Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Data security (3)
- Privacy (2)
- Social media (2)
- Civil liberties (1)
- Code (1)
-
- Consumer privacy (1)
- Copyright (1)
- Data aggregators (1)
- Data protection (1)
- Data retention (1)
- Free market (1)
- Globalization (1)
- Government surveillance (1)
- Identity card (1)
- Information economy (1)
- Information security (1)
- Internet (1)
- PETS (1)
- Personal data (1)
- Privacy-enhancing technologies (1)
- Secure Flight (1)
- Spam (1)
- Technology (1)
- United Kingdom (1)
Articles 1 - 4 of 4
Full-Text Articles in Privacy Law
Best Practices And The State Of Information Security, Kevin Cronin
Best Practices And The State Of Information Security, Kevin Cronin
Chicago-Kent Law Review
The forces of globalization, together with widely available industry standards and best practices, and heightened state legislative activity, are driving the U.S. towards a more unified approach to data security. But the success of this unified approach requires more than free market efficiency and innovation. In order to maintain a state of evolutionary equilibrium in the global information economy, the U.S. must move from a fragmented approach towards data security and privacy standards, towards a more comprehensive set of standards with new penalties and effective enforcement, to better reflect the inherent value of personal data in today's global marketplace.
Returning To A Principled Basis For Data Protection, Gus Hosein
Returning To A Principled Basis For Data Protection, Gus Hosein
Chicago-Kent Law Review
Society must remain conscious of both pragmatic and principle-based rationales for information security rules. The identity card debate in the United Kingdom provides an example of exactly why a governmental information security approach that is sensitive to civil liberties would be the best approach to data protection. In contrast, we should be cautious of a balancing test that places security in parity with civil liberties and, therefore, erroneously allows pragmatism to triumph over principle.
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Chicago-Kent Law Review
Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …