Presentation on mobile phone-only social networks, photo sharing apps and consumer data for "Law of the Smartphone" Symposium, Whittier Law School, October 2011
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
The document discusses challenges around privacy and data protection in the modern era of rapid technological change. It notes that key concepts like "data", "metadata", and "artificial intelligence" are not clearly defined in the 1979 Telecommunications Act and recommends updating the Act to address today's data-driven society. The document advocates for a decentralized, rights-based approach to "data democratization" to ensure data policies support societal advancement while protecting citizens' privacy and dignity.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
This document discusses issues around data ownership on e-commerce platforms in China. It begins by providing background on data rights regulations in China and how they are addressed across various laws. It then analyzes the current status of legislation, law enforcement, and judicial practices regarding data rights protection on e-commerce platforms. Several issues are identified in China's legal protection of data ownership, including a lack of clear entitlement norms, potential for data leakage, and unclear legal use of data rights. The document argues that China's legal system for data rights protection needs improvement and proposes developing comprehensive regulations tailored for China's e-commerce context.
Trust Factory is developing standards-based security technologies using linked data and open credentials to help individuals and organizations securely manage and share their digital records and data on the web. This includes enabling creators to assert rights over their data, describing data using ontologies to improve usability, and providing private and efficient access to verified information through user-defined sharing terms and permissions. The goal is to empower data owners to control how their data is used while supporting effective data storage, accessibility, and applications through open standards and decentralized technologies.
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
This document discusses the legal risks of data collection, storage, and use in marketing. It notes that while data can provide benefits, over-collection poses risks. The document outlines what types of personal data are commonly collected from various online and offline sources, and why (for purposes like marketing, risk assessment, and fraud prevention). However, collecting more data than necessary violates the Collection Limitation Principle. The document also discusses consumer and policymaker attitudes toward privacy and data use, as well as recent privacy controversies and breaches involving companies like Google, Apple, and comScore. It emphasizes having a data governance plan and security response plan to properly assess needs and address vulnerabilities.
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
This document discusses the legal risks of data collection, storage, and use for marketing purposes. It notes that while data provides benefits, over-collection can pose privacy and legal issues. The document examines who collects data, what types of data are collected, why it's collected, and principles that govern collection. It also provides tips on minimizing risk, such as having a data governance plan, collecting only what is necessary, and being prepared in the event of a security breach. The overall message is that while data is valuable for business, collectors must respect privacy and limit their practices to authorized uses.
The FTC issued a preliminary staff report proposing a new privacy framework for businesses and policymakers. The report recommends that companies implement privacy by design, provide simplified privacy choices to consumers, and increase transparency around data collection and use. It also proposed a controversial "Do Not Track" mechanism that would allow consumers to opt-out of online tracking. The report is seeking public comments on these issues and will influence the debate around balancing consumer privacy and business interests online.
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
This document provides a submission to the Senate regarding financial technology and regulatory technology (FinTech and RegTech). It discusses the development of an "information bank" concept over 20 years to create a knowledge banking ecosystem built on open standards and a decentralized infrastructure. The submission argues this approach could provide an alternative that supports human agency, improves productivity, and addresses issues around surveillance, exploitation of knowledge workers, and challenges to liberal democracies from new technologies. It calls for governmental support to build new socio-economic cyber infrastructure through an international cooperative project.
Presentation on mobile phone-only social networks, photo sharing apps and consumer data for "Law of the Smartphone" Symposium, Whittier Law School, October 2011
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
The document discusses challenges around privacy and data protection in the modern era of rapid technological change. It notes that key concepts like "data", "metadata", and "artificial intelligence" are not clearly defined in the 1979 Telecommunications Act and recommends updating the Act to address today's data-driven society. The document advocates for a decentralized, rights-based approach to "data democratization" to ensure data policies support societal advancement while protecting citizens' privacy and dignity.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
This document discusses issues around data ownership on e-commerce platforms in China. It begins by providing background on data rights regulations in China and how they are addressed across various laws. It then analyzes the current status of legislation, law enforcement, and judicial practices regarding data rights protection on e-commerce platforms. Several issues are identified in China's legal protection of data ownership, including a lack of clear entitlement norms, potential for data leakage, and unclear legal use of data rights. The document argues that China's legal system for data rights protection needs improvement and proposes developing comprehensive regulations tailored for China's e-commerce context.
Trust Factory is developing standards-based security technologies using linked data and open credentials to help individuals and organizations securely manage and share their digital records and data on the web. This includes enabling creators to assert rights over their data, describing data using ontologies to improve usability, and providing private and efficient access to verified information through user-defined sharing terms and permissions. The goal is to empower data owners to control how their data is used while supporting effective data storage, accessibility, and applications through open standards and decentralized technologies.
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
This document discusses the legal risks of data collection, storage, and use in marketing. It notes that while data can provide benefits, over-collection poses risks. The document outlines what types of personal data are commonly collected from various online and offline sources, and why (for purposes like marketing, risk assessment, and fraud prevention). However, collecting more data than necessary violates the Collection Limitation Principle. The document also discusses consumer and policymaker attitudes toward privacy and data use, as well as recent privacy controversies and breaches involving companies like Google, Apple, and comScore. It emphasizes having a data governance plan and security response plan to properly assess needs and address vulnerabilities.
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
This document discusses the legal risks of data collection, storage, and use for marketing purposes. It notes that while data provides benefits, over-collection can pose privacy and legal issues. The document examines who collects data, what types of data are collected, why it's collected, and principles that govern collection. It also provides tips on minimizing risk, such as having a data governance plan, collecting only what is necessary, and being prepared in the event of a security breach. The overall message is that while data is valuable for business, collectors must respect privacy and limit their practices to authorized uses.
