Trending Topics in Data Collection & Targeted MarketingcdasLLP
Slideshow to accompany co-sponsored panel from IAB Ad Lab and Cowan, DeBaets, Abrahams & Sheppard LLP. Participants: Joshua B. Sessler, Eleanor M. Lackman, Sarah Hudgins. For more entertainment and digital media law analysis, go to: http://cdas.com/legal/
An introduction to the topic of ethics and big data ending with questions about how to teach data journalists. Part of the Berkman Center for Internet & Society's Study group "Teaching Data Storytelling for Civic Impact".
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
"The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy." A slide show by Adam Thierer presented on January 17, 2012 before George Mason University Law & Economics Center conference on Privacy, Regulation, & Antitrust.
Trending Topics in Data Collection & Targeted MarketingcdasLLP
Slideshow to accompany co-sponsored panel from IAB Ad Lab and Cowan, DeBaets, Abrahams & Sheppard LLP. Participants: Joshua B. Sessler, Eleanor M. Lackman, Sarah Hudgins. For more entertainment and digital media law analysis, go to: http://cdas.com/legal/
An introduction to the topic of ethics and big data ending with questions about how to teach data journalists. Part of the Berkman Center for Internet & Society's Study group "Teaching Data Storytelling for Civic Impact".
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
"The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital Privacy." A slide show by Adam Thierer presented on January 17, 2012 before George Mason University Law & Economics Center conference on Privacy, Regulation, & Antitrust.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
This year I had the opportunity to give a presentation at the World Bank in Washington DC during one of their "brown bag sessions", focused on Privacy, Drones and IoT.
The World Bank is an organization that works worldwide with a wide range of projects, including some initiatives connected with new technologies, and every time, they should evaluate different risks involved, including privacy risks.
The purpose of the presentation was to understand the concept of ‘privacy’ and its different meanings worldwide, how to define the privacy framework and assess the risks arising from the use of new technologies such as drones or IoT, and introduce the Privacy Impact Assessment as an effective tool that we can use in any jurisdiction.
I am going to share some thoughts of these broad and complex chapters that I had to sum up within one hour in this presentation!
Here the full post: http://www.lauravivet.com
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
"Flawed Transparency: Shared Data Collection and Disclosure Challenges for Google Glass and Similar Technologies" presented by Prof. Jonathan I. Ezor of Touro Law Center for Innovation in Business, Law and Technology for the 2013 CEWIT conference in Melville, NY
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...ForgeRock
Stacey Higginbotham - Journalist - As we add the internet to more devices, we're also making more information about ourselves available online. Not necessarily to the public, but to family, marketers, and even law enforcement. What are we sharing? With whom? And what should we do about it?
Making Better Internet Policy: An Analysis of the National Information Infras...Jeremy Pesner
My Masters Thesis mapped diversity of stakeholder involvement to policy outcomes of the National Information Infrastructure. I reviewed many archival documents from the era and interviewed nearly twenty different stakeholders who were involved at the time.
Thesis Committee: D. Linda Garcia, David Ribes, Michael R. Nelson
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
This year I had the opportunity to give a presentation at the World Bank in Washington DC during one of their "brown bag sessions", focused on Privacy, Drones and IoT.
The World Bank is an organization that works worldwide with a wide range of projects, including some initiatives connected with new technologies, and every time, they should evaluate different risks involved, including privacy risks.
The purpose of the presentation was to understand the concept of ‘privacy’ and its different meanings worldwide, how to define the privacy framework and assess the risks arising from the use of new technologies such as drones or IoT, and introduce the Privacy Impact Assessment as an effective tool that we can use in any jurisdiction.
I am going to share some thoughts of these broad and complex chapters that I had to sum up within one hour in this presentation!
Here the full post: http://www.lauravivet.com
10-22-13 Presentation on Google Glass and Privacy ChallengesJonathan Ezor
"Flawed Transparency: Shared Data Collection and Disclosure Challenges for Google Glass and Similar Technologies" presented by Prof. Jonathan I. Ezor of Touro Law Center for Innovation in Business, Law and Technology for the 2013 CEWIT conference in Melville, NY
We Know What You Did Last Summer (and Last Night) - ForgeRock Identity Live A...ForgeRock
Stacey Higginbotham - Journalist - As we add the internet to more devices, we're also making more information about ourselves available online. Not necessarily to the public, but to family, marketers, and even law enforcement. What are we sharing? With whom? And what should we do about it?
