156,551 research outputs found

    Upholding Citizens’ Privacy in the Use of Stingray Technology: Is New York Behind?

    Get PDF
    This Comment will argue that New York should follow the federal agencies’ and states’ leads by imposing a warrant requirement supported by probable cause on local and state agencies that wish to use Stingray technology in their investigations. The first section will explore Stingray technology and how it works. The second section will frame the issue and describe New York’s current standard. The third section will discuss the judicial response to the issue and how New York courts seem to place the burden of upholding privacy on the citizen, instead of the government. The third section will also discuss a possible shift in New York courts’ stance on privacy, examining a recent dispute in Erie County that involved unauthorized Stingray use. The fourth section will discuss the legislative response to the issue, which consists of two state bills and a federal bill that could change New York’s policy. The fifth and final section will argue why New York should adopt a warrant requirement supported by probable cause

    An Examination of Privacy Policies of US Government Senate Websites.

    Get PDF
    US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy policies. This research studied privacy policy protection of 50 US Senate sites and found that few had comprehensive elements of privacy policies and a general lack of protection of personal data that could be obtain from the website. The study reviewed which specific privacy elements are most often mishandled, as well as suggestions for improving an overall online privacy practice

    Local Government Policy and Planning for Unmanned Aerial Systems

    Get PDF
    This research identifies key state and local government stakeholders in California for drone policy creation and implementation, and describes their perceptions and understanding of drone policy. The investigation assessed stakeholders’ positions, interests, and influence on issues, with the goal of providing potential policy input to achieve successful drone integration in urban environments and within the national airspace of the United States. The research examined regulatory priorities through the use of a two-tiered Stakeholder Analysis Process. The first tier consisted of a detailed survey sent out to over 450 local agencies and jurisdictions in California. The second tier consisted of an in-person focus group to discuss survey results as well as to gain deeper insights into local policymakers’ current concerns. Results from the two tiers of analysis, as well as recommendations, are provided here

    Implementing Privacy Policy: Who Should Do What?

    Get PDF
    Academic scholarship on privacy has focused on the substantive rules and policies governing the protection of personal data. An extensive literature has debated alternative approaches for defining how private and public institutions can collect and use information about individuals. But, the attention given to the what of U.S. privacy regulation has overshadowed consideration of how and by whom privacy policy should be formulated and implemented. U.S. privacy policy is an amalgam of activity by a myriad of federal, state, and local government agencies. But, the quality of substantive privacy law depends greatly on which agency or agencies are running the show. Unfortunately, such implementation-related matters have been discounted or ignored— with the clear implication that they only need to be addressed after the “real” work of developing substantive privacy rules is completed. As things stand, the development and implementation of U.S. privacy policy is compromised by the murky allocation of responsibilities and authority among federal, state, and local governmental entities—compounded by the inevitable tensions associated with the large number of entities that are active in this regulatory space. These deficiencies have had major adverse consequences, both domestically and internationally. Without substantial upgrades of institutions and infrastructure, privacy law and policy will continue to fall short of what it could (and should) achieve

    Internet Privacy and Self-Regulation: Lessons from the Porn Wars

    Get PDF
    The availability and adequacy of technical remedies ought to play a crucial role in evaluating the propriety of state action with regard to both the inhibition of Internet pornography and the promotion of Internet privacy. Legislation that would have restricted Internet speech considered indecent or harmful to minors has already faced and failed that test. Several prominent organizations dedicated to preserving civil liberties argued successfully that self-help technologies offered less-restrictive means of achieving the purported ends of such legislation, rendering it unconstitutional. Surprisingly, those same organizations have of late joined the call for subjecting another kind of speech--speech by commercial entities about Internet users--to political regulation. With regard to privacy no less than pornography, however, self-help offers Internet users a less-restrictive means of preventing the alleged harms of free speech than does state action. Indeed, a review of privacy-protecting technologies shows them to work even more effectively than the filtering and blocking software used to combat online smut. Digital self-help in defense of Internet privacy makes regulation by state authorities not only constitutionally suspect but, from the more general point of view of policy, functionally inferior