The FTC issued a preliminary staff report proposing a new privacy framework for businesses and policymakers. The report recommends that companies implement privacy by design, provide simplified privacy choices to consumers, and increase transparency around data collection and use. It also proposed a controversial "Do Not Track" mechanism that would allow consumers to opt-out of online tracking. The report is seeking public comments on these issues and will influence the debate around balancing consumer privacy and business interests online.
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
This document provides a submission to the Senate regarding financial technology and regulatory technology (FinTech and RegTech). It discusses the development of an "information bank" concept over 20 years to create a knowledge banking ecosystem built on open standards and a decentralized infrastructure. The submission argues this approach could provide an alternative that supports human agency, improves productivity, and addresses issues around surveillance, exploitation of knowledge workers, and challenges to liberal democracies from new technologies. It calls for governmental support to build new socio-economic cyber infrastructure through an international cooperative project.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
The purpose of this article is to provide a quantitative analysis of privacy-compromising mechanisms on the top 1 million websites as determined by Alexa. It is demonstrated that nearly 9 in 10 websites leak user data to parties of which the user is likely unaware; more than 6 in 10 websites spawn third-party cookies; and more than 8 in 10 websites load Javascript code. Sites that leak user data contact an average of nine external domains. Most importantly, by tracing the flows of personal browsing histories on the Web, it is possible to discover the corporations that profit from tracking users. Although many companies track users online, the overall landscape is highly consolidated, with the top corporation, Google, tracking users on nearly 8 of 10 sites in the Alexa top 1 million. Finally, by consulting internal NSA documents leaked by Edward Snowden, it has been determined that roughly one in five websites are potentially vulnerable to known NSA spying techniques at the time of analysis.
A Look at Lawyers' Use of Technology in 2011Nicole Black
This article discusses lawyers' increasing use of emerging technologies based on the results of the 2011 ABA Legal Technology Survey. It finds that lawyers are more open to technologies like cloud computing, mobile devices, and social media. Specifically:
- Cloud computing is used by lawyers for document sharing (23%), communication (23%), billing (17%), and scheduling (15%). Convenience of access from anywhere drives adoption.
- Smartphone use rose dramatically, with the iPhone seeing the largest gains. Tablet use is also rising, with the iPad dominating.
- LinkedIn is the most popular social media site for lawyers, used for networking and career development.
- Technologies are making lawyers' jobs easier and more flexible
Digital assets ep article february 2015robertpperry
This document discusses the importance of estate planning for digital assets. It notes that legislation has not kept up with the growth of digital assets, making it difficult for heirs to access these assets. It defines different types of digital assets like personal files, social media accounts, financial accounts, business accounts, domain names, and loyalty program benefits. The document outlines reasons for planning, such as making things easier for executors, preventing identity theft, avoiding financial losses, and preventing unwanted secrets from being discovered. It also discusses user agreements and federal laws regarding digital assets.
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
Source: http://www.helioteixeira.org/ How to use Collective Intelligence techniques to ensure that your web application can extract valuable data from its usage and deliver that value right back to the users. (MODULE 1)
The document provides an overview of ethics, legislation, and privacy issues related to big data. It discusses the necessity of regulating big data and the differences between privacy and data protection. It also provides details on the General Data Protection Regulation (GDPR), including its goals, requirements for companies, and individual rights it aims to protect.
Data mining involves extracting and analyzing large amounts of data to find patterns. While it provides benefits to companies, some view it as an invasion of privacy. There is little regulation in the US on data mining. The government has broad powers to collect data under laws like the Patriot Act. Data breaches have compromised over 800 million records, revealing sensitive personal information. Retailers use data mining to target customers, while gamers mine data to learn about new game content. More regulation may be needed to protect personal privacy as data mining becomes more widespread.
To find a lawyer becomes a headache for business organization or general people. Sometimes people face many difficulties to find proper lawyer as their requirements, because of information gap. In addition, it is also difficult to find experienced lawyer. Usually, in order to hire a lawyer people need to meet him physically which is time-consuming and expensive. The delivery of legal services remains largely fragmented, outdated, and inefficient.The main purpose of this paper is to do empirical research about how the Internet is currently failing laypeople who are searching online for the legal help to their life problems and what a future agenda of user-centered standards and practices for better legal help on the Internet could be. It initially looks at the existing literature about how the Internet can best be used as legal asset and the situation quo of lawful help websites. Then it metering and looks at negative client reports and Investigates of legal help websites. Finally, it presents the primary study of how people search for resources to solve a legal problem, how they scorn and counts legal aid services online, and their recompose on which existing lawful help websites they consider to be the most usable, the most faithful, and the most valued. This data is necessary to propose new best exercises about how these tech-based services can best serve people, in terms of usability, characteristic of service, and safeguard of the users' interests. It also ensures the importance of the Internet as a lawful help service and highlights the need for more experiment and development on better online legal service help websites that fit general people needs and preferences
ONLINE LEGAL SERVICE: THE PRESENT AND FUTUREijcsit
To find a lawyer becomes a headache for business organization or general people. Sometimes people face many difficulties to find proper lawyer as their requirements, because of information gap. In addition, it is also difficult to find experienced lawyer. Usually, in order to hire a lawyer people need to meet him physically which is time-consuming and expensive. The delivery of legal services remains largely fragmented, outdated, and inefficient.The main purpose of this paper is to do empirical research about how the Internet is currently failing laypeople who are searching online for the legal help to their life problems and what a future agenda of user-centered standards and practices for better legal help on the Internet could be. It initially looks at the existing literature about how the Internet can best be used as legal asset and the situation quo of lawful help websites. Then it metering and looks at negative client reports and Investigates of legal help websites. Finally, it presents the primary study of how people search for resources to solve a legal problem, how they scorn and counts legal aid services online, and their recompose on which existing lawful help websites they consider to be the most usable, the most faithful, and the most valued. This data is necessary to propose new best exercises about how these tech-based services can best serve people, in terms of usability, characteristic of service, and safeguard of the users' interests. It also ensures the importance of the Internet as a lawful help service and highlights the need for more experiment and development on better online legal service help websites that fit general people needs and preferences.
Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.
The document discusses the future of online legal services and their potential impact on the legal profession. It notes that while the ABA has encouraged lawyers to utilize the internet to serve clients, the profession has been slow to adopt online legal services. New companies like LegalZoom now offer online legal documents and forms directly to consumers at lower costs than traditional lawyers. If rules do not change to allow innovative online legal services, solo and small law firms may have trouble competing with these new non-lawyer alternatives. The future of law practice lies in embracing technologies like online legal services that make legal help more accessible and affordable.
This document provides an analysis of LinkedIn's Terms of Service by summarizing key points about LinkedIn as a social media platform for professionals and highlighting important clauses in their Terms of Service. It notes that by agreeing to the Terms of Service, users agree to provide personal information and allow LinkedIn broad rights to collect and use member data. However, the document raises concerns that the Terms give up too much privacy and control over personal information and content.
This document discusses several legal issues related to technology. It identifies data security, privacy concerns with big data, and evolving contract and licensing issues with cloud computing as significant concerns. It also notes challenges around compliance with open source licenses, liability for mobile payments, risks of social media use, regulation of virtual currencies, and responsibility for remote automation and control technologies.
The document discusses how citizens are increasingly relying on the internet for information and how this shift toward online self-sufficiency affects credibility. Some key points:
- People are using the internet more for tasks like booking travel and doing school projects instead of relying on physical sources.
- However, online users may not always find the information they need, and it can be harder to verify credibility without physical cues.
- Credibility is shifting from predetermined authorities to reliability based on synthesizing information from multiple sources.
- Trends like open source software facilitate this shift, as online tools are built collaboratively through an open process.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
If we don’t balance the human values that we care about with the compelling uses of big data, our society risks abandoning them for the sake of mere innovation or expediency.
Ben Torres/Bloomberg via Getty Images
These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.
Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.
This document discusses the concept of an "inforg", which is defined as an informationally embodied organism or entity made up of information that exists in the infosphere. An infosphere refers to an environment populated by informational entities. The document suggests that an inforg can help individuals store and manage verifiable claims about themselves, their data, possessions, relationships, and identity. It poses questions about how a regulated knowledge banking industry could be established to ensure individuals maintain control and ownership over their own inforgs through independent information management systems. The goal would be to define how inforgs are stored, maintained, and used in a way that supports individuals' privacy, security, and participation in civic processes through defined knowledge fiduc
Noggin - World's first marketplace for Personal DataNoggin Asia
Direct marketing is expensive; and customer details are usually unknown. Customer on other hand is worried about personal data. Noggin is a marketplace to connect these two. Discover us at www.nogginasia.com. Consumers can earn by sharing personal data
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
This document discusses social media as a new format for records and issues around managing records in social media. It notes that social media content may be considered government records but capturing authentic copies can be challenging given the dynamic nature of social media. It also discusses jurisdiction issues and privacy concerns around data collection by corporations and governments from social media and online activities.
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
With the advent of the era of big data, the utilization rate of data in business activities is getting higher and higher, and the competition is also getting bigger and bigger, and the disputes about data among operators of e commerce platform are also increasing. At present, there is a relative lack of laws and regulations on data rights and interests of e commerce platform operators in China. E commerce platform operators do not have specific and in depth clarity on data collation, collection and processing, which is not comprehensive. With the rapid development of big data in European and American countries in the 20th century, the corresponding laws and regulations and theoretical academic research also appear. China can study the similarities, which has great reference significance for the development of big data and the improvement of laws and regulations in China. This paper will investigate and study the data rights and interests of e commerce platform operators, and deeply analyze the characteristics, attributes, protection mode and basic principles of data rights and interests, especially the legal regulation of e commerce platform operators data rights and interests. Combined with the law of e commerce, the law of data security, the law of network security, the law of personal information protection and other relevant legal theories, this paper analyzes the data rights and interests of e commerce platform operators, discusses the legal protection and implementation practice of the data rights and interests, and puts forward some countermeasures to improve the legislation, law enforcement and judicial protection. For the boundary coordination between operator data and user data of e commerce platform, this paper analyzes and divides the boundary, and puts forward relevant improvement countermeasures. China needs to speed up the improvement of e commerce platform operators data rights and interests protection legislation, improve the regulation of e commerce platform operators unfair competition behavior Improve the legal regulation of data monopoly of e commerce platform operators, bring enterprise data into the adjustment scope of anti monopoly law, and investigate the legal responsibility after data monopoly The data rights of the operators of e commerce platform should be given clearly Improve the allocation of data legal liability of operators of e commerce platform. Changjun Wu | Wenyu Wei "Research on Legal Protection of Data Rights of E-Commerce Platform Operators" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44955.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44955/research-on-legal-protection-of-data-rights-of-ecommerce-platform-operators/changjun-wu
The FDA’s role in the approval and subsequent review of Vioxx, a.docxmehek4
The FDA’s role in the approval and subsequent review of Vioxx, a pain medication with- drawn from the market by its manufacturer after it was associated with heart attacks and strokes, is discussed in a case at the end of this textbook.
In 2010, Congress established, as part of the Dodd-Frank Act (also discussed in Chapters 8 and 14), a new consumer regulatory body, called the Consumer Financial Pro- tection Bureau. The purposes and actions of this agency are described in Exhibit 15.B. The debate over whether government should become involved in protecting consumer privacy is discussed in the next section of this chapter.
All seven government regulatory agencies shown in Figure 15.2 are authorized by law to intervene directly into the very center of free market activities, if that is considered nec- essary to protect consumers. In other words, consumer protection laws and agencies substi- tute government-mandated standards and the decisions of government officials for decision making by private buyers and sellers.
Consumer Privacy in the Digital Age
In the early 21st century, rapidly evolving information technologies have given new ur- gency to the broad issue of consumer privacy. Shoppers have always been concerned that information they reveal in the course of a sales transaction—for example, their credit card or driver’s license numbers—might be misused. But in recent years, fast-changing tech- nologies have increasingly enabled businesses to collect, buy, sell, and use vast amounts of personal data about their customers and potential customers. The danger is not only that this information might rarely be used fraudulently, but also that its collection represents a violation of privacy and might lead to unanticipated harms.
Individuals are often unaware of how much information about themselves they reveal to others as they shop, interact with friends, play games, or look for information online. A variety of technologies make this possible. Many websites place cookies—or more power- ful Flash cookies—on a computer hard drive, to identify the user during each subsequent visit and to build profiles of their behavior over time. Web beacons embedded in e-mails and websites retrieve information about the viewer. In deep packet inspection, third parties access and analyze digital packets of information sent over the Internet, such as pieces of e-mails or Skype calls, to infer characteristics of the sender. Not just retailers, but also Internet service providers such as Comcast, search engine operators such as Google, and informational services such as Dictionary.com, also track their users. So-called data aggregators purchase and combine data about individuals collected from various sources and compile them into highly detailed portraits to be sold to retailers, service providers, and advertisers.15
An example of a data aggregator is Acxiom Corporation, based in Conway, Arkansas. Acxiom, called the “quiet giant” of the industry, has built the larg ...
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
The purpose of this article is to provide a quantitative analysis of privacy-compromising mechanisms on the top 1 million websites as determined by Alexa. It is demonstrated that nearly 9 in 10 websites leak user data to parties of which the user is likely unaware; more than 6 in 10 websites spawn third-party cookies; and more than 8 in 10 websites load Javascript code. Sites that leak user data contact an average of nine external domains. Most importantly, by tracing the flows of personal browsing histories on the Web, it is possible to discover the corporations that profit from tracking users. Although many companies track users online, the overall landscape is highly consolidated, with the top corporation, Google, tracking users on nearly 8 of 10 sites in the Alexa top 1 million. Finally, by consulting internal NSA documents leaked by Edward Snowden, it has been determined that roughly one in five websites are potentially vulnerable to known NSA spying techniques at the time of analysis.
A Look at Lawyers' Use of Technology in 2011Nicole Black
This article discusses lawyers' increasing use of emerging technologies based on the results of the 2011 ABA Legal Technology Survey. It finds that lawyers are more open to technologies like cloud computing, mobile devices, and social media. Specifically:
- Cloud computing is used by lawyers for document sharing (23%), communication (23%), billing (17%), and scheduling (15%). Convenience of access from anywhere drives adoption.
- Smartphone use rose dramatically, with the iPhone seeing the largest gains. Tablet use is also rising, with the iPad dominating.
- LinkedIn is the most popular social media site for lawyers, used for networking and career development.
- Technologies are making lawyers' jobs easier and more flexible
Digital assets ep article february 2015robertpperry
This document discusses the importance of estate planning for digital assets. It notes that legislation has not kept up with the growth of digital assets, making it difficult for heirs to access these assets. It defines different types of digital assets like personal files, social media accounts, financial accounts, business accounts, domain names, and loyalty program benefits. The document outlines reasons for planning, such as making things easier for executors, preventing identity theft, avoiding financial losses, and preventing unwanted secrets from being discovered. It also discusses user agreements and federal laws regarding digital assets.
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
Source: http://www.helioteixeira.org/ How to use Collective Intelligence techniques to ensure that your web application can extract valuable data from its usage and deliver that value right back to the users. (MODULE 1)
The document provides an overview of ethics, legislation, and privacy issues related to big data. It discusses the necessity of regulating big data and the differences between privacy and data protection. It also provides details on the General Data Protection Regulation (GDPR), including its goals, requirements for companies, and individual rights it aims to protect.
Data mining involves extracting and analyzing large amounts of data to find patterns. While it provides benefits to companies, some view it as an invasion of privacy. There is little regulation in the US on data mining. The government has broad powers to collect data under laws like the Patriot Act. Data breaches have compromised over 800 million records, revealing sensitive personal information. Retailers use data mining to target customers, while gamers mine data to learn about new game content. More regulation may be needed to protect personal privacy as data mining becomes more widespread.
To find a lawyer becomes a headache for business organization or general people. Sometimes people face many difficulties to find proper lawyer as their requirements, because of information gap. In addition, it is also difficult to find experienced lawyer. Usually, in order to hire a lawyer people need to meet him physically which is time-consuming and expensive. The delivery of legal services remains largely fragmented, outdated, and inefficient.The main purpose of this paper is to do empirical research about how the Internet is currently failing laypeople who are searching online for the legal help to their life problems and what a future agenda of user-centered standards and practices for better legal help on the Internet could be. It initially looks at the existing literature about how the Internet can best be used as legal asset and the situation quo of lawful help websites. Then it metering and looks at negative client reports and Investigates of legal help websites. Finally, it presents the primary study of how people search for resources to solve a legal problem, how they scorn and counts legal aid services online, and their recompose on which existing lawful help websites they consider to be the most usable, the most faithful, and the most valued. This data is necessary to propose new best exercises about how these tech-based services can best serve people, in terms of usability, characteristic of service, and safeguard of the users' interests. It also ensures the importance of the Internet as a lawful help service and highlights the need for more experiment and development on better online legal service help websites that fit general people needs and preferences
ONLINE LEGAL SERVICE: THE PRESENT AND FUTUREijcsit
To find a lawyer becomes a headache for business organization or general people. Sometimes people face many difficulties to find proper lawyer as their requirements, because of information gap. In addition, it is also difficult to find experienced lawyer. Usually, in order to hire a lawyer people need to meet him physically which is time-consuming and expensive. The delivery of legal services remains largely fragmented, outdated, and inefficient.The main purpose of this paper is to do empirical research about how the Internet is currently failing laypeople who are searching online for the legal help to their life problems and what a future agenda of user-centered standards and practices for better legal help on the Internet could be. It initially looks at the existing literature about how the Internet can best be used as legal asset and the situation quo of lawful help websites. Then it metering and looks at negative client reports and Investigates of legal help websites. Finally, it presents the primary study of how people search for resources to solve a legal problem, how they scorn and counts legal aid services online, and their recompose on which existing lawful help websites they consider to be the most usable, the most faithful, and the most valued. This data is necessary to propose new best exercises about how these tech-based services can best serve people, in terms of usability, characteristic of service, and safeguard of the users' interests. It also ensures the importance of the Internet as a lawful help service and highlights the need for more experiment and development on better online legal service help websites that fit general people needs and preferences.
