RAND mathematician Mary Lee describes the wide variety of personal data collected by smart devices and applications, such as smartwatches, brain implants, and period trackers.
Facial recognition technology is developing rapidly and is increasingly being used in policing. What do policymakers need to understand in order to minimize the risks it poses, while also maximizing its benefits?
The author suggests that the argument "a computer is different" is mythology in many instances and acts to obscure major issues that center around the use of computers.
The widespread use of resource-sharing systems has introduced new complexities to the problem of safeguarding computer information. This paper reviews aspects of security and privacy in both widely shared data networks and private databases.
Discusses the findings of the Privacy Protection Study Commission, whose final report, [Personal Privacy in an Information Society], was published in July 1977. The general thrust of the Commission recommendations is openness and fairness in recordkeeping.
State regulations or laws are frequently silent on rights of access or legal status of records, and questions of ownership of records are almost never examined.
Testimony prepared for presentation before hearings of the Privacy Protection Study Commission, Washington, D.C., January 26, 1977. Discusses in general the nature, extent and problems of the private security industry.
Describes the issue of privacy and the forces driving it. The present situation is: an organization uses information knowing that no right of individual ownership exists, and the individual has no legal standing to control the records.
This report describes and characterizes the present important social issue of privacy and presents its origins and various legislative efforts to deal with it.
Present privacy legislation attempts to guarantee that as we give information to organizations for legitimate needs, we retain some control over its use, are protected against its misuse, and have a legal basis for redress if something goes wrong.
Laws now in effect in several countries require protection of individual privacy in personal information recordkeeping systems maintained by the central, state and local governments and, in some countries, by private business and industry. It is des...
In all computers that maintain and process valuable information, or provide services to multiple users, it is necessary to provide security safeguards against unauthorized access, use, or modification of any data. Concerns for privacy and security must become integral in the design of computer systems and their applications.
Explores the questions of whether or not a centralized personal-information databank system presents a greater threat to the privacy and other related rights of the persons on whom data are kept than does a decentralized system that collectively hold...
Examines (1) the protection of privacy and other individual rights in personal information databank systems, (2) maintenance of information confidentiality in statistical and research databases, and (3) implementation of data security ...
The Privacy Act of 1974 and other pending legislation codify the rights of citizens relative to their personal information stored in computerized databank systems, and assure that privacy and other individual rights are not violated or unduly restric...