Privacy: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
Line 33: Line 33:
* A. Westin, 1967, ''Privacy and Freedom'', New York: Atheneum
* A. Westin, 1967, ''Privacy and Freedom'', New York: Atheneum
* Adams, Helen. "Privacy in the 21st Century". Libraries Unlimited, 2005
* Adams, Helen. "Privacy in the 21st Century". Libraries Unlimited, 2005
==External References==
*[http://spychip.blogspot.com/ Tracks current news regarding developments as we speed towards a Big Brother society]
*[http://mygreenhell.blogspot.com/ Green Hell - The Freedom and Survival blog/privacy]
*[http://infotech.aicpa.org/Resources/Privacy/Generally+Accepted+Privacy+Principles/Generally+Accepted+Privacy+Principles/ Generally Accepted Privacy Principles]
* [http://www.privacycom.net/ Privacy Commission] Privacy Watch Review (and other resources)
* [http://www.eff.org/ Electronic Frontier Foundation] digital rights NGO
* [http://www.epic.org/ Electronic Privacy Information Center] a public interest research center
* [http://www.privacyinternational.org/ Privacy International] UK-based International privacy NGO
* [http://www.privacyspot.com/ Privacy Spot] privacy law blog
* [http://www.theprivacyplace.org/ The Privacy Place Research Center]
* [http://www.worldprivacyforum.org/ World Privacy Forum] U.S. consumer education group
*[http://digital.library.unt.edu/govdocs/crs/search.tkl?q=privacy&search_crit=subject&search=Search&date1=Anytime&date2=Anytime&type=form Read Congressional Research Service (CRS) Reports regarding Privacy]
* [http://www.louisville.edu/library/law/brandeis/privacy.html "The Right to Privacy" (Warren and Brandeis)] the seminal law review article for U.S. privacy law
* [http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.html OECD Guidelines on the Protection of Privacy] describe principles behind many contemporary privacy laws
* [http://plato.stanford.edu/entries/privacy/ Stanford Encyclopedia of Philosophy entry]
* [http://soufron.typhon.net/spip.php?article103 European Privacy Protection for Wikipedia Users] on the blog of Jean-Baptiste Soufron
* [http://europa.eu.int/comm/justice_home/fsj/privacy/index_en.htm Data Protection in the European Union], from the Directorate-General for Justice, Freedom and Security
* [http://www.genelaw.info/ Genetic privacy and the law]
* [http://www.dataprotection.it/  The condition of privacy in Italy]
* [http://www.dataprotection.eu/  European data protection and privacy law]
*[http://security.weburb.org/frame/newsboard/other/newsboard.html EU-IST news - IT security and privacy regulation - what is happening in Europe?]
*[http://www.house.gov/paul/congrec/congrec2005/cr111605.htm Congress Erodes Privacy] by Rep. Ron Paul, Ph.D.
* [http://www.wired.com/news/columns/0,70886-0.html The Eternal Value of Privacy] by Bruce Schneier from Wired magazine
*[http://www.globalpov.com/archives/privacy/ GlobalPOV] Privacy and technology blog
*[http://www.nachrichtendienste.ch/THESIS_BY_MARCEL_STUESSI_SECRET_PERSONAL_DATA_GATHERING_.pdf Proposal for a Privacy Protection Guideline on Secret Personal Data Gathering and Transborder Flows of Such Data in the Fight against Terrorism and Serious Crime by Marcel Stuessi]
*[http://www.ucan.org/money/financial_privacy_id_theft/opt_out_financial_institutions Opt-Out of Personally Identifiable Information Sharing] Sample letter from a non-profit consumer group to opt-out of information sharing by financial institutions under the Financial Services Modernization Act.
* [https://www.mysecurecyberspace.org/ ''MySecureCyberspace'': a resource for home users created by Carnegie Mellon CyLab ]
[[Category:Privacy]]
[[Category:Core issues in ethics]]
[[Category:Law]]

Revision as of 12:09, 15 June 2007

Privacy

The need for information privacy and protection has sparked some level of dedicated regulation in almost every country around the world. But rules, restrictions, and punitive measures vary from country to country. In the US, the confusion is further compounded by a growing number of state laws deriving chiefly from California SB 1386, as well as several pending federal privacy laws, each with its own definition of sensitive information. In addition, industry regulations, such as HIPAA privacy and security requirements and payment card industry (PCI) security standards put a further onus on companies to stay abreast of ever-changing and increasingly detailed requirements.