Presentation by Cori Faklaris and Sara Anne Hook on Sept. 18, 2015. An overview of case law, articles and key findings as to how electronic discovery in U.S. legal system is affected by the rise of Snapchat, WhatsApp and other mobile messaging apps in the face of the pending update to the Federal Rules of Civil Procedure. This presentation was originally prepared for the ATINER 2015 International Conference on Law in Athens, Greece. These revised slides were used during a Brown Bag talk to the Department of Human-Centered Computing, School of Informatics and Computing, Indiana University-Purdue University Indianapolis.
The document discusses the future of online legal services and their potential impact on the legal profession. It notes that while the ABA has encouraged lawyers to utilize the internet to serve clients, the profession has been slow to adopt online legal services. New companies like LegalZoom now offer online legal documents and forms directly to consumers at lower costs than traditional lawyers. If rules do not change to allow innovative online legal services, solo and small law firms may have trouble competing with these new non-lawyer alternatives. The future of law practice lies in embracing technologies like online legal services that make legal help more accessible and affordable.
This document provides an analysis of LinkedIn's Terms of Service by summarizing key points about LinkedIn as a social media platform for professionals and highlighting important clauses in their Terms of Service. It notes that by agreeing to the Terms of Service, users agree to provide personal information and allow LinkedIn broad rights to collect and use member data. However, the document raises concerns that the Terms give up too much privacy and control over personal information and content.
This document discusses several legal issues related to technology. It identifies data security, privacy concerns with big data, and evolving contract and licensing issues with cloud computing as significant concerns. It also notes challenges around compliance with open source licenses, liability for mobile payments, risks of social media use, regulation of virtual currencies, and responsibility for remote automation and control technologies.
The document discusses how citizens are increasingly relying on the internet for information and how this shift toward online self-sufficiency affects credibility. Some key points:
- People are using the internet more for tasks like booking travel and doing school projects instead of relying on physical sources.
- However, online users may not always find the information they need, and it can be harder to verify credibility without physical cues.
- Credibility is shifting from predetermined authorities to reliability based on synthesizing information from multiple sources.
- Trends like open source software facilitate this shift, as online tools are built collaboratively through an open process.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
If we don’t balance the human values that we care about with the compelling uses of big data, our society risks abandoning them for the sake of mere innovation or expediency.
Ben Torres/Bloomberg via Getty Images
These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.
Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.
This document discusses the concept of an "inforg", which is defined as an informationally embodied organism or entity made up of information that exists in the infosphere. An infosphere refers to an environment populated by informational entities. The document suggests that an inforg can help individuals store and manage verifiable claims about themselves, their data, possessions, relationships, and identity. It poses questions about how a regulated knowledge banking industry could be established to ensure individuals maintain control and ownership over their own inforgs through independent information management systems. The goal would be to define how inforgs are stored, maintained, and used in a way that supports individuals' privacy, security, and participation in civic processes through defined knowledge fiduc
Noggin - World's first marketplace for Personal DataNoggin Asia
Direct marketing is expensive; and customer details are usually unknown. Customer on other hand is worried about personal data. Noggin is a marketplace to connect these two. Discover us at www.nogginasia.com. Consumers can earn by sharing personal data
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
This document discusses social media as a new format for records and issues around managing records in social media. It notes that social media content may be considered government records but capturing authentic copies can be challenging given the dynamic nature of social media. It also discusses jurisdiction issues and privacy concerns around data collection by corporations and governments from social media and online activities.
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
With the advent of the era of big data, the utilization rate of data in business activities is getting higher and higher, and the competition is also getting bigger and bigger, and the disputes about data among operators of e commerce platform are also increasing. At present, there is a relative lack of laws and regulations on data rights and interests of e commerce platform operators in China. E commerce platform operators do not have specific and in depth clarity on data collation, collection and processing, which is not comprehensive. With the rapid development of big data in European and American countries in the 20th century, the corresponding laws and regulations and theoretical academic research also appear. China can study the similarities, which has great reference significance for the development of big data and the improvement of laws and regulations in China. This paper will investigate and study the data rights and interests of e commerce platform operators, and deeply analyze the characteristics, attributes, protection mode and basic principles of data rights and interests, especially the legal regulation of e commerce platform operators data rights and interests. Combined with the law of e commerce, the law of data security, the law of network security, the law of personal information protection and other relevant legal theories, this paper analyzes the data rights and interests of e commerce platform operators, discusses the legal protection and implementation practice of the data rights and interests, and puts forward some countermeasures to improve the legislation, law enforcement and judicial protection. For the boundary coordination between operator data and user data of e commerce platform, this paper analyzes and divides the boundary, and puts forward relevant improvement countermeasures. China needs to speed up the improvement of e commerce platform operators data rights and interests protection legislation, improve the regulation of e commerce platform operators unfair competition behavior Improve the legal regulation of data monopoly of e commerce platform operators, bring enterprise data into the adjustment scope of anti monopoly law, and investigate the legal responsibility after data monopoly The data rights of the operators of e commerce platform should be given clearly Improve the allocation of data legal liability of operators of e commerce platform. Changjun Wu | Wenyu Wei "Research on Legal Protection of Data Rights of E-Commerce Platform Operators" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44955.pdf Paper URL: https://www.ijtsrd.com/management/law-and-management/44955/research-on-legal-protection-of-data-rights-of-ecommerce-platform-operators/changjun-wu
The FDA’s role in the approval and subsequent review of Vioxx, a.docxmehek4
The FDA’s role in the approval and subsequent review of Vioxx, a pain medication with- drawn from the market by its manufacturer after it was associated with heart attacks and strokes, is discussed in a case at the end of this textbook.
