271,110 research outputs found

    Restoring a Public Interest Vision of Law in the Age of the Internet

    Get PDF
    In November 2003, Mr. Marc Rotenberg, Executive Director of the Electronic Privacy Information Center, lectured at Duke Law School on the importance of protecting individual privacy. In his remarks, Mr. Rotenberg recounted the successful campaign against the government\u27s Clipper Chip proposal. He argued that successful public interest advocacy in the Internet age requires the participation of experts from many fields, public engagement, and a willingness to avoid a simple balancing analysis. He further concluded that privacy may be one of the defining issues of a free society in the twenty-first century

    BACK TO KATZ: REASONABLE EXPECTATION OF PRIVACY IN THE FACEBOOK AGE

    Get PDF
    Part I of this Note discusses the evolution of Fourth Amendment jurisprudence in reaction to advancing technology, the Supreme Court and circuit courts’ disposition in dealing with electronic “beeper” tracking (the technology that predated GPS), and the legal doctrine governing the government’s use of cellular phones to conduct surveillance of individuals both retroactively and in real-time. Part II examines the developing split among the federal circuits and state courts over whether GPS surveillance of vehicles constitutes a search, as well as the parallel concerns raised in recent published opinions by magistrate judges as to whether government requests for cell-site information from third party service providers require a warrant. Part III of this Note argues for the adoption of a rule that GPS surveillance constitutes a search and seizure and should require a warrant because the privacy expectation—that the government is not tracking its citizens twenty-four hours per day—is still one that society considers legitimate. It also argues that increasing public use or consent to third party use of GPS technology does not destroy an individual’s reasonable expectation of privacy in his movements, nor indicate that society no longer views these expectations as reasonable. In fact, increased public awareness of recent technological invasions of privacy may be producing an increased demand for control over information

    The Impact of Information Security Technologies Upon Society

    Get PDF
    This paper's aims are concerned with the effects of information security technologies upon society in general and civil society organisations in particular. Information security mechanisms have the potential to act as enablers or disablers for the work of civil society groups. Recent increased emphasis on national security issues by state actors, particularly 'anti-terrorism' initiatives, have resulted in legislative instruments that impinge upon the civil liberties of many citizens and have the potential to restrict the free flow of information vital for civil society actors. The nascent area of cyberactivism, or hactivism, is at risk of being labelled cyberterrorism, with the accompanying change of perception from a legitimate form of electronic civil disobedience to an abhorrent crime. Biometric technology can be an invasive intrusion into citizens' privacy. Internet censorship and surveillance is widespread and increasing. These implementations of information security technology are becoming more widely deployed with profound implications for the type of societies that will result

    EHRs at King Fahad Specialist Hospital : an overview of professionals' perspectives on the use of biometric patient identification for privacy and confidentiality, taking into consideration culture and religion : a thesis presented in partial fulfilment of the requirements of the degree of Master in Information Science, Massey University, Albany, Auckland, New Zealand

    Get PDF
    The Kingdom of Saudi Arabia is focused on expanding use of biometric technologies and it is a matter of time before this expansion includes medical institutions. However there is a lack of research on Electronic Health Records (EHRs) in Saudi Arabian hospitals, especially on the staff views and attitudes in relation to confidentiality, privacy, and security policies in the context of Saudi society, which is governed largely by culture and Islam. This research utilised an online survey tool to ask doctors, managers, and IT professionals, at the King Fahad Specialist Hospital (KFSH) about these aspects and explored if they recommend the classic non-biometric access method over the rather intrusive, yet more advanced, biometric patient identification (BPI) technology. Encouragingly, all the participants recommended BPI methods with the least favoured method being the facial recognition method for Saudi female patients. This study also focused on whether staff believed that religious and cultural issues influence EHR privacy and confidentiality, as the literature showed that in certain cases unauthorised revelation of an EHR could lead to honorary killing of the patient. Implications of this research include the need for comprehensive staff training on being culturally aware, as well as training on EHR security policy, privacy, and confidentiality

    Analisis privasi data pengguna contact tracing application pengendalian COVID-19 di Indonesia berdasarkan PERPRES RI No. 95 tahun 2018 tentang sistem pemerintahan berbasis elektronik

