Spotlight on the Emerging Chinese Data Protection Framework: Lessons Learned from the Unprecedented Investigation of Didi Chuxing
As China is making headlines with its ramped up efforts to build a comprehensive data protection, privacy and cybersecurity legal framework with broad extraterritorial effects, a recent landmark enforcement action of the Cyberspace Administration of China (CAC) against one of the largest tech companies in the country shines a light on how the future privacy […]
The_Privacy_Matrix
*Assistant Professor at the Daniels College of Business in the Department of BusinessEthics and Legal Studies, University of Denver.245THE PRIVACY MATRIXCorey Ciocchetti*I. INTRODUCTION………………………………246II. THE PRIVACY MATRIX………………………….249III. E-THREATS AT THE FRONT DOOR (PII COLLECTION) …….251A. Internally-Created “Front Door” E-Threats………..254B. Externally-Created “Front Door” E-Threats……….262C. U.S. Law Operating at the Front Door……………2651.Privacy Policies Must beStandardized and Multilayered……………….2672.Privacy Policies […]
Privacy_The_Lost_Right_Jon_Mills_2008
PRIVACY THE LOST RIGHT JON L. MILLS OXFORD UNIVERSITY PRESS OXFORD UNIVERSITY PRESS Oxford University Press, Inc” publishes works that further Oxford University’s objective of excellence in research, scholarship, and education. Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto […]
To Track Or Not To Track
1 To Track or “Do Not Track”: Advancing Transparency and =ndividual Control in Online Behavioral Advertising Omer Tene 1 and Jules Polonetsky 2 Table of Contents 1. Introduction ………………………….. ………………………….. ………………………….. ……………………….. 2 2. Online tracking devices ………………………….. ………………………….. ………………………….. ……….. 3 2.1. Cookies ………………………….. ………………………….. ………………………….. ………………………….. 4 2.2. Flash Cookies ………………………….. ………………………….. ………………………….. […]
Workplace Privacy and Monitoring The Quest for Balanced Interests
W ORKPLACE PRIVACY AND M ONITORING : THE Q UEST FOR BALANCED INTERESTS Ariana R. Levinson* I. Introduction We all are aware at this point that we have rapidly advancing technology. It’s advancing faster than it has in previous times, and this creates what Kat hy Stone at the UCLA Schoo l of Law has […]
Why-Johnny-Can’t-Opt-Out1
Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising Pedro G. Leon, Blase Ur, Rebecca Balebako, Lorrie Faith Cranor, Richard Shay, and Yang Wang October 31, 2011 CMU-CyLab-11-017 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral […]
Why the Federal Government Should Have a Privacy Policy Office
May 1 9, 2011 1 Why the Federal Government Should Have a Privacy Policy Office Peter Swire I. Introduction This article support s the creation of a Privacy Policy Office in the executive branch, as called for in the recent Department of Commerce green paper, ” Commercial Data Privacy and Innovation in the Internet Economy: […]
Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees
Draft June 16 , 2011 Forthcoming 114 West Virginia Law R eview * Assistant Professor, University of Louisville, Louis D. Brandeis School of Law; J.D., University of Michigan. The author extends thanks to the many scholars who helped with this piece. The author cannot overstate her appreciation for Nancy Levit ‘s review of earlier drafts. […]
The_Future_of_Privacy_Policies_ A_Privacy_Nutrition_Label_Filled
THE FUTURE OF PRIVACY POLICIES : A P RIVACY N UTRITION LABEL FILLED WITH FAIR INFORMATION P RACTICES COREY A. CIOCCHETTI ∗ T ABLE OF CONTENTS Abstract………………………………………………………………………………………………………………………………………………… 2 I. Introduction ……………………………………………………………………………………………………………………………………….. 3 II. Privacy Policies: The Basics ……………………………………………………………………………………………………………….. 5 A. Fair Information Practices ………………………………………………………………………………………………………………. 8 (1) Notice of PII Practices Via Conspicuous Posting …………………………………………………………………………. 11 (2) Visitor Choice Regarding PII Dissemination ………………………………………………………………………………. 16 (3) Visitor Access to Collected PII ………………………………………………………………………………………………….. 19 (4) Integrity of Collected, Stored and Disseminated PII ……………………………………………………………………. 20 (5) Enforcement of Penalties for Broken Privacy Commitments ……………………………………………………….. 21 III. The Future of Privacy Policies: The Concept of a Privacy Label ………………………………………………………….. 23 A. Privacy Nutrition Labels: The Basics ……………………………………………………………………………………………… 24 B. Privacy Nutrition Labels: Incorporating Key FIPs ……………………………………………………………………………. 27 (1) Notice …………………………………………………………………………………………………………………………………….. 27 (2) Choice ……………………………………………………………………………………………………………………………………. 29 (3) Access ……………………………………………………………………………………………………………………………………. 30 (4) Integrity ………………………………………………………………………………………………………………………………….. 31 (5) Enforcement ……………………………………………………………………………………………………………………………. 32 IV. Conclusion …………………………………………………………………………………………………………………………………….. 35 ∗ […]
The PII Problem Privacy and a New Concept of Personally Identifiable Information
07/08/11 PII ARTICLE FINAL FPF P LEASE DO NOT CITE OR C IRCULATE WITHOUT PERMISSION Forthcoming NYU LAW REVIEW (2011) THE PII PROBLEM: P R IVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION by Paul M. Schwartz & Daniel J. Solove 2 T HE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE […]