Spelling suggestions: "subject:"privacy daw"" "subject:"privacy caw""
1 |
Protecting Online PrivacyWinkler, Stephanie D. 01 January 2016 (has links)
Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is provided legally users may turn to technological solutions.
|
2 |
The Interplay of Web Aggregation and RegulationZhu, Hongwei, Madnick, Stuart E., Siegel, Michael D. 01 1900 (has links)
The development of web technology has led to the emergence of web aggregation, a service that collects existing web data and turns them into more useful information. We review the development of both comparison and relationship aggregation and discuss their impacts on various stakeholders. The aggregator’s capability of transparently extracting web data has raised challenging issues in database and privacy protection. Consequently, new regulations are introduced or being proposed. We analyze the interactions between aggregation and related policies and provide our insights about the implications of new policies on the development of web aggregation. / Singapore-MIT Alliance (SMA)
|
3 |
The Implications of Artificial Intelligence in the Criminal Justice SystemGaray, Natalie 01 January 2024 (has links) (PDF)
This thesis focuses on artificial intelligence's recent implications on the criminal justice system regarding its admissibility as evidence in civil and criminal cases. One of the main concerns surrounding artificial intelligence is determining the validity of AI application; application refers to the accuracy "AI measures, classifies, or predicts what it is designed to" (Article: Artificial Intelligence as Evidence by Paul W. Grimm, Maura R. Grossman & Gordon V.Cormack.(https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1349&context=njtip). Privacy law will also be analyzed in this analysis. Is evidence recorded without the individual's consent or knowledge acceptable in determining an individual's guilt? This analysis will primarily focus on determining whether the introduced AI evidence is valid and if it can and should play a role in a civil or criminal case. Like any other system, the criminal justice system has many imperfections. The goal of this research is to neither negate nor enforce what that criminal justice system is currently doing but rather to provide evidence for growth within the system. Through the research process, many wrongful convictions due to mishaps with AI have presented themselves. Whether AI continues to grow in the criminal justice system or not is inevitable. AI as evidence will continue to grow in the system and become more than evidence one day. The Florida Bar has passed a rule allowing the integration of AI into the legal system. The rule prohibits misleading information and ensures the client must be aware that they are not communicating with an attorney but rather an AI program. As AI continues to integrate into the legal system, court officials must do it harm-free, which is the goal of this research.
|
4 |
Internetové obchodování s mezinárodním prvkem / Internet business transactions with an international elementČišecká, Nikol January 2019 (has links)
This thesis examines online trade and the latest European Union directive that forbids geo- blocking, which could be a breakthrough for the sector. The work dissects the benefits of the regulation not only from the point of view of the consumer, but from that of an e- commerce company as well. It also includes a discussion of the planned international trade accord between the United States and the EU. The work is segmented into four parts. The first section defines general terms such as international privacy laws, e- commerce, and the internet. It lays out the history of the internet and its beginnings in the Czech Republic, its regulation, and the movement fighting for a so-called free internet. It also examines consumer protections on the internet and the setting of a legal authority to adjudicate conflicts created in internet trade. The second part is dedicated to e-commerce, which is often understood as a synonym for internet-based trade. It's the differences in these two terms that will be discussed in this part of the work. The definition of e-commerce is discussed as are its individual types, international organizations, and associations overseeing electronic commerce. The third part of the work examines the Transatlantic Commerce and Investment Partnership between the United States and the...
|
5 |
The Right to Digital Privacy: Advancing the Jeffersonian Vision of Adaptive ChangeMoller, Kerry 01 January 2014 (has links)
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient nineteenth century observation that laws and institutions must keep pace with the times offers a vision for change. Statutory law and court precedents help to define our right to privacy, however, the development of new technologies has complicated the application of old precedents and statutes. Third party organizations, such as Google, facilitate new methods of communication, and the government can often collect the information that third parties receive with a subpoena or court order, rather than a Fourth Amendment-mandated warrant. Privacy promotes fundamental democratic freedoms, however, under current law, the digital age has diminished the right to privacy in our electronic communications data.
