Cookies_Constitution_and_Common-Law_2
DRAFT – PUBLISHED IN WINTER 2002 -2003 1 Cookies, The Constitution, and The Common Law: A Framework for the Right of Privacy on The Internet M ATTHEW C. KECK * That the individual shall have the full protection in person and in property is a principle as old as the common law; but it has […]
Calo_Boundaries_of_Privacy_Harm
THE BOUNDARIES OF PRIVACY HARM M. Ryan Calo * A BSTRACT This Essay describes the outer boundaries and core properties of privacy harm, an important, unique, but chronically under-t heorized injury. I argue that the vast majority of privacy harms fall into j ust two categories. The subjective category of privacy harm is the unwanted perception of observation. This category describes unwelcome men […]
Accountability as the Basis for Regulating Privacy Can Information Security Regulations Inform Privacy Policy
1 Accountability as the Basis for Regulating Privacy: Can Information Security Regulations Inform Privacy Policy? By Mary J. Culnan Slade Professor of Management and Information Technology IPM Department Bentley University [email protected] Ju ly 20, 2011 An earlier version of this paper was presented at the 2011 Privacy Law Scholars Conference, Berkeley, CA., June 2 -3, […]
Preserving_Identities_ Protecting_Personal_Identifying_Information
1 PRESERVING IDENTITIES: PROTECTING PERSONAL IDENTIFYING INFORMATION THROUGH ENHANCED PRIVACY POLICIES AND LAWS by Robert Sprague* and Corey Ciocchetti** “The common law has always recognized a man’s house as his castle . . . . Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or […]
Suarez_RFID_Hospital_Privacy
Radio Frequency Identification in Hospitals: Balancing Hospital Efficiency and Patient Privacy Christopher A. Suarez Yale Law School, USA This paper will appear in P ERSONAL DATA PRIVACY AND PROTECTION IN A SURVEILLANCE ERA : TECHNOLOGIES AND PRACTICES , edited by Christina Akrivopoulou and Athanasios Psygkas, Copyright 2010, IGI Global. Posted by permission of the publisher. […]
Jetten-Sharon-Selected-Issues-Concerning-the-Ethical-Use-of-Big-Data
Selected Issues Concerning the Ethical Use of Big Data Health Analytics I. Introduction a. Big Data Generally T he terms Big Data and Big Data analytics originally derive from the terms artificial intelligence, business intelligence , and business analytics ; terms used in the 1950s, 1990s, and 2000s, respectively . 1 Although some argue that […]
Privacy_Ethical_and_Legal_Considerations
Communication Law Review47 Privacy: Ethical and Legal Considerations 1 Raphael Cohen-Almagor, University of Haifa, Mount Carmel 2 Abstract Privacy is commonly understood as insulation from observability, a value asserted by individuals against the demands of a curious and intrusive society. It is intimately associated with our most profound values, our understanding of what it means […]
Polonetsky-Tene-final
POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15*6:51*PM**333*BEYOND’THE’COMMON’RULE:””””””””’ETHICAL’STRUCTURES’FOR’DATA’RESEARCH’IN’NON4ACADEMIC’SETTINGS’JULES*POLONETSKY,*OMER*TENE,*&*JOSEPH*JEROME**ABSTRACT*…………………………………………………………………………………………………….*333!INTRODUCTION*…………………………………………………………………………………………….*334!I.!BIG*DATA*BENEFITS—AND*RISKS*……………………………………………………………*337!II.!CONTEXTUAL*AND*NONGCONTEXTUAL*DATA*USE*…………………………………..*339!III.!WHAT*SHOULD*BE*COVERED*BY*A*CSRB*………………………………………………..*341!A.!Data&experimentation*………………………………………………………………*341!B.!Non1contextual&data&uses*………………………………………………………..*346!C.!Disparate&impact*………………………………………………………………………*349!IV.!CSRB*STRUCTURE*………………………………………………………………………………….*352!A.!Who&is&covered*…………………………………………………………………………..*352!B.!External&(FTC1approved)&or&Internal&(Organization1led)*…*353!V.!GUIDELINES*FOR*CSRB*ENGAGEMENT*…………………………………………………….*356!A.!Guiding&Substantive&Principles*……………………………………………….*356!1.!Respect*for*persons*…………………………………………………………*357!2.!Beneficence*………………………………………………………………………..*358!3.!Justice*………………………………………………………………………………….*360!4.*Respect*for*law*………………………………………………………………….*361!B.!Promoting&Independence&and&Trust*………………………………………*362!C.&Documentation&and&Accountability*……………………………………….*365!CONCLUSION*…………………………………………………………………………………………………*366!*ABSTRACT*As* scientific* knowledge* advances,* new* data* uses* continuously*emerge* in* a* wide* variety* of* contexts,* from* combating* fraud* in* the*payment* card* industry,*to*reducing* the* time* commuters*spend* on*the* road,*detecting* harmful* drug* interactions,* improving* marketing*mechanisms,* personalizing* the* delivery* of* education* in* K–12*************Jules*Polonetsky*is*CoGchair*and*Executive*Director,*Omer*Tene*Senior*Fellow,*and*Joseph* Jerome* Policy* Counsel* at* the* Future* of* Privacy* Forum.* We* would* like* to* thank*Arielle*Brown*for*excellent*assistance*with*research*and*drafting.** POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15**6:51*PM*334*COLO.&TECH.&L.J.*[Vol.*13*schools,*encouraging*exercise*and*weight*loss,*and*much*more.1*At* corporations,* notGforGprofits,* […]
FPF-Privacy-Papers-2013
Privacy Papers for Policy Makers 2013 The publication of “Privacy P apers for Policy M akers” was supported by AT&T, Microsoft, and GMAC. January 1 st, 2014 We are delighted to provide you with FPF’s fourth annual “Privacy Papers for Policy Makers,” representing cutting -edge research and analytical work on a variety of important privacy […]