Lee Rainie, Director of Internet, Science, and Technology research at the Pew Research Center, presented this material on December 12, 2016 to a working group at the National Academy of Sciences. The group is exploring how to think about creating an academic discipline around "data science."
25th May 2018 marks the enforcement date of EU’s General Data Protection Regulation. This new regulation strives to increase privacy for individuals and penalize businesses in breach. The complexity organizations face in managing consumer data is driving the growth of privacy tech solutions that decisively address a slew of privacy compliance challenges.
In this presentation the concept of cyber-ethics is defined, some case studies are provided, as well as suggestions for how to teach cyber-ethics to students. It concludes with questions for consideration.
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
25th May 2018 marks the enforcement date of EU’s General Data Protection Regulation. This new regulation strives to increase privacy for individuals and penalize businesses in breach. The complexity organizations face in managing consumer data is driving the growth of privacy tech solutions that decisively address a slew of privacy compliance challenges.
In this presentation the concept of cyber-ethics is defined, some case studies are provided, as well as suggestions for how to teach cyber-ethics to students. It concludes with questions for consideration.
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
COVID-19 has impacted countries, communities, and individuals in countless ways, from business and school closures to job losses not to undermined loss of lives.
This presentation looks at how AI works, how it is being used presently in Education and then outline some concerns about how AI might be used in education in the future.
I argue that AI has a much greater part to play in Education – particularly in making education more widely available in the developing world and in reducing the cost of education.
The talk then moves on to discuss general ethical concerns about how AI is being used in society, looking at the issue of how we program autonomous vehicles as a case in point. I then outline five areas of concern about the use (and potential abuse) of AI in education arguing that we need to have a much more informed debate before things go too far. With this in mind, I close with some suggestions for courses and reading that might help colleagues to become better informed about the subject.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to delivered a keynote address at WAN-IFRA’s first World Media Policy Forum. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He talked about what research is showing us about privacy strategies and statistics.
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Hamidreza Bolhasani
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and Healthcare Systems
+ History of IoT
+ Internet of Nano Things (IoNT)
+ IoT and IoNT for Medical and Healthcare Systems
+ IoT and Artificial Intelligence (AI)
+ IoT and AI for Health
+ Deep Learning Accelerator
The General Data Protection Regulation (GDPR) becomes enforceable at the end of May, 2018. Designed to strengthen and unify data protection for individuals within the European Union (EU), it comes with a strict set of compliance protocols. And, because GDPR also applies to the export of the export of personal data outside the EU, it is applicable to any entity that uses or exchanges this data. As Vice President and Senior Legal Counsel for a leading international bank, Paul knows firsthand the importance of protecting and securing customer data and intelligence. Join Paul to learn about responsibilities and accountabilities that your organization will need to address.
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
COVID-19 has impacted countries, communities, and individuals in countless ways, from business and school closures to job losses not to undermined loss of lives.
This presentation looks at how AI works, how it is being used presently in Education and then outline some concerns about how AI might be used in education in the future.
I argue that AI has a much greater part to play in Education – particularly in making education more widely available in the developing world and in reducing the cost of education.
The talk then moves on to discuss general ethical concerns about how AI is being used in society, looking at the issue of how we program autonomous vehicles as a case in point. I then outline five areas of concern about the use (and potential abuse) of AI in education arguing that we need to have a much more informed debate before things go too far. With this in mind, I close with some suggestions for courses and reading that might help colleagues to become better informed about the subject.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to delivered a keynote address at WAN-IFRA’s first World Media Policy Forum. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He talked about what research is showing us about privacy strategies and statistics.
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Hamidreza Bolhasani
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and Healthcare Systems
+ History of IoT
+ Internet of Nano Things (IoNT)
+ IoT and IoNT for Medical and Healthcare Systems
+ IoT and Artificial Intelligence (AI)
+ IoT and AI for Health
+ Deep Learning Accelerator
The General Data Protection Regulation (GDPR) becomes enforceable at the end of May, 2018. Designed to strengthen and unify data protection for individuals within the European Union (EU), it comes with a strict set of compliance protocols. And, because GDPR also applies to the export of the export of personal data outside the EU, it is applicable to any entity that uses or exchanges this data. As Vice President and Senior Legal Counsel for a leading international bank, Paul knows firsthand the importance of protecting and securing customer data and intelligence. Join Paul to learn about responsibilities and accountabilities that your organization will need to address.
