Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms
|
|
- Lindsay Long
- 8 years ago
- Views:
Transcription
1 NELLCO NELLCO Legal Scholarship Repository New York University Public Law and Legal Theory Working Papers New York University School of Law Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms Kate Crawford Microsoft Research; MIT Centre for Civic Media; NYU Information Law Institute, kate@katecrawford.net Jason M. Schultz NYU School of Law, schultzj@exchange.law.nyu.edu Follow this and additional works at: Part of the Computer Law Commons, Consumer Protection Law Commons, and the Science and Technology Commons Recommended Citation Crawford, Kate and Schultz, Jason M., "Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms" (2013). New York University Public Law and Legal Theory Working Papers. Paper This Article is brought to you for free and open access by the New York University School of Law at NELLCO Legal Scholarship Repository. It has been accepted for inclusion in New York University Public Law and Legal Theory Working Papers by an authorized administrator of NELLCO Legal Scholarship Repository. For more information, please contact tracy.thompson@nellco.org.
2 BIG DATA AND DUE PROCESS: TOWARD A FRAMEWORK TO REDRESS PREDICTIVE PRIVACY HARMS Abstract:
3 Boston College Law Review New York Times See, e.g.the Philosophy of Data Strata 2013 Is a Wrap archived at Yes, Big Data Can Solve Real World Problems archived at See Information Privacy in the Cloud See Big Brother Gets a Makeover: Behavioral Targeting and the Third-Party Doctrine SeeBig Data: The End of Privacy or a New Beginning? Seeid. Privacy in the Age of Big Data: A Time for Big Decisions archived at Psst, You in Aisle 5 Id
4 Using Procedural Due Process to Redress Big Data s Privacy Harms What Is Big Data and Why All the Hype? Knowledge is invariably a matter of degree: you cannot put your finger upon even the simplest datum and say this we know. In the growth and construction of the world we live in, there is no one stage, and no one aspect, which you can take as the foundation. Id. See infra See infra See infra See infra See infra
5 Boston College Law Review Big Data s Predictive Privacy Harms See Big Data for All: Privacy and User Control in the Age of Analytics See Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon Id. Id. Id. Id. SeeProtecting Patient Privacy in the Age of Big Data archived at supra See Eight Problems with Big Data archived at See infra infra
6 Using Procedural Due Process to Redress Big Data s Privacy Harms See In Sickness, Health, and Cyberspace: Protecting the Security of Electronic Private Health Information see also Big Data Proxies and Health Privacy Exceptionalism available at archived at See Report Finds Correlation Between Health Data Breaches, Fraud Cases archived at supra Id. See Your Health Records: About Blue Button archived at See supra See Dependence on Cyberscribes Issues in e-security Health Sector Braces for Wide Impact of the New HITECH Omnibus Rule supra
7 Boston College Law Review imagining New York Times Id. Id. Seesupra See Quantified Self: Self Knowledge Through Numbers archived at See About Us archived at Counting Every Moment archived at Seegenerally The PII Problem: Privacy and a New Concept of Personally Identifiable Information supra Id. Id. Id. Id.see infra
8 Using Procedural Due Process to Redress Big Data s Privacy Harms impossible supra See generally Robust De-Anonymization of Large Sparse Datasets Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization Sample Complexity Bounds for Differentially Private Learning Id. See infra See Id.
9 Boston College Law Review Id. See id. See Saving Fair Housing on the Internet: The Case for Amending the Communications Decency Act See generally See generally, e.g. See generally Seegenerally Big Data in Small Hands archived at Private Traits and Attributes Are Predictable from Digital Records of Human Behavior
10 Using Procedural Due Process to Redress Big Data s Privacy Harms See The Rich See a Different Internet Than the Poor archived at Cf.Big Data Is Our Generation s Civil Rights Issue, and We Don t Know It archived at Followup on Big Data and Civil Rights archived at See supra See supra See It s Not Privacy, and It s Not Fair archived at Prediction, Preemption, Presumption: How Big Data Threatens Big Picture Privacy archived at
11 Boston College Law Review supra Id. Id. The Personalized Medicine Revolution Is Almost Here archived at 30 Million Investment in Health Research Centre to Tackle Major Diseases see also supra Meaningful Use of Health IT Stage 2: The Broader Meaning archived at How to Use 23andMe Without Giving Up Your Genetic Privacy archived at See generally archived at archived at
12 Using Procedural Due Process to Redress Big Data s Privacy Harms supra see supra Id. See Predictive Policing: Using Technology to Reduce Crime archived at Id. Cf.Unique in the Crowd: The Privacy Bounds of Human Mobility archived at Predictive Policing and Reasonable Suspicion supra
13 Boston College Law Review United States v. Jones watching and collecting generate See id. See id The Right to Quantitative Privacy Id Id.
