background preloader

US privacy debates

Facebook Twitter

CA Privacy class action – theories of liability – 2013 year in r

Business Technology Leadership - CIO.co.uk. Steve Jobs house burgled; Address unknown to perp. A thief broke into Steve Jobs' former home last month, it's emerged.

Steve Jobs house burgled; Address unknown to perp

The now-dead Apple (NASDAQ:AAPL) co-founder's Palo Alto property was raided to the tune of $60,000 or more. The offender didn't even realize the significance of the address; the alleged perpetrator is now in custody. In IT Blogwatch, bloggers break out the conspiracy theories. By Richi Jennings: Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: Proof that nuns have no sense of humor... Colin Neagle reports: Police are currently holding 35-year-old Alameda, California, resident Kariem McFarlin on $500,000 bail and charging him with... " U.S. becomes first participant in APEC cross-border privacy rules system. Microsoft Privacy & Safety. Eben Moglen - Freedom in The Cloud. Jeff Jarvis and the two axes of privacy. Jeff Jarvis has an excellent, provocative post about the topic of the book he’s writing: the economics of publicness.

Jeff Jarvis and the two axes of privacy

(I’m paraphrasing. Read his post to get it right.) I replied in his comments. The following is a modified version of that comment: Your post makes me wonder about two axes of public-private. By the way, I’m pretty sure I wrote something about this in Small Pieces Loosely Joined. Online Privacy Protection Wins Investor Backing. Panopticlick. How Do You Define ‘Privacy Harm’? Jennifer Valentino-DeVries of the Wall Street Journal recently interviewed Ryan Calo about his concept of “privacy harm.”

I had posted a link to Ryan’s article earlier this month, but if you haven’t read it yet or would like to think more about his ideas — and I would hope that you do — you can read the interview here. If we take Ryan’s view (as I understand it), some events might constitute privacy violations but not privacy harms. I had discussed some of this with him prior to the release of his first draft as I think that we should consider something a privacy harm if it weakens our ability to protect our privacy going forward. The fact that we may not know about a privacy violation or even know that we have been harmed does not mean that we have not been harmed. Privacy is Hard Because People Change Their Minds. If there’s one issue that unites major Internet giants like Google and Facebook, it’s privacy.

Privacy is Hard Because People Change Their Minds

Google tries to offer a new service with Buzz, and triggers a series of privacy land mines; Facebook tries to offer new services and runs afoul of privacy concerns as well, then it changes its privacy settings and (according to some) makes the problem worse instead of better. Privacy is Hard Because People Change Their Minds. Ten Fallacies About Web Privacy - Security Watch.

The Future of Privacy Forum Announces New Publication: “Privacy. WASHINGTON, DC – Today, the Future of Privacy Forum (FPF) co-chairs announced a new competition-based project that is entitled: “Privacy Papers for Policy Makers.”

The Future of Privacy Forum Announces New Publication: “Privacy

This new publication is made possible in part by the generous support of LexisNexis, AT&T and others. Banking on Our Privacy. Privacy is something we lose actively, not passively. Listen to the verbs of our digital lives: We browse the web and Google.We tweet and Twitter.We socially connect and Facebook.We move around the world as mayors on Foursquare. We charge our purchases on credit cards. We share our favorite places to dine, shop and travel on Blippy. Monthly all of this financial activity aggregates to us as a one-way mirror on PageOnce and Mint (now Intuit), disembodied from the holistic view the world at large sees of us. Dizzied by Data - The Chronicle Review. Daniel J.

Dizzied by Data - The Chronicle Review

Solove In his short story "The Library of Babel," Jorge Luis Borges imagined an infinitely large library containing all books. Although the library was wondrous, people had no way of finding the right book. Much like Borges's library, the information age has presented us with a dizzying amount of data. The past decade witnessed the rise of the interactive Internet—Web 2.0—where people not only consume information but also add to it.

