Identities Evolve Why Federated Identity is Easier Said Than Done
Copyright © 2011 Lockstep Consulting Pty Ltd 1 Lockstep AusCERT 2011 Identities Evolve (1.1).docx Identities Evolve Why federated identity is easier said than done Stephen Wilson Lockstep Consulting Pty Ltd, Australia [email protected] AusCERT 2011 Conference: “Overexposed” May 2011, Gold Coast, Austra lia Abstract Why does digital identity turn out to be such a hard problem? […]
futureofreputation-ch1
The Future of Reputation This page intentionally left blank The Future of Reputation Gossip, Rumor, and Privacy on the Internet Daniel J. Solove Yale University Press New Haven and London To Papa Nat A Caravan book. For more information, visit www.caravanbooks.org Copyright © 2007 by Daniel J. Solove. All rights reserved. This book may not […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]
Encryption_Safe_Harbours
ENCRYPTION SAFE H ARBOURS AND D ATA BREACH N OTIFICATION LAWS Mark Burdon a, Jason Reid a and Rouhshi Low a ABSTRACT Data breach notification laws require organizations to notify affected persons or regulatory authorities when an unauthorized acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data […]
E-Commerce_and_Information_Privacy_ Privacy_Policies_as_Personal
Corey A. Ciocchetti n r r 55 American Business Law Journal n Id. F F See, e.g Personal Information in Government Records: Protecting the Public Interest In Privacy 63, 118 & n.332 (2006) (defining personally identifying information with reference to the Privacy Act of 1974, 5 U.S.C.552a(a)(4) (2000)); TRUSTe,Guidance on Model Web Site Disclosures, http://www.truste.org/docs/Model_Privacy_ […]
Dispelling the Myths Surrounding De-identification Anonymization Remains a Strong Tool for Protecting Privacy
Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada June 2011 Khaled El Emam, Ph.D. Canada Research Chair in Electronic Health Information, CHEO Research Institute and University of Ottawa Table of Contents Introduction ……………………………………………………………… ………. 1 Questioning the Value of De-identification ………………………………. […]
Calo_Boundaries_of_Privacy_Harm
THE BOUNDARIES OF PRIVACY HARM M. Ryan Calo * A BSTRACT This Essay describes the outer boundaries and core properties of privacy harm, an important, unique, but chronically under-t heorized injury. I argue that the vast majority of privacy harms fall into j ust two categories. The subjective category of privacy harm is the unwanted perception of observation. This category describes unwelcome men […]
Preserving_Identities_ Protecting_Personal_Identifying_Information
1 PRESERVING IDENTITIES: PROTECTING PERSONAL IDENTIFYING INFORMATION THROUGH ENHANCED PRIVACY POLICIES AND LAWS by Robert Sprague* and Corey Ciocchetti** “The common law has always recognized a man’s house as his castle . . . . Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or […]
Suarez_RFID_Hospital_Privacy
Radio Frequency Identification in Hospitals: Balancing Hospital Efficiency and Patient Privacy Christopher A. Suarez Yale Law School, USA This paper will appear in P ERSONAL DATA PRIVACY AND PROTECTION IN A SURVEILLANCE ERA : TECHNOLOGIES AND PRACTICES , edited by Christina Akrivopoulou and Athanasios Psygkas, Copyright 2010, IGI Global. Posted by permission of the publisher. […]
Harbour_&_ Koslov_ALJ 76-3_ANT314
SECTION 2 IN A WEB 2.0 WORLD: AN EXPANDED VISION OF RELEVANT PRODUCT MARKETS PAMELA JONES H ARBOUR TARA ISA K OSLOV * Section 2 enforcement by the U.S. antitrust authorities is back—at least, that is what the antitrust enforcers themselves have been saying. 1 An examination of Section 2 enforcement principles could not be […]