Toward Accountability in the Cloud
View from the Cloud Editor: George Pallis • [email protected] 2 Published by the IEEE Computer Society 1089-7801/11/$26.0 0 © 2011 IEEE IEEE INTERNET COMPUTING T he US National Institute of Standards and Technology defines cloud computing as “a model for enabling convenient, on-demand net work access to a shared pool of configurable computing resources (for […]
Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees
Draft June 16 , 2011 Forthcoming 114 West Virginia Law R eview * Assistant Professor, University of Louisville, Louis D. Brandeis School of Law; J.D., University of Michigan. The author extends thanks to the many scholars who helped with this piece. The author cannot overstate her appreciation for Nancy Levit ‘s review of earlier drafts. […]
Token Attempt The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens
Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens Pedro Giovanni Leon, Lorrie Faith Cranor, Aleecia M. McDonald, Robert McGuire September 10, 2010 CMU-CyLab-10-014 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens Pedro […]
The_Future_of_Privacy_Policies_ A_Privacy_Nutrition_Label_Filled
THE FUTURE OF PRIVACY POLICIES : A P RIVACY N UTRITION LABEL FILLED WITH FAIR INFORMATION P RACTICES COREY A. CIOCCHETTI ∗ T ABLE OF CONTENTS Abstract………………………………………………………………………………………………………………………………………………… 2 I. Introduction ……………………………………………………………………………………………………………………………………….. 3 II. Privacy Policies: The Basics ……………………………………………………………………………………………………………….. 5 A. Fair Information Practices ………………………………………………………………………………………………………………. 8 (1) Notice of PII Practices Via Conspicuous Posting …………………………………………………………………………. 11 (2) Visitor Choice Regarding PII Dissemination ………………………………………………………………………………. 16 (3) Visitor Access to Collected PII ………………………………………………………………………………………………….. 19 (4) Integrity of Collected, Stored and Disseminated PII ……………………………………………………………………. 20 (5) Enforcement of Penalties for Broken Privacy Commitments ……………………………………………………….. 21 III. The Future of Privacy Policies: The Concept of a Privacy Label ………………………………………………………….. 23 A. Privacy Nutrition Labels: The Basics ……………………………………………………………………………………………… 24 B. Privacy Nutrition Labels: Incorporating Key FIPs ……………………………………………………………………………. 27 (1) Notice …………………………………………………………………………………………………………………………………….. 27 (2) Choice ……………………………………………………………………………………………………………………………………. 29 (3) Access ……………………………………………………………………………………………………………………………………. 30 (4) Integrity ………………………………………………………………………………………………………………………………….. 31 (5) Enforcement ……………………………………………………………………………………………………………………………. 32 IV. Conclusion …………………………………………………………………………………………………………………………………….. 35 ∗ […]
The PII Problem Privacy and a New Concept of Personally Identifiable Information
07/08/11 PII ARTICLE FINAL FPF P LEASE DO NOT CITE OR C IRCULATE WITHOUT PERMISSION Forthcoming NYU LAW REVIEW (2011) THE PII PROBLEM: P R IVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION by Paul M. Schwartz & Daniel J. Solove 2 T HE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE […]
The Limits of Torts Privacy
Electronic copy available at: http://ssrn.com/abstract=1862264 L EGAL S TUDIES R ESEARCH P APER S ERIES PAPER N O. 1 1-0 6-0 6 June 2011 T HE L IMITS OF T ORT PRIVACY by Neil M. Richards Professor of Law Electronic copy available at: http://ssrn.com/abstract=1862264Electronic copy available at: http://ssrn.com/abstract=1862264 DO NOT DELETE 6/20/2011 3:35 PM 357 […]
The Failure of Online Social Network Privacy Settings
The Failure of Online Social Network Privacy Settings Michelle Madejski y [email protected] Maritza Johnson maritza [email protected] Steven M. Bellovin [email protected] CUCS-010-11 Abstract Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously dicult to […]
The Future of the Constitution
The Future Of the Constitution Paul Edmondson – People boarding DC metro commuter train in terminal . Use Restrictions and the Future of Surveillance Law Orin S. Kerr April 19, 2011 Use Restric tions and the Future of Surveillance Law 1 Orin S. Kerr is a professor of law at the George Washington University Law […]
Sticky Policies An Approach for Privacy Management across Multiple Parties
Sticky Policies: An Approach for Privacy Management across Multiple Parties Authors: Siani Pearson and Marco Casassa Mont Cloud and Security Research Lab, Long Down Avenue, Stoke Gifford, Bristol. BS34 8QZ. Phone: +44 117 3128438/ 3128794 FAX: +44 1173129250 Email: [email protected] ; marco.casassa- [email protected] Abstract Organisations often have good privacy procedures in place for protection of […]
The Case for Online Obscurity
T HE C ASE FOR O NLINE O BSCURITY Woodrow Hartzog * and Fred eric Stutzman ** ABSTRACT: On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demonstrates that I nternet users rely on obscurity perhaps more than anything else to protect their privacy . […]