To cope with all this data, we created new ways to find it and analyze it. Over the next decade, the ability to search for information and to analyze it will mature dramatically. Data-mining technology will also continue to develop at a rapid pace. The growth of information-analysis technology will have profound consequences, both good and bad. Daniel J. IAPP Global Privacy Summit 2010 – Hot Topics: Cédric Laurant and. At the recent IAPP Global Privacy Summit in Washington, D.C., many hot topics were addressed: Privacy by Design, Behavioral Advertising, the new EU Cookie Consent Law, the Smart Power Grid, the Cloud, Web 2.0, the new EU Model Clause Agreements, Controllers, Processors and Sub-Processors, the recent Google convictions, to name just a few.

IAPP Global Privacy Summit 2010 – Hot Topics: Cédric Laurant and

I interviewed a few prominent privacy professionals, attending and/or presenting at the summit on some of the important issues of the day. In this video, I interviewed Cédric Laurant, who is an attorney and an independent privacy consultant based in Belgium. Cédric was probably the only European to have braved the Icelandic ash clouds in order to make it to the IAPP Summit in Washington, D.C.

Indeed, about 25 European speakers and a couple of hundred European attendees never got to the summit because of cancelled flights all over Europe. Cédric is closely involved in the brand new European Privacy and Human Rights ( EPHR) project. Technology Review: Why Privacy Is Not Dead. Each time Facebook’s privacy settings change or a technology makes personal information available to new audiences, people scream foul.

Technology Review: Why Privacy Is Not Dead

Each time, their cries seem to fall on deaf ears. The reason for this disconnect is that in a computational world, privacy is often implemented through access control. Yet privacy is not simply about controlling access. It’s about understanding a social context, having a sense of how our information is passed around by others, and sharing accordingly. Blog of Rights: Official Blog of the American Civil Liberties Union » Don't Let Schools Chip Your Kids. On Tuesday, preschoolers in Richmond, California showed up for school and were handed jerseys embedded with Radio Frequency Identification (RFID) tags.

Blog of Rights: Official Blog of the American Civil Liberties Union » Don't Let Schools Chip Your Kids

RFID tags are tiny computer chips that are frequently used to track everything from cattle to commercial products moving through warehouses. Now the school district is apparently hoping to use these chips to replace manual attendance records, track the children’s movements at school and during field trips, and collect other data like whether the child has eaten or not. While school officials and parents may have been sold on these tags as a "cost-saving measure," we are concerned that the real price of insecure RFID technology is the privacy and safety of small children. Debates: Online privacy: Statements. Prepared Statement of the Federal Trade Commission on Consumer Privacy. I am continuing my practice of sharing recent internet safety research pieces: Excerpt Remarks by the FTC: Privacy has been central to the Commission’s consumer protection mission for more than a decade.

Prepared Statement of the Federal Trade Commission on Consumer Privacy

Over the years, the Commission has employed a variety of strategies to protect consumer privacy, including law enforcement, regulation, outreach to consumers and businesses, and policy initiatives.2 In 2006, recognizing the increasing importance of privacy to consumers and a healthy marketplace, the FTC established the Division of Privacy and Identity Protection, which is devoted exclusively to privacy-related issues.3 Although the FTC’s commitment to consumer privacy has remained constant, its policy approaches have evolved over time. I.

U.S. surveillance architecture includes collection of revealing

How Involved Should The Government Be In Protecting Online Privacy? The Economist is having one of its regular debates, this time on the question of whether or not governments should do more to protect online privacy.

How Involved Should The Government Be In Protecting Online Privacy?

Speaking for the motion that government should do more is Marc Rotenberg of EPIC, while arguing that there are better ways to protect your privacy than expecting your government to help you is Jim Harper from the Cato Institute. Right now more people are siding with Rotenberg, but it seems like a classic "oh, somebody has to protect me! " sort of response. Online privacy debates heat up in Washington. The issue of electronic privacy is as hot as the weather in Washington this summer. Last week, both the House and Senate held hearings on online privacy, featuring testimony from top executives from Facebook, Apple and Google. The Washington Post published a massive investigative report on the growth of “Top Secret America” in July. And the Wall Street Journal’s new series on online privacy, “What They Know,” has laid bare the scope of tracking technology on the Internet.

In the Information Age, our family, friends, neighbors, employers and government all have unprecedented abilities to watch one another, changing the nature of our relationships, workplaces and schools. Solving the privacy dilemma will be difficult, controversial and crucial for the nation’s citizens, businesses, regulators and lawmakers.