People_Can_Be_So_Fake
Penn State Law Review Winter, 2010 Articles *809 PEOPLE CAN BE SO FAKE: A NEW DIMENSION TO PRIVACY AND TECHNOLOGY SCHOLARSHIP M. Ryan Calo [FNa1] Copyright (c) 2010 The Dickensen School of Law of The Pennsylvania State University; M. Ryan Calo This article updates the traditional discussion of privacy and technology, focused since the days […]
Model-Privacy-Regime
SOLOVE .DOC 2/2/2006 4:27:56 PM 357 A MODEL REGIME OF PRIVACY PROTECTION Daniel J. Solove* Chris Jay Hoofnagle** A series of major security breaches at companies with sensitive personal information has sparked significant attention to the prob- lems with privacy protection in the United States. Currently, the pri- vacy protections in the United States are […]
MacCarthy-PLSC-Paper-June-10
1 New Directions in Privacy: Disclosure, Unfairness and Externalities Privacy Law Scholars Conference June 2010 Mark MacCarthy Georgetown University ―…the solution to regulating information flow is not to radically curtail the collection of information, but to regulate uses.‖ 1 I. INTRODUCTION Several developments in 2009 and 2010 underscore d a return of public concerns about […]
Narayanan-Ethical-Considerations-for-Web-based-Censorship-Measurement1
No Encore for Encore? Ethical questions for web -based censorship measurement 1 ARVIND NARAYANAN , BENDERT ZEVENBERGEN Abstract A pair of computer scientists recently developed a clever way to measure Internet filtering and censorship worldwide, including countries such as China and Iran. Their system, named Encore, does this by executing a snippet of code on […]
Just_Click_Submit_ The_Collection,_Dissemination_and_Tagging_of
J UST C LICK S UBMIT T HE C OLLECTION , D ISSEMINATION AND T AGGING OF P ERSONALLY IDENTIFYING INFORMATION As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of pe rsonally identifying information (PII) and mine it in sophisticated databases […]
Identities Evolve Why Federated Identity is Easier Said Than Done
Copyright © 2011 Lockstep Consulting Pty Ltd 1 Lockstep AusCERT 2011 Identities Evolve (1.1).docx Identities Evolve Why federated identity is easier said than done Stephen Wilson Lockstep Consulting Pty Ltd, Australia [email protected] AusCERT 2011 Conference: “Overexposed” May 2011, Gold Coast, Austra lia Abstract Why does digital identity turn out to be such a hard problem? […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]
Encryption_Safe_Harbours
ENCRYPTION SAFE H ARBOURS AND D ATA BREACH N OTIFICATION LAWS Mark Burdon a, Jason Reid a and Rouhshi Low a ABSTRACT Data breach notification laws require organizations to notify affected persons or regulatory authorities when an unauthorized acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data […]
E-Commerce_and_Information_Privacy_ Privacy_Policies_as_Personal
Corey A. Ciocchetti n r r 55 American Business Law Journal n Id. F F See, e.g Personal Information in Government Records: Protecting the Public Interest In Privacy 63, 118 & n.332 (2006) (defining personally identifying information with reference to the Privacy Act of 1974, 5 U.S.C.552a(a)(4) (2000)); TRUSTe,Guidance on Model Web Site Disclosures, http://www.truste.org/docs/Model_Privacy_ […]
Dispelling the Myths Surrounding De-identification Anonymization Remains a Strong Tool for Protecting Privacy
Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada June 2011 Khaled El Emam, Ph.D. Canada Research Chair in Electronic Health Information, CHEO Research Institute and University of Ottawa Table of Contents Introduction ……………………………………………………………… ………. 1 Questioning the Value of De-identification ………………………………. […]