Making Better Internet Policy: An Analysis of the National Information Infras...Jeremy Pesner
My Masters Thesis mapped diversity of stakeholder involvement to policy outcomes of the National Information Infrastructure. I reviewed many archival documents from the era and interviewed nearly twenty different stakeholders who were involved at the time.
Thesis Committee: D. Linda Garcia, David Ribes, Michael R. Nelson
This 2 hour presentation provides an overview of Internet Security. The first part addresses current threats such as viruses, Trojans, backdoors, botnets and more. The second part talks about how to protect yourself from these threats by changing the way you surf the ‘Net and by understanding your software and hardware options.
Social networking tools are used by advertisers and marketers, by human resources departments, and of course by job-seekers and employees.
For many companies, the question now is not whether to use social media in its business, but how.
And as with any new aspect of doing business, there are several potential pitfalls that a company must be aware of to avoid running into legal difficulties.
Go through this "Research Proposal" Sample written by one of the expert writer of Instant Assignment Help and get an idea to write a perfect Research Proposal. Still if you are facing any problem in writing your Research Proposal then contact us and hire our professional writers who will assist you in your assignment writing task and will help you to score A+ grade. We provide all kind of writing services to the students at best price. Place your order now to avail extra discounts.
Lee Rainie will present findings from Pew Research Center’s report titled "The Internet of Things Will Thrive by 2025" to the American Bar Association Section of Science & Technology law on March 30, 2016. The report presents the views of hundreds of “technology builders and analysts” on the question of whether Internet of Things will have widespread and beneficial effects on the everyday lives of the public.
The presentation is all about the issues in professional ethics. This talks about the failures of ethics in Information Technology. Sliding thru the powerpoint gives you a hint what are the ethical and social issues in information systems
Keynote talk for VL/HCC 2018. I talk about why developers should care about privacy, what privacy is and why it is hard, some of our group's research in building better tools to help developers (in particular, Coconut IDE Plug-in and PrivacyStreams), and lastly some frameworks for thinking about privacy and developers.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
Successful innovation, which is essential to better health, safety and security, requires freedom to experiment and develop. But there is an array of government rules and processes that increasingly prohibit “permissionless” innovation.
Data protection and other systems of personal data protection around the globe are fundamentally based on principles of "notice and choice". These basic principles are now however assailed from three directions: the chimera of online consent; the lack of opportunity for consent in the world of ambient intelligence or ubiq; and the destruction of purpose specification by the rise of Big Data. This paper connects the dots between all three and considers if anything is left of DP after.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
A Morning of Mobile Privacy - Presenter SlidesDan Wittmers
Consumers’ appetite for mobile has become insatiable; whether it’s smartphones, tablets, wearable tech or connected automobiles, mobile is the fastest growing platform we've ever experienced. These devices are inherently social, yet extremely personal; serving almost as an extension of who we are as individuals. They have given marketers the ability to get closer to their consumers than ever before, but with great power comes great responsibility.
During MLA & Celtra’s Morning of Mobile Privacy, presenters Jules Polonetsky, Jaka Jancar and Alan Chapell shared thoughts on avoiding privacy pitfalls in mobile to garner consumer trust and building digital audiences in a cookieless world. Download the presented slides and feel free to contact the MLA directly with any questions you may have about mobile privacy.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Similar to Privacy & the Internet: An Overview of Key Issues (20)
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
The War on Vertical Integration in the Digital EconomyAdam Thierer
Presentation delivered before the Southern Economic Association on November 16, 2012. Examines concerns about vertical integration in the tech economy and specifically addresses regulatory proposals set forth by Tim Wu (arguing for a "separations principle" for the tech economy) & Jonathan ZIttrain (arguing for "API neutrality" for social media and digital platforms. This presentation is based on two papers published by the Mercatus Center at George Mason University: “Uncreative Destruction: The Misguided War on Vertical Integration in the Information Economy” & “The Perils of Classifying Social Media Platforms as Public Utilities." Both are available at www.Mercatus.org.
