Information Privacy

Featured

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    Apr 14, 2016

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

  • Digital silhouettes of people

    Commentary

    How to Rethink Data Privacy

    Oct 5, 2016

    Society benefits from the exchange of large-scale data in many ways. Anonymization is the usual mechanism for addressing the privacy of data subjects. Unfortunately, anonymization is broken.

Explore Information Privacy

  • Woman's eye with technology of security concept

    Commentary

    The Perils of Connecting Our Bodies to the Internet

    High-tech health care solutions are part of an emerging sector of medical technologies that monitor personal health data by essentially connecting your body to the Internet. As smart devices in health care evolve, the line between human and machine is blurring, and creating new concerns about consumer safety and privacy rights.

    Oct 15, 2018

  • Doctors using a tablet and a desktop computer to view a patient's medical records

    Commentary

    How Smartphone Apps Could Help Keep Health Records Accurate

    Electronic health records have helped streamline record keeping but providers aren't always able to reliably pull together records for the same patient from different hospitals, clinics, and doctor's offices. The growing use of smartphones offers a promising opportunity to improve record matching.

    Oct 4, 2018

  • Hacker on a laptop

    Commentary

    Have a Victim Response Plan for Data Breaches

    In a large data breach, there could be a real risk to victims' financial or personal security. Though responsible organizations should do everything in their power to ensure data is protected in the first place, they also should prepare a plan to ensure prompt victim response.

    Oct 2, 2018

  • Students using digital tablets

    Report

    Privacy and Interoperability Challenges Could Limit the Benefits of Education Technology

    The rise of education technology brings increased opportunity for the collection and application of data. This presents challenges, including data infrastructure issues that could limit the usefulness of data, and privacy concerns.

    Oct 2, 2018

  • News Release

    Mobile Phones and Smartphone Apps Hold Promise for Allowing Patient Participation in Improving Medical Record Matching

    Mobile phones and smartphone apps offer a promising approach to ensure that an individual's medical records when shared between different health care providers are matched correctly.

    Aug 22, 2018

  • A medical record app displaying on a smartphone

    Report

    Patients Could Help Improve Record Matching

    When health providers exchange medical records, the success rate can be as low as 50 percent. The ubiquity of mobile phones offers a promising opportunity to create a patient-empowered system to confirm identities that would allow hospitals and other providers to match records more accurately.

    Aug 22, 2018

  • Face detection and recognition

    Commentary

    Keeping Artificial Intelligence Accountable to Humans

    Artificial intelligence (AI) systems are often only as intelligent and fair as the data used to train them. To enable AI that frees humans from bias instead of reinforcing it, experts and regulators must think more deeply not only about what AI can do, but what it should do—and then teach it how.

    Aug 20, 2018

  • Report

    Developing Cybersecurity Capacity: A proof-of-concept implementation guide

    This document is a proof-of-concept operational toolbox designed to facilitate the development of national-level cybersecurity capacity building programmes and of holistic policy and investment strategies to tackle challenges in the cyber domain.

    Aug 2, 2018

  • Social network illustration superimposed over a city at night

    Report

    How Police Could Use Social Media and Social Network Analysis

    Social media and social network analysis could help law enforcement monitor for safety threats, identify those at high risk for involvement in violence, and investigate crimes and crime networks. But computer security, privacy, and civil rights protections must be in place before using these tools.

    Jul 18, 2018

  • A group of colleagues using their smart phones in synchronicity.

    Multimedia

    Protecting Consumer Data: Considerations for Congress

    Should consumers be in charge of self-regulating the data they share and how companies use it? What policy opportunities could Congress consider to better protect consumer data? In this RAND Congressional briefing, Rebecca Balebako and John Davis discuss the benefits and risks of data sharing, opportunities for protecting privacy at both the personal and industry level, and current U.S. laws and how they compare to European laws.

    Jun 8, 2018

  • Osonde Osoba in a RAND panel discussion in Pittsburgh, Pennsylvania, February 20, 2018

    Q&A

    The Human Side of Artificial Intelligence: Q&A with Osonde Osoba

    Osonde Osoba has been exploring AI since age 15. He says it's less about the intelligence and more about being able to capture how humans think. He is developing AI to improve planning and is also studying fairness in algorithmic decisionmaking in insurance pricing and criminal justice.

    May 1, 2018

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018

  • William Welser IV, Rebecca Balebako, and Osonde Osoba in a RAND panel discussion in Pittsburgh, Pennsylvania, February 20, 2018

    Blog

    'Alexa, What Do You Know About Me, and Who Are You Telling?'

    RAND experts held a wide-ranging discussion about artificial intelligence and privacy. They raised questions about fairness and equity regarding privacy and data use, while also highlighting positive trends and developments across the evolving AI-privacy landscape.

    Mar 1, 2018

  • Composite impage of a hand holding a digital device locked with a padlock symbol

    Multimedia

    The Collision of AI and Privacy

    In this Events @ RAND podcast, RAND experts discuss risks to privacy in the age of artificial intelligence.

    Feb 20, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Data sharing and privacy concept

    Commentary

    Collaboration Is the Best Strategy to Combat Population Health Concerns

    The greatest opportunities to improve health happen pretty much everywhere but the doctor's office. Collaborative programming that merges strategies from housing, education, or labor could make a big difference.

    Dec 14, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017