The results of this fifth annual survey by the Ponemon Institute outlines the cost of data breaches in the U.S., showing an increase in spending on breach incidents from 2008 to 2009.
Dennis Hirsch describes the recent Congressional bills and White House policy papers that propose using a collaborative, safe harbor approach to regulate commercial privacy and synthesizes the literature on collaborative governance against the backdrop of the Dutch “code of conduct” approach to privacy regulation.
This article by Andrew Chin and Anne Klinefelter infers that Facebook appears to be using differential privacy-supporting technologies in its targeted advertising system without apparent loss of utility and highlights opportunities for recognition of the differential privacy standard as a best practice or a presumption of compliance for privacy, while acknowledging certain limitations on the transferability of the Facebook example.
This paper by Daniel C. Barth-Jones of Columbia University critically examines the historic Weld re-identification and the dramatic reductions of re-identification risks for de-identified health data as they have been protected by the HIPAA Privacy Rule provisions for de-identification since 2003. The paper also provides recommendations for enhancements to existing HIPAA de-identification policy; discusses critical advances routinely made in medical science and improvement of our healthcare system using de-identified data, and provides commentary on the vital importance of properly balancing the competing goals of protecting patient privacy and preserving the accuracy of scientific research and statistical analyses conducted with de-identified data.
This article by Peter Swire and Kenesa Ahmad offers a short history of wiretaps for phone and Internet data; highlights key lessons learned from the U.S. crypto wars of the 1990s; proposes reasons why effective encryption becomes even more important when the debate shifts from one country to a globalized setting, and synthesizes the key reasons supporting effective encryption in today’s globalized world.
This article by Deirdre Mulligan and Jennifer King of the University of California, Berkeley, School of Information explores the gap between privacy and design in the context of “lateral privacy”—privacy issues arising among users of a service rather than from the service provider—on social networking sites (SNSs) and other platforms by analyzing the privacy concerns lodged against the introduction of Facebook’s News Feed in 2006.
Written by Ponnurangam (PK) Kumaraguru and Niharika Sachdeva of the research group PreCog, this study aims to better understand how Indians’ view their own privacy, particularly given advances in technology and government projects such as Unique ID. The survey involved interviews with 20 participants, four focus group discussions of 31 participants and a survey that elicited responses from 10,427 individuals.
Written by Paul Schwartz and Daniel Solove, this article explores the importance of personally identifiable information (PII) in privacy law and the challenges stemming from the lack of a uniform definition for the term. The authors outline a new approach to PII and show how existing approaches impede effective regulation of behavioral marketing.
This World Bank Institute governance working paper, written by David Banisar, explores the rights to privacy and to information and uses case studies of different government approaches to illustrate ways of balancing the two rights.
In this article Omer Tene and Jules Polonetsky address the legal issues arising from the Big Data debate. The article suggests that the FIPPs should adjustable to adapt to varying business and technological conditions and that to solve the Big Data privacy quandary, individuals must be offered meaningful rights to access their data.
This report by The Boston Consulting Group and Liberty Global introduces the concept of digital identity and explores the rapid growth of the volume of data that is available, collected and analysed thanks to ubiquitous connectivity. The study surveyed 3,000 individuals in Europe and aims to give business and political leaders a better understanding of this new phenomenon.
In this article, Omer Tene explores Google’s evolution from “a benevolent giant seeking to do no evil” into “an informational gatekeeper harboring previously unimaginable riches of personal data.” Tene writes, “Google's access to and storage of vast amounts of personal data create a serious
privacy problem,” and goes on to explore whether those privacy fears are valid, what rules should govern access to Google's database and what are the legal protections currently in place.
This essay by Daniel Solove discusses the “nothing to hide” argument. Solove introduces the argument and examines frequent ways of responding to the argument; discusses his work on conceptualizing privacy, and explains why existing theories of privacy have been unsatisfactory, have led to confusion, and have impeded the development of effective legal and policy responses to privacy problems.
This paper by Ira S. Rubinstein and Nathaniel Good offers a comprehensive analysis of engineering and usability principles specifically relevant to privacy. It derives relevant principles, illustrates them by referencing 10 recent privacy incidents involving Google and Facebook and concludes that all ten privacy incidents might have been avoided by the application of these privacy engineering and usability principles.
Written by Khaled El Emam and Ontario Information and Privacy Commissioner Ann Cavoukian, this paper aims to illustrate the importance of de-identifying personal information before it is used or disclosed and, at times, prior to its collection.
Page 5 of 8 pages ‹ First < 3 4 5 6 7 > Last ›