    Get PDF
    The presence of user contact applications in the community as a means of preventing and overcoming the spread of COVID-19 can pose another risk to the potential dangers of protecting data privacy from contact tracing. This research examines more deeply related to user privacy policies through 3 (three) samples of android-based user contact applications that are used as a means of preventing, overcoming and controlling the spread of the COVID-19 virus in today's society and by reviewing the rules contained in the Presidential Regulation of the Republic. Indonesian No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE). The study in this study was prepared using the method of literature study, observation and qualitative analysis. A comparison was made regarding the data privacy of the three samples, which was then evaluated and matched with the form of the privacy policy according to Presidential Regulation No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE) and according to the ideal form of data privacy policy based on several experts. Comparative data is obtained through related applications and other electronic media which are then discussed together to conclude and evaluate the data privacy policies of the three sample applications. Based on this research, it can be concluded that privacy intervention to deal with damage and save lives is legal as long as its use is in accordance with regulations in the health, disaster, telecommunications, informatics and other related fields; in this case listed in the Presidential Decree No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE) and there needs to be an increase in efforts to maintain the security and confidentiality of user data privacy through continuous system and data maintenance, encryption of data privacy storage in the manager's data warehouse and added with other data privacy policies can guarantee the security and confidentiality of the privacy of user data

    Invisible Pixels Are Dead, Long Live Invisible Pixels!

    Full text link
    Privacy has deteriorated in the world wide web ever since the 1990s. The tracking of browsing habits by different third-parties has been at the center of this deterioration. Web cookies and so-called web beacons have been the classical ways to implement third-party tracking. Due to the introduction of more sophisticated technical tracking solutions and other fundamental transformations, the use of classical image-based web beacons might be expected to have lost their appeal. According to a sample of over thirty thousand images collected from popular websites, this paper shows that such an assumption is a fallacy: classical 1 x 1 images are still commonly used for third-party tracking in the contemporary world wide web. While it seems that ad-blockers are unable to fully block these classical image-based tracking beacons, the paper further demonstrates that even limited information can be used to accurately classify the third-party 1 x 1 images from other images. An average classification accuracy of 0.956 is reached in the empirical experiment. With these results the paper contributes to the ongoing attempts to better understand the lack of privacy in the world wide web, and the means by which the situation might be eventually improved.Comment: Forthcoming in the 17th Workshop on Privacy in the Electronic Society (WPES 2018), Toronto, AC

    Privacy Issues in the Era of Ubiquitous Commerce

    Get PDF
    The vision of ubiquitous commerce (u-commerce) is realized through the convergence of electronic, mobile, television, voice and silent commerce applications. The ubiquity, universality, uniqueness, and unison of u-commerce will provide two principal benefits for individual users and companies: increased convenience as well as more personalized and customized services. However, u-commerce will also bring new issues such as a greater degree of privacy concerns that will impact individual users, companies, and the society at large. This paper proposes and elaborates on a conceptual framework for privacy in the u-commerce era. It combines Lessig’s macro-level perspective – the four-factor model of privacy – with Adam’s micro-level perspective – the perceived privacy factors model. Using this framework, privacy issues related to ucommerce are discussed and future research directions are presented

    ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

    Get PDF
    The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The decentralized nature of this in-band key distribution, however, makes it prone to man-in-the-middle attacks and can leak the social graph of users. To address this problem we introduce ClaimChain, a cryptographic construction for privacy-preserving authentication of public keys. Users store claims about their identities and keys, as well as their beliefs about others, in ClaimChains. These chains form authenticated decentralized repositories that enable users to prove the authenticity of both their keys and the keys of their contacts. ClaimChains are encrypted, and therefore protect the stored information, such as keys and contact identities, from prying eyes. At the same time, ClaimChain implements mechanisms to provide strong non-equivocation properties, discouraging malicious actors from distributing conflicting or inauthentic claims. We implemented ClaimChain and we show that it offers reasonable performance, low overhead, and authenticity guarantees.Comment: Appears in 2018 Workshop on Privacy in the Electronic Society (WPES'18

    Chief Justice Warren and 1984

    Get PDF
    George Orwell\u27s 1984 predicts a society dominated by a totalitarian government. Chief Justice Earl Warren was primarily responsible for a jurisprudence that would not countenance the kind of society envisaged in 1984. This Commentary traces the significant criminal procedure decisions of the Warren Court that helped to ensure that Orwel\u27s chilling prediction would remain only fiction. It first focuses on decisions that advanced fourth amendment privacy protections. It next examines the Warren Court\u27s concern for protecting the rights of the criminal defendant and for curbing illegal and oppressive police conduct. The Commentary then notes that as modern methods of electronic surveillance develop, the potential for governmental intrusion on individual privacy rights increases. It concludes with a warning: if society moves toward the Orwellian state, Supreme Court decisions alone will not be enough to safeguard the individual from the trend
    • …
    corecore