On Privacy Liberty in the Digital Revolution
ON PRIVACY: LIBERTY IN THE DIGITAL REVOL UTION Christina M. Gagnier * Cite as 11 J. HIGH TECH . L. 229 (2011) In the dorm room of some college freshman Political Science major at Any College U.S.A is a copy of John Stuart Mill’s On Liberty shoved under the bed. 1 Mill’s On Liberty , […]
MacCarthy-PLSC-Paper-June-10
1 New Directions in Privacy: Disclosure, Unfairness and Externalities Privacy Law Scholars Conference June 2010 Mark MacCarthy Georgetown University ―…the solution to regulating information flow is not to radically curtail the collection of information, but to regulate uses.‖ 1 I. INTRODUCTION Several developments in 2009 and 2010 underscore d a return of public concerns about […]
Model-Privacy-Regime
SOLOVE .DOC 2/2/2006 4:27:56 PM 357 A MODEL REGIME OF PRIVACY PROTECTION Daniel J. Solove* Chris Jay Hoofnagle** A series of major security breaches at companies with sensitive personal information has sparked significant attention to the prob- lems with privacy protection in the United States. Currently, the pri- vacy protections in the United States are […]
Just_Click_Submit_ The_Collection,_Dissemination_and_Tagging_of
J UST C LICK S UBMIT T HE C OLLECTION , D ISSEMINATION AND T AGGING OF P ERSONALLY IDENTIFYING INFORMATION As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of pe rsonally identifying information (PII) and mine it in sophisticated databases […]
Identities Evolve Why Federated Identity is Easier Said Than Done
Copyright © 2011 Lockstep Consulting Pty Ltd 1 Lockstep AusCERT 2011 Identities Evolve (1.1).docx Identities Evolve Why federated identity is easier said than done Stephen Wilson Lockstep Consulting Pty Ltd, Australia [email protected] AusCERT 2011 Conference: “Overexposed” May 2011, Gold Coast, Austra lia Abstract Why does digital identity turn out to be such a hard problem? […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]
Encryption_Safe_Harbours
ENCRYPTION SAFE H ARBOURS AND D ATA BREACH N OTIFICATION LAWS Mark Burdon a, Jason Reid a and Rouhshi Low a ABSTRACT Data breach notification laws require organizations to notify affected persons or regulatory authorities when an unauthorized acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data […]
Cookies_Constitution_and_Common-Law_2
DRAFT – PUBLISHED IN WINTER 2002 -2003 1 Cookies, The Constitution, and The Common Law: A Framework for the Right of Privacy on The Internet M ATTHEW C. KECK * That the individual shall have the full protection in person and in property is a principle as old as the common law; but it has […]
Accountability as the Basis for Regulating Privacy Can Information Security Regulations Inform Privacy Policy
1 Accountability as the Basis for Regulating Privacy: Can Information Security Regulations Inform Privacy Policy? By Mary J. Culnan Slade Professor of Management and Information Technology IPM Department Bentley University [email protected] Ju ly 20, 2011 An earlier version of this paper was presented at the 2011 Privacy Law Scholars Conference, Berkeley, CA., June 2 -3, […]
Preserving_Identities_ Protecting_Personal_Identifying_Information
1 PRESERVING IDENTITIES: PROTECTING PERSONAL IDENTIFYING INFORMATION THROUGH ENHANCED PRIVACY POLICIES AND LAWS by Robert Sprague* and Corey Ciocchetti** “The common law has always recognized a man’s house as his castle . . . . Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or […]