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Part of the "2016 Annual Conference: Big Data, Health Law, and Bioethics" held at Harvard Law School on May 6, 2016.
This conference aimed to: (1) identify the various ways in which law and ethics intersect with the use of big data in health care and health research, particularly in the United States; (2) understand the way U.S. law (and potentially other legal systems) currently promotes or stands as an obstacle to these potential uses; (3) determine what might be learned from the legal and ethical treatment of uses of big data in other sectors and countries; and (4) examine potential solutions (industry best practices, common law, legislative, executive, domestic and international) for better use of big data in health care and health research in the U.S.
The Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics at Harvard Law School 2016 annual conference was organized in collaboration with the Berkman Center for Internet & Society at Harvard University and the Health Ethics and Policy Lab, University of Zurich.
Learn more at http://petrieflom.law.harvard.edu/events/details/2016-annual-conference.
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
Data democratization and data protection are conflicting forces that both need to be addressed through data governance and security by defining, deploying, and auditing data access control policies. Yet there is a latent “governance gap”: the individuals in the organization accountable for articulating and specifying data policies do not have enough knowledge of the systems to understand how policies are to be implemented, and the technologists who understand the system are not familiar enough with data policy drivers to appropriately define and deploy data protection policies.
This webinar is a must for personnel with an analytics and technology mandate to learn about the root causes of this governance gap and consider ideas for closing the gap.
On-Demand here: https://tdwi.org/webcasts/2021/07/arch-all-closing-the-governance-gap-enabling-governed-self-service-analytics.aspx
Learn about:
- Different roles tasked with managing data policies
- Root causes of the governance gap
- Establishing bridges among the different personas - privacy and compliance teams, data stewards, security teams, IT teams, data users
- Simplifying data policy governance
- Governed self-service analytics and data sharing
- Definitions of data sources and data assets and how to enable delegated policy administration
My Data - A Nordic Model for human-centered personal data management and proc...Joonas Pekkanen
This white paper - written by Open Knowledge Finland and published by the Ministry of Transportation and Communication of Finland - presents a framework, principles, and a model for a human-centric approach to the managing and processing of personal information. The approach – defined as MyData – is based on the right of individuals to access the data collected about them. The core idea is that individuals should be in control of their own data. The MyData approach aims at strengthening digital human rights while opening new opportunities for businesses to develop innovative personal data based services built on mutual trust.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
Published December 14, 2015, in Social media
Research Presentation on Online Social Networks (OSN) Privacy.
CSC 425
Senior Seminar
Hampton University
Fall 2015
---
FVCproductions
https://fvcproductions.com
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 29, 2020 to scholars, policy makers and civil society advocates convened by New York University’s Governance Lab (GovLab). He described findings from two canvassings of hundreds of technology and democracy experts that captured their views about the future of democracy and the future of social and civic innovation by the year 2030. Among other subjects, the experts looked at the impact of misinformation, “techlash” and trust in government institutions.
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 14, 2020 at a gathering sponsored by the International Institute of Communications. He described the most recent Center public opinion surveys since mid-March, covering the impact of the COVID-19 outbreak, racial justice protests that began in the summer, and the final stages of the 2020 presidential election campaign. He particularly examined how and why people are using the internet in the midst of multiple national crises and their concerns about digital divide and homework gap issues. And he covered how the Center has researched the impact of misinformation in recent years.
Lee Rainie, director of internet and technology research, presented a synthesis of the Pew Research Center’s growing explorations of issues related to trust, facts and democracy at a forum hosted by the International Institute of Communications on December 5, 2018. His presentation covered Center findings related to declining trust in institutions, increasing challenges tied to misinformation and the ways in which concerns about trust and truth are linked to public attitudes about democracy.
Lee Rainie, Director of Internet and Technology research, spoke about the skills requirements for jobs in the future at the International Telecommunications Union’s “capacity building symposium” for digital technologies. He discussed the changing structure of jobs and the broad labor force and the attitudes of Americans about the likely changes that robots, artificial intelligence (AI) and other advances in digital life will create in workplaces. The session took place in Santo Domingo on June 18, 2018.
