Privacy Research    IT/Data Brokerage

A Middleware Approach for Managing Privacy of Outsourced Personal Data

Written by Sharad Mehrotra and Bijit Hore of the Department of Computer Science at the University of California, Irvine, this paper promotes third-party based middleware that sits between clients and service providers and manages tasks related to enabling confidentiality of sensitive information.

Information Lifecycle Management Concepts, Practices and Value

Written by James E. Short of the University of California, San Diego, this report summarizes findings from a year-long study undertaken to explore the views of senior technology managers in addressing information lifecycle management.

When personal data, behavior and virtual identities become a commodity

Written by Corien Prins, this paper explores the property rights approach to protecting personal data, suggesting that while the EU system offers opportunity for that approach, data protection mechanisms must “be structured along lines of control and visibility in relation to identities, instead of ownership of individual data.”

Personal Data Vaults: A Locus of Control for Personal Data Streams

This paper was written by Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark Hansen and Ramesh Govindan of the Center for Embedded Networked Sensing, University of California, Los Angeles. It lays out a privacy architecture in which individuals retain ownership of their data, referred to as Personal Data Vaults. Instead of individuals sharing their personal data streams directly with services, the authors propose "the use of secure containers to which only the individual has complete access."

Accountability: A Compendium for Stakeholders

Created by The Hunton & Williams Center for Information Policy Leadership, this paper outlines the work of the Accountability Project. It covers the essential elements of accountability, demonstrating and measuring accountability and implementing accountability in the marketplace.

Developing a Security Oriented Corporate Culture

Created by JurInnov, this whitepaper explores the concepts of corporate culture in terms of their effect on security initiatives. It includes sample questions for a security culture assessment that can be used to identify employee views on corporate security practices.

The Symantec Smartphone Honey Stick Project

The Symantec Smartphone Honey Stick Project is an experiment involving 50 intentionally lost smartphones. Researchers planted corporate and personal data on the phones before "losing" them, along with the capability to remotely monitor what happened to them once they were found, in order to explore what users should expect to happen on their phones if they are lost and then found by a stranger.

A Privacy Impact Assessment Framework for data protection and privacy rights

Created by the PIAF consortium to the European Commission, this report reviews the privacy impact assessment (PIA) methodologies of seven countries and 10 PIA case studies.

Mobile Phones and Privacy

Created by Jennifer M. Urban and Chris Jay Hoofnagle of the Berkeley Center for Law & Technology at the UC-Berkeley School of Law, this study aims to better understand Americans’ attitudes towards privacy in data generated by or stored on mobile phones and inform the public policy debate concerning the collection and use of information by private and public actors.

Information Security & Data Breach Report—June 2012 Update

Created by Navigant, this report is designed to keep the legal community apprised of data breach activity, spotlight notable breaches, and identify trends and other major changes taking place in the information security arena.

Cyber/Privacy Insurance Market Survey –2012

Created by Betterley Risk Consultants, this survey reviews and evaluates insurance products designed to protect against data security risks for organizations.

2012 Data Breach Investigations Report

A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit, and United States Secret Service.

Empirical Analysis of Data Breach Litigation

By Sasha Romanosky, David A. Hoffman and Alessandro Acquisti

An Evaluation of Privacy Impact Assessment Guidance Documents

Written by Roger Clarke for International Data Privacy Law

2012 IAPP Privacy Professionals Role, Function and Salary Survey

The 2012 IAPP Privacy Professionals Role, Function and Salary Survey builds upon last year’s survey to provide expanded analysis of key trends as reported by respondents from multiple disciplines within the privacy field. As with previous editions, this survey highlights information and potential trends with regard to the responsibilities, department structures, reporting relationships and compensation levels of privacy professionals from across the globe.

Page 7 of 8 pages ‹ First  < 5 6 7 8 >