14 Using Procedural Due Process to Redress Big Data s Privacy Harms Jones and Jones Cf. id. supra See generally The Memory Gap in Surveillance Law How Big Data Could Help Identify the Next Felon or Blame the Wrong Guy archived at Id Id. Id. See SeeClean Slate: Expanding Expungements and Pardons for Non-Violent Federal Offenders See, e.g.jones supra
15 Boston College Law Review Predictive Privacy Harms Threaten to Marginalize Traditional Privacy Protections A Taxonomy of Privacy See amended by See supra supra
16 Using Procedural Due Process to Redress Big Data s Privacy Harms supra See supra supra See archived at available at archived at see available at archived at available at archived at
17 Boston College Law Review Id. See, e.g.supra Big Data News Roundup: Correlation vs. Causation archived at Seesupra supra See supraacxiom Lets Consumers See Data It Collects supra Id. See id. See, e.g. It s About Time: Privacy, Information Life Cycles, and the Right to Be Forgotten The Right to Be Forgotten
18 Using Procedural Due Process to Redress Big Data s Privacy Harms The heart of the matter is that democracy implies respect for the elementary rights of men, however suspect or unworthy; a democratic government must therefore practice fairness; and fairness can rarely be obtained by secret, one-sided determination of facts decisive of rights. archived at Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation) available at archived at SeeBig Data, Trying to Build Better Workers
19 Boston College Law Review The Historical Role of Due Process The One and Only Substantive Due Process Clause SeeInformation Lost and Found Id. see also reprinted in see also Id. Id See supra
20 Using Procedural Due Process to Redress Big Data s Privacy Harms Procedural Due Process in the Courts Mathews v. Eldridge Goldberg Id. See See Intellectual Privacy The Right to Privacy Seesupra Id. Perspectives on the Fourth Amendment See
21 Boston College Law Review v. Kelly Goldberg Goldberg Mathews Goldberg Id. Id Id. Id. IdMcGrath Id. Id See id. Goldberg Goldberg Id. Id. Id. Id.
22 Using Procedural Due Process to Redress Big Data s Privacy Harms Mathews Goldberg Mathews Mathews Compareid. withgoldberg Id See id. Id. Id See, e.g. HamdiLoudermill
23 Boston College Law Review Some Kind of Hearing Mathews Greene v. McElroy Greene Some Kind of Hearingpassim Id. Id. Id. Id. Id. Perry v. Sindermann supra See supra Compare with Technological Due Process
24 Using Procedural Due Process to Redress Big Data s Privacy Harms Greene supra Compare with supra See supra See supra McGrath Id. Id. Id.
25 Boston College Law Review Id. Id. Id. Id. Id. Id. Id. Id. Id. Id. Id. Id. Id. Id.
26 Using Procedural Due Process to Redress Big Data s Privacy Harms See supra See supra Id. Seesupra Id. Id.
27 Boston College Law Review The Underlying Values of Due Process Id. See supra Adjudicatory Independence and the Values of Procedural Due Process Id. See id.
