Open data and privacy law often conflict. What issues are people discussing in the realm of privacy and government-held data? What can open data advocates do to increase access to government data when privacy is a concern?
With a transactional practice, covering the areas of e-commerce, software and technology, Heather Buchta, with Quarles & Brady LLP, presented the different cloud regulations that impact our industry; from data privacy to compliance. Learn all the legal Internet/cloud considerations CIOs are faced with today and apply them to your value proposition.
An overview of GDPR data privacy and the impact on traditional information security practices, which was presented at SecureWorld Dallas, October, 2017
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
With a transactional practice, covering the areas of e-commerce, software and technology, Heather Buchta, with Quarles & Brady LLP, presented the different cloud regulations that impact our industry; from data privacy to compliance. Learn all the legal Internet/cloud considerations CIOs are faced with today and apply them to your value proposition.
An overview of GDPR data privacy and the impact on traditional information security practices, which was presented at SecureWorld Dallas, October, 2017
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
With the latest news of privacy violations on popular social media platforms and the new regulations coming from the European Union (EU) – The General Data Protection Regulations (GDPR), how companies use data and the laws protecting consumers is in the forefront of many person’s minds.
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
As data sets and analytics sophistication grow, so do consumer's concerns about their privacy and what is being done with their personal information. Legislatures around the world are beginning to respond to these concerns. We present an overview of the General Data Protection Regulation and the California Consumer Protection Act to help companies comply with the law and engender trust with the consumers whose data they hold.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
This is the presentation from the class I taught at the University of Toronto Faculty of Information Sciences graduate school - a major challenge to capture the concepts in less than 3 hours!
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Clyrofor webinar series consists of several webinar sessions, brought together by highlighting various Cyber Security topics and hosting sessions through out the year on a quarterly basis. the POPIA Readiness Webinar session was our very first kick off session, where we had our guest Speaker Mr Nemasisi (Executive: PAIA) give us a brief break down of the POPI act and it's requirements. This slide gives clear details on what was discussed during our webinar session.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
Fredrik Felix P. Nogales, Giancarlo P. Nogales, Rogelio P. Nogales, Melinda P. Nogales, Priscila B. Cabrera, Phil-Pacific Outsourcing Services Corporation and 3x8 Internet, represented by its proprietor Michael Christopher A. Nogales, Petitioners, Versus, People of the Philippines and President Judge Tita Bughao Alisuag, Branch 1, Regional Trial Court (RTC), Manila, Respondent. [G.R. No. 191080. November 21, 2011]
GDPR clinic - A strategic approach for compliance with the European General Data Protection regulation
Paolo Balboni Ph.D. - Founding Partner at ICT Legal Consulting & President of the European Privacy Association
Nicola Franchetto LL.M. - Associate at ICT Legal Consulting &
Fellow of the European Privacy Association
Strong Host Security Policies are Good BusinessHostingCon
Inevitably, the actions of some clients create legal issues that need to be addressed by hosts quickly and cost effectively. It is essential to have good hosting policies and procedures in place to deal with the legal and regulatory issues arising from operating a hosting business. Failure to implement good hosting practices can be disruptive and expensive for both hosts and their clients. Hosts must deal with a variety of law enforcement issues over time, ranging from cyber-crime to potential law suits.
Exclusive Bank Program allows you to customize orders bank direct. We have 3 Trillion Dollars in assets nationwide. Reos, Commercial, Residential and Non Performing Notes.
Give your staff the tools they need to create positive experiences for their patients. Even in the best organizations, things go wrong and patients/residents and their families are inconvenienced. Research shows that effective handling not only keeps them from leaving, it actually strengthens their loyalty. If done well, Service Recovery can significantly improve profitability.
With the latest news of privacy violations on popular social media platforms and the new regulations coming from the European Union (EU) – The General Data Protection Regulations (GDPR), how companies use data and the laws protecting consumers is in the forefront of many person’s minds.
