Accountability as the Basis for Regulating Privacy Can Information Security Regulations Inform Privacy Policy
1 Accountability as the Basis for Regulating Privacy: Can Information Security Regulations Inform Privacy Policy? By Mary J. Culnan Slade Professor of Management and Information Technology IPM Department Bentley University [email protected] Ju ly 20, 2011 An earlier version of this paper was presented at the 2011 Privacy Law Scholars Conference, Berkeley, CA., June 2 -3, […]
Preserving_Identities_ Protecting_Personal_Identifying_Information
1 PRESERVING IDENTITIES: PROTECTING PERSONAL IDENTIFYING INFORMATION THROUGH ENHANCED PRIVACY POLICIES AND LAWS by Robert Sprague* and Corey Ciocchetti** “The common law has always recognized a man’s house as his castle . . . . Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or […]
Jetten-Sharon-Selected-Issues-Concerning-the-Ethical-Use-of-Big-Data
Selected Issues Concerning the Ethical Use of Big Data Health Analytics I. Introduction a. Big Data Generally T he terms Big Data and Big Data analytics originally derive from the terms artificial intelligence, business intelligence , and business analytics ; terms used in the 1950s, 1990s, and 2000s, respectively . 1 Although some argue that […]
Harbour_&_ Koslov_ALJ 76-3_ANT314
SECTION 2 IN A WEB 2.0 WORLD: AN EXPANDED VISION OF RELEVANT PRODUCT MARKETS PAMELA JONES H ARBOUR TARA ISA K OSLOV * Section 2 enforcement by the U.S. antitrust authorities is back—at least, that is what the antitrust enforcers themselves have been saying. 1 An examination of Section 2 enforcement principles could not be […]
Privacy_Ethical_and_Legal_Considerations
Communication Law Review47 Privacy: Ethical and Legal Considerations 1 Raphael Cohen-Almagor, University of Haifa, Mount Carmel 2 Abstract Privacy is commonly understood as insulation from observability, a value asserted by individuals against the demands of a curious and intrusive society. It is intimately associated with our most profound values, our understanding of what it means […]
Polonetsky-Tene-final
POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15*6:51*PM**333*BEYOND’THE’COMMON’RULE:””””””””’ETHICAL’STRUCTURES’FOR’DATA’RESEARCH’IN’NON4ACADEMIC’SETTINGS’JULES*POLONETSKY,*OMER*TENE,*&*JOSEPH*JEROME**ABSTRACT*…………………………………………………………………………………………………….*333!INTRODUCTION*…………………………………………………………………………………………….*334!I.!BIG*DATA*BENEFITS—AND*RISKS*……………………………………………………………*337!II.!CONTEXTUAL*AND*NONGCONTEXTUAL*DATA*USE*…………………………………..*339!III.!WHAT*SHOULD*BE*COVERED*BY*A*CSRB*………………………………………………..*341!A.!Data&experimentation*………………………………………………………………*341!B.!Non1contextual&data&uses*………………………………………………………..*346!C.!Disparate&impact*………………………………………………………………………*349!IV.!CSRB*STRUCTURE*………………………………………………………………………………….*352!A.!Who&is&covered*…………………………………………………………………………..*352!B.!External&(FTC1approved)&or&Internal&(Organization1led)*…*353!V.!GUIDELINES*FOR*CSRB*ENGAGEMENT*…………………………………………………….*356!A.!Guiding&Substantive&Principles*……………………………………………….*356!1.!Respect*for*persons*…………………………………………………………*357!2.!Beneficence*………………………………………………………………………..*358!3.!Justice*………………………………………………………………………………….*360!4.*Respect*for*law*………………………………………………………………….*361!B.!Promoting&Independence&and&Trust*………………………………………*362!C.&Documentation&and&Accountability*……………………………………….*365!CONCLUSION*…………………………………………………………………………………………………*366!*ABSTRACT*As* scientific* knowledge* advances,* new* data* uses* continuously*emerge* in* a* wide* variety* of* contexts,* from* combating* fraud* in* the*payment* card* industry,*to*reducing* the* time* commuters*spend* on*the* road,*detecting* harmful* drug* interactions,* improving* marketing*mechanisms,* personalizing* the* delivery* of* education* in* K–12*************Jules*Polonetsky*is*CoGchair*and*Executive*Director,*Omer*Tene*Senior*Fellow,*and*Joseph* Jerome* Policy* Counsel* at* the* Future* of* Privacy* Forum.* We* would* like* to* thank*Arielle*Brown*for*excellent*assistance*with*research*and*drafting.** POLONETSKY*&*TENE*FINAL.DOCX*(DO*NOT*DELETE)*6/4/15**6:51*PM*334*COLO.&TECH.&L.J.*[Vol.*13*schools,*encouraging*exercise*and*weight*loss,*and*much*more.1*At* corporations,* notGforGprofits,* […]
FPF-Privacy-Papers-2013
Privacy Papers for Policy Makers 2013 The publication of “Privacy P apers for Policy M akers” was supported by AT&T, Microsoft, and GMAC. January 1 st, 2014 We are delighted to provide you with FPF’s fourth annual “Privacy Papers for Policy Makers,” representing cutting -edge research and analytical work on a variety of important privacy […]
Dutch-Treat-Collaborative-Dutch-Privacy-Regulation
Dutch Treat? Collaborative Dutch Privacy Regulation and the Lessons it Holds for U.S. Privacy LawDennis D. HirschGeraldine W. Howell Professor of LawCapital University Law [email protected] (614) 236-6685July 19, 2012Paper Submitted for the Future of Privacy ForumPrivacy Papers for Policy Makers Initiative 2012Do not use, cite or circulate this manuscriptwithout the author’s permission -i-TABLE OF CONTENTSI.Introduction […]
Differential-Privacy-as-a-Response-to-the-Reidentification-Threat-Klinefelter-and-Chin
Electronic copy available at: http://ssrn.com/abstract=2062447 CHIN &K LINEFELTER .FPP 5/8/2012 2:02 PM DIFFERENTIAL PRIVACY AS A RESPONSE TO THE REIDENTIFICATION THREAT: THE FACEBOOK ADVERTISER CASE STUDY * A NDREW CHIN ** & ANNE KLINEFELTER *** Recent computer science research on the reidentification of indi viduals from anonymized data has given some observers in the legal […]