Data Privacy

Featured

  • COVID-19 content displayed on a mobile phone, photo by da-kuk/Getty Images

    Research Brief

    COVID-19 Mobile Surveillance Tools Raise Privacy Concerns

    Jul 30, 2020

    Dozens of countries are using mobile phone tools and data sources for COVID-19 tracking. These tools are beneficial, but they also have the potential for harm. As public health agencies consider using mobile surveillance tools, they will need to address privacy concerns.

  • Graphic depicting quantum computing, design by Alyson Youngblood/RAND Corporation

    Article

    Quantum Computers Will Break the Internet, but Only If We Let Them

    Apr 9, 2020

    Quantum computers are expected to be powerful enough to break the current cryptography that protects all digital communications. But this scenario is preventable if policymakers take actions now to minimize the harm that quantum computers may cause.

Explore Data Privacy

  • Woman's eye with technology of security concept

    Commentary

    The Perils of Connecting Our Bodies to the Internet

    High-tech health care solutions are part of an emerging sector of medical technologies that monitor personal health data by essentially connecting your body to the Internet. As smart devices in health care evolve, the line between human and machine is blurring, and creating new concerns about consumer safety and privacy rights.

    Oct 15, 2018

  • Doctors using a tablet and a desktop computer to view a patient's medical records

    Commentary

    How Smartphone Apps Could Help Keep Health Records Accurate

    Electronic health records have helped streamline record keeping but providers aren't always able to reliably pull together records for the same patient from different hospitals, clinics, and doctor's offices. The growing use of smartphones offers a promising opportunity to improve record matching.

    Oct 4, 2018

  • Hacker on a laptop

    Commentary

    Have a Victim Response Plan for Data Breaches

    In a large data breach, there could be a real risk to victims' financial or personal security. Though responsible organizations should do everything in their power to ensure data is protected in the first place, they also should prepare a plan to ensure prompt victim response.

    Oct 2, 2018

  • Students using digital tablets

    Report

    Privacy and Interoperability Challenges Could Limit the Benefits of Education Technology

    The rise of education technology brings increased opportunity for the collection and application of data. This presents challenges, including data infrastructure issues that could limit the usefulness of data, and privacy concerns.

    Oct 2, 2018

  • A medical record app displaying on a smartphone

    Report

    Patients Could Help Improve Record Matching

    When health providers exchange medical records, the success rate can be as low as 50 percent. The ubiquity of mobile phones offers a promising opportunity to create a patient-empowered system to confirm identities that would allow hospitals and other providers to match records more accurately.

    Aug 22, 2018

  • Face detection and recognition

    Commentary

    Keeping Artificial Intelligence Accountable to Humans

    Artificial intelligence (AI) systems are often only as intelligent and fair as the data used to train them. To enable AI that frees humans from bias instead of reinforcing it, experts and regulators must think more deeply not only about what AI can do, but what it should do—and then teach it how.

    Aug 20, 2018

  • Report

    Developing Cybersecurity Capacity: A proof-of-concept implementation guide

    This document is a proof-of-concept operational toolbox designed to facilitate the development of national-level cybersecurity capacity building programmes and of holistic policy and investment strategies to tackle challenges in the cyber domain.

    Aug 2, 2018

  • Social network illustration superimposed over a city at night

    Report

    How Police Could Use Social Media and Social Network Analysis

    Social media and social network analysis could help law enforcement monitor for safety threats, identify those at high risk for involvement in violence, and investigate crimes and crime networks. But computer security, privacy, and civil rights protections must be in place before using these tools.

    Jul 18, 2018

  • A group of colleagues using their smart phones in synchronicity.

    Multimedia

    Protecting Consumer Data: Considerations for Congress

    Should consumers be in charge of self-regulating the data they share and how companies use it? What policy opportunities could Congress consider to better protect consumer data? In this RAND Congressional briefing, Rebecca Balebako and John Davis discuss the benefits and risks of data sharing, opportunities for protecting privacy at both the personal and industry level, and current U.S. laws and how they compare to European laws.

    Jun 8, 2018

  • Osonde Osoba in a RAND panel discussion in Pittsburgh, Pennsylvania, February 20, 2018

    Q&A

    The Human Side of Artificial Intelligence: Q&A with Osonde Osoba

    Osonde Osoba has been exploring AI since age 15. He says it's less about the intelligence and more about being able to capture how humans think. He is developing AI to improve planning and is also studying fairness in algorithmic decisionmaking in insurance pricing and criminal justice.

    May 1, 2018

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018

  • William Welser IV, Rebecca Balebako, and Osonde Osoba in a RAND panel discussion in Pittsburgh, Pennsylvania, February 20, 2018

    Blog

    'Alexa, What Do You Know About Me, and Who Are You Telling?'

    RAND experts held a wide-ranging discussion about artificial intelligence and privacy. They raised questions about fairness and equity regarding privacy and data use, while also highlighting positive trends and developments across the evolving AI-privacy landscape.

    Mar 1, 2018

  • Composite impage of a hand holding a digital device locked with a padlock symbol

    Multimedia

    The Collision of AI and Privacy

    In this Events @ RAND podcast, RAND experts discuss risks to privacy in the age of artificial intelligence.

    Feb 20, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Data sharing and privacy concept

    Commentary

    Collaboration Is the Best Strategy to Combat Population Health Concerns

    The greatest opportunities to improve health happen pretty much everywhere but the doctor's office. Collaborative programming that merges strategies from housing, education, or labor could make a big difference.

    Dec 14, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017