Information Privacy

  • Member of the protest group, Code Pink, protests against U.S. President Obama and the NSA before his arrival at the DOJ in Washington, January 17, 2014

    Commentary

    The Facts About the Metadata 'Menace'

    Metadata from a phone call include information such as the direction (who called whom), length, date and time. The program does not record the location or the name associated with a call. No one is listening to the call and no content is recorded.

    Jan 26, 2014

  • A protester during a rally against mass surveillance near the U.S. Capitol

    Commentary

    After NSA Spying Revelations, US Must Reform Rules on Secrecy and Data

    The U.S. should make two key reforms. First, the over-designation of material as classified makes it is harder to protect the few real secrets; this must be change. Second, the FISA court must become a gatekeeper for NSA access to communications data.

    Nov 14, 2013

  • Events @ RAND Audio Podcast

    Multimedia

    Events @ RAND: Security Versus Privacy?

    At this October 2013 event, Henry Willis, director of the RAND Homeland Security and Defense Center, moderated a panel discussion on U.S. efforts to strike a balance among privacy, security, and liberty.

    Oct 24, 2013

  • woman using a laptop

    Commentary

    Opt-In, Opt-Out; Why Not Forced Choice?

    By default, browsers generally are set to automatically allow online tracking, but there may be a better way to make sure consumers decide whether or not they want to allow advertisers to sniff at their digital footprints, writes Steven Isley.

    Oct 8, 2013

  • Commentary

    Needed: Sustainable Spying Oversight

    Domestic intelligence in the United States is an activity with a history, and efforts to consider future policy on this issue need to take that history into account, writes Brian Jackson. Public acceptability must be part of the calculus in devising oversight and control of intelligence efforts.

    Sep 18, 2013

  • open red cyber lock with circuitboard background

    Journal Article

    Examining Data and Security Breaches and Cyber-Security Strategies

    A review some of the provisions of the European Commission's 2013 proposals for a Network and Information Security Directive highlights specific concerns, including the relationship of incident notification achieving the outcomes of the directive, potential for overlapping regulation and definitions of covered entities.

    Sep 1, 2013

  • Supporters of Edward Snowden

    Commentary

    What Did Edward Snowden Get Wrong? Everything

    Unfortunately, during the Snowden affair, many news outlets have spent more time examining ways the government could abuse the information it has access to while giving scant mention to the lengths to which the intelligence community goes to protect privacy, writes Andrew Liepman.

    Aug 12, 2013

  • Doctor using laptop

    Report

    Patient Privacy, Consent, and Identity Management in Health Information Exchange: Issues for the Military Health System

    A look at the gaps in research, policy, and practice involving patient privacy, consent, and identity management that need to be addressed to improve the quality and efficiency of care in the Military Health System through health information exchange.

    May 22, 2013

  • Eric Schmidt at RAND's Politics Aside event

    Blog

    Google's Eric Schmidt: 'Free Speech Matters'

    During a discussion with Reuters West Coast Bureau Chief Jonathan Weber at RAND's Politics Aside event, Google Executive Chairman Eric Schmidt discusses YouTube and the internet, and how Google's position on free speech, privacy, and user-generated content resonates globally.

    Dec 10, 2012

  • Binary code and laptops

    Journal Article

    Impact of the Data Protection Review on EU Innovation and Competitiveness

    This rapid evidence assessment of the innovation and competitiveness impacts of the EU's proposed General Data Protection Regulation considers a variety of perspectives and identifies several impacts and areas for improvement.

    Dec 1, 2012

  • Jonathan Weber interviews Eric Schmidt about "The New Digital Age" Thursday, Nov. 15, 2012 at the RAND Politics Aside event in Culver City.(High Res Version)

    Blog

    Google's Eric Schmidt on How Petraeus Resignation Highlights Online Privacy Battle

    Google Executive Chairman Eric Schmidt says there's a fight going on to save personal privacy on the web, and General Petraeus' resignation illustrates just some of the issues we face. Schmidt talks with Reuters West Coast Bureau Chief Jonathan Weber at RAND's Politics Aside event.

    Nov 20, 2012

  • money changing hands

    Journal Article

    Wellness Program Incentives: Can We Legally Pay People for Being Good?

    Incentives to participate in wellness programs or reach health-related targets are popular, but could expose employers and insurers to litigation risk because incentives might violate state and federal insurance, anti-discrimination, or privacy laws.

    Nov 1, 2012

  • Report

    Understanding the Security, Privacy, and Trust Aspects of Cloud Computing

    Cloud computing is a model for enabling on-demand network access to a shared pool of computing resources—such as storage and applications—that can be rapidly provisioned with minimal management effort or service provider interaction. RAND Europe explored the security, privacy, and trust challenges that cloud computing poses.

    Apr 4, 2011

  • Research Brief

    Security at what cost? Quantifying trade-offs across liberty, privacy and security

    RAND Europe undertook an internally funded, innovative discrete choice experiment to understand the real privacy and security trade-offs individuals are willing to make in order to inform policymakers about citizens' true preferences in this domain.

    Jun 8, 2010

  • Journal Article

    Quantifying Individuals' Trade-Offs Between Privacy, Liberty and Security: The Case of Rail Travel in UK

    This paper uses a stated choice experiment to quantify individuals' tradeoffs between privacy and security within a real-life context, namely rail travel in the UK.

    Mar 30, 2010

  • Travelers line up at Denver International Airport

    Report

    Security, At What Cost? Quantifying People's Trade-Offs

    To help policymakers understand the privacy, liberty, and security trade-offs individuals are willing to make, RAND Europe examined three real-life case studies where these factors come into play: applying for a passport, traveling on the national rail network, and attending a major public event.

    Jan 8, 2010

  • Report

    Increase Health Information Technology Adoption and Connectivity

    This document explores how increased health information technology (HIT) adoption and connectivity would affect health system performance along nine dimensions.

    Oct 12, 2009

  • Computer password screen

    Commentary

    The Cracks in Data Privacy

    In the future, the EU will inevitably have to adjust its system of rules to cope with the evolving uses of personal data, globalization and international data flows, write Neil Robinson and Lorenzo Valeri.

    May 19, 2009

  • Journal Article

    Crossed Wires: How Yesterday's Privacy Rules Might Undercut Tomorrow's Nationwide Health Information Network

    More than a decade after passage of the Health Insurance Portability and Accountability Act (HIPAA), concerns about the privacy and security of personal health information remain a major policy issue. Now, the emergence of the Nationwide Health Information Network (NHIN) presents deeper underlying privacy challenges, which will require renewed attention from policymakers as federal and state privacy rules need to be revisited.

    Mar 14, 2009

  • Journal Article

    Interoperable Electronic Prescribing in the United States: A Progress Report

    Although the vast majority of U.S. physicians still handwrite prescriptions, adoption of electronic prescribing is slowly growing. Major barriers to adoption remain, including the inability to electronically submit prescriptions for controlled substances and confusion about standards for data exchange. Federal and state governments and private insurers are using payment and policy incentives to boost e-prescribing because they still believe in its promise for improving the quality and efficiency of health care.

    Mar 14, 2009