In 2010, Congress established, as part of the Dodd-Frank Act (also discussed in Chapters 8 and 14), a new consumer regulatory body, called the Consumer Financial Pro- tection Bureau. The purposes and actions of this agency are described in Exhibit 15.B. The debate over whether government should become involved in protecting consumer privacy is discussed in the next section of this chapter.
All seven government regulatory agencies shown in Figure 15.2 are authorized by law to intervene directly into the very center of free market activities, if that is considered nec- essary to protect consumers. In other words, consumer protection laws and agencies substi- tute government-mandated standards and the decisions of government officials for decision making by private buyers and sellers.
Consumer Privacy in the Digital Age
In the early 21st century, rapidly evolving information technologies have given new ur- gency to the broad issue of consumer privacy. Shoppers have always been concerned that information they reveal in the course of a sales transaction—for example, their credit card or driver’s license numbers—might be misused. But in recent years, fast-changing tech- nologies have increasingly enabled businesses to collect, buy, sell, and use vast amounts of personal data about their customers and potential customers. The danger is not only that this information might rarely be used fraudulently, but also that its collection represents a violation of privacy and might lead to unanticipated harms.
Individuals are often unaware of how much information about themselves they reveal to others as they shop, interact with friends, play games, or look for information online. A variety of technologies make this possible. Many websites place cookies—or more power- ful Flash cookies—on a computer hard drive, to identify the user during each subsequent visit and to build profiles of their behavior over time. Web beacons embedded in e-mails and websites retrieve information about the viewer. In deep packet inspection, third parties access and analyze digital packets of information sent over the Internet, such as pieces of e-mails or Skype calls, to infer characteristics of the sender. Not just retailers, but also Internet service providers such as Comcast, search engine operators such as Google, and informational services such as Dictionary.com, also track their users. So-called data aggregators purchase and combine data about individuals collected from various sources and compile them into highly detailed portraits to be sold to retailers, service providers, and advertisers.15
An example of a data aggregator is Acxiom Corporation, based in Conway, Arkansas. Acxiom, called the “quiet giant” of the industry, has built the larg ...
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
(300-400 words)
1- Watch anyone of the following documentary/movie:
· The Corporation (2005)
· Food Inc. (2009)
· An Inconvenient Truth (2006)
Share your understanding around
Who
THE PEOPLE INVOLVED
What
THE PROBLEMS, THINGS, IDEAS
When
PAST, PRESENT, FUTURE OF THE TOPIC
Where
THE PLACE INVOLVED
Why
THE CAUSES, REASONS, RESULTS, CONDITIONS.
How
HISTORY OR FUNCTION (HOW IT BEGAN OR OPERATES).
………………………………………………………………………………………………………………………………………….
2-
(a) Find a news article about an economic topic that you find interesting.
(b) Make a short bullet-list summary of the article.
(c) Write and illustrate with appropriate graphs an economic analysis of the key points in the article.
Hint: Use 5Ws and 1H in your explanation.
1. Who was involved?
1. What happened?
1. When did it happen?
1. Where did it happen?
1. Why did it happen?
1. How did it happen?
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to ...
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
The document discusses the challenges and risks of adopting new mobile and cloud technologies without proper governance strategies. It provides examples of companies that experienced negative consequences due to a lack of oversight and planning around BYOD policies and unsupported devices/applications. The author advocates for proactive governance that supports new tools while managing risks through well-defined protocols and transparency between IT and users.
A global Digital Magna Carta that lays the foundation for everyone’s access to internet is beneficial for trade and social exchange. Since internet is very accessible to all, privacy concerns for people and companies is important to protect. However, there will be exemptions to privacy concerns when technology increases the user experience and make it easier to use internet. Other cases of exemptions will be when it greatly benefit the functioning of society and such examples includes the health sector and the rescue services.
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
Three big questions about AI in financial servicesWhite & Case
To ride the rising wave of AI, financial services companies will have to navigate evolving standards, regulations and risk dynamics—particularly regarding data rights, algorithmic accountability and cybersecurity.
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
The DASHBOARD Act would impose several data-disclosure requirements on large companies that monetize online user data. The Act assumes a market failure of information asymmetry, where consumers undervalue their personal data. However, the evidence for this claim is indeterminate, and a lack of clarity on data property rights and liability could make corresponding rules difficult to enforce.
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
Data mining involves collecting and analyzing large amounts of customer data. While this can provide commercial benefits, it also raises ethical issues regarding customer privacy. Some key ethical challenges include ambiguity around how social networks label relationships, uncertainty around future uses of customer data by companies, and a lack of transparency around passive collection of mobile location data. To address these challenges, companies should focus on ethical data mining practices like verifying data sources, respecting customer expectations of privacy, developing trust through transparency and control over data access. Regulators also need to continue updating laws and regulations to balance the benefits of data analytics with protecting individual privacy rights.
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
Surveillance capitalism is a new economic system that claims human experience as free raw material for hidden commercial practices of extraction, prediction, and sales. It relies on accumulating behavioral surplus data from users and using machine learning to generate prediction products that are sold to businesses. This allows firms like Google to convert behavioral surplus directly into revenue. The amount of surplus accumulated affects the accuracy of predictions, driving firms to amass ever greater stores of behavioral data for continued profits in behavioral futures markets.