Cronyism: History, Costs, Case Studies and SolutionsAdam Thierer
In this presentation, I offer a definition of cronyism, explain its origins, discuss how various academics have traditionally thought about it, outline a variety of case studies, and then propose a range of solutions.
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
Adam Thierer & Berin Szoka of The Progress & Freedom Foundation are attempting to articulate the core principles of cyber-libertarianism to provide the public and policymakers with a better understanding of this alternative vision for ordering the affairs of cyberspace. We invite comments and suggestions regarding how we should refine and build-out this outline. We hope this outline serves as the foundation of a book we eventually want to pen defending what we regard as “Real Internet Freedom.”
Who Needs Parental Controls (Adam Thierer Pff)Adam Thierer
An examination of how many U.S. households actually need parental control technologies by Adam Thierer, a senior fellow at The Progress & Freedom Foundation in Washington, D.C. (www.PFF.org)
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
1. Privacy & The Internet:
An Overview of Key Issues
Adam Thierer
Senior Research Fellow
Mercatus Center at George Mason University
May 19, 2011
2. Outline of Presentation
1) What do we mean by “privacy?
2) Different approaches to defining / protecting
it
3) Trade-offs associated with privacy regulation
4) The challenge of information control
5) Specific regulatory proposals
6) An alternative vision / the “3-E Solution”
2
3. What is Privacy?
• Privacy is a remarkably vague concept
• Means different things to different people
• Varies by cultures
• An ever-changing concept
• Reacts to evolving social norms & technological
change
• If it is a “right,” we must determine how it plays
alongside other, well-established rights (ex:
freedom of speech & press freedoms)
3
4. Privacy’s Fuzzy Concepts
• “Harm”
– How do we define and measure “harm”?
– Is “creepiness” a harm?
– Should “emotional harms” (feelings) be actionable?
• “Ownership”
– Who owns shared data?
– What is personally identifying information?
• “Informed Consent”
– Are strict contracts possible?
• “Sensitive Data”
– Health, financial, what else?
4
5. Alan Westin’s 3 Visions / Paradigms
1. “Privacy Fundamentalists”: Absolutists about
privacy being a “right” & one that trumps
most other values / considerations
2. “Privacy Pragmatists”: Values privacy to
some extent but also sees benefits of
information sharing
3. “Privacy Unconcerned”: Have little concern
about who knows what about them
5
6. How to Enforce / Protect Privacy?
(U.S. vs. E.U. Visions)
United States
• Privacy not viewed as a
fundamental right
• Issue-specific / Sectoral approach
• Bottom-up case law / torts
• States have role; often more
stringent than fed law
• More focus on “opt-out”
• “Big Brother” generally = govt
• = a reactive regime
European Union
• Privacy viewed as a
fundamental “dignity” right
• Broad-based approach
• Top-down “directives”
• More focus on “opt-in”
• “Big Brother” = private
sector as much as govt
• = a preemptive regime
6
7. The U.S. Sectoral / Issue-Specific
Approach to Privacy Law
• Privacy Act (1974) = govt data collection
• FERPA (1974) = fed-funded education institutions
• Cable Comm. Policy Act (1984) = cable data
• Video Privacy Prot. Act (1988) = video rental records
• Driver’s Privacy Prot. Act (1994) = DMV records
• HIPPA (1996) = health records
• Gramm-Leach-Bliley (1999) = financial records
• COPPA (1998) = kids’ (under 13) online privacy
• CAN-SPAM Act (1993)
• Do Not Call registry (2003)
7
8. The Battle over Online Privacy
• Policy battle has been raging since late 1990s
• FTC & Congress appeared poised to act
around 2000, but...
– Industry self-regulation was given a chance
– 9/11 preempted this debate to some extent
• Framework for past decade:
– Focus on Notice / Choice / Access / Security
– Rise of self-regulatory bodies & mechanisms
– Targeted FTC & state enforcement
8
9. New Fault Lines in the Online Privacy Wars
(and the legislative response)
• New activity driven by:
– Fears of “targeting” & “tracking” = “creepy” factor
– General unease with ubiquity of data access & availability
Proposals:
• “Baseline legislation” / FIPPS (Kerry-McCain, Rush, Stearns)
• “Do Not Track” mechanism + regulation (Speier & Rockefeller bills)
• “Do Not Track Kids” / COPPA expansion (Markey-Barton)
• Internet “Eraser Button” (Markey-Barton)
• Geolocation restrictions (Markey-Barton)
• Data breach disclosure (Kerry-McCain)
• Data minimization requirements (Kerry-McCain, Rush)
• ECPA vs. Data retention laws
9
10. Privacy Trade-Offs & Opportunity Costs
• Internet feels like the ultimate “free lunch;” most sites,
services & content are free of charge.
