The Complexity Underlying JetBlue’s Privacy Policy Violations
نویسندگان
چکیده
This report examines the actions of JetBlue Airways Corporation (JetBlue), which violated its privacy policy when it gave the travel records of five million customers to Torch Concepts, a private Department of Defense contractor. JetBlue’s actions have prompted at least two lawsuits, including a claim by the Electronic Privacy Information Center with the Federal Trade Commission that JetBlue engaged in deceptive trade practices when it violated its privacy policy. Our analysis reveals that JetBlue’s privacy policy contains ambiguities, which may pose additional significant threats to customer privacy. The complexity of our actor/information flow model elucidates the importance of organizations establishing clear contractual relationships that specify permissions, obligations and responsibilities for all parties. An implication of this study is that the anti-terrorism exercise of the new Department of Homeland Security described below has taken place at the expense of personal privacy.
منابع مشابه
Towards Discovering and Containing Privacy Violations in Software
Malicious code can wreak havoc on our cyberinfrastructure. Hence, discovering and containing malicious code is an important goal. This paper focuses on privacy-violating malicious code. Examples of privacy violations are leaking private user data to an external entity or downloading data to a user’s host without their permission. Spyware, which has recently received considerable attention in th...
متن کامل“ Accountability for Privacy and Fairness Violations in Data - Driven Systems with Limited Access
Automated systems are increasingly being employed to make critical decisions about our lives. Such systems utilize the power of big data to make ever so accurate predictions. The widespread use of such systems has led to concerns over societal values like user privacy and fairness. Although these systems have policies promising to protect societal values, the blackbox nature of these systems ma...
متن کاملGUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
The Android mobile platform supports millions of users and their mobile devices across more than 190 countries around the world. This popularity coupled with user data collection by Android apps has made privacy protection a well-known challenge in the Android ecosystem. In practice, app producers provide privacy policies disclosing what information is collected and processed by the app. Howeve...
متن کاملAnalysis of XACML Policies with SMT
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for the specification of access control policies. However, the richness and flexibility of the language (along with the verbose syntax of XML) come with a price: errors are easy to make and difficult to detect when policies grow in size. If these errors are not detected and rectified, they can resul...
متن کاملPriGuardTool: A Web-Based Tool to Detect Privacy Violations Semantically
Online social networks contain plethora of information about its users. While users enjoy sharing information online, not all information is meant to be seen by the entire network. Managing the privacy of users has become an important aspect of such online networks. An important part of this is detecting privacy violations and notifying the users so that they can take appropriate actions. While...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003