MediaPost Publications The Further Adventures Of Opt-In Man

Excellent review by Behavioral Insider’s Steve Smith of how networks are beginning to provide users access to profiles and a roadmap to make this more useful for users.  The eXelate widgetised version of a profile viewer that publishers or advertisers could provide at their own sites seems to make sense — if there was a way to scale this indeed.

MediaPost Publications The Further Adventures Of Opt-In Man 05/08/2009.

Homeland Security

The Department of Homeland Security is seeking applications for appointments to the agency’s Data Privacy and Integrity Advisory Committee. The committee provides advice at the request of the Secretary of DHS and the agency’s Chief Privacy Officer on privacy related matters. The agency is seeking to fill two terms that would expire in January 2012, and January 2013. Applications for the positions must be received by the agency on or before June 8, 2009.

FR Doc E9-10318.

Harvard Engineering

Looks like a fabulous talk today at Harvard to be presented by our Advisory Board member Professor Annie Anton. Harvard CRCS » 2009 » March.  Hope someone will be live blogging/twittering!

CRCS Privacy and Security Lunch Seminar

Date: Wednesday, May 6, 2009

Time: 12:00pm-1:30 pm

Place: Maxwell Dworkin 119

Speaker: Annie Anton

Title: Designing Software Systems that Comply with Privacy Laws

Abstract: Properly protecting information is in all our best interests, but it is a complex undertaking. The fact that regulation is often written by non-technologists, introduces additional challenges and obstacles. Moreover, those who design systems that collect, store, and maintain sensitive information have an obligation to design systems holistically within this broader context of regulatory and legal compliance.

There are questions that should be asked when developing new requirements for information systems. For example ….. How do we build systems to handle data that must be kept secure and private when relevant regulations tie your hands? When building a system that maintains health or financial records for a large number of people, what do we need to do to protect the information against theft and abuse, keep the information private, AND at the same time, satisfy all governing privacy laws and restrictions? Moreover, how do we know that we’ve satisfied those laws? How do we monitor for compliance while ensuring that we’re monitoring the right things? And, how do you accomplish all this in a way that can be expressed clearly to end-users and legislators (or auditors) so they can be confident you are doing the right things?

We’ve been working on technologies to make these tasks simpler, and in some senses, automatic. In this talk, I will describe some of the research that we have been conducting to address these problems. I will also discuss the results of a survey involving 975 Internet users in which we compared various ways to represent privacy management information to online healthcare consumers. The results of this work and our other studies pose interesting ethical questions for industry and society at large, and help illustrate the complexity of the problems.

Opt-Out Cookie Best Practices

Some very thoughtful guidance on opt-out cookie practices just released by our friend at privacy choice.  Check them out!

More on Scalia

Scalia: Free Speech Trumps Privacy Online
by Wendy Davishttp://web.archive.org/web/20090508122947/http://www.mediapost.com:80/publications/?fa=Articles.printFriendly&art_aid=105258
Some lawmakers are talking about enacting new online privacy laws, but at least one U.S. Supreme Court Judge has indicated that such laws might not be constitutional.Earlier this year, conservative judge Antonin Scalia said new privacy laws would conflict with the First Amendment. The remarks, made at an event held by the Institute of American and Talmudic Law, were in response to comments made by Jules Polonetsky, co-chair and director of the think tank Future of Privacy Forum.Polonetsky outlined the various ways that data is collected across different Web platforms and proposed that people need some assurances that the information won’t be used against them. Scalia responded that the First Amendment would prevent much of the privacy protection that Polonetsky seemed to favor.

In a follow-up question, Polonetsky asked Scalia what he thought about a federal law banning video rental stores from disclosing the names of movies customers borrow. That law has particular resonance for Supreme Court judges because it was passed after a newspaper obtained and printed video rental records of nominee Robert Bork. Scalia then softened his position somewhat, to concede that “sensitive” information might warrant privacy protection…more at http://web.archive.org/web/20090508122947/http://www.mediapost.com:80/publications/?fa=Articles.printFriendly&art_aid=105258

IAPP Audio Conference – Identity, Identifiers and Personal Data

IAPP Audio Conference – Identity, Identifiers and Personal Data

Date: May 7, 2009

Time: 1 – 2:30 p.m. EDT

Two of the most important concepts of data protection law and its application are identifiable data and (in many jurisdictions) the relationship of this data to an identifiable person. For privacy laws to apply effectively this relationship must be clear. Yet, what is less clear is the critical dividing line between personal data and de-identified data. Join us to explore both established and emerging definitions of “PII” and “personal data” within the framework of existing technical capabilities, case law and regulatory views.

Speakers:

David Hoffman, CIPP, Director of Security Policy and Global Privacy Officer, Intel Corporation

Renzo Marchini, Counsel, Dechert LLP

Jules Polonetsky, CIPP, Co-Chairman and Director, Future of Privacy Forum

Price:

IAPP Members: $159

Nonmembers: $179