Lee Rainie, director of Internet and Technology research at the Pew Research Center, gave the Holmes Distinguished Lecture at Colorado State University on April 13, 2018. He discussed the research the Center conducted with Elon University’s Imagining the Internet Center about the future of the internet and the way digital technologies will spread to become the “internet of everywhere” and “artificial intelligence” everywhere. He also explored the ways in which experts say this will create improvements in people’s lives and the new challenges – including privacy, digital divides, anti-social behavior and stress tests for how human social and political systems adapt.
Lee Rainie, director of internet and technology research at Pew Research Center, discussed recent findings about the prevalence and impact of online harassment at the Cyber Health and Safety Virtual Summit: 41% of American adults have been harassed online and 66% have witnessed harassment. The findings come from the Center’s recent report on these issues.
Lee Rainie, director of internet and technology research at Pew Research Center, presented these findings at the International Monetary Fund/World Bank’s Youth Dialogue and its program, “A World Without Work?” The findings tie to several pieces of research at the Center, including reports on the state of American jobs, automation in everyday life, and the future of jobs training programs.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, described the Center’s research about public views related to facts and trust after the 2016 election at UPCEA's “Summit on Online Leadership.” He explored how education is affected as students face challenges finding and using knowledge. In addition, he covered the Center’s latest research about how ubiquitous technology shapes the new information landscape for students.
Lee Rainie, director of Internet, Science and Technology Research at the Pew Research Center, spoke on May 10, 2017 to the American Bar Association’s Section of Science and Technology Law about the rise of the Internet of Things and its implications for privacy and cybersecurity. The velocity of change today is remarkable and increasingly challenging to navigate. Rainie discussed Pew Research Center’s reports about “Digital Life in 2025” and “The Internet of Things Will Thrive by 2025,” which present the views of hundreds of “technology builders and analysts” on the future of the internet. He also highlighted the implications of the Center’s reports on “Americans and Cybersecurity” and “What the Public Knows about Cybersecurity.”
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, discussed the Center's latest findings at the Mid-Atlantic Marketing Summit in Washington. He talked about how people use social media, how they think about news in the Trump Era, how they try to establish and act on trust and where they turn for expertise in a period where so much information is contested.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, discussed his group’s latest findings about the role of libraries and librarians on April 3 at Innovative Users Group conference. The latest work shows that many people struggle to find the most trustworthy information and they express a clear hope that librarians can help them. He explored recent research about how people are becoming “lifelong learners” and that library services are an element of how they hope to stay relevant in their jobs, as well as find ways to enrich their lives. He drew on Pew Research Center studies about the information and media sources people use and how they decide what to trust.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, presented at the Computers in Libraries 2017 conference on March 30 new findings about how people have shifted to the mindset of lifelong learners and the implications of that for librarians. He discussed how people’s disposition towards information and knowledge – are they engaged or are they wary? – shapes how they use library resources. He also discussed future technology trends and how librarians will have to adjust to them.
Lee Rainie, director of internet, science and technology research at Pew Research Center, gave this speech at Flagler College in St. Augustine, Florida on Feb. 16, 2017, about the new age of politics and media. He described what Donald Trump's campaign and the dawn of the Trump presidency have taught us about the historic shifts in politics and media that have occurred in the last generation.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, discussed the Center’s latest findings on digital divides based a survey conducted from Sept. 29 to Nov. 6, 2016. The presentation was to the board of Feeding America. Rainie looked at differences tied to internet access, home broadband ownership, and smartphone ownership by several demographic measures, including household income, educational attainment, race and ethnicity, age, and community type. He also discussed the Center’s research related to “digital readiness gaps” among technology users.
