The Geeks, Suits, and Wonks Convene at Strata – Jim Adler
Wonk, Meet Geek. Big Data Reinventing Privacy Principles for the Big Data Age, Dec Geeks. Wonks. Suits. Social Entrepreneur. High-Tech Mercenary. Technology Officer, will participate in a panel discussion at the Google D.C. Talks on, "The Technology of Privacy: When Geeks Meet Wonks. Tunisia's revolution, SXSW pre-gaming, privacy, and more this week in The Technology of Privacy: When Geeks Meet Wonks: On Data.
Proposed Appendix to Convention http: The Commission found that unprotected clouds of data pose a threat to the privacy of millions of European citizens. Data protection rules already exist to ensure consumer privacy on social networking sites, but the European Union's data protection rules must be updated to reflect the advancing technological climate. The intangible nature of data on the cloud makes it a global issue.
Policy makers have the daunting task of determining who will police these data protection efforts, since the clouds drift without borders. Viviane Reding, the European Commissioner for Justice, contemplates several methods to improve cloud security. One of these methods is "privacy by design," requiring privacy protection features to be integrated in the product or service.
Because of the intangible nature of cloud computing, Reding acknowledges that it is vital that businesses and service providers exercise transparency. The Commission believes that consumers must be able to trust cloud computing to store their personal data. This includes the ability to be able to delete their personal data at will, without the consequence that it will remain engrained in the system indefinitely.
Reding wishes to include this aspect in her data protection rules to guarantee the protection of EU citizens.
Changes to the Data Protection Directive are anticipated later this year. Implementation of the Data Protection Directive differs among Member States, and the European Commission plans to investigate whether these differences in implementation are due to unavoidable legal distinctions or a failure to comply with the Directive.
EU Data Protection Directive http: The study is composed of 33 individual reports covering issues from privacy enforcement to ID cards and biometrics, to data-sharing, to government access to visual surveillance, among others.
The study ranks privacy sharing across the European Union EU. An interactive table and a map enable readers to visualize how European countries rank on a continuum from endemic surveillance societies to countries consistently upholding human rights standards.
Formed in and based in London, England and Washington, D. Nelson, a case brought by NASA scientists who argued that the government's invasive background checks violate the Constitution.
The Court's seven-Justice majority opinion, penned by Justice Alito, confirmed as good law the multiple Supreme Court precedents which recognize a privacy interest in "avoiding disclosure" that "arguably ha[s] its roots in the Constitution. The Court did uphold the specific background checks in this case, after finding 1 that the requests were reasonable, 2 that the information would be protected under the Privacy Act, and 3 that any information NASA applicants offered in response to the sensitive requests under review would act "solely as a mitigate[ing] factor.
At oral argument, Justice Ginsburg took pains to stress that the Ninth Circuit order under review was limited to two specific government-issued background check forms that all traditional government employees are already required to fill out. Writing in concurrence, Justice Scalia said the Court's opinion "will dramatically increase the number of lawsuits claiming violations of the right to informational privacy. Justice Kagan did not participate because of her earlier involvement in the case as Solicitor General.
Supreme Court Opinion http: Supreme Court Oral Argument http: Ninth Circuit Opinion http: Senator Rockefeller has specifically called for strong Internet privacy laws: Testimony on Phone Records February 8, http: Testimony on Spam May 21, http: Online Tracking and Behavioral Profiling http: Leahy vowed to work alongside the new Chairman of the House Judiciary Committee on a variety of privacy and open government issues.
Updates to key legislation, including the Electronic Communications Privacy Act, are included in the Judiciary Committee's agenda with the goal of strengthening cyber security and law enforcement while respecting citizens' privacy rights. Furthermore, the Committee will examine the body scanners at airports and online activity tracking.
Jan 24 Week Dc Tech January 24 Edition — Development Seed
Agenda for the th Congress http: The Electronic Communications Privacy Act http: New York, a Supreme Court case concerning police access to government databases, enabled by patrol cars with Mobile Device Terminals. EPIC urged the Court to uphold Fourth Amendment protections for the Petitioner, who asserted that police had no basis for pulling him over and running his license.
EPIC's brief states that "the risk is real that car stops will increasingly become pretextual because of the opportunity to search a government database for data unrelated to the reason that gave rise to the original stop. Sixth Judicial District, in which the Supreme Court upheld, by a margin, a state identification law because the individual did not have to produce his drivers license. In that case, Justice Stevens wrote "a name can provide the key to a broad array of information about the person, particularly in the hands of a police officer with access to a range of law enforcement databases.
A message from Andrew Rasiej, Tech President's Publisher
Sixth Judicial District http: Drivers Privacy Protection Act http: Mocek has published footage of the incident, stemming from his attempt to board a flight in Albuquerque in Ventura, who received a titanium hip implant inattracted significant media attention for labeling the searches an "unlawful sexual assault.
A Dynamic Policy Framework. EPIC also urged the Department to push forward an international framework for privacy protection and explained how effective regulation will promote innovation for privacy, as it has for alternative energy. EPIC warned the Commerce Department not to "repeat the dreadful mistake of P3P," a privacy protocol widely viewed as one of the failures of self-regulation.
- Public Policy Blog
- Subscribe to the Digest
- EPIC Alert 18.02
Privacy Act of http: Several countries, including the U. FCC Complaint May 21, http: Google Street View http: The report analyzes the processing of FOIA requests made throughout the year by each DHS component, detailing the disposition of each request, response times, and the remaining number of backlogged requests. The release of over 1, agency documents revealed a persistent agency practice of flagging FOIA requests from EPIC and other watchdog organizations for referral.
Is the minimum necessary granularity of location information distributed or collected? How much ongoing control does the user have over location information?
Is the user a passive receiver of notices or an active transmitter of policies? Do they privilege privacy or information ow? Can requesters transmit information about their identity and practices?
Wonk, Meet Geek: Big Data Conference - Strata + Hadoop World, October 15 - 17, , New York, NY
What information is required to be provided to the user by the requesting entity? What rules can individuals establish, attach to their location information and transmit? Is there a standard language for such rules? Is the user in control of decisions to disclose location information? Is control provided on a per use, per recipient or some other basis? Is it operationalized as an opt-in, opt-out or opt model?
Is user consent required for secondary use a use beyond the one for which the information was supplied by the user?
Wonk, Meet Geek
Do mechanisms facilitate setting of limits or asking permission for secondary uses? Is distribution of location information limited to the entity with whom the individual believes they are interacting or is information re-transmitted to others?
Are timestamps for limiting retention attached to location information? How can policy statements about retention be made?
Are flows of information transparent to the individual?Jim Adler - Wonk, Meet Geek