28 Using Procedural Due Process to Redress Big Data s Privacy Harms Id. Id. Id. Id. Id. see supra Id. See, e.g. When Google Got Flu Wrong The Hidden Biases in Big Data archived at See generallynetworks of Governance: Users, Platforms, and the Challenges of Networked Media Regulation Id. Voice, Control, and Belonging: The Double-Edged Sword of Procedural Justice
29 Boston College Law Review Due Process as Separation of Powers and Systems Management supra See suprathink Again: Big Data archived at Due Process as Separation of Power Id. Id
30 Using Procedural Due Process to Redress Big Data s Privacy Harms Technological Due Process: The Citron Analysis Technological Due Process seesupra See, e.g. supra Some Confusion About Due Process, Judicial Review, and Constitutional Remedies The Management Side of Due Process: Some Theoretical and Litigation Notes on the Assurance of Accuracy, Fairness, and Timeliness in the Adjudication of Social Welfare Claims supra See, e.g. supra Prediction, Pre-emption, Presumption: The Path of Law After the Computational Turnin Data Matching, Data Mining, and Due Process Transparent Predictions
31 Boston College Law Review supra Id. Id. Id. Id. Id. Id. Id.see also supra supra Id.
32 Using Procedural Due Process to Redress Big Data s Privacy Harms Mathews Mathews Id.Mathews v. Eldridge Id. Id. Id. Id. Id. Id. Id.
33 Boston College Law Review Procedural Data Due Process Id. id. at Id. Seesuprasuprasee also supra
34 Using Procedural Due Process to Redress Big Data s Privacy Harms See See, e.g. Meet a Start-Up With a Big Data Approach to Hiring archived at Meet the New Boss: Big Data archived at See, e.g
35 Boston College Law Review See supra supra see also Propositions of Modernisation archived at
36 Using Procedural Due Process to Redress Big Data s Privacy Harms See archived at supra
37 Boston College Law Review Seesupra See supra
LSA 2 nd Half Century Project Essay. Sociolegal Studies in the Big Data Age
LSA 2 nd Half Century Project Essay Sociolegal Studies in the Big Data Age Karen E.C. Levy PhD Candidate, Department of Sociology, Princeton University kelevy@princeton.edu www.karen levy.net Abstract:
More informationBig Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms
Boston College Law Review Volume 55 Issue 1 Article 4 1-29-2014 Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms Kate Crawford Microsoft Research, kate@katecrawford.net
More informationIndex All entries in the index reference page numbers.
Index All entries in the index reference page numbers. A Audit of organizations, 37-38, Access to personal information 162-163 by individual, 22, 31, 151-154 B assistance by organization, Biometrics, 123-125
More informationBIG DATA AND GEOSPATIAL PRIVACY A TALE OF TWO REPORTS KEITH C. CLARKE
BIG DATA AND GEOSPATIAL PRIVACY A TALE OF TWO REPORTS KEITH C. CLARKE NGAC meeting June 24-25, 2014 Podesta: Policy/Review PCAST: Technological implications/future Podesta: Big Data: Seizing Opportunities,
More informationClient Update A New Ruling by the French Data Protection Authority: Is the Right to Be Forgotten Crossing the Atlantic to the U.S.?
1 Client Update A New Ruling by the French Data Protection Authority: Is the Right to Be Forgotten Crossing the Atlantic to the U.S.? NEW YORK Jeremy Feigelson jfeigelson@debevoise.com PARIS Frederick
More informationBook Note: In Doubt: The Psychology Of The Criminal Justice Process, by Dan Simon
Osgoode Hall Law Journal Volume 51, Issue 2 (Winter 2014) Article 13 Book Note: In Doubt: The Psychology Of The Criminal Justice Process, by Dan Simon Jennifer McKee Follow this and additional works at:
More informationNEW YORK UNIVERSITY SCHOOL OF LAW
NEW YORK UNIVERSITY SCHOOL OF LAW PUBLIC LAW & LEGAL THEORY RESEARCH PAPER SERIES WORKING PAPER NO. 13-64 LAW & ECONOMICS RESEARCH PAPER SERIES WORKING PAPER NO. 13-36 Big Data and Due Process: Toward
More informationINTRODUCTION The Criminal Law Committee of the Law Society of Scotland ( the. Committee ) welcomes the opportunity to comment upon the Scottish
RESPONSE FROM LAW SOCIETY OF SCOTLAND INTRODUCTION The Criminal Law Committee of the Law Society of Scotland ( the Committee ) welcomes the opportunity to comment upon the Scottish Government s Consultation
More informationObservations on international efforts to develop frameworks to enhance privacy while realising big data s benefits
Big Data, Key Challenges: Privacy Protection & Cooperation Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Seminar arranged by the Office
More informationFederal Agencies Subject to the Data Quality Act. by Susan M. Bisong Modrall, Sperling, Roehl, Harris & Sisk, P.A.
