Calo_Boundaries_of_Privacy_Harm
THE BOUNDARIES OF PRIVACY HARM M. Ryan Calo * A BSTRACT This Essay describes the outer boundaries and core properties of privacy harm, an important, unique, but chronically under-t heorized injury. I argue that the vast majority of privacy harms fall into j ust two categories. The subjective category of privacy harm is the unwanted perception of observation. This category describes unwelcome men […]
Accountability as the Basis for Regulating Privacy Can Information Security Regulations Inform Privacy Policy
1 Accountability as the Basis for Regulating Privacy: Can Information Security Regulations Inform Privacy Policy? By Mary J. Culnan Slade Professor of Management and Information Technology IPM Department Bentley University [email protected] Ju ly 20, 2011 An earlier version of this paper was presented at the 2011 Privacy Law Scholars Conference, Berkeley, CA., June 2 -3, […]
Preserving_Identities_ Protecting_Personal_Identifying_Information
1 PRESERVING IDENTITIES: PROTECTING PERSONAL IDENTIFYING INFORMATION THROUGH ENHANCED PRIVACY POLICIES AND LAWS by Robert Sprague* and Corey Ciocchetti** “The common law has always recognized a man’s house as his castle . . . . Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or […]
Suarez_RFID_Hospital_Privacy
Radio Frequency Identification in Hospitals: Balancing Hospital Efficiency and Patient Privacy Christopher A. Suarez Yale Law School, USA This paper will appear in P ERSONAL DATA PRIVACY AND PROTECTION IN A SURVEILLANCE ERA : TECHNOLOGIES AND PRACTICES , edited by Christina Akrivopoulou and Athanasios Psygkas, Copyright 2010, IGI Global. Posted by permission of the publisher. […]
Jetten-Sharon-Selected-Issues-Concerning-the-Ethical-Use-of-Big-Data
Selected Issues Concerning the Ethical Use of Big Data Health Analytics I. Introduction a. Big Data Generally T he terms Big Data and Big Data analytics originally derive from the terms artificial intelligence, business intelligence , and business analytics ; terms used in the 1950s, 1990s, and 2000s, respectively . 1 Although some argue that […]
Privacy_Ethical_and_Legal_Considerations
Communication Law Review47 Privacy: Ethical and Legal Considerations 1 Raphael Cohen-Almagor, University of Haifa, Mount Carmel 2 Abstract Privacy is commonly understood as insulation from observability, a value asserted by individuals against the demands of a curious and intrusive society. It is intimately associated with our most profound values, our understanding of what it means […]
FPF_Cal_PUC_Smar_ Grid_Comments
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Order Instituting Rulemaking to Consider Smart Grid Technologies Pursuant to Federal Legislation and on the Commission’s own Motion to Actively Guide Policy in California’s Development of a Smart Grid System. R.08-12-009 (Filed December 18, 2008) COMMENTS OF THE FUTURE OF PRIVACY FORUM ON THE PROPOSED […]
Polonetsky-Tene-final
POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15*6:51*PM**333*BEYOND’THE’COMMON’RULE:””””””””’ETHICAL’STRUCTURES’FOR’DATA’RESEARCH’IN’NON4ACADEMIC’SETTINGS’JULES*POLONETSKY,*OMER*TENE,*&*JOSEPH*JEROME**ABSTRACT*…………………………………………………………………………………………………….*333!INTRODUCTION*…………………………………………………………………………………………….*334!I.!BIG*DATA*BENEFITS—AND*RISKS*……………………………………………………………*337!II.!CONTEXTUAL*AND*NONGCONTEXTUAL*DATA*USE*…………………………………..*339!III.!WHAT*SHOULD*BE*COVERED*BY*A*CSRB*………………………………………………..*341!A.!Data&experimentation*………………………………………………………………*341!B.!Non1contextual&data&uses*………………………………………………………..*346!C.!Disparate&impact*………………………………………………………………………*349!IV.!CSRB*STRUCTURE*………………………………………………………………………………….*352!A.!Who&is&covered*…………………………………………………………………………..*352!B.!External&(FTC1approved)&or&Internal&(Organization1led)*…*353!V.!GUIDELINES*FOR*CSRB*ENGAGEMENT*…………………………………………………….*356!A.!Guiding&Substantive&Principles*……………………………………………….*356!1.!Respect*for*persons*…………………………………………………………*357!2.!Beneficence*………………………………………………………………………..*358!3.!Justice*………………………………………………………………………………….*360!4.*Respect*for*law*………………………………………………………………….*361!B.!Promoting&Independence&and&Trust*………………………………………*362!C.&Documentation&and&Accountability*……………………………………….*365!CONCLUSION*…………………………………………………………………………………………………*366!*ABSTRACT*As* scientific* knowledge* advances,* new* data* uses* continuously*emerge* in* a* wide* variety* of* contexts,* from* combating* fraud* in* the*payment* card* industry,*to*reducing* the* time* commuters*spend* on*the* road,*detecting* harmful* drug* interactions,* improving* marketing*mechanisms,* personalizing* the* delivery* of* education* in* K–12*************Jules*Polonetsky*is*CoGchair*and*Executive*Director,*Omer*Tene*Senior*Fellow,*and*Joseph* Jerome* Policy* Counsel* at* the* Future* of* Privacy* Forum.* We* would* like* to* thank*Arielle*Brown*for*excellent*assistance*with*research*and*drafting.** POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15**6:51*PM*334*COLO.&TECH.&L.J.*[Vol.*13*schools,*encouraging*exercise*and*weight*loss,*and*much*more.1*At* corporations,* notGforGprofits,* […]
FPF-Privacy-Papers-2013
Privacy Papers for Policy Makers 2013 The publication of “Privacy P apers for Policy M akers” was supported by AT&T, Microsoft, and GMAC. January 1 st, 2014 We are delighted to provide you with FPF’s fourth annual “Privacy Papers for Policy Makers,” representing cutting -edge research and analytical work on a variety of important privacy […]