Information Privacy

Featured

  • Woman typing into a laptop, photo by pathdoc/Fotolia

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    Apr 13, 2016

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

  • Digital silhouettes of people, photo by blackdogvfx/Fotolia

    Commentary

    How to Rethink Data Privacy

    Oct 5, 2016

    Society benefits from the exchange of large-scale data in many ways. Anonymization is the usual mechanism for addressing the privacy of data subjects. Unfortunately, anonymization is broken.

Explore Information Privacy

  • Journal Article

    Possible Legal Barriers for PCP Access to Mental Health Treatment Records

    Over one-third of states appear to have more stringent medical privacy laws than HIPAA (federal), which could hinder primary care and mental health providers' efforts to share information and integrate care.

    Jul 19, 2017

  • Global network and information connection

    Report

    Social Media Analysis Could Support Information Operations

    Social media analysis could provide a window into the perspectives and communications of adversaries and other key audiences. If DoD seeks to expand its capability in this area, it must navigate U.S. law, cultural norms, and other issues.

    Jun 14, 2017

  • A mobile phone with an app to control wireless devices in a smart home like a washing machine, security camera, door lock, and music player

    Commentary

    Using Digital Data in Criminal Investigations

    Personal devices such as smartphones and wearables gather and store personal data. How much of this “digital footprint” should be available for criminal investigations?

    May 15, 2017

  • Man using credit card and smartphone

    Report

    Helping Law Enforcement Use Data from Mobile Applications: A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool

    Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.

    Apr 28, 2017

  • Report

    Understanding value in health data ecosystems: A review of current evidence and ways forward

    The potential of health data to improve health R&D, innovation, healthcare delivery, and health systems is substantial. Realising the benefits of health data will require a supportive health data ecosystem and addressing associated challenges.

    Apr 26, 2017

  • A coder types on laptop keyboard

    Commentary

    Reining in Internet Abuse

    The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.

    Mar 23, 2017

  • A man being interviewed by police in dark interrogation room

    Commentary

    What Data Is the Government Keeping About You?

    Governments are amassing a wealth of data on citizens, a trend that will continue as technology advances. But with no reliable way to ensure that the data is accurate, risks abound. In the criminal justice system, for example, poor quality data could affect individual freedoms and employability.

    Mar 1, 2017

  • Binary code bursts from phones held by a crowd of people with an overlay of glowing electronic numbers

    Commentary

    What Is the Adversary Likely to Do with the Clearance Records for 20 Million Americans?

    The state actor that hacked the Office of Personnel Management could use the stolen information to further its domestic control against dissidents, enhance its foreign intelligence, and improve its position in the global military and economic order.

    Jan 20, 2017

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Dec 19, 2016

  • Report

    A Framework for Exploring Cybersecurity Policy Options

    RAND conducted two discovery games to explore possible solutions for improving cybersecurity, assess their implications, and develop an initial framework to support debate and inform decisions regarding cybersecurity policies and practices.

    Nov 23, 2016

  • People use their smartphones in New York City, November 6, 2013

    Report

    Can Smartphones and Privacy Coexist?

    Smartphones are becoming more widespread around the world. How can policymakers grapple with issues related to the security and privacy of these devices?

    Oct 27, 2016

  • Illustration of a digital world

    Commentary

    Where Next for the Digital Society?

    Digital technologies are omnipresent, both in terms of where we are and what we do. A digital society can bring about economic and societal gain, but there are many challenges that need to be addressed beyond the actual technologies.

    Oct 14, 2016

  • Dissertation

    Police, Process, and Privacy: Three Essays on the Third Party Doctrine

    This dissertation presents the results of three studies that investigate how law enforcement uses electronic surveillance.

    Oct 13, 2016

  • Report

    Thought Leadership programme 2016: Key Findings

    Key findings from the 2016 Thought Leadership Programme, convened by Corsham Institute in conjunction with RAND Europe and St George's House exploring opportunities and challenges created by digital technologies in society.

    Oct 13, 2016

  • Concept of leaky software, data pouring out of pipe

    Commentary

    Digital Theft: The New Normal

    Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.

    Oct 10, 2016

  • Research Brief

    Accelerating the Internet of Things in the UK: Linking policy with practice

    Using insights from Internet of Things (IoT) implementations and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the IoT in the UK.

    Oct 4, 2016

  • Report

    Accelerating the Internet of Things in the UK: Using policy to support practice

    Using insights from businesses and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the Internet of Things in the UK.

    Oct 4, 2016

  • Glass globe and stethoscope on laptop

    Research Brief

    Engineering a Roadmap for Health Information Technology in Chile

    Describes a roadmap with five objectives for the Chilean government to expand its health information technology (IT) capabilities over the next ten years.

    Aug 25, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016