The Complexity Underlying JetBlue’s Privacy Policy Violations

نویسندگان

  • Annie I. Antón
  • Qingfeng He
  • David L. Baumer
چکیده

This report examines the actions of JetBlue Airways Corporation (JetBlue), which violated its privacy policy when it gave the travel records of five million customers to Torch Concepts, a private Department of Defense contractor. JetBlue’s actions have prompted at least two lawsuits, including a claim by the Electronic Privacy Information Center with the Federal Trade Commission that JetBlue engaged in deceptive trade practices when it violated its privacy policy. Our analysis reveals that JetBlue’s privacy policy contains ambiguities, which may pose additional significant threats to customer privacy. The complexity of our actor/information flow model elucidates the importance of organizations establishing clear contractual relationships that specify permissions, obligations and responsibilities for all parties. An implication of this study is that the anti-terrorism exercise of the new Department of Homeland Security described below has taken place at the expense of personal privacy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Discovering and Containing Privacy Violations in Software

Malicious code can wreak havoc on our cyberinfrastructure. Hence, discovering and containing malicious code is an important goal. This paper focuses on privacy-violating malicious code. Examples of privacy violations are leaking private user data to an external entity or downloading data to a user’s host without their permission. Spyware, which has recently received considerable attention in th...

متن کامل

“ Accountability for Privacy and Fairness Violations in Data - Driven Systems with Limited Access

Automated systems are increasingly being employed to make critical decisions about our lives. Such systems utilize the power of big data to make ever so accurate predictions. The widespread use of such systems has led to concerns over societal values like user privacy and fairness. Although these systems have policies promising to protect societal values, the blackbox nature of these systems ma...

متن کامل

GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications

The Android mobile platform supports millions of users and their mobile devices across more than 190 countries around the world. This popularity coupled with user data collection by Android apps has made privacy protection a well-known challenge in the Android ecosystem. In practice, app producers provide privacy policies disclosing what information is collected and processed by the app. Howeve...

متن کامل

Analysis of XACML Policies with SMT

The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for the specification of access control policies. However, the richness and flexibility of the language (along with the verbose syntax of XML) come with a price: errors are easy to make and difficult to detect when policies grow in size. If these errors are not detected and rectified, they can resul...

متن کامل

PriGuardTool: A Web-Based Tool to Detect Privacy Violations Semantically

Online social networks contain plethora of information about its users. While users enjoy sharing information online, not all information is meant to be seen by the entire network. Managing the privacy of users has become an important aspect of such online networks. An important part of this is detecting privacy violations and notifying the users so that they can take appropriate actions. While...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003