This article by Kush Wadhwa and Rowena Rodrigues first outlines the evaluation criteria established under the EU Privacy Impact Assessment Framework project and attempts to find the best means of extending their application to help assess PIAs, based on good practice.
This whitepaper by Chris Wolf and Winston Maxwell analyzes the “extravagant claims about U.S. access that ignore access by foreign jurisdictions.”
In this paper, Kroll offers real life examples of breach incidents involving insider threats to businesses, identifying steps companies can take to reduce their risk.
This article by Meg Leta Ambrose in the Stanford Technology Law Review
explores the idea of data permanence online and the right to be forgotten, while considering the changing nature of information over time. “Understanding how information changes over time in relation to its subject, how and where personal information resides online longer than deemed appropriate and what information is important for preservation allows regulation to be tailored to the problem, correctly framed,” Ambrose writes.
In this paper, Thomas M. Lenard and Paul H. Rubin discuss how the use of individuals‘ information for commercial purposes affects consumers, and the implications of restricting information availability in the interest of privacy. (2009)
This 2010 ENISA study provides a technical perspective on behavioural tracking. It presents a comprehensive view, answering questions such as: Why are users tracked? What techniques are used? To what extent are we tracked today? What are the trends? What are the risks? What protective measures exist? What could regulators do to help improve user privacy?
The overall objective of this ENISA study is to serve as a starting point for a pan-European view on the rules relating to the collection and storage of personal data in the European Union and on their implementation in Member States legislation.
This whitepaper from UnboundID aims to address questions and concerns about the privacy of personal information that have been raised by the emergence of the “Identity Economy.”
The Software and Information Industry Association created this white paper to explain the nature of data-driven industry, how it empowers enterprises and governments to benefit individuals and show how it is already enabling economic growth. The paper details how changes in information technology products and services and the increasing use of data are combining to foster transformative innovation that will greatly benefit how we learn, do business and live our lives, while greatly stimulating economic growth.
This paper from the World Economic Forum and The Boston Consulting Group captures key outcomes from a global dialogue hosted as part of the WEF’s Rethinking Personal Data initiative. The dialogue invited perspectives from the US, Europe, Asia and the Middle East and involved representatives of various social, commercial, governmental and technical sectors, who shared their views on the changes occurring within the personal data ecosystem and how these changes affect the collective ability to uphold core principles. It highlights areas that need to be resolved in order to achieve a sustainable balance of growth and protection.
Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen and Vincent D. Blondel of MIT study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique. In fact, in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier’s antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals.
In this article, Daniel Solove and Chris Jay Hoofnagle propose a model privacy regime to address privacy protection challenges in the United States, with a particular focus on commercial data brokers. Their proposed regime aims to build upon the existing foundation of U.S. privacy law by applying the Fair Information Practices Principles and demonstrating specific ways that they can be incorporated into current regulations.
The 2013 Data Breach Investigations Report analyzes more than 47,000 reported security incidents and 621 confirmed data breaches from 2012 and brings to bear the perspective of 19 global organizations on studying and combating data breaches in the modern world.
This paper complements two other recent ENISA publications in this area and focuses on the technical means to enforce or support the right to be forgotten in information systems; “there are technical limitations and there is a further need for clear definitions and legal clarifications.” In this paper ENISA reviews relevant existing technology and identifies the technical limitations and challenges to enforcement as well as the need for additional definitions and legal clarifications.
This article by Adam Thierer and originally published in the Harvard Journal of Law and Public Policy
focuses on privacy rights in relation to private enterprise and suggests that expanded regulation is not the most constructive way to ensure greater online privacy. The article introduces the notion that “Legislative and regulatory efforts aimed at protecting privacy must now be seen as an increasingly intractable information control problem.”
Page 3 of 8 pages < 1 2 3 4 5 > Last ›