Federal Agencies Subject to the Data Quality Act by Susan M. Bisong Modrall, Sperling, Roehl, Harris & Sisk, P.A. The Data Quality Act (DQA) is an attempt by Congress to ensure that federal agencies use
More informationEDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70
EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and
More informationCollateral damage occurs in any war, including America s War on Crime.
12 Collateral damage occurs in any war, including America s War on Crime. Ironically, our zealous efforts to keep communities safe may have actually destabilized and divided them. The vast expansion of
More informationLuna Community College. Criminal Justice Certificate Curriculum Profile 2012 2015
Luna Community College Criminal Justice Certificate Curriculum Profile 2012 2015 Content Page Program Goals 2 Approvals 3 Degree / Certificate Requirements 4 Course Descriptions and Outcomes 5-12 Assessment
More informationFederal Trade Commission
Federal Trade Commission The FTC s Privacy and Data Security Program: Where It Came From, Where It s Going Jessica Rich 1 Director, Bureau of Consumer Protection, FTC International Association of Privacy
More informationBig Data in Communication Research: Its Contents and Discontents
Journal of Communication ISSN 0021-9916 AFTERWORD Big Data in Communication Research: Its Contents and Discontents Malcolm R. Parks Department of Communication, University of Washington, Seattle, WA, 98195,
More informationPrivacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
More informationJan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament
September 5, 2012 Jan Philipp Albrecht Rapporteur, Committee on Civil Liberties, Justice and Home Affairs European Parliament Lara Comi Rapporteur, Committee on Internal market and Consumer Protection
More informationHealthcare data analytics. Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw
Healthcare data analytics Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw Outline Data Science Enabling technologies Grand goals Issues Google flu trend Privacy Conclusion Analytics
More information2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security
2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009
More informationBOUNDARY CONDITIONS FOR BIG DATA IN HEALTH CARE EFFY VAYENA, PHD UNIVERSITY OF ZURICH
BOUNDARY CONDITIONS FOR BIG DATA IN HEALTH CARE EFFY VAYENA, PHD UNIVERSITY OF ZURICH BIG DATA Ubiquitous (from dating, to hiring, to voting, to policing, to searching for terrorists, etc.) Everyone is
More informationExecutive Doctorate in Higher Education Management Curriculum Guide
Executive Doctorate in Higher Education Management Curriculum Guide The Executive Doctorate in Higher Education Management Program consists of six consecutive terms, starting with a late summer term and
More informationSecuring Big Data Learning and Differences from Cloud Security
Securing Big Data Learning and Differences from Cloud Security Samir Saklikar RSA, The Security Division of EMC Session ID: DAS-108 Session Classification: Advanced Agenda Cloud Computing & Big Data Similarities
More informationI. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
More informationMEDIA, TECHNOLOGY, AND INFORMATION LAW. Yale Law School
MEDIA, TECHNOLOGY, AND INFORMATION LAW Yale Law School MEDIA,TECHNOLOGY, AND INFORMATION LAW Yale Law School Yale Law School has long focused on the intersection of media, technology, information, and
More informationBut For Causation in Defective Drug and Toxic Exposure Cases: California s Form Jury Instruction CACI 430
But For Causation in Defective Drug and Toxic Exposure Cases: California s Form Jury Instruction CACI 430 By Matt Powers and Charles Lifland Since the California Supreme Court s 1991 decision in Mitchell
More informationHarmful digital communications, cyber bullying and digital harassment can take a variety of forms.
FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending
More informationPUBLIC HEALTH LAW AND ETHICS
PUBLIC HEALTH LAW AND ETHICS LAWJ-364-05 Fall Term, 2002 Tuesdays 5:45-8:50 PM Room 160 Georgetown University Law Center Professor Lawrence O. Gostin Syllabus COURSE OBJECTIVES Ensuring the health and
More informationBig Data, Official Statistics and Social Science Research: Emerging Data Challenges
Big Data, Official Statistics and Social Science Research: Emerging Data Challenges Professor Paul Cheung Director, United Nations Statistics Division Building the Global Information System Elements of
More informationSeattle Job Assistance Legislation Regulating the use of criminal history in employment decisions. Frequently Asked Questions
Seattle Job Assistance Legislation Regulating the use of criminal history in employment decisions Frequently Asked Questions This Frequently Asked Questions (FAQ) sheet addresses some of the most common
More informationHIPAA Audits and Compliance: What To Expect From Regulators and How to Comply
HIPAA Audits and Compliance: What To Expect From Regulators and How to Comply October 18, 2013 ACEDS Membership Benefits Training, Resources and Networking for the ediscovery Community Exclusive News and
More informationStudents may publish up to one Comment and one Note within Volume 125, but may not publish more than one of either.
TO: All J.D. Candidates at Yale Law School FROM: The Yale Law Journal Volume 125 Comments Committee (Dahlia Mignouna, Jeffrey Chen, Marcella Coburn, Stephanie Krent, Rebecca Loomis, Amanda Lynch, Michael
More informationLLB (Hons) Law with Criminology Module Information
LLB (Hons) Law with Criminology Module Information Year 1 Law of Contract and Problem Solving This module develops students knowledge and understanding of the law of contract. You will study the underlying
More informationThe Intersection of Big Data, Data Science, and The Internet of Things
The Intersection of Big Data, Data Science, and The Internet of Things Bebo White SLAC National Accelerator Laboratory/ Stanford University bebo@slac.stanford.edu SLAC is a US national laboratory operated
More informationAtlanta s John Marshall Law School
Atlanta s John Marshall Law School 121 Torts II Syllabus & Course Outline Summer Semester 2015 Associate Professor Michael Mears 1422 West Peachtree Street NW Atlanta, Georgia 30309 404 872-3593, ext.
More informationE-PRIVACY DIRECTIVE: Personal Data Breach Notification
E-PRIVACY DIRECTIVE: Personal Data Breach Notification PUBLIC CONSULTATION BEUC Response Contact: Kostas Rossoglou digital@beuc.eu Ref.: X/2011/092-13/09/11 EC register for interest representatives: identification
More informationThis thesis is presented for the Honours degree of Bachelor of Laws of Murdoch University
This thesis is presented for the Honours degree of Bachelor of Laws of Murdoch University The dichotomy between criminal and civil law. Can civil penalties be more than just a remedial hybrid in corporate
More informationFORENSIC DNA COLLECTION: A CITIZEN S GUIDE TO YOUR RIGHTS SCENARIOS AND RESPONSES
FORENSIC DNA COLLECTION: A CITIZEN S GUIDE TO YOUR RIGHTS SCENARIOS AND RESPONSES 1. DNA Dragnets You are between the ages of 18 and 35 and live in a city, town or neighborhood where a homicide has occurred.
More informationWhite Paper. Data Mining for Business
White Paper Data Mining for Business January 2010 Contents 1. INTRODUCTION... 3 2. WHY IS DATA MINING IMPORTANT?... 3 FUNDAMENTALS... 3 Example 1...3 Example 2...3 3. OPERATIONAL CONSIDERATIONS... 4 ORGANISATIONAL
More informationBig Data Analytics for United Security
Big Data Analytics for United Security What Advantages Does an Agile Network Bring? (Issue 2) By Swift Liu, President Enterprise Networking Product Line Huawei Enterprise Business Group Agile means quick
More information1.1 Do you agree that these are the basic features required of the patent system?
Hi, I'm in charge of software development for a computer software business. I'd like to put forward my company's position on patents in response to your Questionnaire on the Patent System in Europe. 1.1
More informationThe Big Deal With Big Data: New Security Tools Are Needed
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com The Big Deal With Big Data: New Security Tools Are
More informationHonours Political Science, Law and Politics Specialization
Department of Political Science Honours Political Science, Law and Politics Specialization This program offers a specialized concentration of learning within the four-year Honours Political Science degree.
More informationPrivacy Policy. If you have any questions about this Policy or our privacy practices, please contact us by email at inforequest@pellawi.com.
