Showing results for dover drapers curtains blinds amp amp
Big Data and Privacy Paper Collection
[…] tracking of genetic information, personal finance, and myriad other types of data. Even when monitoring is self -directed, however, these data can impact interpersonal relationships (for ex ample, by facilitating comparison and competition within one’s personal networks). 15 In many areas of life, then, individuals use data gathering and analysis tools to manage their […]
FPF IoT Comments_January 2014
1 BEFORE THE UNITED STATES FEDERAL TRADE COMMISSION WASHINGTON, DC ____________________ ____________________ ____________ ) COMMENTS OF THE FUTU RE OF PRIVACY FORUM ) ) RE: INTERNET OF THIN GS, PROJECT NO. P135405 ) ____________________ ____________________ ___________) I. Introduction On November 19, 2013, the FTC held a Workshop examining the privacy and security issues associated with […]
Wolf and Polonetsky An Updated Privacy Paradigm for the “Internet of Things” 11 19 2013
An Updated Privacy Paradigm for the “Internet of Things” By Christopher Wolf and Jules Polonetsky Co -Chairs, Future of Privacy Forum November 19, 2013 The Future of Privacy Forum is a think tank whose mission is to advance privacy for people in practical ways that allow for innovation and responsible uses of data. The FPF […]
Commissioner Brill and the Broader Privacy Call to Arms
Wednesday, in a speech at the Polytechnic Institute of New York University, FTC Commissioner Julie Brill addressed an audience of engineers and computer scientists and solicited their skills to improve consumer privacy and enhance trust. Her specific concerns have tracked some of the biggest debates I have seen during my time at the Future of […]
Gagnier – Regulating the Man Behind the Curtain
1 Regulating the Man Behind the Curtain by Christina M. Gagnier, Esq. “Pay no attention to the man behind the curtain!” – Frank L. Baum, The Wonderful Wizard of Oz Frank L. Baum’s famed novel, The Wonderful Wizard of Oz, has been noted as a political allegory for the gold standard among st other speculation […]
FRAMEWORK – Dwork & Mulligan – It's Not Privacy It's Not Fair
It’s Not Privacy, and it’s Not Fair Cynthia Dwork & Deirdre K. Mulligan Classification is the foundation of target ing and tailor ing of information and experiences to individuals. Big data promises — or threatens — to bring classification to an increasing range of human activity. While many companies foster an i llusion that classification […]
Dwork Mulligan – It's Not Privacy It's Not Fair
It’s Not Privacy, and it’s Not Fair Cynthia Dwork & Deirdre K. Mulligan Classification is the foundation of target ing and tailor ing of information and experiences to individuals. Big data promises — or threatens — to bring classification to an increasing range of human activity. While many companies foster an i llusion that classification […]
Zanfir_Forgetting About Consent
1 Forgetting about consent. Why the focus should be on “suitable safeguards” in data protection law Gabriela Zanfir 1 Working Paper May 2013 University of Craiova Faculty of Law and Administrative Sciences 1 PhD candidate, Faculty of Law and Administrative Sciences, University of Craiova, Romania, e -mail: [email protected]. This work was supported by the strategic […]
Thierer_The Pursuit of Privacy in a World Where Information Control Is Failing
[…] Technologies, F EDERAL TRADE COMMISSION , (Oct. 22, 2012), http://www.ftc.gov/ opa/2012/10/facialrecognition.shtm. 217. See J IM HARPER , THE PRIVACY TORTS : HOW U.S. STATE LAW QUIETLY LEADS THE WAY IN PRIVACY PROTECTION (2002), http://www.privacilla.org/releases/ Torts_Report.html. 218. See Harper, supra note 22, at 3. (“Real property law and the law of trespass mean that people have legal backing when they retreat into their homes, close their doors, and pull their curtains to prevent others from seeing what goes on within.”). 219. See id. (“Contract law, for example, allows consumers to enter into enforce‐ able agreements that restrict the sharing of information involved in or derived from transactions. Thanks to contract, one person may buy foot powder from another and elicit as part of the deal an enforceable promise never to tell another soul about the purchase.”) (footnote omitted). 220. P ALFREY & GASSER , supra note 87, at 79 (“The law should make it clear what it means for an actor who collects personally identifiable information to be negli‐ gent in terms of computer security. Lawyers call this area of the law torts. Com‐ 452 Harvard Journal of Law & Public Policy [Vol. 36 pared to other common law torts, it is possible that these pri‐ vacy torts will continue to evolve in response to technological change in ways that will provide more avenues of recourse to plaintiffs seeking to protect their privacy rights. State governments and state attorneys general also continue to advance their own privacy policies, and those enforcement efforts are often more stringent than federal law. 221 For exam‐ ple, in July 2012, California Attorney General Kamala D. Harris announced the creation of the Privacy Enforcement and Protec‐ […]
Thierer_A Framework for Benefit Cost Analysis in Digital Privacy Debates
[…] oft en necessary to evaluate other values or constitutional constraints implicated by gover n- ment action. In the case of privacy -related regulatory enactments, for e x- ample, free speech concerns might be raised by some regulatory pr o- posals. 221 Information technol ogy is, by definition, tied up with the production and dissemination […]