• But, in reality, there is no free lunch.
• The implicit quid pro quo of online life: you gotta give a little
to get a little (or a lot!). And most people like this deal.
• The Net is powered by advertising & data collection.
Information is lifeblood of Digital Economy.
• Info may be collected to facilitate a better browsing
experience or to help the site or service remain viable.
• In essence, information used in lieu of payment.
• Regulation could break this system & have other unintended
consequences.
10
11. The Problem of Information Control
Even if we agree privacy is important and
worth protecting, it will be very hard.
• “Information wants to be free” - Stewart
Brand
– and that includes personal information
• “The Net interprets censorship as damage and
routes around it.” - John Gilmore
– and privacy regulation is, at root, a form of data
flow censorship
11
12. 10 Factors That Complicate
Information Control Efforts
Drivers Results
Digitization Convergence
Intangibility Decentralized, Distributed
Networking
Moore’s Law Scale & Scope
Falling Storage Costs Volume
Ubiquitous High-Speed
Networks
User-Generation of Content
and Self-Revelation of Data
12
13. Some Facts (or ‘Why Putting
Genies Back in Bottles is So Hard’)
• Facebook: users submit @ 650,000 comments on the 100
million pieces of content served up every minute on its site.
• YouTube: over 35 hours of video uploaded every minute.
• Twitter: 300 million users produce 140 million Tweets / day, =
a billion Tweets every 8 days. (@ 1,600 per second)
• Apple: more than three billion apps have been downloaded
from its App Store by customers in over 77 countries.
“Humankind shared 65 exabytes of information in 2007, the
equivalent of every person in the world sending out the contents
of six newspapers every day.” - Hilbert and Lopez
13
14. “The Privacy Paradox”
• “People value their privacy, but then go out of
their way to give it up.” – Larry Downes, Laws of
Disruption
• “We give away information about ourselves—
voluntarily leave visible footprints of our daily
lives—because we judge, perhaps without
thinking about it very much, that the benefits
outweigh the costs. To be sure, the benefits
are many.” – Abelson, Ledeen & Lewis, Blown to Bits
14
15. What We Must Learn to Accept
• “Once information is out there, it is very hard to keep
track of who has it and what he has done with it.” --
David Friedman, Future Imperfect
• Privacy is not “dead” as some have claimed, but it is
different than it was in past
– New realities of info dissemination, accessibility,
searchability
• Rushed, heavy-handed solutions will be costly and
perhaps not effective anyway
15
17. “Do Not Track” – The Theory
• Could be voluntary, but might be mandated.
• Would demand that websites honor a
machine-readable header indicating that the
user did not want to be “tracked.”
• In theory, this will allow privacy-sensitive web
surfers to signal to websites they would like to
opt-out of any targeted advertising, or not
have any information about them collected
when visiting sites.
17
18. “Do Not Track” – Potential Downsides
• Costs: If law breaks the quid pro quo something must give…
– Paywalls and higher prices?
– less relevant or more intrusive advertising?
– Fewer services? Less media content?
• Int’l Competitiveness: Goldfarb & Tucker - “after the [EU’s]
Privacy Directive was passed [in 2002], advertising
effectiveness decreased on average by around 65 % in
Europe.” Because regulation decreases ad effectiveness,
“this may change the number and types of businesses
sustained by the advertising-supporting Internet.”
• Practical? Does DNT scale? Apply internationally? To other
devices?
• Regulatory creep: Will it serve as a template for other
forms of Net regulation?
18
19. COPPA Expansion – Background
• Special concerns about youth & online
marketing
• COPPA (‘98) was first attempt to deal with it
• Requires “verifiable parental consent” for sites
“directed at” children that collect info
• FTC defines rules (safe harbors) and enforces
• Never constitutionally challenged
19
20. COPPA Expansion – Potential Problems
• What works for under 13 not likely to work for
teens
• Would basically require mandatory age
verification of all web surfers
• COPPA becomes COPA? = unconstitutional
• Serious free speech issues
• Irony = in name of protecting privacy, more info
about users would need to be collected!