Effective Date: January 1, 2015 Privacy Policy Thank for visiting pellawi.com which is operated by VerHalen, Inc. an independently owned and operated business under a distribution agreement with Pella
More informationDEPARTMENT OF PREVENTIVE MEDICINE AND COMMUNITY HEALTH Medical College of Virginia VIRGINIA COMMONWEALTH UNIVERSITY
DEPARTMENT OF PREVENTIVE MEDICINE AND COMMUNITY HEALTH Medical College of Virginia VIRGINIA COMMONWEALTH UNIVERSITY PMCH 618: PUBLIC HEALTH LAW Summer Semester, 2001 COURSE TIME/ROOM: CREDITS: INSTRUCTOR:
More informationIntroduction to Law and Public Safety 1
Introduction to Law and Public Safety 1 Career Cluster Law, Public Safety, Security & Corrections Course Code 15001 Prerequisite(s) None Credit 1.0 Program of Study and Foundation courses, Law and Public
More informationHIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
More informationTECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT
TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT Don t get lost in the cloud! This session will arm you with an understanding of the intricacies of
More informationBig Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013
Big Data & Analytics: Your concise guide (note the irony) Wednesday 27th November 2013 Housekeeping 1. Any questions coming out of today s presentation can be discussed in the bar this evening 2. OCF is
More informationPRIVACY BREACH POLICY
Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION
More informationSecurely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
More informationHit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
More informationCriminal Justice Theory - How to Write and Study It
CRIJ 6332 CRIMINAL JUSTICE THEORY Graduate Level Spring A Session, 2015 8- Week Online - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationConsumer Information Sheet 16 October 2013
First Aid For Medical Identity Theft Tips for Consumers Consumer Information Sheet 16 October 201 When another person uses your personal information to get medical services or goods, or to gain financially,
More informationThe Federal EEO Process
The Federal EEO Process LULAC National Convention and Exposition Cincinnati, Ohio June 27- July 2, 2011 Overview of EEO Laws Identifying Discrimination 1 Laws Enforced by the EEOC Title VII of the Civil
More informationDEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES
DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) Mission The University strives to endow students with the skills necessary for critical knowledge, communication,
More informationStatement on the general concept of the European Union towards Data Protection by Aktion Freiheit statt Angst e.v.; EU Register ID 17019643006-45
Berlin, 10. Januar 2011 Aktion Freiheit statt Angst Rochstr. 3 Directorate-General Justice Unit C3 Data protection European Commission B - 1049 Brussels Statement on the general concept of the European
More informationTHE PENNSYLVANIA PRISON SOCIETY'S RESTORATIVE JUSTICE PROGRAM
THE PENNSYLVANIA PRISON SOCIETY'S RESTORATIVE JUSTICE PROGRAM The Pennsylvania Prison Society's Restorative Justice Program seeks to change the lives of incarcerated people and the prison environment by
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationTraining, Resources and Networking for the E-Discovery Community
ACA Reporting and the HIPAA Omnibus Final Rule: Privacy and Security Requirements Doubly Strengthened New HIPAA Requirements and data reporting rules will affect healthcare providers, plans, many employers
More informationFOR SHARING LAW ENFORCEMENT INFORMATION
INTERLOCAL AGREEMENT BETWEEN COLLIN COUNTY TEXAS AND The City of Austin, Texas; the City of El Paso, Texas; the City of Houston, Texas; and the City of San Antonio, Texas FOR SHARING LAW ENFORCEMENT INFORMATION
More informationHow To Report Abuse In Martha Maryland
GUIDE to REPORTING ABUSE in MARYLAND INTRODUCTION Unfortunately, abuse in our community is a reality, and the incidents are rarely self reported. When abused and neglected children and adults and their
More informationChapter 15 Criminal Law and Procedures
Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures
More informationPolicy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
More informationBig Data / Privacy: Pick One?
Big Data / Privacy: Pick One? A. Michael Froomkin University of Miami School of Law froomkin@law.miami.edu 1 Privacy, Quickly Has multiple elements including control of access to body, to thoughts, protection
More informationSTATE OF TENNESSEE OFFICE OF THE ATTORNEY GENERAL. February 3, 2014. Opinion No. 14-15 QUESTIONS
STATE OF TENNESSEE OFFICE OF THE ATTORNEY GENERAL Juveniles on Sex Offender Registry February 3, 2014 Opinion No. 14-15 QUESTIONS 1. Would a juvenile who committed a violent juvenile sexual offense before
More informationSecurity vs. Privacy: Who is Winning?
