meta data for this page

This is an old revision of the document!

Search and select three (3) documents (web pages, articles, videos, …) of the topic of your course (Data & Privacy in Critical thinking and Sustainability in Green IT course) and explain why those documents are relevant for the course.

1: Lomas, N. 8.2.2015. Today In Creepy Privacy Policies, Samsung’s Eavesdropping TV. TechCrunch. [Online] Available:

  • With techonology constantly evolving we have to consider privacy issues which come from new features. This article revolves around the new features in televisions and voice control. There are concerns whether the private information and private spoken information leaking to third parties. Samsung itself is warning users to not speak sensitive information in front of a TV with certain features turned on.

2: Wilson, M. Sep. 2015. Accepting Microsoft's Windows 10 privacy stance at face value is sheer folly. Betanews. [Online] Available:

  • In this article writer questions Microsoft's decision to not let home users to completely disable telemetry in Windows 10, while giving Enterprise customers ability to do so. Why should home users be treated differently in terms of privacy and data collection.

3: Lomas, N. 22.02.2105. Metadata retention: 'Those with nothing to hide have nothing to fear', says Australian Federal Police Assistant Commissioner Tim Morris. Digital Life, The Sydney Morning Herald. [Online] Available:

  • This article talks about using metadata for counter-terrorism and how people with nothing to hide have nothing to fear. Yet this means privacy is highly at risk here.

UQx: META101x Philosophy and Critical Thinking

Screenshot comes here:

Day 1: Nothing to hide slides:


Day 2: Liars and Outliers slides:

Find out information gathered of you in one physical and one digital service. What is collected, how it is used, who is using that etc. Deadline 2nd discussions.

Physical service: K-Plussa bonus card

  • What data is possessed:
    • Basic information about card owner: customer number, customer type, date of relationship start, surname, first names, home address, phone number, email address, date of birth / personal id, gender, language
    • Card information: card number, period of validity, date of card application, card type, card numbers of expired or lost cards
  • What is gathered:
    • Information related to card use: purchases made involving use of card, product groups, place of purchase, receipt number, means of payment, date and time of purchase, discounts granted
    • K-Plussa system information: number of points accumulated by customer each month, number of vouchers and their serial numbers sent to customer, dates and places of voucher use, requests for voucher values to be transferred to bank account
    • Information related to customer relationship: recordings of customer service calls and information on marketing and customer service activities
    • Record of clubs related to K-Plussa: Napero-kerho (includes dates of birth of members children), Musta Pörssi, identification details for users who register on K-Pluss website, information regarding means of payment connected to card holders, K-Plussa points donation to charity policy, records based on statistical classifications related to the customer relatonship, whether person has become K-Plussa developer, any sponsorship targets selected for the household
  • How is information used:
    • For managing customer relationships under K-Plussa program
    • Contacting customers
    • Marketing
  • Who is using information:
    • Data on card holders purchasing patterns (group and product level) is used by companies belonging to the K-Plussa programme for direct marketing purposes (unless card holder has prevented this)
    • Card holder information may be used to update customer data files of companies belonging to K-Plussa system (if customer has given consent to this)

Digital service: Twitter

  • What data is possessed:
    • Unordered List Item
  • What is gathered:
    • Unordered List Item
  • How is information used:
    • Unordered List Item
  • Who is using information:
    • Unordered List Item