April 7, 1999 Privacy in Transition -- and What’s Next? Alan F. Westin Professor of Public Law & Government Emeritus,

Slides:



Advertisements
Similar presentations
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Advertisements

Local Commerce in Social Networks in Mexico and its Regulations.
© 2006 IBM Corporation Privacy Matters: Safeguarding Identity, Data and Corporate Reputation Harriet P. Pearson VP Corporate Affairs & Chief Privacy Officer.
A Public Policy Research Agenda in IST John W. Bagby Professor of IST Co-Dir. Inst. Info. Policy.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Disclaimer This Presentation is provided “as is” without any express or implied warranty. This Presentation is for educational purposes only and does not.
3 Ethics and Privacy.
Better, Smarter, Healthier Delivery System Reform Presentation to the Health IT Policy Committee March 10, 2015 U.S. Department of Health and Human Services.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Can We Have EHRs and Privacy Too? Dr. Alan F. Westin Professor of Public Law and Government Emeritus, Columbia University; Principal, Privacy Consulting.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Lecture 9 E-Marketing Consumer Behavior Online
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Stan Lee (presenter) and Graham Coult Editor-in-chief Managing Information magazine
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
REPORT OF THE BJS/SEARCH NATIONAL TASK FORCE ON PRIVACY, TECHNOLOGY AND CRIMINAL JUSTICE INFORMATION May 31, 2000 Washington, DC Presented by Robert R.
6 Ethics and Privacy.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Data protection and European citizens’ initiatives
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
17 March Privacy (finish) Consumer. Privacy Data & informational privacy One should ask: Who has ACCESS? Who should have ACCESS? Need to know? Why? Keep.
Issue: High Spending, Low Results. Goals: Increased Efficiency Improve quality and delivery of health care services provided. Improve the cost effectiveness.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Towards Affordable Internet Access: A4AI Ghana Coalition’s Lobbying Interventions.
1 Food Safety: Hong Kong’s Experience Clement Leung Hong Kong Commissioner to the United States The Brookings Institution April 28,
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
2 PSD2- C HALLENGES AND OPPORTUNITIES Pascale-Marie BRIEN– Senior Policy Adviser.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
2011 Annual May Workshop The Australian Privacy Law Reform Project: a snapshot Karin Clark 4 May 2011.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
For more information visit us at Up the Revolution – The law of unintended consequences strikes again David Sinclair Chartered health.
India and Tuberculosis GRETCHEN APGAR MARYMOUNT UNIVERSITY SUMMER SEMESTER II.
Judicial Training on Data Protection and Privacy Rights
Cyber Security – An Existential Threat? (IIC, Singapore)
Social and environmental impact
MGMT 452 Corporate Social Responsibility
Educause/Internet 2 Computer and Network Security Task Force
Security of In-Vehicle Software
PEST Analysis.
Internet and Research Ethics
Electronic Government (part 1)
UNC System Archivists and Records Managers Meeting
Teaching Internet Safety
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
E-government Working Group
April 7, 1999 How Privacy Became a Top-Tier Socio-Political Issue -- and What’s Next? Alan F. Westin Professor of Public.
2018 Autonomous Vehicle Summit
A Gift of Fire Third edition Sara Baase
The Mozambique Experience Dr Pascoal Mocumbi
Other Sources of Information
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Chapter 1: Information Security Fundamentals
HIPAA Overview.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Lesson 1: Introduction to HIPAA
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
IT and Society Week 2: Privacy.
Workshop on GRP, Quito, Ecuador, 7-9 Nov. 2018
STRUCTURE OF THE CHAPTER
Presentation transcript:

April 7, 1999 Privacy in Transition -- and What’s Next? Alan F. Westin Professor of Public Law & Government Emeritus, Columbia University and Principal, Privacy Consulting Group at the Summer Privacy Symposium, Cambridge, August 19, 2008

A Dramatic New Privacy Environment April 7, 1999 Last August, I outlined a set of powerful technology applications and societal trends that have fundamentally altered the relatively stable successive privacy law and practices environments of the 1960s to early 2000s I posed the question: do we need a new privacy framework for this environment or can we apply the Fair Information Practices concepts to the new challenges This is where I want to pick up today, by first noting the unprecedented effects of the new technologies and social trends… Then identifying the major privacy laws and regulatory initiatives I see as likely to unfold, in response, over the next 3-5 years

Ten Developments Transforming the Privacy Environment -- A Quick Review April 7, 1999 The all-pervasive Internet 2.0 “Identity crisis” and data breaches Social networking and video posting The Blogosphere Behavioral target marketing The mobile revolution Anti-Terrorist surveillance Monitoring and photographing public spaces Electronic patient health records In the U.S., a growing culture rejecting privacy constraints

Powerful Effects of These Trends April 7, 1999 Creation of vast storehouses of personal data on a large majority of the population: -- from voluntary personal communications -- emails, social networking and video posts, blogs -- from trackable online activities -- shopping, information seeking, games, etc. -- from the move to online banking, travel, and other services -- from citizen uses of new online/electronic government services -- from new computerization and networking of some previously manual sensitive personal record systems, such as patient health records -- from stored camera surveillance tapes at public and private venues x

With Three Troubling Realities April 7, 1999 1. Most of these personal data are being stored for long periods if not permanently, and are generally searchable by individual identity to retrieve desired elements or create profiles Existing laws and voluntary policies do not cover many uses of these new personal-data storehouses, by businesses, employers, police, etc. These storehouses stand today in a basically insecure data environment, marked by continuing data leaks and large-scale identity thefts

Effects of These Realities… April 7, 1999 Entering a period of major new national (and state) privacy law debates. Will include consideration of: A national online privacy law and regulatory administration 2. A privacy code for mobile communications and services 3. A new federal privacy code for electronic health records A new federal privacy act covering government electronic services and dissemination of public records Federal identity management standards for both the private and public sectors 6. Revision of federal anti-terrorist surveillance systems

Likelihood of Enactments? April 7, 1999 History of privacy legislation and regulation since 1970 warns that enactments often falter or produce weak outcomes And, new social drives to communicate, reveal, and network often trump privacy worries by the public, however majorities lament threats to privacy But, I see the next 2-4 years as a period of serious national consideration of new privacy standards and processes Much depends on how industries adopt voluntary programs and IF they can earn public trust for these My guess: 2012 will see a major new privacy-law system, adopting Fair Information Practices to the new electronic-information-driven environments

Our Symposium Will Explore these Issues April 7, 1999 What is happening in all of these new privacy environments, how well or poorly existing laws and voluntary policies are doing, and what are the choices for new privacy rules are what will be explored in the Symposium sessions today and over the next two days