    Electronic Employment Eligibility Verification: Franz Kafka's Solution to Illegal Immigration

    Get PDF
    In last summer's debate over immigration reform, Congress treated a national electronic employment eligibility verification (EEV) system as a matter of near consensus. Intended to strengthen internal enforcement of the immigration laws, electronic EEV is an Internet-based employee vetting system that the federal government would require every employer to use. Broad immigration reform failed before Congress thoroughly considered national EEV, but the lines of debate have been drawn. Advocates in Congress will try to attach a nationwide worker registration system to any immigration bill Congress considers, and the Bush administration recently announced steps to promote such a system.A mandatory national EEV system would have substantial costs yet still fail to prevent illegal immigration. It would deny a sizable percentage of law-abiding American citizens the ability to work legally. Deemed ineligible by a database, millions each year would go pleading to the Department of Homeland Security and the Social Security Administration for the right to work. By increasing the value of committing identity fraud, EEV would cause that crime's rates to rise. Creating an accurate EEV system would require a national identification (ID) system, costing about $20 billion to create and hundreds of millions more per year to operate. Even if it were free, the country should reject a national ID system. It would cause law-abiding American citizens to lose more of their privacy as government records about them grew and were converted to untold new purposes. "Mission creep" all but guarantees that the federal government would use an EEV system to extend federal regulatory control over Americans' lives even further

    A National Dialogue on Health Information Technology and Privacy

    Get PDF
    Increasingly, government leaders recognize that solving the complex problems facing America today will require more than simply keeping citizens informed. Meeting challenges like rising health care costs, climate change and energy independence requires increased level of collaboration. Traditionally, government agencies have operated in silos -- separated not only from citizens, but from each other, as well. Nevertheless, some have begun to reach across and outside of government to access the collective brainpower of organizations, stakeholders and individuals.The National Dialogue on Health Information Technology and Privacy was one such initiative. It was conceived by leaders in government who sought to demonstrate that it is not only possible, but beneficial and economical, to engage openly and broadly on an issue that is both national in scope and deeply relevant to the everyday lives of citizens. The results of this first-of-its-kind online event are captured in this report, together with important lessons learned along the way.This report served as a call to action. On his first full day in office, President Obama put government on notice that this new, more collaborative model can no longer be confined to the efforts of early adopters. He called upon every executive department and agency to "harness new technology" and make government "transparent, participatory, and collaborative." Government is quickly transitioning to a new generation of managers and leaders, for whom online collaboration is not a new frontier but a fact of everyday life. We owe it to them -- and the citizens we serve -- to recognize and embrace the myriad tools available to fulfill the promise of good government in the 21st Century.Key FindingsThe Panel recommended that the Administration give stakeholders the opportunity to further participate in the discussion of heath IT and privacy through broader outreach and by helping the public to understand the value of a person-centered view of healthcare information technology

    Protecting Patient Privacy: Strategies for Regulating Electronic Health Records Exchange

    Get PDF
    The report offers policymakers 10 recommendations to protect patient privacy as New York state develops a centralized system for sharing electronic medical records. Those recommendations include:Require that the electronic systems employed by HIEs have the capability to sort and segregate medical information in order to comply with guaranteed privacy protections of New York and federal law. Presently, they do not.Offer patients the right to opt-out of the system altogether. Currently, people's records can be uploaded to the system without their consent.Require that patient consent forms offer clear information-sharing options. The forms should give patients three options: to opt-in and allow providers access to their electronic medical records, to opt-out except in the event of a medical emergency, or to opt-out altogether.Prohibit and sanction the misuse of medical information. New York must protect patients from potential bad actors--that small minority of providers who may abuse information out of fear, prejudice or malice.Prohibit the health information-sharing networks from selling data. The State Legislature should pass legislation prohibiting the networks from selling patients' private health information

    Why the Insurance Industry Cannot Protect Against Health Care Data Breaches

    Get PDF
    • …
    corecore