Showing results for crimes renting amp cerning amp
PPPM 2020 Digest
PRIVACY PAPERS FOR POLICYMAKERS 2019 This material is based upon work supported by the National Science Foundation under Grant No. 1837413. Privacy Papers for Policymakers 2019 1 Februar y 6, 2020 We are pleased to introduce FPF’s tenth annual Privacy Papers for Policymakers. Each year, we invite privacy scholars and authors to submit scholarship for […]
Privacy Papers 2019: Spotlight on the Winning Authors
FPF recently announced the winners of the 10th Annual Privacy Papers for Policymakers (PPPM) Award. This Award recognizes leading privacy scholarship that is relevant to policymakers in the United States Congress, at U.S. federal agencies, and for data protection authorities abroad. From many nominated privacy-related papers published in the last year, five were selected by Finalist […]
OtonomoPrivacyPaper
[…] and who has access to it (63% of drivers indicated this was ‘very important’). Consumer Survey by Otonomo and Edison Research 11 A PRIVACY PLAYBOOK FOR CONNECTED CAR DATA Play #2: Ofer choices even when it’s not legally required For the foreseeable future, it’s inevitable that diferent jurisdic tions will have diferent definitions of what constitutes “personal” car data and which da ta practices require driver consent. At a higher level, there are basic principles of fairness and m eaningful choice that come into play. Sharing certain types of car data will soon become a public good. For ex ample, vehi- cle-to-vehicle communications could potentially eliminate many devastati ng car accidents. Governments may decide that there are certain situations where connected car data must be collected and shared with OEMs as well as public agencies and their serv ice providers, such as smart city software. For example, participants in a workshop sponsore d by the U.S. Federal Trade Commission suggested applying diferent sharing options depending on whether the data is safety-critical. 11 There may be other situations in which OEMs ofer drivers some choices about which third parties may use their aggregate data, similar to how Apple or Microsoft may ask you to share your crash data so they can improve their products. OEMs should cl early define diferent categories of aggregate data, for example de-identified lo cation, speed, hard-braking events, road signs captured by in-car cameras, weather , or infotainment systems settings. They should explain the purposes of data collection an d data sharing as well as the direct and indirect benefits to drivers. Drivers then have the context they need […]
WhitePaper_DataProtectionByProcess
Data Protection by Process How to Operationalize Data Protection by Design for Machine Learning VERSION 1.0 DECEMBER 2019 Sophie Stalla-Bourdillon Senior Privacy Counsel & Legal Engineer, Immuta Alfred Rossi Research Scientist, Immuta Gabriela Zanfir-Fortuna Senior Counsel, Future of Privacy Forum REPORT BY: Content Introduction 3 What is Data Protection by Design? 4 The DPbD Workflow […]
Increased Surveillance is Not an Effective Response to Mass Violence
By Sara Collins and Anisha Reddy This week, Senator Cornyn introduced the RESPONSE Act, an omnibus bill meant to reduce violent crimes, with a particular focus on mass shootings. The bill has several components, including provisions that would have significant implications for how sensitive student data is collected, used, and shared. The most troubling […]
DesigningAIResearchReviewCommittee
[…] in fields such as cancer research (Vollman and Winau 1996). Three events motivated public calls for a robust public system of review boards. First, the revelations of crimes against humanity conducted in the name of “research” by Nazi and Japanese officials spurred development of the Nuremburg Code (first edition 1946), which outlined the foundational […]
Peter Swire le monde annotated bibliography
[…] in criminal investigations. 14 standards identified in the normative framework: 1. “in accordance with law;” 2. court order; 3. approval of senior official; 4. limited to serious crimes or threats; 5. particularity as to target; 6. showing of suspicion; 7. exhaustion of less intrusive means; 8. l imit on duration; 9. limit on scope; […]
June 18 – FPF Webinar – Cavoukian
Ann Cavoukian , Ph.D. Executive Director Global Privacy & Security by Design Centre Toronto, Canada The Need to Proactively Embed Privacy, by Design into Your Operations Future of Privacy Forum Webinar June 18 th , 2019 Let’s Dispel The Myths Privacy ≠ Secrecy Privacy is not about having something to hide Privacy = Control Privacy […]
Smart Communities: A Conversation with Kelsey Finch
One of FPF Policy Counsel Kelsey Finch’s areas of focus is Smart Communities, a field which draws from many of FPF’s issue areas. From her Seattle office, she has the opportunity to do hands-on work with cities in the Pacific Northwest. Last year, she worked with city officials on Seattle’s first Open Data Risk Assessment, […]
FPF_PPPM_2019Digest_FINAL2 (1)
[…] Professor of Law at the University of Maryland Carey School of Law where she teaches and writes about privacy, civil rights, and free speech. Her book Hate Crimes in Cyberspace (Harvard University Press) was named one of the “20 Best Moments for Women in 2014” by Cosmopolitan magazine. Her law review articles have appeared […]