Written by Sharad Mehrotra and Bijit Hore of the Department of Computer Science at the University of California, Irvine, this paper promotes third-party based middleware that sits between clients and service providers and manages tasks related to enabling confidentiality of sensitive information.
Written by James E. Short of the University of California, San Diego, this report summarizes findings from a year-long study undertaken to explore the views of senior technology managers in addressing information lifecycle management.
Written by Corien Prins, this paper explores the property rights approach to protecting personal data, suggesting that while the EU system offers opportunity for that approach, data protection mechanisms must “be structured along lines of control and visibility in relation to identities, instead of ownership of individual data.”
This paper was written by Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark Hansen and Ramesh Govindan of the Center for Embedded Networked Sensing, University of California, Los Angeles. It lays out a privacy architecture in which individuals retain ownership of their data, referred to as Personal Data Vaults. Instead of individuals sharing their personal data streams directly with services, the authors propose "the use of secure containers to which only the individual has complete access."
Created by The Hunton & Williams Center for Information Policy Leadership, this paper outlines the work of the Accountability Project. It covers the essential elements of accountability, demonstrating and measuring accountability and implementing accountability in the marketplace.
Created by JurInnov, this whitepaper explores the concepts of corporate culture in terms of their effect on security initiatives. It includes sample questions for a security culture assessment that can be used to identify employee views on corporate security practices.
The Symantec Smartphone Honey Stick Project is an experiment involving 50 intentionally lost smartphones. Researchers planted corporate and personal data on the phones before "losing" them, along with the capability to remotely monitor what happened to them once they were found, in order to explore what users should expect to happen on their phones if they are lost and then found by a stranger.
Created by the PIAF consortium to the European Commission, this report reviews the privacy impact assessment (PIA) methodologies of seven countries and 10 PIA case studies.
Created by Jennifer M. Urban and Chris Jay Hoofnagle of the Berkeley Center for Law & Technology at the UC-Berkeley School of Law, this study aims to better understand Americans’ attitudes towards privacy in data generated by or stored on mobile phones and inform the public policy debate concerning the collection and use of information by private and public actors.
Created by Navigant, this report is designed to keep the legal community apprised of data breach activity, spotlight notable breaches, and identify trends and other major changes taking place in the information security arena.
Created by Betterley Risk Consultants, this survey reviews and evaluates insurance products designed to protect against data security risks for organizations.
A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit, and United States Secret Service.
By Sasha Romanosky, David A. Hoffman and Alessandro Acquisti
Written by Roger Clarke for International Data Privacy Law
The 2012 IAPP Privacy Professionals Role, Function and Salary Survey builds upon last year’s survey to provide expanded analysis of key trends as reported by respondents from multiple disciplines within the privacy field. As with previous editions, this survey highlights information and potential trends with regard to the responsibilities, department structures, reporting relationships and compensation levels of privacy professionals from across the globe.
Page 7 of 8 pages ‹ First < 5 6 7 8 >