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
As data sets and analytics sophistication grow, so do consumer's concerns about their privacy and what is being done with their personal information. Legislatures around the world are beginning to respond to these concerns. We present an overview of the General Data Protection Regulation and the California Consumer Protection Act to help companies comply with the law and engender trust with the consumers whose data they hold.
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
This is the presentation from the class I taught at the University of Toronto Faculty of Information Sciences graduate school - a major challenge to capture the concepts in less than 3 hours!
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Clyrofor webinar series consists of several webinar sessions, brought together by highlighting various Cyber Security topics and hosting sessions through out the year on a quarterly basis. the POPIA Readiness Webinar session was our very first kick off session, where we had our guest Speaker Mr Nemasisi (Executive: PAIA) give us a brief break down of the POPI act and it's requirements. This slide gives clear details on what was discussed during our webinar session.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
Fredrik Felix P. Nogales, Giancarlo P. Nogales, Rogelio P. Nogales, Melinda P. Nogales, Priscila B. Cabrera, Phil-Pacific Outsourcing Services Corporation and 3x8 Internet, represented by its proprietor Michael Christopher A. Nogales, Petitioners, Versus, People of the Philippines and President Judge Tita Bughao Alisuag, Branch 1, Regional Trial Court (RTC), Manila, Respondent. [G.R. No. 191080. November 21, 2011]
GDPR clinic - A strategic approach for compliance with the European General Data Protection regulation
Paolo Balboni Ph.D. - Founding Partner at ICT Legal Consulting & President of the European Privacy Association
Nicola Franchetto LL.M. - Associate at ICT Legal Consulting &
Fellow of the European Privacy Association
Strong Host Security Policies are Good BusinessHostingCon
Inevitably, the actions of some clients create legal issues that need to be addressed by hosts quickly and cost effectively. It is essential to have good hosting policies and procedures in place to deal with the legal and regulatory issues arising from operating a hosting business. Failure to implement good hosting practices can be disruptive and expensive for both hosts and their clients. Hosts must deal with a variety of law enforcement issues over time, ranging from cyber-crime to potential law suits.
Exclusive Bank Program allows you to customize orders bank direct. We have 3 Trillion Dollars in assets nationwide. Reos, Commercial, Residential and Non Performing Notes.
Give your staff the tools they need to create positive experiences for their patients. Even in the best organizations, things go wrong and patients/residents and their families are inconvenienced. Research shows that effective handling not only keeps them from leaving, it actually strengthens their loyalty. If done well, Service Recovery can significantly improve profitability.
The "Internet of Things" (IoT) refers to an Internet like structure consisting of uniquely identified objects that expose services. The IoT is a relatively new field with all more and more connected devices being developed monthly. This presentation discusses the current state of the IoT, what it is lacking and offers up some solutions to those problems.
The Control of Media & Devices in an Internet of Things (IoT)Steve Posick
The “Internet of Things” (IoT) refers to an Internet like structure consisting of uniquely identified objects that expose services. These services are typically designed using traditional Object Oriented methodologies that encourage the coalescence of features into a single consolidated endpoint. This may work well for homogeneous environments but can be problematic for heterogeneous environments, such as the Internet of Things, where objects may be modular and change their behavior dynamically. To better represent objects within the Internet of Things each endpoint should implement a single, concise feature, or capability of that object. The representation of capabilities in this fashion requires a means by which endpoint consumers can identify the list of capabilities exposed by an object. Thus adding an additional requirement to the IoT, requiring not only the unique identification of objects, but also the unique identification of the capabilities that those objects expose. Capabilities-based programming addresses the "Basket of Remotes" problem posed by the IoT by allowing applications to be developed against a set of features (Capabilities) as opposed to a specific object type. Elevating features to first-class citizen status (capabilities) allows applications to work with new objects without forehand knowledge of the object type and allows the object to change behavior dynamically at runtime without negatively impacting the application.
