Information Privacy

Featured

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    Apr 14, 2016

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

  • Digital silhouettes of people

    Commentary

    How to Rethink Data Privacy

    Oct 5, 2016

    Society benefits from the exchange of large-scale data in many ways. Anonymization is the usual mechanism for addressing the privacy of data subjects. Unfortunately, anonymization is broken.

Explore Information Privacy

  • Report

    Reuse of health data by the European pharmaceutical industry: Current practice and implications for the future

    Health data is re-used for a variety of reasons by pharmaceutical companies across the R&D pathway. RAND Europe suggests seven ways which might help create a sustainable ecosystem in which health data is reused effectively.

    Nov 12, 2019

  • Group of hands in a circle, each holding a puzzle piece, photo by Patcharin Saenlakon/Getty Images

    Tool

    Sharing and Integrating HIV Client Data Across Provider Organizations to Improve Service Coordination: A Toolkit

    The authors share lessons learned from a project involving data integration across two federal programs. The goal of this toolkit is to demystify the integration process and help others share data and coordinate services across providers.

    Nov 7, 2019

  • Cybercrime concept of handcuffs icon on a digital background, photo by blackboard/Adobe Stock

    Report

    What Could Help Law Enforcement Deal with Crime on the Dark Web?

    Crime in traditional online forums often leaves a trail of data that can be followed. But on the dark web, the process of collecting those data and turning them into evidence can be difficult. A panel of law enforcement practitioners and researchers identified ways to address this challenge.

    Oct 29, 2019

  • Illustration of a robot analyzing a database of personnel, image by OstapenkoOlena/Getty Images

    Report

    Big Data Could Improve Military Recruiting

    DoD and the U.S. military services have had some success with data-enabled outreach and recruiting. But they could benefit from expanding their adoption of private-sector approaches. For example, recruiters could better target prospects through the use of personally identifiable information and third-party data.

    Oct 22, 2019

  • Report

    Forensic Familial and Moderate Stringency DNA Searches: Policies and Practices in the United States, England, and Wales

    Forensic DNA databases help solve crimes. When an exact DNA match is not found, familial DNA and moderate stringency search may provide investigative leads. Evidence-based practices can guide policymakers on the use and effectiveness of this method.

    Aug 12, 2019

  • An illustration of a human's moral compass, image by Trifonov_Evgeniy/Getty Images

    Report

    Ethics in Scientific Research

    An analysis of how ethics are created, monitored, and enforced finds which ethical principles are common across scientific disciplines, how these ethics might vary geographically, and how emerging topics are shaping future ethics.

    Jun 5, 2019

  • Soldier and civilian shaking hands on white background, photo by Adobe Stock/Africa Studio and U.S. Army/Jim Goodwin

    Report

    Service Member Separation: Updating the DD Form 214

    This report offers suggestions for updating DD Form 214, which is used to characterize separating servicemembers' service, military history, and the reasons for separation, for electronic delivery.

    May 14, 2019

  • Report

    Strategic Surveillance for Food Safety: Designing a surveillance approach and considerations for implementation

    The Food Standards Agency engaged RAND Europe to design an approach to strategic surveillance for the UK food system. The study team produced an end-to-end approach, identified implementation steps and considered their impact and feasibility.

    May 13, 2019

  • Motion blur. Abstract technology and cyber space environment, photo by Quardia/Getty Images

    Commentary

    Three 'New Rules' Worth Considering for the Internet

    Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. But why stop there? His proposal could be expanded to include much more: security-by-design, net worthiness, and updated internet business models.

    May 10, 2019

  • Cyborg head using artificial intelligence to create digital interface 3D rendering, image by sdecoret/Adobe Stock

    Q&A

    The Promise and Perils of AI: Q&A with Douglas Yeung

    Douglas Yeung, a social psychologist at RAND, discusses how any technology reflects the values, norms, and biases of its creators. Bias in artificial intelligence could have unintended consequences. He also warns that cyber attackers could deliberately introduce bias into AI systems.

    Feb 27, 2019

  • Young Asian woman looking at an eye scanner image, photo by Photographer is my life/Getty Images

    Commentary

    Biology, in the Language of the People

    As technology and the ability to gather ever-growing amounts of data move further into the realms of biology and human performance, communication and transparency become increasingly important. Experts should consider whether they are using the words, examples, and models that connect with a broad audience most effectively.

    Feb 21, 2019

  • Artificial eye looking through greenery

    Commentary

    Does the United States Face an AI Ethics Gap?

    Instead of worrying about an artificial intelligence “ethics gap,” U.S. policymakers and the military community could embrace a leadership role in AI ethics. This may help ensure that the AI arms race doesn't become a race to the bottom.

    Jan 11, 2019

  • Facebook CEO Mark Zuckerberg testifies before a House Energy and Commerce Committee hearing regarding the company's use and protection of user data on Capitol Hill in Washington, U.S., April 11, 2018

    Commentary

    Data Breaches Could Cause Users to Opt Out of Sharing Personal Data. Then What?

    As tech-based systems have become all but indispensable, many institutions might assume user data will be reliable, meaningful and, most of all, plentiful. But what if this data became unreliable, meaningless, or even scarce?

    Dec 28, 2018

  • A close-up image of a police body camera clipped to a vest

    Report

    Using Video Analytics and Sensor Fusion in Law Enforcement: Building a Research Agenda That Includes Business Cases, Privacy and Civil Rights Protections, and Needs for Innovation

    Video technology is changing the ways that law enforcement works and interacts with the public. In this report, the authors explore some of the challenges posed and innovation needs in this emerging area.

    Dec 28, 2018

  • World map with electronic circuits

    Commentary

    When Cyber Attacks Occur, Who Should Investigate?

    Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.

    Dec 6, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport. But all participants on the field are playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom.

    Oct 25, 2018

  • A robot's hand selecting a candidate photograph

    Commentary

    Intentional Bias Is Another Way Artificial Intelligence Could Hurt Us

    Conversations about unconscious bias in artificial intelligence often focus on algorithms unintentionally causing disproportionate harm to entire swaths of society. But the problem could run much deeper. Society should be on guard for the possibility that nefarious actors could deliberately introduce bias into AI systems.

    Oct 22, 2018

  • Woman's eye with technology of security concept

    Commentary

    The Perils of Connecting Our Bodies to the Internet

    High-tech health care solutions are part of an emerging sector of medical technologies that monitor personal health data by essentially connecting your body to the Internet. As smart devices in health care evolve, the line between human and machine is blurring, and creating new concerns about consumer safety and privacy rights.

    Oct 15, 2018

  • Doctors using a tablet and a desktop computer to view a patient's medical records

    Commentary

    How Smartphone Apps Could Help Keep Health Records Accurate

    Electronic health records have helped streamline record keeping but providers aren't always able to reliably pull together records for the same patient from different hospitals, clinics, and doctor's offices. The growing use of smartphones offers a promising opportunity to improve record matching.

    Oct 4, 2018

  • Hacker on a laptop

    Commentary

    Have a Victim Response Plan for Data Breaches

    In a large data breach, there could be a real risk to victims' financial or personal security. Though responsible organizations should do everything in their power to ensure data is protected in the first place, they also should prepare a plan to ensure prompt victim response.

    Oct 2, 2018