This work explores the statutory and constitutional law protecting our right to privacy, as well as the inadequacies that have developed with the digital revolution. With commonplace use of third parties to facilitate electronic communication, our courts and lawmakers must amend current laws and doctrines to protect the privacy of communications in the digital age. To provide clarity and appropriate data privacy protections, the following clarifications and amendments should be made to the third party doctrine and the Stored Communications Act (SCA): 1) third party doctrine should only apply to context data, 2) content data should be protected by the Fourth Amendment, 3) the SCA should eliminate the distinction between Remote Computing Services (RCS) data and Electronic Communication Services (ECS) data, and 4) the SCA should require warrants for all content data acquisition.
|
6 |
An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systemsSaganich, Robert Lee 01 January 2019 (has links)
This study examined privacy legislation in California to identify those electronic Protected Health Information (e-PHI) privacy policies that are suited to seniors using in-home health monitoring systems. Personal freedom and independence are essential to a person's physical and mental health, and mobile technology applications provide a convenient and economical method for monitoring personal health. Many of these apps are written by third parties, however, which poses serious risks to patient privacy. Current federal regulations only cover applications and systems developed for use by covered entities and their business partners. As a result, the responsibility for protecting the privacy of the individual using health monitoring apps obtained from the open market falls squarely on the states.
The goal of this study was to conduct an exploratory study of existing legislation to learn what was being done at the legislative level to protect the security and privacy of users using in-home mobile health monitoring systems. Specifically, those developed and maintained by organizations or individuals not classified as covered entities under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The researcher chose California due to its reputation for groundbreaking privacy laws and high population of seniors.
The researcher conducted a content analysis of California state legislation, federal and industry best practices, and extant literature to identify current and proposed legislation regarding the protection of e-PHI data of those using in-home health monitoring systems.
The results revealed that in-home health monitoring systems show promise, but they are not without risk. The use of smartphones, home networks, and downloadable apps puts patient privacy at risk, and combining systems that were not initially intended to function together carries additional concerns. Factors such as different privacy-protection profiles, opt-in/opt-out defaults, and privacy policies that are difficult to read or are not adhered to by the application also put user data at risk.
While this examination showed that there is legislative support governing the development of the technology of individual components of the in-home health monitoring systems, it appears that the in-home health monitoring system as a whole is an immature technology and not in wide enough use to warrant legislative attention. In addition – unlike the challenges posed by the development and maintenance of the technology of in-home health monitoring systems – there is ample legislation to protect user privacy in mobile in-home health monitoring systems developed and maintained by those not classified as covered entities under HIPAA. Indeed, the volume of privacy law covering the individual components of the system is sufficient to ensure that the privacy of the system as a whole would not be compromised if deployed as suggested in this study. Furthermore, the legislation evaluated over the course of this study demonstrated consistent balance between technical, theoretical, and legal stakeholders.
This study contributes to the body of knowledge in this area by conducting an in-depth review of current and proposed legislation in the state of California for the past five years. The results will help provide future direction for researchers and developers as they struggle to meet the current and future needs of patients using this technology as it matures. There are practical applications for this study as well. The seven themes identified during this study can serve as a valuable starting point for state legislators to evaluate existing and proposed legislation within the context of medical data to identify the need for legislation to assist in protecting user data against fraud, identity theft, and other damaging consequences that occur because of a data breach.
|
7 |
Protecting Online Privacy in the Digital Age: Carpenter v. United States and the Fourth Amendment's Third-Party DoctrineDel Rosso, Cristina 01 January 2019 (has links)
The intent of this thesis is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the United States Supreme Court's decision in Carpenter v. United States. In order to better understand the Supreme Court's reasoning in that case, this thesis will review the history of the third-party doctrine and its roots in United States v. Miller and Smith v. Maryland. A review of Fourth Amendment history and jurisprudence is also crucial to this thesis, as it is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of "papers" and "effects." Furthermore, this thesis will ultimately answer the following question: Why is it legally significant that we protect at least some data that comes from technologies that our forefathers could have never imagined under the Fourth Amendment?