20
21. Internet “Eraser Button” Concept
• Goal: Make it easier for people (esp. kids) to
delete posted comments or content they later
regret
• Practical Problem: Where is this button? Who
controls it? What if info is shared content? Back-door
to fraud / abuse?
• Principled Problem: Conflicts mightily with
freedom of speech & press freedoms
21
23. The Conflict of Visions:
Anticipatory Regulation vs. Resiliency
• Long-standing conflict of visions about how to
best manage risks:
1. Anticipation
– Prevention is prime value
– Focus on the “Precautionary Principle”
2. Resiliency
– Experimentation is prime value
– Focus on Learning / Coping
23
24. Anticipatory vs. Resiliency-Based
Solutions
Anticipatory Reg Approach
• Mandatory “Do Not Track”
• Mandatory “Opt-In” for all
data collection
• Bans on apps / functionality
• Restrictions on sharing / all
defaults to private
• “Eraser Button” mandates /
demands for data deletion
Resiliency Approach
• Voluntary “Do Not Track”
• Offer opt-outs (encourages
experimentation & innovation)
• No preemptive bans on tech
• No restrictions on sharing, but
education about downsides
• Voluntary data “purges” &
“data hygiene”
24
25. Constructive Alternatives to Regulation
1. Be careful @ how “harm” & “market failure”
defined. (ex: Creepiness not a likely harm; data
breech likely a harm)
2. Focus on a “3-E Solution” to problems:
Education, Empowerment, & (Targeted)
Enforcement
3. Encourage corporate and personal responsibility
4. Think of privacy as an evolving set of norms,
interactions & experiments
5. Don’t Panic! We can learn to cope with
technological change.
25
27. #1: Educational Solutions
• Education at all levels
• Awareness campaigns from privacy advocates,
govt, industry, educators, etc.
• Encouraging better online “netiquette” and
“data hygiene”
• Push for better transparency across the board
– Better notice & labeling
– Need more watch-dogging of privacy promises
made by companies
27
28. #2: Empowerment Solutions
• = Helping users help themselves
• User “self-help” tools are multiplying
– AdBlockPlus, NoScript, other browser tools
• Industry self-regulation
– More cross-industry collaboration on privacy
programs
– More education efforts (better notice)
– Best practices & better defaults
– More and better tools to respond to new
developments and needs
28
29. #3: Enforcement Solutions
• Holding companies to the promises they make
– stepped-up FTC Sec. 5 enforcement
• Demand better notice & transparency
• Mandatory disclosure of data breaches
• Targeted regulation of sensitive data, but with
flexibility
29
30. Conclusion / Key Takeaways
• “Privacy” is incredibly complicated & contentious
• Privacy can conflict with other values / rights
• All regulation entails costs & trade-offs
• There is no free lunch
• Information control is very, very hard
• “Silver-bullet” solutions rarely work
• The more education & transparency the better
• Resiliency is generally a smarter strategy compared to
anticipatory, top-down regulation
• And, once more… don’t panic! We’ll get through and adjust.
30
31. Further Readings
• Adam Thierer, Filing to Federal Trade Commission in ‘Do Not Track’
Proceeding, February 18, 2011.
• Adam Thierer, “Birth of the ‘Privacy Tax,’” Forbes, April 4, 2011.
• Adam Thierer, “Online Privacy Regulation: Likely More Complicated
(And Costly) Than Imagined,” Mercatus on Policy, Mercatus Center
at George Mason University, December 6, 2010 .
• Adam Thierer, “Erasing Our Past on the Internet,” Forbes, April 17,
2011.
• Adam Thierer, “Unappreciated Benefits of Advertising and
Commercial Speech,” Mercatus on Point 86, Mercatus Center,
January 2011.
• Berin Szoka and Adam Thierer, “COPPA 2.0: The New Battle over
Privacy, Age Verification, Online Safety & Free Speech,” Progress on
Point 16, no.11, The Progress & Freedom Foundation, May 21,
2009.
31