Lee Rainie, director of Internet, Science and Technology research at the Pew Research Center, presented the Center’s latest findings about the use of digital technology and its future at the Federal Reserve Board’s Editors and Designers conference in Philadelphia on October 6, 2016. During the keynote he discussed the impact of social media, collaboration, and future trends in technology with a special focus on the issues tied to security and reputational risk that face the Federal Reserve System. He described how the Center’s research can help communicators:
-Disseminate their messages across multiple digital and traditional media channels
-Engage their audience and encourage amateur evangelism
-Assess the impact of their outreach and observe challenges to their material
-Think like long a long-tail organization that also has real-time immediacy
Lee Rainie, director of Internet, Science and Technology Research at the Pew Research Center will cover the latest findings of the center’s public opinion polling about Americans use of libraries and their feelings about the role that libraries play in their lives and in their communities at the American Library Association Conference in Orlando. The new findings will cover the latest library-usage trends, book-reading trends, and insights into the ways more and more Americans hope libraries will offer community-oriented and educational services.
Lee Rainie will present findings from Pew Research Center’s report titled "The Internet of Things Will Thrive by 2025" to the American Bar Association Section of Science & Technology law on March 30, 2016. The report presents the views of hundreds of “technology builders and analysts” on the question of whether Internet of Things will have widespread and beneficial effects on the everyday lives of the public.
Innovation and technology go hand in hand in developing the vision and strategy for the business solutions these leaders employ to engage current and new customers (boomers and beyond), and to establish new business models. Explore the best practices in innovation that drive new revenue generation. How is innovation affected by the adoption of technology by older consumers? Lee Rainie and Andrew Perrin present what works and what doesn’t when innovating in large public and nonprofit organizations at the Boomer Summit in Washington.
Lee Rainie, director of Internet, Science and Technology research at Pew Research Center, will describe how the Center’s research provides guideposts for librarians along three dimensions of library activity: the people, the place, and the platform, at the VALA2016 conference in Melbourne, Australia.
More from Pew Research Center's Internet & American Life Project (20)
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1. Ethics and Data
Lee Rainie
Director, Internet, Science, and Technology Research
Pew Research Center
Lrainie@pewresearch.org
12.12.16
2. Digital life in 2025 - Metaverse
The internet will become ‘like electricity’ —
less visible, yet more deeply embedded in
people’s lives for good and ill
3. Theme 1) Information sharing over the internet will be
effortlessly interwoven into daily life making us smarter,
safer, more efficient. ‘Computication’ involving ‘smart
agents’ will be commonplace.
4. Theme 2) Artificial intelligence, augmented reality, wearable
devices, and big data will make people more aware of
their world and their own behavior – which will especially
aid in health care.
5. Theme 3) Social and business encounters will be shaped by
virtual reality and telepresence. Interfaces with data and
objects will change and become easier. Speech and gesture
interaction will matter more
6. Why big data are different and need fresh
attention from ethics perspectives
• Volume (organic)
• Velocity (real-time)
• Variety (Internet of Things)
• Valence (give analysts more insight)
– Longitudinal
– Location specific
– Combinatorial & searchable
– “Understood” by algorithms
• Variable valuation over time (in ways not
fully known at time of collection)
7. How ethics enters the picture
Privacy = control of access
Freedom from intrusion—into the body, home, protected space
Physical security—protection from bodily harm done by intrusion
Dignity—not being subject to contacts regarded as degrading
Intimacy—the role of controlling access to the person in creating
intimate relationships
Autonomy—controlling access to the person is important to the
individual’s ability to make central choices about his/her life
Identity—protecting access is critical to individual or group
identity
Equality—ease of access to some but not to others may affect
social positions (e.g. equality of women, racial/ethnic minorities)
8. 1. The balance of
forces has shifted in
the networked
age. People are
now “public by
default and
private by effort.”
-- danah boyd
9.
10. • Half of internet users say they worry
about the amount of information
available about them online – up from
30% in 20
• Considering the Future of Privacy,
experts argue that privacy is no longer a
“condition” of American life. Rather, it is
becoming a commodity that would be
purchased.
11. Implications for big data
• Americans want data-sharing arrangements to be
secure
• If security is breached, Americans would like
disclosure mechanisms to be clear and swift
• Americans would like to know if re-identification
processes have compromised their identities
• They would appreciate a process to gain redress
from harms caused by data breaches or re-
identification efforts
12. 2. Privacy is not binary / context matters and
many are in transactional frame of mind
13.
14.