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...Cengage Learning
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course Technology Computing Conference
Presenter: Amelia Phillips, Highline Community College
E-discovery is defined as “gathering electronically stored information (ESI) for use in litigation”. At first glance, this appears to be a straightforward statement, but upon further examination one finds that it encompasses a broad range of items. Over 90% of documents produced by companies now are electronic. Older paper files have been converted to microfiche or PDF files. Add to this email, text messages, social media (yes, even the IRS has a Facebook page) and you have an idea of the amount of information that becomes this new term called “Big Data”. Terabytes of data will soon become petabytes of data. Are we ready? Are our students prepared for this new era? E-Discovery is a field that affects not only the lawyers, but the IT support staff, and how companies do business. In this talk you will be introduced to some of the new technology in the field such as predictive coding, forensic linguistics, and social media archiving. You will also be shown some of the new tools on the market that you can use in your classrooms to prepare your students and yourself for this fast evolving arena. What does a company need to do when a litigation hold is in place? What response needs to come from the legal staff, the IT support staff, the managers, and the average employee? How does this affect the BYOD (Bring Your Own Device) policies? Which comes first - employee privacy, freedom of information or corporate security? You will walk away from this talk with a methodology to incorporate this new topic into your curriculum. You will also be given ideas of how to make this affordable for your labs, what foundations your students need, and how to deliver this in a way that appeals to the business, IT or legal oriented student. This topic affects them all. Come and find out why this is something they need to be successful in tomorrow's market.
The presentation is all about the issues in professional ethics. This talks about the failures of ethics in Information Technology. Sliding thru the powerpoint gives you a hint what are the ethical and social issues in information systems
Data has emerged as one of the most important resources of today's world. However, there does not exist clear rules on how to make use of this resource. There are spillover effects and negative externalities in the form of privacy breaches while exploiting this resource. In such a situation, what should be the legal remedy?
The law should find a balance between the interests of the customers and the corporations. The customers want safety and privacy, whereas corporations want commercial use of data which risks the customer's interests.
Data Privacy Trends in 2021: Compliance with New RegulationsPECB
The pandemic has changed the way the world works, shops, and interact; the consequences of this have included an increased reliance on technology for all of these activities and a corresponding increased sharing of personal information through technological mediums. Even before the pandemic, a global push was on to strengthen the protection of personal and health information and the results of these various influences has been an enhancement of privacy legislations globally. Compliance with global security laws is now also a larger concern for organizations everywhere.
The webinar will cover:
Global trends in privacy legislations
Some commonalities between privacy laws
Compliance requirements which can affect your organization
Recorded webinar > https://www.youtube.com/watch?v=BKWf6GTlgAM&feature=youtu.be
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001...
https://pecb.com/en/education-and-cer...
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternat...
Slideshare: http://www.slideshare.net/PECBCERTIFI...
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Quarles & Brady
California’s passage of the California Consumer Privacy Act marks the first-of-its-kind comprehensive data privacy statute in the United States. Effective January 1, 2020, amendments are sitting on the Governor’s desk for signature, with new initiatives being discussed as we speak. What are the new developments? And at the end of the day, where do you need to be by December 31st? Join us for a lively discussion on the latest best practices for meeting the new data privacy requirements in California.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Current Privacy and Data Issues (for people who care about open data!)
1. Review of privacy and data
issues
Emily Shaw
National Policy Manager, Sunlight Foundation
2. 4th Amendment + technology = ?
• Riley v. California (2014) – physically locked on phone, but accessible
via cloud or electronic communications service?
• Parallel construction and law enforcement use of NSA-collected data
• US v. Jones (2012) – GPS on car, but uninstalled techniques?
• ACLU study found that 237 of 250 surveyed PDs track cellphones, mostly
without warrants
3. Main 4th Am & data privacy issue areas
1. Collection of new data – what are limits on new
surveillance tools?
2. Access to existing data – what are the standards for
protection?
