Privacy and Identity Management in Europe for Life presents an analysis of the ways in which individuals use two types of web 2.0 environments; collaborative workspaces and social network sites, to construct and express identities, manage relationships and cooperate in the creation and dissemination of content. The group looks into privacy issues that may arise in relation to these activities and provide possible solutions; presenting three demonstrators built to contribute to solving some of the issues with regard to privacy and identity management in collaborative workspaces and social networking sites.
This report from The Privacy Projects presents a comparative study of how the OECD guidelines have influenced the development of laws, regulations and public policy in five representative OECD member states—Australia, Canada, Japan, Spain and the United States.
Michelle Madejski, Maritza Johnson and Steven M. Bellovin of Columbia University present the results of a study measuring the sharing intentions of social networking users to identify potential violations in users’ privacy settings. The results revealed a mismatch between intentions and reality, indicating that users are unable to correctly manage their privacy settings.
Drawing from multiple disciplines, Woodrow Hartzog of the Cumberland School of Law at Samford University and Frederic Stutzman of the H. John Heinz III College at Carnegie Mellon University have developed a focused, clear and workable definition of online obscurity: Information is obscure online if it exists in a context missing one or more key factors that are essential to discovery or comprehension. We have identified four of these factors: Search visibility, unprotected access, identification and clarity. This framework could be applied as an analytical tool or as part of an obligation.
Created by Nicholas Cramer of AllClear ID, this whitepaper takes a close look at key considerations involved in responding to data breaches of all sizes to help privacy, risk, legal and compliance professionals understand some of the nuances involved in a data breach response.
In this summary, we will discuss Do Not Track, what it is trying to solve, what it does, who is involved and where regulators, browsers and advertising initiatives stand.
The results of this fifth annual survey by the Ponemon Institute outlines the cost of data breaches in the U.S., showing an increase in spending on breach incidents from 2008 to 2009.
Dennis Hirsch describes the recent Congressional bills and White House policy papers that propose using a collaborative, safe harbor approach to regulate commercial privacy and synthesizes the literature on collaborative governance against the backdrop of the Dutch “code of conduct” approach to privacy regulation.
This article by Andrew Chin and Anne Klinefelter infers that Facebook appears to be using differential privacy-supporting technologies in its targeted advertising system without apparent loss of utility and highlights opportunities for recognition of the differential privacy standard as a best practice or a presumption of compliance for privacy, while acknowledging certain limitations on the transferability of the Facebook example.
This paper by Daniel C. Barth-Jones of Columbia University critically examines the historic Weld re-identification and the dramatic reductions of re-identification risks for de-identified health data as they have been protected by the HIPAA Privacy Rule provisions for de-identification since 2003. The paper also provides recommendations for enhancements to existing HIPAA de-identification policy; discusses critical advances routinely made in medical science and improvement of our healthcare system using de-identified data, and provides commentary on the vital importance of properly balancing the competing goals of protecting patient privacy and preserving the accuracy of scientific research and statistical analyses conducted with de-identified data.
This article by Peter Swire and Kenesa Ahmad offers a short history of wiretaps for phone and Internet data; highlights key lessons learned from the U.S. crypto wars of the 1990s; proposes reasons why effective encryption becomes even more important when the debate shifts from one country to a globalized setting, and synthesizes the key reasons supporting effective encryption in today’s globalized world.
This article by Deirdre Mulligan and Jennifer King of the University of California, Berkeley, School of Information explores the gap between privacy and design in the context of “lateral privacy”—privacy issues arising among users of a service rather than from the service provider—on social networking sites (SNSs) and other platforms by analyzing the privacy concerns lodged against the introduction of Facebook’s News Feed in 2006.
Written by Ponnurangam (PK) Kumaraguru and Niharika Sachdeva of the research group PreCog, this study aims to better understand how Indians’ view their own privacy, particularly given advances in technology and government projects such as Unique ID. The survey involved interviews with 20 participants, four focus group discussions of 31 participants and a survey that elicited responses from 10,427 individuals.
Written by Paul Schwartz and Daniel Solove, this article explores the importance of personally identifiable information (PII) in privacy law and the challenges stemming from the lack of a uniform definition for the term. The authors outline a new approach to PII and show how existing approaches impede effective regulation of behavioral marketing.
This World Bank Institute governance working paper, written by David Banisar, explores the rights to privacy and to information and uses case studies of different government approaches to illustrate ways of balancing the two rights.
Page 5 of 8 pages ‹ First < 3 4 5 6 7 > Last ›