This paper by Girard Kelly of Santa Clara University School of Law examines the European Commission’s recently proposed data protection reform of the 1995 EU Data Protection Regulation and the U.S Consumer Privacy Bill of Rights. The paper will elucidate the data protection framework expressed in the Regulation’s principles, within the context of their implications on the proposed policies of the U.S Consumer Privacy Bill of Rights. This analysis will explore the public policy and regulatory frameworks of both data protection perspectives and recommend legal harmonization between the U.S and the EU’s data protection principles by providing legislative guidance to policymakers.
This web page shows data breach incidents by incident type and sector for the year beginning April 1 to track trends.The UK Information Commissioner’s Office will update the data quarterly.
This report presents findings from a technical analysis conducted by the Technology Analysis Branch of the Office of the Privacy Commissioner of Canada examining the privacy implications of subscriber information elements which are not found in a phone book: e-mail address, mobile phone number and Internet Protocol (or IP) address.
In this paper, Kroll outlines the top four cybersecurity concerns organizations that may blindside organizations in 2013.
This article by Kush Wadhwa and Rowena Rodrigues first outlines the evaluation criteria established under the EU Privacy Impact Assessment Framework project and attempts to find the best means of extending their application to help assess PIAs, based on good practice.
In this paper, Kroll offers real life examples of breach incidents involving insider threats to businesses, identifying steps companies can take to reduce their risk.
This article by Meg Leta Ambrose in the Stanford Technology Law Review
explores the idea of data permanence online and the right to be forgotten, while considering the changing nature of information over time. “Understanding how information changes over time in relation to its subject, how and where personal information resides online longer than deemed appropriate and what information is important for preservation allows regulation to be tailored to the problem, correctly framed,” Ambrose writes.
In this paper, Thomas M. Lenard and Paul H. Rubin discuss how the use of individuals‘ information for commercial purposes affects consumers, and the implications of restricting information availability in the interest of privacy. (2009)
The Commonwealth of Australia produced this issues paper in 2013 to provide an opportunity to consider the range of opportunities presented to agencies in relation to the use of Big Data and the emerging tools that allow us to better appreciate what it tells us, in the context of the potential concerns that this might raise.
This 2010 ENISA study provides a technical perspective on behavioural tracking. It presents a comprehensive view, answering questions such as: Why are users tracked? What techniques are used? To what extent are we tracked today? What are the trends? What are the risks? What protective measures exist? What could regulators do to help improve user privacy?
The overall objective of this ENISA study is to serve as a starting point for a pan-European view on the rules relating to the collection and storage of personal data in the European Union and on their implementation in Member States legislation.
This whitepaper from UnboundID aims to address questions and concerns about the privacy of personal information that have been raised by the emergence of the “Identity Economy.”
The Software and Information Industry Association created this white paper to explain the nature of data-driven industry, how it empowers enterprises and governments to benefit individuals and show how it is already enabling economic growth. The paper details how changes in information technology products and services and the increasing use of data are combining to foster transformative innovation that will greatly benefit how we learn, do business and live our lives, while greatly stimulating economic growth.
The U.S. government is proposing to expand wiretap design laws broadly to Internet services, including voice over Internet protocol (VoIP) services and other peer-to-peer tools that allow communications in real-time directly between individuals. This report explains how mandating wiretap capabilities in endpoints poses serious security risks. Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences for the economic well-being and national security of the United States.
This paper from the World Economic Forum and The Boston Consulting Group captures key outcomes from a global dialogue hosted as part of the WEF’s Rethinking Personal Data initiative. The dialogue invited perspectives from the US, Europe, Asia and the Middle East and involved representatives of various social, commercial, governmental and technical sectors, who shared their views on the changes occurring within the personal data ecosystem and how these changes affect the collective ability to uphold core principles. It highlights areas that need to be resolved in order to achieve a sustainable balance of growth and protection.
Page 3 of 8 pages < 1 2 3 4 5 > Last ›