Security vs. Privacy: Who is Winning? SESSION ID: DSP-R01 Christopher T. Pierson, J.D., Ph.D. EVP, Chief Security Officer & Chief Compliance Officer Viewpost James T. Shreve, J.D. Attorney BuckleySandler
More informationBIG DATA FOR DEVELOPMENT: A PRIMER
June 2013 BIG DATA FOR DEVELOPMENT: A PRIMER Harnessing Big Data For Real-Time Awareness WHAT IS BIG DATA? Big Data is an umbrella term referring to the large amounts of digital data continually generated
More informationNCVLI. Victim Law Position Paper* Crime Victims Have the Right to Retained Counsel s Presence During Investigative Interviews
NCVLI NATIONAL CRIME VICTIM LAW INSTITUTE PROTECTING, ENFORCING & ADVANCING VICTIMS RIGHTS Protecting, Enforcing & Advancing Victims Rights AUGUST 2014 * LEGAL PUBLICATIONS PROJECT OF THE NATIONAL CRIME
More informationThe Effect of Prison Populations on Crime Rates
The Effect of Prison Populations on Crime Rates Revisiting Steven Levitt s Conclusions Nathan Shekita Department of Economics Pomona College Abstract: To examine the impact of changes in prisoner populations
More informationThe Impact of Big Data on Social Research David Rhind Sharon Witherspoon
The Impact of Big Data on Social Research David Rhind Sharon Witherspoon 1 www.nuffieldfoundation.org The landscape to be covered What is Big Data? Just consultants hype? Key questions for SRA Technology
More informationDrug Court as Diversion for Youthful Offenders
Drug Court as Diversion for Youthful Offenders Juvenile Drug Courts in Hawaii: A Policy Brief Introduction The problem of drug abuse among the general population in the United States began to escalate
More informationBriefing note: What s wrong with the Protection of Information Bill Aug 2010
Briefing note: What s wrong with the Protection of Information Bill Aug 2010 Background The apartheid-era Protection of Information Act (84 of 1982) remains on the statute books, but government acknowledges
More information7 Things Every Family Lawyer Should Know About Criminal Law
7 Things Every Family Lawyer Should Know About Criminal Law Jason Kohlmeyer Rosengren Kohlmeyer, Law Office Chtd. Mankato, MN 1) What exactly is the whole misdemeanor, gross misdemeanor and felony thing?
More informationBusiness Law and Ethics, 7-11-14, Page 1 of 5
Indiana Department of Education Academic Course Framework BUSINESS LAW AND ETHICS Business Law and Ethics provides an overview of the legal system in the business setting. Topics covered include: basics
More informationA life like any other?
A life like any other? Human Rights and Adults with Learning Disabilities An Easy Read Summary of a Report by the Joint Committee on Human Rights What is in this booklet Page 1. Introduction 1 2. What
More informationCloud Computing: The Gathering Storm
Cloud Computing: Independent research Martin Wootton, RS Consulting Cloud Computing: The Gathering Storm What UK consumers really feel about cloud-based services We rely more than ever on computing and
More informationMassachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews
Massachusetts Major City Chiefs Best Practices in Eyewitness Identification and the Recording of Suspect Interviews September 2010 Introduction In December 2009 the Boston Bar Association published Getting
More informationPrivacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems
Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure
More informationOne thing everyone seems to agree with is that Big Data reflects the geometric growth of captured data and our intent to take advantage of it.
1. CONTEXT Everywhere you turn these days, you will hear three buzzwords: SaaS (Software as a Service), cloud computing and Big Data. The first is a business model, the second a capacity model. The last
More informationInternal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity
Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity Prepared for: The Essential Privacy, Access to Information, CASL Forum November 24, 2014 Dr. Andrea Slane University
More informationACTA - State of Play. Karel De Gucht. European Commissioner for Trade
Karel De Gucht European Commissioner for Trade ACTA - State of Play 1st Exchange of Views with the Committee for International Trade of the European Parliament Brussels, 29 February 2012 Professor Moreira,
More informationCanadian Law. What is Law?