Privacy and Security Trade-offs

Privacy and security can be in conflict, requiring trade-offs between the two, or privacy can enhance security. For the collection of taxes it is in the interests of government if one's earnings and income are well known. On the other hand, that same information may be used to select someone or his family as a good target for kidnapping. In these narrow terms, one group's interest is to keep the information private. One of the goals of computer security is confidentiality. Identity theft, for example, is a security problem that is created from a lack of privacy or failure of confidentiality.

Privacy can also have free speech ramifications. In some countries privacy has been used as a tool to suppress free speech. One person's speech can sometimes be considered a violation of another's person's privacy. In various cases the US Supreme Court has ruled that the First Amendment trumps privacy. In Bartnicki v. Vopper, 532 U.S. 514 (2001) Docket Number: 99-1687, US Supreme Court ruled 6-3 that someone cannot be held liable in court for publishing or broadcasting intercepted contents of information, as long as that information is of public concern. Conversely, the Constitutional right to privacy is built in part on the First Amendment.

Census data is another area where such trade-offs become apparent. Accurate data are useful for planning future services (whether commercial or public sector), on the other hand, almost all censuses are released only in a way which does not allow identification of specific individuals. Often this is done by randomly altering the data and directly reducing accuracy.

On the other hand some trade-offs may be regarded as false by some observers. Identity card systems, which may reduce privacy, are often presented as a method of increasing security.

Organizations

References

  • Dennis Bailey, Open Society Paradox: Why The Twenty-first Century Calls For More Openness--not Less, Brasseys Inc (November, 2004), hardcover, 224 pages, ISBN 1-57488-916-8
  • Judith Wagner DeCew, 1997, In Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca: Cornell University Press
  • Whitefield Diffie and Susan Landau, 2007, Privacy on the Line: The Politics of Wiretapping and Encryption, The MIT Press, ISBN 978-0-262-04240-6
  • Ruth Gavison, "Privacy and the Limits of the Law," in Michael J. Gorr and Sterling Harwood, eds., Crime and Punishment: Philosophic Explorations (Belmont, CA: Wadsworth Publishing Co., 2000, formerly Jones and Bartlett Publishers, 1996), paperback, 552 pages, pp. 46-68
  • Raymond Geuss, 2003, "Public Goods, Private Goods," Princeton: Princeton University Press
  • Sven Ove Hansson and Elin Palm, eds., The Ethics of Workplace Privacy (SALTSA Reports, Work and Society Series nr 50), (Brussels: P.I.E.-Peter Lang), 2005, paperback, 186 pages, ISBN 90-5201-293-8
  • Robert O Harrow, No Place To Hide: Behind The Scenes Of Our Emerging Surveillance Society, Free Press or Simon and Schuster (January, 2005), hardcover, 304 pages, ISBN 0-7432-5480-5
  • Adam D. Moore, 2003, “Privacy: Its Meaning and Value” American Philosophical Quarterly 40: 215-227
  • William Parent, 1983, “Privacy, Morality and the Law”, Philosophy and Public Affairs 12: 269-88
  • K. A. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy, and the Lessons of King Ludd," 7 Yale J. L. & Tech. 123 ; 9 Intl. J. Comm. L. & Pol'y 8 (Dec. 2004) (arguing for incorporating privacy protecting features in the construction of information systems through value sensitive design)
  • Judith Jarvis Thomson, "The Right to Privacy," in Michael J. Gorr and Sterling Harwood, eds., Crime and Punishment: Philosophic Explorations (Belmont, CA: Wadsworth Publishing Co., 2000, formerly Jones and Bartlett Publishers, 1995), 552 pages, pp. 34-46
  • Perry Metzger (1993) A Parable. http://cypherpunks.venona.com/date/1993/04/msg00559.html
  • David H. Holtzman, Privacy Lost: How Technology Is Endangering Your Privacy, Jossey-Bass (September, 2006), hardcover, 278 pages, ISBN 0-7879-8511-2
  • A. Westin, 1967, Privacy and Freedom, New York: Atheneum
  • Adams, Helen. "Privacy in the 21st Century". Libraries Unlimited, 2005

External References