This document discusses the opportunities and risks associated with big data for legal departments. It provides a cheat sheet on big data that includes mitigating privacy risks by implementing standard security protocols like anonymizing data and obtaining consent. It also notes the risks of uncontrolled data breaches and how algorithms can lead to issues like discrimination if not monitored closely. The document then provides further discussion of the implications of big data for legal departments, including navigating numerous privacy laws and regulations. It emphasizes the importance of understanding what data the organization has, establishing policies and procedures, and proactively addressing privacy and security to leverage big data's advantages while avoiding risks.
The document discusses best practices for designing digital experiences that protect user privacy, including avoiding "dark patterns" that trick users, being transparent about what personal data is collected and how it is used, and obtaining explicit user consent before collecting or sharing sensitive personal information. It emphasizes designing with privacy as the default setting and embedding privacy into the design from the start.
This document contains review questions about ethical, social, and political issues related to technology. It discusses how ethics, society, and politics are interconnected and provides examples. Key technology trends like increasing computer power and data storage capabilities are highlighted as heightening ethical concerns due to their impact on privacy, data analysis, and system dependence. The document also defines responsibility, accountability, and liability and outlines the five steps of an ethical analysis. It identifies six ethical principles and discusses professional codes of conduct, privacy, and how technology challenges privacy protection. Intellectual property rights and challenges posed by the Internet are also addressed.
Network neutrality has been at the center of intense political discussions about Internet regulation. Net neutrality is the principle that all content on the Internet should be equally available to users without discrimination by service providers. Establishing legal protections for net neutrality is a necessary component to providing equitable access to online educational materials and services.
Smartphones Have Privacy Risks.docxSmartphones Have Privacy Ri.docxwhitneyleman54422
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to shore up privacy in the mobile computing age.
Cloudy with a Chance of Snooping
Law enforcement loves cloud computing. We don't know exactly how much information the government collects from online service providers, but Google alone fields thousands of requests from the US government each year for private customer data. Other providers have been less transparent, but they presumably experience similar request volumes.
Shifting data to a remote server makes life easier for mobile users, but it also makes life easier for people who want to access their data with or without permission. Data stored on third-party servers is much more vulnerable to surreptitious snooping not only by the government but also by hackers and the service provider itself.
Google's new privacy policy, which allows Google to more freely swap data among Google products, has attracted.
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
This document discusses ethics in data warehousing and data mining. It notes that data mining can discover new patterns and relationships but also raises ethical issues when used to discriminate against groups for things like loans or special offers. The project manager is responsible for ensuring ethical use of data and establishing access controls and qualifications for users. Small data sets can also raise ethical concerns if users learn information they should not. The project manager must decide what public data is integrated and ensure end users, testing practices, and data mining applications comply with ethical standards and legal regulations.
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion. Filed on August 21, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Similar to Why it's so hard for users to control their data (20)
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
1. Why It’s So Hard forUsers to Control Their
Data
by
Bhaskar Chakravorti
January 30, 2020
Peter Crowther/Getty Images
A recent IBM study found that 81% of consumers say they have become more concerned about how
their data is used online. But most users continue to hand over their data online and tick consent boxes
impatiently, giving rise to a “privacy paradox,” where users’ concerns aren’t reflected in their
behaviors. It’s a daunting challenge for regulators and companies alike to navigate the future of data
governance.
In my view, we’re missing a system that defines and grants users “digital agency” — the ability to
own the rights to their personal data, manage access to this data and, potentially, be compensated
fairly for such access. This would make data similar to other forms of personal property: a home, a
bank account or even a mobile phone number. But before we can imagine such a state, we need to
examine three central questions: Why don’t users care enough to take actions that match their
concerns? What are the possible solutions? Why is this so difficult?
Why don’t users’ actions match their concerns?
To start, data is intangible. We don’t actively hand it over. As a byproduct of our online activity, it is
easy to ignore or forget about. A lot of data harvesting is invisible to the consumer — they see the
results in marketing offers, free services, customized feeds, tailored ads, and beyond.
2. Second, even if users wanted to negotiate more data agency, they have little leverage. Normally, in
well-functioning markets, customers can choose from a range of competing providers. But this is not
the case if the service is a widely used digital platform. For many, leaving a platform like Facebook
feels like it would come at a high cost in terms of time and effort and that they have no other option
for an equivalent service with connections to the same people. Plus, many people use their Facebook
logins on numerous apps and services. On top of that, Facebook has bought up many of its natural
alternatives, like Instagram. It’s equally hard to switch away from other major platforms, like Google
or Amazon, without a lot of personal effort.
Third, while a majority of American users believe more regulation is needed, they are not as
enthusiastic about broad regulatory solutions being imposed. Instead, they would prefer to have better
data management tools at their disposal. However, managing one’s own data would be complex – and
that would deter users from embracing such an option.
What are the possible solutions?
One solution is to create mechanisms that give users direct ownership of their data. There are many
proposals jostling for attention.
Legislative fixes:
Some internet observers believe that the only way to fix the problem is through a comprehensive
privacy bill or meaningful, large-scale regulation of Big Tech. Europe’s General Data Protection
Regulation (GDPR), which is arguably the most comprehensive legislative measure thus far, offers
provisions for data portability, giving citizens greater digital agency. However, the European solution
has left many dissatisfied with the lack of practicality associated with the rules. As of January 2020,
the California Consumer Privacy Act (CCPA) brings a version of GDPR to the U.S. California
residents — and, by extension, residents in other states in many cases, as companies adopt the same
standards nationally — will have the right to know what data of theirs has been collected, delete it and
stop their sale to others, among other things.
The U.S. also has several other bills under consideration. Sen. Mark Warner (D-Va.), Sen. Richard
Blumenthal (D-Ct.) and Sen. Josh Hawley (R-Mo.) have proposed the ACCESS Act that would
mandate that social media platforms with over 100 million users in the U.S. offer users a way to easily
move their data to another service. The bill would create conditions for users to retrieve their personal
data in a structured and machine-readable format, while the tech companies maintain the necessary
interfaces that give access to this data to competing platforms. Hawley and Warner have also co-
authored the DASHBOARD Act, which would require data collecting platforms to be transparent
about what data is being collected on users and how it is being monetized.
