1. Is it possible to identify someone, perhaps a patient, knowing just the gender, birth date, and zip code? Why or why not? Yes, it is very probable that you can due to the high probability that there is only one person of a specific gender and D.O.B., living in your zip code. However, it is possible that there could be a few people of the same demographic all living in a larger city.
  2. Are electronic documents like paper documents? Write 2-3 sentences comparing and contrasting them. Electronic documents are unlike paper documents in that they can never be erased. They are like paper documents because people who keep paper trails will have an even easier time doing so with digital documents.
  3. Earlier in the course, you built the Map Tour app. In the final version, what kind of data is collected from the user? Does the user know the data is being collected? Can they opt out of providing data and still use the app? In the final version of the Map Tour app, the app collected data on where the user is, and where they are going. The user doesn’t know that the data is being collected, and they cannot opt out because the app needs to know where you are in order to work.
  4. Is the Privacy Act effective? Explain why or why not. The Privacy Act is very ineffective because nowadays there is nearly zero privacy. So much data is being collected and it seems like the average person is powerless to the whole process.
  5. Are you willing to trade some of your privacy for the convenience of having a computer or a company recommend products to you? Why or why not? Under what circumstances? While I am extremely wary of trading my privacy, I think it’s nearly impossible to use many internet platforms without doing so. It’s necessary to give up some of my privacy for convenience, as I would be unable to use websites like Amazon. That being said, I would never share personal information or bank information with random sites.
  6. How do we leave digital “footprints and fingerprints?” Do you think this is important for everyone to know? Why or why not? We leave digital footprints by sending messages such as emails to friends/family and visiting sites. We leave digital fingerprints through posting pictures on Facebook, liking posts on Instagram, using geotags to show location, etc. I think everyone should know just how permanent and public their actions are on the internet.
  7. How have social media platforms such as Twitter, Instagram, Snapchat, etc. affected our privacy?Social media platforms such as Twitter, Instagram, Snapchat, etc., have greatly comprised our privacy. With a simple search of someone’s name you can find anything from their innermost thoughts expressed via Twitter to pictures they’ve posted of their family, and their current locations displayed on “SnapMap’ via Snapchat. The companies themselves also can see everything we are doing and all the pages we access, aka collecting our fingerprints.
  8. In this course, you are building apps that collect data from users, the device, and its sensors. What responsibilities do we have as app developers for the data we collect? As app developers, we have a responsibly to inform users that we are collecting data from them, and should not give the data to anyone or use it for any purpose unless given permission to.
  9. Search the web for a recent news story that deals with privacy. Write a paragraph summarizing the article, including any beneficial or harmful impacts on privacy.

The social networking platform Instagram has recently suffered a possibly detrimental data breach in which hackers gained access to the phone numbers and email addresses for many “high-profile” users. The flaw that allowed hackers to access such private information actually occured in Instagram’s application programming interface (API), which the service uses to communicate with other apps. In a recent statement, Instagram said, “We recently discovered that one or more individuals obtained unlawful access to a number of high-profile Instagram users’ contact information—specifically email address and phone number—by exploiting a bug in an Instagram API.” After putting users’ most private information at risk, Instagram needs to work hard to regain the trust of users. The company notified all verified users of the issue via an email and also encouraged them to be cautious of suspicious or unrecognized messages.

https://thehackernews.com/2017/08/instagram-breach.html