RAND mathematician Mary Lee describes the wide variety of personal data collected by smart devices and applications, such as smartwatches, brain implants, and period trackers.
The Supreme Court decision to overturn Roe v. Wade has providers and health advocates strategizing about how to provide more abortions where it is still legal. Expanding virtual medical visits is one popular idea. Policymakers and clinics could take steps to make telemedicine better understood, easier to use, and more equitable.
State regulations or laws are frequently silent on rights of access or legal status of records, and questions of ownership of records are almost never examined.
Testimony prepared for presentation before hearings of the Privacy Protection Study Commission, Washington, D.C., January 26, 1977. Discusses in general the nature, extent and problems of the private security industry.
Present privacy legislation attempts to guarantee that as we give information to organizations for legitimate needs, we retain some control over its use, are protected against its misuse, and have a legal basis for redress if something goes wrong.
Laws now in effect in several countries require protection of individual privacy in personal information recordkeeping systems maintained by the central, state and local governments and, in some countries, by private business and industry. It is des...
In all computers that maintain and process valuable information, or provide services to multiple users, it is necessary to provide security safeguards against unauthorized access, use, or modification of any data. Concerns for privacy and security must become integral in the design of computer systems and their applications.
Explores the questions of whether or not a centralized personal-information databank system presents a greater threat to the privacy and other related rights of the persons on whom data are kept than does a decentralized system that collectively hold...
Examines (1) the protection of privacy and other individual rights in personal information databank systems, (2) maintenance of information confidentiality in statistical and research databases, and (3) implementation of data security ...
The Privacy Act of 1974 and other pending legislation codify the rights of citizens relative to their personal information stored in computerized databank systems, and assure that privacy and other individual rights are not violated or unduly restric...
A discussion of the principles and costs involved in designing, implementing, and operating protective systems in personal information databanks. All databank systems containing identifiable, personal information require adequate procedural and tech...
There is an increasing need for providing privacy and security in telecommunication and teleprocessing networks. This paper presents a brief survey of privacy systems--the techniques that can be used to provide communications security in commercial ...
The growing number of automated personal data files, collected for different purposes, can be linked to obtain individual dossiers, especially using Social Security numbers.
Privacy transformations, both reversible and irreversible, are techniques for increasing data security and privacy in computerized databank systems. Irreversible transformations, such as data aggregation, are used primarily in statistical databanks....
The problem of providing privacy transformations for databanks and retrieval systems falls into two modern disciplines: information theory and computer science. In this paper the concern is primarily with the former. Here it is shown that measures o...
The problem of providing cost-effective data security safeguards in personal information databanks is addressed. A structural model of databank systems is formulated, the roles of its elements in providing or threatening data privacy and security ar...
Recital of RAND's pioneering efforts from the beginning of the computer era to resolve the complex privacy and security problems arising from the proliferation of computer systems and their applications. Of first concern was the protection of classi...
Examines the social and technical implications of information systems in relation to the individual's ability to control the dissemination of information about himself.
A discussion of the problem of maintaining privacy in an age of computerized credit transactions, and a proposal that some government agency be charged with the responsibility for protecting citizens' privacy.