New FPF Report Highlights Privacy Tech Sector Evolving from Compliance Tools to Platforms for Risk Management and Data Utilization
As we enter the third phase of development of the privacy tech market, purchasers are demanding more integrated solutions, product offerings are more comprehensive, and startup valuations are higher than ever, according to a new report from the Future of Privacy Forum and Privacy Tech Alliance. These factors are leading to companies providing a wider […]
FPF PTA Report_Digital
Privacy Tech’s Third Generation A Review of the Emerging Privacy Tech Sector JUNE 2021 The Future of Privacy Forum launched the Privacy Tech Alliance (PTA) as a global initiative with a mission to define, enhance, and promote the market for privacy technologies. The PTA brings together innovators in privacy tech with customers and key stakeholders. […]
The_Privacy_Matrix
*Assistant Professor at the Daniels College of Business in the Department of BusinessEthics and Legal Studies, University of Denver.245THE PRIVACY MATRIXCorey Ciocchetti*I. INTRODUCTION………………………………246II. THE PRIVACY MATRIX………………………….249III. E-THREATS AT THE FRONT DOOR (PII COLLECTION) …….251A. Internally-Created “Front Door” E-Threats………..254B. Externally-Created “Front Door” E-Threats……….262C. U.S. Law Operating at the Front Door……………2651.Privacy Policies Must beStandardized and Multilayered……………….2672.Privacy Policies […]
Privacy_The_Lost_Right_Jon_Mills_2008
PRIVACY THE LOST RIGHT JON L. MILLS OXFORD UNIVERSITY PRESS OXFORD UNIVERSITY PRESS Oxford University Press, Inc” publishes works that further Oxford University’s objective of excellence in research, scholarship, and education. Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto […]
To Track Or Not To Track
1 To Track or “Do Not Track”: Advancing Transparency and =ndividual Control in Online Behavioral Advertising Omer Tene 1 and Jules Polonetsky 2 Table of Contents 1. Introduction ………………………….. ………………………….. ………………………….. ……………………….. 2 2. Online tracking devices ………………………….. ………………………….. ………………………….. ……….. 3 2.1. Cookies ………………………….. ………………………….. ………………………….. ………………………….. 4 2.2. Flash Cookies ………………………….. ………………………….. ………………………….. […]
Workplace Privacy and Monitoring The Quest for Balanced Interests
W ORKPLACE PRIVACY AND M ONITORING : THE Q UEST FOR BALANCED INTERESTS Ariana R. Levinson* I. Introduction We all are aware at this point that we have rapidly advancing technology. It’s advancing faster than it has in previous times, and this creates what Kat hy Stone at the UCLA Schoo l of Law has […]
Toward Accountability in the Cloud
View from the Cloud Editor: George Pallis • [email protected] 2 Published by the IEEE Computer Society 1089-7801/11/$26.0 0 © 2011 IEEE IEEE INTERNET COMPUTING T he US National Institute of Standards and Technology defines cloud computing as “a model for enabling convenient, on-demand net work access to a shared pool of configurable computing resources (for […]
Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees
Draft June 16 , 2011 Forthcoming 114 West Virginia Law R eview * Assistant Professor, University of Louisville, Louis D. Brandeis School of Law; J.D., University of Michigan. The author extends thanks to the many scholars who helped with this piece. The author cannot overstate her appreciation for Nancy Levit ‘s review of earlier drafts. […]
The_Future_of_Privacy_Policies_ A_Privacy_Nutrition_Label_Filled
THE FUTURE OF PRIVACY POLICIES : A P RIVACY N UTRITION LABEL FILLED WITH FAIR INFORMATION P RACTICES COREY A. CIOCCHETTI ∗ T ABLE OF CONTENTS Abstract………………………………………………………………………………………………………………………………………………… 2 I. Introduction ……………………………………………………………………………………………………………………………………….. 3 II. Privacy Policies: The Basics ……………………………………………………………………………………………………………….. 5 A. Fair Information Practices ………………………………………………………………………………………………………………. 8 (1) Notice of PII Practices Via Conspicuous Posting …………………………………………………………………………. 11 (2) Visitor Choice Regarding PII Dissemination ………………………………………………………………………………. 16 (3) Visitor Access to Collected PII ………………………………………………………………………………………………….. 19 (4) Integrity of Collected, Stored and Disseminated PII ……………………………………………………………………. 20 (5) Enforcement of Penalties for Broken Privacy Commitments ……………………………………………………….. 21 III. The Future of Privacy Policies: The Concept of a Privacy Label ………………………………………………………….. 23 A. Privacy Nutrition Labels: The Basics ……………………………………………………………………………………………… 24 B. Privacy Nutrition Labels: Incorporating Key FIPs ……………………………………………………………………………. 27 (1) Notice …………………………………………………………………………………………………………………………………….. 27 (2) Choice ……………………………………………………………………………………………………………………………………. 29 (3) Access ……………………………………………………………………………………………………………………………………. 30 (4) Integrity ………………………………………………………………………………………………………………………………….. 31 (5) Enforcement ……………………………………………………………………………………………………………………………. 32 IV. Conclusion …………………………………………………………………………………………………………………………………….. 35 ∗ […]
The PII Problem Privacy and a New Concept of Personally Identifiable Information
07/08/11 PII ARTICLE FINAL FPF P LEASE DO NOT CITE OR C IRCULATE WITHOUT PERMISSION Forthcoming NYU LAW REVIEW (2011) THE PII PROBLEM: P R IVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION by Paul M. Schwartz & Daniel J. Solove 2 T HE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE […]