Guide to Protecting the Confidentiality of Personally Identifiable Information


Book Description

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.




Beyond the HIPAA Privacy Rule


Book Description

In the realm of health care, privacy protections are needed to preserve patients' dignity and prevent possible harms. Ten years ago, to address these concerns as well as set guidelines for ethical health research, Congress called for a set of federal standards now known as the HIPAA Privacy Rule. In its 2009 report, Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research, the Institute of Medicine's Committee on Health Research and the Privacy of Health Information concludes that the HIPAA Privacy Rule does not protect privacy as well as it should, and that it impedes important health research.




Protecting Personal Information


Book Description

The concept of privacy has long been confused and incoherent. The right to privacy has been applied promiscuously to an alarmingly wide-ranging assortment of issues including free speech, political consent, abortion, contraception, sexual preference, noise, discrimination, and pornography. The conventional definition of privacy, and attempts to evolve a 'privacy-as-a-fence' approach, are unable to deal effectively with the technological advances that have significantly altered the way information is collected, stored, and communicated. Social media such as Facebook pose searching questions about the use and protection of personal information and reveal the limits of conceiving the right to privacy as synonymous with data protection. The recent European Union's GDPR seeks to enforce greater protection of personal information, but the overlap with privacy has further obscured its core meaning. This book traces these troubling developments, and seeks to reveal the essential nature of privacy and, critically, what privacy is not.




The Basics of Digital Privacy


Book Description

Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You'll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who's watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis! - The most straightforward and up-to-date guide to privacy for anyone who goes online for work, school, or personal use - Real-world examples show you how cyber criminals commit their crimes, and what you can do to keep your identity and your data safe - Written by author Denny Cherry, who teaches top security professionals how to protect huge databases of information - Learn the best ways to create secure passwords, chat, text, email and conduct business online without compromising your identity and your personal data




Protecting Your Internet Identity


Book Description

People research everything online – shopping, school, jobs, travel – and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The authors look into the Edward Snowden revelations and the government’s voracious appetite for personal data. A new chapter on the right to be forgotten explores the origins and current effects of this new legal concept, and shows how the new right could affect us all. Timely information helping to protect your children on the Internet and guarding your business’s online reputation has also been added. The state of Internet anonymity has been exposed to scrutiny lately, and the authors explore how anonymous you can really choose to be when conducting activity on the web. The growth of social networks is also addressed as a way to project your best image and to protect yourself from embarrassing statements. Building on the first book, this new edition has everything you need to know to protect yourself, your family, and your reputation online.




Protecting Your Privacy


Book Description

Privacy is a fundamental human right; it underpins our freedom of association, thought and expression, and freedom from discrimination. It includes physical privacy, surveillance and information privacy. However, it is not absolute, it is hard to define, and sometimes harder to protect. What are the principles and laws that apply to privacy and personal information protection in Australia? How do tech giants like Facebook and Google profit from personal data, and how accountable are they to consumers and governments? Security cameras, CCTV, drones, ID scanning, smart home devices, GPS, tracing apps, and facial recognition technology - how much surveillance are you really subjected to by governments, corporations, hackers and law enforcement? Although privacy laws have expanded in recent years to deal with emerging technologies, there are still flaws and gaps in Australia's regulation. This title examines rights and responsibilities in relation to privacy and personal information and shines a light on the growth in digital surveillance. The book also offers advice on how to understand and preserve individual privacy and protect your personal information online. Are we too trusting, at the expense of our precious privacy?




Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




Protecting Personal Information


Book Description




Why Privacy Matters


Book Description

This is a book about what privacy is and why it matters. Governments and companies keep telling us that Privacy is Dead, but they are wrong. Privacy is about more than just whether our information is collected. It's about human and social power in our digital society. And in that society, that's pretty much everything we do, from GPS mapping to texting to voting to treating disease. We need to realize that privacy is up for grabs, and we need to craft rules to protect our hard-won, but fragile human values like identity, freedom, consumer protection, and trust.




Innovations in Federal Statistics


Book Description

Federal government statistics provide critical information to the country and serve a key role in a democracy. For decades, sample surveys with instruments carefully designed for particular data needs have been one of the primary methods for collecting data for federal statistics. However, the costs of conducting such surveys have been increasing while response rates have been declining, and many surveys are not able to fulfill growing demands for more timely information and for more detailed information at state and local levels. Innovations in Federal Statistics examines the opportunities and risks of using government administrative and private sector data sources to foster a paradigm shift in federal statistical programs that would combine diverse data sources in a secure manner to enhance federal statistics. This first publication of a two-part series discusses the challenges faced by the federal statistical system and the foundational elements needed for a new paradigm.