Privacy Research    Human Resources

Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents

This paper by Ira S. Rubinstein and Nathaniel Good offers a comprehensive analysis of engineering and usability principles specifically relevant to privacy. It derives relevant principles, illustrates them by referencing 10 recent privacy incidents involving Google and Facebook and concludes that all ten privacy incidents might have been avoided by the application of these privacy engineering and usability principles.

Everyone’s nightmare: Privacy and data breach risks

This Edwards Wildman whitepaper discusses the growing body of law that governs data security and breach response, the types of exposure and liabilities these present and the lines of insurance potentially affected. The whitepaper also discusses privacy issues arising out of new technologies, the increasing use of social media and the growth of regulatory scrutiny of companies’ collection and usage of information about individuals.

Rethinking Personal Data

Created by Vodaphone, this white paper explores the balance between sustaining end-user trust through new trust frameworks and enabling governments and industry to create new economic and social value from personal data.

How Boards & Senior Executives Are Managing Cyber Risks

This is the third biennial survey that Carnegie Mellon CyLab has conducted on how boards of directors and senior management are governing the security of their organizations' information, applications and networks. The survey is based upon results received from 108 respondents at the board or senior executive level from Forbes Global 2000 companies.

Rethinking Personal Data: Strengthening Trust

As part of its Rethinking Personal Data initiative, the World Economic Forum created this report in collaboration with the Boston Consulting Group. The report proposes questions and recommends steps for stakeholders in efforts to restore trust in organizations' and governments' ability to secure data.

Risk and Responsibility in a Hyperconnected World: Pathways to Global Cyber Resilience

As part of its Rethinking Personal Data initiative, the World Economic Forum created this report in collaboration with Deloitte, to examine some of the key threats posed by hyperconnectivity and what should be done about them. The report provides a multistakeholder perspective on ways to deal with increasing cyber attacks and to improve corporate governance.

Big Data: The next frontier for innovation, competition and productivity

This study by MGI and McKinsey's Business Technology Office explores Big Data within U.S. healthcare, the European public sector, U.S. retail and manufacturing and personal-location data globally seeking to understand the state of digital data, how different domains can use large datasets to create value, the potential value across stakeholders and the implications for the leaders of private- and public-sector organizations, as well as for policy makers.

A Middleware Approach for Managing Privacy of Outsourced Personal Data

Written by Sharad Mehrotra and Bijit Hore of the Department of Computer Science at the University of California, Irvine, this paper promotes third-party based middleware that sits between clients and service providers and manages tasks related to enabling confidentiality of sensitive information.

Information Lifecycle Management Concepts, Practices and Value

Written by James E. Short of the University of California, San Diego, this report summarizes findings from a year-long study undertaken to explore the views of senior technology managers in addressing information lifecycle management.

Accountability: A Compendium for Stakeholders

Created by The Hunton & Williams Center for Information Policy Leadership, this paper outlines the work of the Accountability Project. It covers the essential elements of accountability, demonstrating and measuring accountability and implementing accountability in the marketplace.

Developing a Security Oriented Corporate Culture

Created by JurInnov, this whitepaper explores the concepts of corporate culture in terms of their effect on security initiatives. It includes sample questions for a security culture assessment that can be used to identify employee views on corporate security practices.

A Privacy Impact Assessment Framework for data protection and privacy rights

Created by the PIAF consortium to the European Commission, this report reviews the privacy impact assessment (PIA) methodologies of seven countries and 10 PIA case studies.

Information Security & Data Breach Report—June 2012 Update

Created by Navigant, this report is designed to keep the legal community apprised of data breach activity, spotlight notable breaches, and identify trends and other major changes taking place in the information security arena.

2012 Data Breach Investigations Report

A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit, and United States Secret Service.

Exploring the Meaning of “Real Risk of Significant Harm”

This report by Heenan Blakie compiles the results of the AccessPrivacy CPO Forum Workshops held on September 27 and October 12, 2011, Exploring the Meaning of the “Real Risk of Significant Harm” breach notification threshold under the Personal Information Protection Act (Alberta).

Page 5 of 6 pages ‹ First  < 3 4 5 6 >