8 MODULE 1 LAW 12 Canadian Law Canada s laws are complex (i.e., not easy to understand) and comprehensive (i.e., we have laws governing just about everything). They affect each of us every day of our lives.
More informationDEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES
122 / Department of Social and Behavioral Sciences DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) The Bachelor of Arts in Criminal Justice is a four-year
More informationPrinciples of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note
Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout
More informationHuman Resource Administration in the American Public vs Private School System By Annick Brennen, MA
Human Resource Administration in the American Public vs Private School System By Annick Brennen, MA Introduction The employment of teachers in both the private and public systems is governed by law. In
More informationFebruary 17, 2011. Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580
February 17, 2011 Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 Re: A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework
More informationPrivacy: Legal Aspects of Big Data and Information Security
Privacy: Legal Aspects of Big Data and Information Security Presentation at the 2 nd National Open Access Workshop 21-22 October, 2013 Izmir, Turkey John N. Gathegi University of South Florida, Tampa,
More informationUniversity of King's College Research Ethics Policy
University of King's College Research Ethics Policy 1. Introduction The University of King's College is committed to ethical practices in research and we subscribe to the guidelines presented in the Canadian
More informationPOLICY FRAMEWORK AND STANDARDS INFORMATION SHARING BETWEEN GOVERNMENT AGENCIES
POLICY FRAMEWORK AND STANDARDS INFORMATION SHARING BETWEEN GOVERNMENT AGENCIES January 2003 CONTENTS Page 1. POLICY FRAMEWORK 1.1 Introduction 1 1.2 Policy Statement 1 1.3 Aims of the Policy 1 1.4 Principles
More informationBoys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology
Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the
More informationCONSTITUTIONAL LAW ESSAY QUESTION #2 MODEL ANSWER
CONSTITUTIONAL LAW ESSAY QUESTION #2 MODEL ANSWER Because of teenage pregnancy student dropouts, the Board of Education of City (Board) adopted an "Alternative Education Program" (AEP) for unmarried students
More informationATTORNEYS AT LAW ONLINE MARKETING MAGIC INSTALLMENT 2: THE COVER-UP IS WORSE THAN THE CRIME
SILVERMAN ADVISORS ATTORNEYS AT LAW CLIENT ALERT AUGUST 2014 ONLINE MARKETING MAGIC INSTALLMENT 2: THE COVER-UP IS WORSE THAN THE CRIME BY SCOTT A. SILVERMAN Are you still impressed when you hear that
More informationJustice Committee. Courts Reform (Scotland) Bill. Written submission from Unite the Union
Justice Committee Courts Reform (Scotland) Bill Written submission from Unite the Union In our view the Court of Session should deal with only the most complex and important cases and the most routine
More informationBig Data in Government: What Are the Talent Needs? McMaster University Big Data Forum 2014-09-24
Big Data in Government: What Are the Talent Needs? McMaster University Big Data Forum 2014-09-24 Big data in government The Canadian government holds large amounts of administrative and transactional,
More informationOPEN ACCESS, PRIVACY AND HACKER CULTURE
OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013
More informationParents recording social workers - A guidance note for parents and professionals
Parents recording social workers - A guidance note for parents and professionals The Transparency Project December 2015 www.transparencyproject.org.uk info@transparencyproject.org.uk (Charity Registration
More informationAnalysing the US HIPAA legacy and future changes on the horizon
Volume: 10 Issue: 2 Analysing the US HIPAA legacy and future changes on the horizon The US Department of Health and Human Services issued the long-awaited final omnibus rule under the Health Insurance
More informationNAU Criminal Justice Department. Masters of Science. Student Learning Outcomes Assessment Plan, 2004-5
NAU Criminal Justice Department Masters of Science Student Learning Outcomes Assessment Plan, 2004-5 The Department of Criminal Justice Mission: The mission of the Department of Criminal Justice is to
More informationEducation Leadership (ISLLC) Standards Comparison of Old (2007) and New Standards (2015)
Education Leadership (ISLLC) Standards Comparison of Old (2007) and New Standards (2015) 2007 Standards 2015 Standards Standard 1: Vision and Mission Standard 1: Vision and Mission An education leader
More information