Looking to the future, this thesis will contemplate solutions on how to move forward in this technology era. It will scrutinize the relevancy of the third-party doctrine due to the rise of technology and the enormous amount of information held about us by third parties. In the past, the Third-Party Doctrine may have been good law, but that time has passed. It is time for the Third-Party Doctrine to be abolished so the Fourth Amendment can join the 21st Century.
|
8 |
Attitudes toward, and awareness of, online privacy and security: a quantitative comparison of East Africa and U.S. internet usersRuhwanya, Zainab Said January 1900 (has links)
Master of Science / Computing and Information Sciences / Eugene Vasserman / The increase in penetration of Internet technology throughout the world is bringing an increasing volume of user information online, and developing countries such as those of East Africa are included as contributors and consumers of this voluminous information. While we have seen concerns from other parts of the world regarding user privacy and security, very little is known of East African Internet users’ concern with their online information exposure. The aim of this study is to compare Internet user awareness and concerns regarding online privacy and security between East Africa (EA) and the United States (U.S.) and to determine any common attitudes and differences. The study followed a quantitative research approach, with the EA population sampled from the Open University of Tanzania, an open and distance-learning university in East Africa, and the U.S. population sampled from Kansas State University, a public university in the U.S. Online questionnaires were used as survey instruments. The results show no significant difference in awareness of online privacy between Internet users from East Africa and the U.S. There is however, significant difference in concerns about online privacy, which differ with the type of information shared. Moreover, the results have shown that the U.S. Internet users are more aware of online privacy concerns, and more likely to have taken measure to protect their online privacy and conceal their online presence, than the East African Internet users. This study has also shown that East Africans Internet users are more likely to be victims of online identity theft, security issues and reputation damage.
|
9 |
Substantive Due Process and the Politicization of the Supreme CourtMillman, Eric 01 January 2018 (has links)
Substantive due process is one of the most cherished and elusive doctrines in American constitutional jurisprudence. The understanding that the Constitution of the United States protects not only specifically enumerated rights, but also broad concepts such as “liberty,” “property,” and “privacy,” forms the foundation for some of the Supreme Court’s most impactful—and controversial—decisions.
This thesis explores the constitutional merits and politicizing history of natural rights jurisprudence from its application in Dred Scott v. Sandford to its recent evocation in Obergefell v. Hodges. Indeed, from slavery to same-same sex marriage, substantive due process has played a pivotal role in shaping our nation’s laws and destiny: But was it ever intended to?
This paper first examines the legal arguments in favor of substantive due process to determine whether the judiciary was designed to be the “bulwark” of natural as well as clearly scribed law. Then, employing a novel framework to measuring judicial politicization, the thesis tracks the doctrine’s application throughout its most prominent case studies. Often arriving at nuanced conclusions, we observe that the truth is more often painted in some gradation of grey than in black or white.
|
10 |
La protection de la vie privée au temps de la biosécuritéDéziel, Pierre-Luc 03 1900 (has links)
Cette thèse s’intéresse à la protection de la vie privée informationnelle dans le contexte de la biosécurité. La biosécurité se définit comme le processus qui vise à prendre en charge, dans une optique de sécurité nationale, les menaces et dangers que représentent les épidémies de maladies infectieuses pour la santé des populations humaines et la sécurité de l’État. Notre projet remet en question l’idée selon laquelle la conduite des activités de surveillance de la santé publique implique nécessairement une diminution de la protection offerte aux renseignements personnels sur la santé. Nos recherches tendent à démontrer que la conciliation de la surveillance de la santé et la protection de la vie privée est non seulement possible, mais qu’elle est surtout nécessaire. Nous portons plus précisément notre attention sur le cas de la collecte et de l’utilisation de renseignements dépersonnalisés sur la santé par les systèmes de surveillance syndromique. Bien calibrée et soigneusement réglementée, cette forme novatrice et particulière de surveillance offrirait le double avantage de réduire les risques d’atteintes à la vie privée des individus et d’augmenter de manière considérable l’efficacité des capacités étatiques en matière de détection des épidémies. / This thesis focuses on the protection of privacy in the context of biosecurity. Biosecurity is concerned with the threats that epidemics of infectious diseases present to public health and national security. The main goal of my thesis is to challenge the idea that conducting meaningful public health surveillance necessarily implies that the scope of the legal protection given to personal health information has to be reduced. My research demonstrates that, given certain conditions, a public health surveillance conducted with carefully configured syndromic surveillance systems operating with de-identified health data would increase both the efficiency of surveillance in terms of its capacity to detect emerging epidemics and the level of informational privacy of the patients.
|
Page generated in 0.0548 seconds