There is also an “Own Your Own Data Act” in the U.S. Senate, giving users “an exclusive property
right in the data that individual generates on the internet,” a cause that has been adopted by
Democratic presidential contender Andrew Yang. Another Democratic presidential
contender, Elizabeth Warren, has called for an outright breakup of Big Tech, which would increase
users’ ability to negotiate greater data agency.
Big Tech-led Initiatives:
The tech companies are attempting to get ahead of the surge of concerns and legislative action and
define the ground rules before regulators set them. To be sure, the companies have also been given a
prod by the right to data portability requirements under statues like GDPR and CCPA. Facebook has
3. a white paper on data portability, while Google has a facility that allows users to download their data.
A challenge remains in that data portability just isn’t practical or easy for most users who want a fast
way to switch between platforms. To address this, Facebook, Google, Microsoft, Twitter, and Apple
have launched a collective initiative, the Data Transfer Project, to move data between platforms
without having to download or upload user data; however, progress on the project has been slow.
Ideas from the Wider Expert and Business Community:
Some of the ideas from the wider business community are conceptual, but intuitive because they use
recognizable analogies, which makes them worthy of our attention. For example, the musician,
will.i.am, has proposed a concept called “idatity”, combining identity and data as a human right with
users being eligible for compensation for transferring it to others. Researchers Eric Posner and Glen
Weyl have argued for data to be treated as “labor” and have advocated for mechanisms such as “data
labor unions” to collectively bargain with tech companies over payments for access to data. Extending
the analogy, they also call for a “minimum data wage,” that is equivalent to a standard minimum
wage argument but applied to a guaranteed basic compensation to users for producing useful data.
Others, such as the journalist Rana Foroohar, have floated the idea of a public data bank, regulated by
elected governments along the lines of the “civic data trust” being considered by Toronto
for Google’s Sidewalk Labs or data trusts being proposed in general as the concept of a legal trust
being applied specifically to the securing of data.
And there are entrepreneurial opportunities. Engineer and World Wide Web inventor, Sir Tim
Berners-Lee, launched a startup predicated on the idea of data ownership, where users store their data
in a personal data “pod.” Users can give or revoke permission to individual apps to read and write to
their personal pods.
Indian entrepreneur, Nandan Nilekani, a champion of “data democracy,” argues that India’s
technology infrastructure, with his brainchild, the unique ID system, Aadhaar, as a foundation, gives
India the unique ability to empower every resident with her own data. Many Indian banks are taking
this forward by preparing to give consumers access to their financial data so that they can directly
share it to apply for credit, investment products, or insurance, bypassing the credit ratings agencies as
gatekeepers or the lack of credit histories as barriers. This initiative will use third-party mediators and
is backed by the country’s central bank.
The list goes on. The startup Streamr, which provides infrastructure for users to collectively monetize
their data, has an app, Swash, which aims to facilitate a “data union.” Yet another venture, Ocean
Protocol, intends to facilitate digital agency through a self-managed distributed ledger framework of
blockchain.
Despite this multiplicity of ideas, we’re no closer to truly meaningful change.
Why is data governance so hard?
Data, unlike other forms of personal property, is just plain complicated. Any workable solution would
need to manage the following 10-point checklist at a minimum:
Define what constitutes the personal data to which a user has exclusive rights. For example, a
personal photo may contain a picture of a friend tagged by the user. Moving that data could violate the
friend’s privacy. Alternatively, a user’s click-trail tracked by a platform reveals the user’s preferences
4. based on the platform’s analysis. At what point does that revelation become the platform’s intellectual
property?
1. Establish criteria to demarcate personal data, anonymized data and third-party data. To see
why this can be difficult, even anonymized data when linked can reveal personally identifiable
information; an algorithm was shown to identify 99.98% of Americans by knowing as few as
15 demographic attributes per person. Alternatively, if a user’s data links to third-party data
deemed harmful or false, can the user remove it without violating the third-party’s free-speech
rights?
2. Create a transparent — market based — and universally accepted system of valuing data and
compensating users accordingly for trading data. The compensation could be in the form of a
tailored service or monetary compensation, while some data may not be tradeable at all.
3. Define standards for how the data is stored, moved, or accessed inter-operably across different
digital platforms.
4. Establish criteria to evaluate the tradeoffs between many needs: inter-operability, privacy,
cybersecurity. Ease of inter-operability, for example, could also reduce cybersecurity.
5. Establish criteria to evaluate the trade-offs between personal data and the use of aggregated
data as a “public good” — for training algorithms for societal use, fraud-detection, public
safety, flagging fake news, etc.
6. Mitigate the transactions costs of negotiating with multiple parties whenever a platform needs
multiple data sources, e.g. location data needed for a ridesharing app.
7. Mitigate the risks of bots or malicious actors from taking advantage of compensation for
access to data. For example, Microsoft experimented with paying users for data, and bots —
with no usable information — exploited the system.
8. Make it easy to move data across platforms, without expecting the user to be a technology
expert.
9. Anticipate unintended consequences of changes as fundamental as transferring the control and
management of data from Big Tech “professionals” to the “regular” users.
As the multiplicity of solutions and the checklist above suggests, finding a workable digital agency
solution is daunting. While users are not abandoning digital platforms, they are the proverbial frogs in
steadily warming water. Company leaders, pundits, and politicians fuel the fire with rhetoric, but
ultimately that’s not getting us anywhere. It is time to give users more rights of digital agency and
figure which parts of the data checklist are most practical, scalable, and sustainable. If consumers help
demand it, we can find forward-looking solutions that draw upon the wealth of ideas on the table
before the water boils over.
5. Bhaskar Chakravortiis the Dean of Global Business at The Fletcher School at Tufts University and
founding Executive Director of Fletcher’s Institute for Business in the Global Context. He is the author
of The Slow Pace of Fast Change.