To Track Or Not To Track
[…] 33 Bits of Entropy, Feb. 18, 2011, http://33bits.org/2010/02/18/cookies -supercookies -and -ubercookies -stealing – the -iden tity -of-web -visitors . 4 and storage of information became simple and cheap, motivating businesses to look for innovative ways to manage and analyze heaps of data accumulated through various business processes. 6 In this chapter we describe the […]
The Case for Online Obscurity
[…] faster than through traditional or word of mouth campaigns. Second, messages posted online have ―persistence,‖ such that messages can be replicated, archived, and essentially made permanent through cheap digital copies. Writing in 2008, social media scholar danah boyd ma de a similar argument, in which she describe d the four primary components of networked […]
Repairing_Online_Reputation
[…] 7, at (“Privacy tort law is a product of prior centuries’ hazards. In the late n ineteenth century, snap cameras and recording devices provided a cheap way to capture o thers’ private moments without detection. The penny press profited from the publi cation of revealing photographs and gossip about people’s personal lives.”) 155 Patricia Sánchez […]
Relational_Surveillance_Final
1 FREEDOM OF ASSOCIATION IN A NETWORKED WORLD: FIRST AMENDMENT REGULATION OF RELATIONAL SURVEILLANCE Katherine J. Strandburg * Abstract: Recent controversies about the National Security Ag ency’s war- rantless wiretapping of international calls have ov ershadowed equally dis- turbing allegations that the government has acquire d access to a huge da- tabase of domestic call traffic data, revealing inf ormation about times, dates, and numbers called. Although communication c ontent tradition- ally has been the primar y focus of concern about […]
People_Can_Be_So_Fake
[…] data and those that allow one to process and collate that data in inter-esting ways.” Jonathan Zittrain identifies “three successive shifts in technology from the early 1970s: cheap pro- cessors, cheap networks, and cheap sensors. . . . The third shift has, with the help of the first two, opened the doors tonew and […]
Model-Privacy-Regime
[…] If they fall into the wrong hands, they could prove devastating for victims as well as present ongoing risks to national secu- rity. Therefore, passwords are a cheap and effective way to limit identity theft and minimize the problems victims face in clearing up the damage caused by identity theft. 7. Disclosure of Security […]
First_Generation_Laws
[…] was mostly predictable. 257 252 . Zittrain, Privacy 2.0 , supra note 147, at 65 . 253 . Id. 254 . See Id. at 81 (stating ―ith cheap sensors, processors, and networks, citizens can quickly distribute to anywhere in the world what they capture in their backyard. Therefore, any activity is subject to recording […]
Privacy_Ethical_and_Legal_Considerations
[…] media professionals to respect grief, respect the deceased’s family, and personal privacy of the wife and children, and not to unnecessary intrude on family relationships in a cheap gossip, peeping way. The most recent controversy relating to Princess Diana took place in 2004, some years after her tragic death, when CBS News program “48 […]
Big-Data-and-Privacy-Paper-Collection
[…] political, professional, religious, and sexual associations. The Government can store such records and efficiently mine them for information years into the future. And because GPS monitoring is cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that const rain abusive law enforcement practices: ‘limited police resources […]
OtonomoPrivacyPaper
[…] Ridesharing is an interesting case for data collection consent and helps us to think beyond the car ownership model. Today, a ridesharing driver has a direct relati onship to an OEM and theoretically would be in control of data sharing. Tomorrow, autonom ous ridesharing vehicles will be taking to the road, owned by ridesharing companies or b y OEMs. (Elon Musk has tweeted that Tesla 25 could enter the ridesharing business in the future.) However, the car’s location, heading, music being played on the car’s sound system, and even ads or coupons that get displayed on the infotainment system are data points th at are unique to the rider. In an ideal world, each rider would have easy-to-access priva cy controls and some amount of control over what data they would share. The ridesharing app would then terminate consent automatically when the ride ends. Play #9: Establish a data lifecycle strategy including disposal For every use case, there’s a natural data lifecycle. Keeping data lo nger than necessary for business operations creates avoidable risk. Gail Gottehrer, Founder of t he Law Ofce of Gail Gottehrer LLC, reminds us: “Storage is cheap, but risk is expens ive!” In addition to establishing strategies for collecting and storing data a nd managing consent, each participant in the connected car ecosystem should build comprehensi ve policies and procedures covering data retention and end-of-life data disposal that ar e based on actual business needs. This strategy should be in place even if all of the data you manage is de-identified and/or aggregated. Companies can start the process of developing these policies and procedu res by looking at: The practical, realistic useful life of data for each use case Any legal requirements that could mandate access to archived data (such as litigation holds or regulatory requirements) Practices for discarding raw, user-level data when your use case is base d on aggregate data (and ensuring that any vendors or contractors who may have obtaine d the data from you during the process are legally obligated to discard the data, a nd in fact, do so) Automated data deletion according to your policies and procedures. You s hould also document the deletion process and keep that documentation with your busi ness records, […]