15. Implications for big data
• Americans are not instinctively opposed to
data collection and use. They want to
understand the tradeoffs.
• This puts some burden on big data analysts to
make the case for their work and the benefits
that will emerge from it.
19. Implications for big data
• Consent is so context specific, it is hard to
know for certain how to apply it for non-
obvious uses of the data post facto
• Would “due process” mechanisms be better
suited?
• Would “participatory consent” be possible?
20. 4. Many know they do not
know what is going on ….
Those who know the most
are more worried
and wary
21.
22. Implications for big data
• People do not like surprises and will be
unhappy if their data were used in ways they
did not anticipate or that seem “out of the
blue”
• Is a re-consent process possible?
23. 5. Many are resigned – some are even hopeless –
and their trust is fading
24. How confident are you that your records at
these places will remain private and secure?
76%
69%
66%
61%
57%
56%
55%
54%
50%
46%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Online advertisers
Social media
Search engines
Retailers
Email provider
Cell telephone
Government agencies
Cable TV
Landline telephone
Credit card
Not too confident / Not at all confident
25. Implications for big data
• Transparency (including about data transfers)
• Consider new, networked trust-building
mechanisms
– Third party validation
– Updated ethics codes
– “Hold harmless” mechanisms?
• Algorithmic validation / replication
26. (1) Consumer Privacy Bill of Rights (2) OECD Fair Information Practice Principles
2013
Transparency: easily understandable and
accessible information about privacy and
security practices
Openness Principle: companies should be
open about their practices and policies
related to personal data
Individual Control: consumers have a right
to exercise control over what personal
data companies collect from them and
how they use it
Use Limitation Principle: personal data
should not be disclosed without consumer
consent except when authorized by law
Respect for Context: users have a right to
expect that companies will collect, use,
and disclose personal data in ways that are
consistent with the context in which
consumers provide the data
Purpose Specification Principle: companies
should specify the reasons why data are
collected no later than the time of
collection, and the uses of data should be
compatible with the stated reason for data
collection
Focused Collection: users have a right to
reasonable limits on the personal data that
companies collect and retain
Collection Limitation Principle: there
should be limits on the amount of personal
data collected and, where appropriate, the
company should receive consumer consent
27. Security: users have right to secure and
responsible handling of personal data
Security Safeguards Principle: personal data
should be reasonably protected against risks
such as loss or unauthorized access,
destruction, use, modification, or disclosure of
data
Access and Accuracy: user have right to access
and correct personal data in usable formats, in
a manner that is appropriate to the sensitivity
of the data and the risk of adverse
consequences to consumers if the data are
inaccurate
Individual Participation Principle: consumers
should be able to receive confirmation that an
entity controls their personal data, and they
should be able to access their data within a
reasonable time, in a practical manner, and in
an intelligible form
Data Quality Principle: personal data should be
relevant to the purposes for which they are
used, and, to the extent necessary for those
purposes, the data should be accurate and kept
up-to-date
Accountability: users can expect that their
personal data will be handled only by
companies with appropriate measures in place
to ensure they follow the Consumer Bill of
Rights
Accountability Principle: entities that control
data should ensure the compliance the other
principles
(1) Consumer Privacy Bill of Rights (continued) (2) OECD Fair Information Practice Principles
2013 (continued)
28. New Deal on Data
MIT’s Sandy Pentland
1. You have the right to possess data about
yourself
2. You have the right to full control over your
data
3. You have the right to dispose of or distribute
your data
30. Sources
• The State of Privacy in America: What we learned
http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/
• Privacy and Information Sharing
http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/
• Americans’ Attitudes About Privacy, Security and Surveillance
http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
• Americans’ Privacy Strategies Post-Snowden
http://www.pewinternet.org/2015/03/16/americans-privacy-strategies-post-snowden/
• Public Perceptions of Privacy and Security in the Post-Snowden Era
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
• The Future of Privacy
http://www.pewinternet.org/2014/12/18/future-of-privacy/
• Anonymity, Privacy, and Security Online
http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/
• More Support for Justice Department Than for Apple in Dispute Over Unlocking iPhone
http://www.people-press.org/2016/02/22/more-support-for-justice-department-than-for-apple-in-dispute-over-unlocking-iphone/