4. 1. New Surveillance Tools
• Automated License Plate Readers
• Stingray Tracking Devices
• Arial surveillance – known and unknown
• Sensor networks
• Public
• Public-private
5. Automatic License Plate Readers (ALPRs)
• Used regularly around the country, some states are restricting
• Where FOIA-able, can be used to track police behavior
• Not just photographing license plates – car occupants are also
subjects
6. Stingray Cellphone Tracking Devices
• Can collect phone ID, numbers dialed and
previous location (e.g., last tower)
• Used by at least 48 state and local PDs, but full
scale of adoption is not known (DC, Fairfax,
Montgomery County all have)
• Judges have been unfamiliar with tech and
unintentionally authorized
• LE often uses without explicit authorization,
though recent legal pushback
• 10 states now require warrants (yes MD, no VA)
7. Arial surveillance
• 13 states regulate drone use as of end of 2014 session but generally
exempt law enforcement. Local law enforcement use of drones is
mainly unregulated.
• Using technology developed for the war in Iraq, manned surveillance
planes like Persistent Surveillance Systems have been seeking
contracts with local law enforcement.
8. Sensor systems
• Public sensor systems: New York’s Domain Awareness System,
Chicago downtown public sensor array
• Contracted sensor systems: ShotSpotter, persistent sound recording in
over 60 US cities (as in DC, below)
• Public-private connected systems: Oakland’s Domain Awareness
Center (now reduced in scope)
10. 2. Privacy-based limits on access to existing
data
• Government data: 1974 Privacy Act (& FIPs), HIPAA/FERPA,
state variation
• Privately-held data: Electronic Communications Privacy Act
11. Elements of government data protection
• “Personally Identifiable Information” (PII) or “Personal Health
Information” (PHI) protection – e.g., field elimination/transformation
• HIPAA Safe Harbor standard – removal of 18 fields
• 1974 Privacy Act identified the SSN as private data for all
governments
• Privacy Act also mandates that federal agencies provide you access to
data about you held within a “system of records” and to produce
“system of record notices” (SORNs); supposed to limit sharing.
• All privacy laws have a number of exceptions
12. “Notice and Consent” –
Fair Information Practices principles
• There must be no personal data record-keeping system whose very
existence is secret.
• There must be a way for an individual to find out what information about
him is in a record and how it is used.
• There must be a way for an individual to prevent information about him
that was obtained for one purpose from being used or made available for
other purposes without his consent.
• There must be a way for an individual to correct or amend a record of
identifiable information about him.
• Any organization creating, maintaining, using, or disseminating records of
identifiable personal data must assure the reliability of the data for their
intended use and must take precaution to prevent misuse of the data.
13. Electronic Communications Privacy Act
• Federal ECPA (1986) required law enforcement to get a warrant for
individuals’ email, unless it was stored on a third-party server for over
180 days.
• Under current technological practice, this leaves out most email.
• Federal efforts to reform have not been successful so far. Current
efforts: LEADS and ECPA Amendments Acts.
• Digital Due Process Principles created by broad coalition
• Maine and Texas have passed a form of improved ECPA and California,
Montana and Maryland currently considering bills
14. But what about benefits?
Privacy and Data-Sharing for Public Good
• Federal laws like HIPAA and FERPA, and a patchwork of varying state
laws, regularly limit inter-agency data-sharing
There are
two main
possibilities.
15. 1. Keep it restricted.
Share private data within trusted partnerships, using:
• Exceptions for law enforcement
• Exceptions for improvement of a public service
• Exceptions for research to benefit the public
• Legal Mechanisms:
• Memorandums of Understanding
• Statutory change
• Other important elements:
• IRBs
• Social trust
16. 2. Take out the restricted parts!
• Aggregation or anonymization
• Always a balance between privacy and data utility, but an evolving
area
17. If you like microdata, know your PII
• Rule for open data folks: Know your PII. There are at least 4 kinds:
1. Unintentional PII (legally shouldn’t be there, but it is)
2. Unnecessary PII (doesn’t need to be there, but it is)
3. Necessary PII (needs to be there)
4. Legally-identified information
• Know your rights to legally-identified info. Know to ask for
redaction of unnecessary PII. Know to seek better controls for
unintentional PII.
18. The Future! Exciting upcoming
surveillance/public access/privacy issues!
• Police body camera data
• Government relationships with third-party shared location data –
Google, Waze
• Public service location data - Metrocards, EZ Pass (recent example of
Christie’s political use of opponent’s EZ Pass data.)