Review:

  • JC Cannon, Privacy in Technology, Chapters 2 and 3, pages 25-82.
  • Review all lecture notes

Tuesday, October 20


RHB

Location tracking [slides]

Required reading:

Optional reading:

Thursday, October 22




RHB

Privacy on social networks [slides]

Required reading:

Optional reading:

Tuesday, October 27


LFC

Homework 5 discussion

Delving further into privacy policies [slides]

Required reading:

Optional readings:

  • Any September 29 optional readings you haven't already read

Homework 5 due

Thursday, October 29


RHB

Smartphone privacy concerns [slides]

Required reading:

Optional reading:

Project proposal due

Tuesday, November 3

Election day


ACM

Biometrics and facial recognition

Field Trip to CMU biometrics lab after brief lecture

Required reading

Optional reading:

Thursday, November 5

LFC

Government surveillance [slides]

Homework 6 discussion

Required reading:

Optional reading:

Homework 6 due

Tuesday, November 10

LFC

Identity and anonymity [slides]

Required reading:

Optional reading:

Thursday, November 12


LFC

Data privacy and big data

[slides]

Required reading:

Optional reading:

Tuesday, November 17


LFC

Privacy engineering, privacy by design,  and privacy governance [slides]

 Homework 7 discussion

Required reading:

Optional reading:

Homework 7 due

Thursday, November 19


ACM

Mid-term

Midterm Review:

  • Chris Clifton, Chapter 4 Identity and Anonymity. In Privacy Handbook for IT Professionals. 2013.
  • JC Cannon, Privacy in Technology, Chapter 7, pages 183-210.
  • Review all lecture notes from beginning of semester

Tuesday, November 24


RHB

Data breach [slides]

Guest Speaker Cynthia Dion-Schwarz

Required reading:

Optional reading:

Thurs, November 26

Thanksgiving break, no class


Tuesday, December 1


LFC

Drones [Guest Speaker Nathan Michael] [slides]

Writing a research paper [slides]

Required Reading

Optional Reading

Thursday, December 3


RHB

Health and electronic records

Creating a research poster [slides]

Research and communications skills

Required reading:

Optional reading:

Draft project paper due

Tuesday, December 8


LFC

[TBD]

No required reading

Thursday, December 10

Poster fair
GHC 4405 and Gates lobby

No required reading

Friday, December 18, noon

Deadline

Final project due

Course Requirements and Grading

Your final grade in this course will be based on:

You are expected to complete the reading assignments before the class session for which they were assigned. Class discussions will often be based on these assignments and you will not be able to participate fully if you have not done the reading. It is suggested that you write up summaries and highlights as you read each chapter or paper and bring them with you to class.

Quizzes at the beginning of each class will be based on the readings for that day. It is suggested that you arrive on time in order to complete the daily quiz with sufficient time.

All homework assignments must be typed and submitted in hard copy in class on the day it is due. Every homework submission must include a properly formatted bibliography that includes all works you referred to as you prepared your homework. These works should be cited as appropriate in the text of your answers.

All homework is due at the beginning of class on the due date. You will lose 10% for turning in homework late (5 minutes or more after class has started) on the due date. You will lose an additional 10% for each late day after that. I reserve the right to take off additional points or refuse to accept late homework submitted after the answers have been discussed extensively in class. Reasonable extensions will be granted to students with excused absences or extenuating circumstances. Please contact me as soon as possible to arrange for an extension.

Cheating and plagiarism will not be tolerated. Students caught cheating or plagiarizing will receive no credit for the assignment on which cheating occurred. Additional actions -- including assigning the student a failing grade in the class or referring the case for disciplinary action -- may be taken at the discretion of the instructor. Please familiarize yourself with the CMU Policy on Academic Integrity.

A class mailing list has been setup for announcements, questions, and further discussion of topics discussed in class. Students will be expected to contribute to mailing list discussions. Students should post (non-personal) course-related questions to this mailing list rather than sending them to the instructor directly. Students are encouraged to post course-related items of interest to this mailing list.