Introduction To Privacy Law Richard Warner. An Informational Privacy Ideal Informational privacy consists in the ability to control  What information.

Slides:



Advertisements
Similar presentations
Psychometrics to Support RtI Assessment Design Michael C. Rodriguez University of Minnesota February 2010.
Advertisements

OPERATIONS The term production and operations tend to be interchangeable today the main feature of operations is that there is an input, process, output.
Basic Concepts of Democracy
Living with HIV Know Your Rights Accommodation in the workplace The information contained in this publication is information about the law, but it is not.
Evidence, Ethics, and the Law Ronnie Detrich Wing Institute.
Privacy, Consent, and Norms Richard Warner. Summary Informational privacy is the ability to control what others know about us and what they do with it.
Contracts, Norms, and Privacy Robert Sloan Richard Warner.
The process of formulating responses remains
Privacy: Expectations, Norms, Technology Richard Warner.
Equality and Diversity  Aims: To provide an introduction to the background and requirements of Equality and Diversity and to introduce E&D into learner’s.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
International Auditing and Assurance Standards Board Accounting Estimates, Including Fair Value Accounting Estimates, and Related Disclosures ISA Implementation.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
Informational Privacy, Privacy Law, Consent, and Norms Richard Warner.
Effective Team Management
Operations Management Week 01 Adapted from Operations Management by William J. Stevenson.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
1 Monitoring Review: What Every New Coordinator Should Know Victoria Rankin and Greta Colombi, NDTAC.
APPLYING THE CHARTER.   What would society be like if we were allowed to do and say anything we like?  Irony– there are mechanisms in place to ensure.
Basic Concepts of Democracy
6-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 3 rd edition by.
International Auditing and Assurance Standards Board The Clarified ISAs, Audit Documentation, and SME Audit Considerations ISA Implementation Support Module.
Legal Principles of Insurance Chapter 9. Agenda Recall topics learned in your insurance or business law class to better understand this chapter Principle.
Privacy: Law, Values, Norms
Values and Ethics EDU 131 Constitution Day 15 Sept 2006.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Chapter 10 THE NATURE OF WORK GROUPS AND TEAMS. CHAPTER 10 The Nature of Work Groups and Teams Copyright © 2002 Prentice-Hall What is a Group? A set of.
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
National Center on Severe and Sensory Disabilities © 2010 Family/Educator Partnerships Kansas Instructional Resource Center for the Visually Impaired Wichita,
Notice and Choice and Its Problems Robert Sloan Richard Warner.
Philosophical Topic That Arises Frequently. Obligations as a citizen: I must not break the law Benefits: citizenship, protection of constitutional rights,
© Pearson Education Limited 2003 OHT 8.1 Individual decision-making.
Top-Down or Bottom-Up? Richard Warner. Top-Down and Bottom-Up  “Top-down” refers to central planning through legislation and court decisions. Top-down.
1 Estimation From Sample Data Chapter 08. Chapter 8 - Learning Objectives Explain the difference between a point and an interval estimate. Construct and.
RTI, Jammu1 Team building and group dynamics Presentation by: Regional Training Institute, Jammu.
The economics of privacy and surveillance: assessing the social costs and benefits Vicki Nash Oxford Internet Institute Web Science June 2015.
A short introduction to epidemiology Chapter 10: Interpretation Neil Pearce Centre for Public Health Research Massey University, Wellington, New Zealand.
1 REVIMP From review to improvement Dr. Adrie Visscher Faculty of Behavioural Sciences The Netherlands.
‘Sujala’ Karnataka Watershed Development Programme Developing the Training Strategy Introduction for the “Brainstorming Workshop 1st of October 2003.
CHAPTER 3 UNDERSTANDING THE COMMUNITY. A Major Step In Developing A School Public Relations Program Is Collecting Information That Will Enable School.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
FREEDOM AND DETERMINISM  The Clash Between A Modern Account Of Thought On The One Hand, And Free Will, Human Agency And Moral Responsibility On The Other.
EULAs And The Theory of Standard Form Contracting Richard Warner.
Introduction to Management LECTURE 32: Introduction to Management MGT
Manager ethics Definition of Ethics Slovak University of Technology Faculty of Material Science and Technology in Trnava.
AVCC Guidelines on Information Access for Students with Print Disabilities Dey Alexander Monash University Adelaide Web Accessibility Forum.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
1 The 7 Elements of a High Performance Healthcare Team Cohesiveness Healthy Climate Team Members’ Contribution.
Improving Purchasing of Clinical Services* 21 st October 2005 *connectedthinking 
MECHANICAL PRINCIPLES TRANSFER OF WEIGHT AND FOLLOW THROUGH.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Department of Mechanical Engineering ME 322 – Mechanical Engineering Thermodynamics Lecture 4 Conservation and Balance Concepts.
Markets and Information Richard Warner. Three Types of Privacy  Spatial rights define a physical zone of control over intrusions by others.  Decisional.
Values Based Recruitment Nick Mernock & Lynn Hughes.
Collecting Copyright Transfers and Disclosures via Editorial Manager™ -- Editorial Office Guide 2015.
Health & Safety Management “and a few other things for your consideration”
Essential Questions of Unit 2 1.To what extent does the DOI, Constitution, and the Amendments recognize and protect the rights of the individual? 2.Why.
Introduction Americans expect government to be effective, efficient, equitable, and accountable Essence of public administration: solving problems using.
A questionnaire is a document designed for the purpose of seeking specific information from the respondents.
Thompson On Privacy Richard Warner. Thomson’s Critique: Background A moral right is a reason not to interfere, where the reason has a “special status.”
6 Selecting Employees and Placing Them in Jobs
TRANSORGANISATIONAL CHANGE
SOCIOLOGY: A Brief Introduction
Eight principles of quality management.
Managing Employees’ Performance
Emotional Factors Impacting Performance
IT Competency and Firm Performance: Is Organizational Learning a Missing Link? 杨雅文 南京大学商学院国际商务 2019/4/17.
Economics “Econ, Econ” Econ.
INFS 452 – Computer Ethics & Society
Presentation transcript:

Introduction To Privacy Law Richard Warner

An Informational Privacy Ideal Informational privacy consists in the ability to control  What information others obtain about you, and  what they do with that information. We differ in the degree of informational privacy we desire.

An Ideal Ideally, each person should, other things being equal, have the degree of informational privacy he or she desires.  Other things are not always equal: Terrorism Why is this an ideal?  Freedom  Self-realization

In The Past Each person’s individual effort could ensure, to a considerable extent, that he or she would have the desired degree of informational privacy. The effort occurred against a background of norms.  The pharmacist did not ask about your marriage.  Your grocery store did not secretly watch you to see what you purchased.

The Present: Technology has enabled ever-increasing mass surveillance. The result:  Our individual efforts cannot now ensure that each of us has the desired degree of informational privacy

Lack of Norms One solution would be to rely more heavily on norms. Appropriate norms could define what information businesses collect and what they do with it. We cannot control what information businesses collect and what they do with it, But norm-compliant businesses would control themselves.

Lack of Norms The relevant norms would strike a balance between business efficiency and privacy. There is considerably controversy about how to make this tradeoff. This shows that we lack the relevant norms. Recall: a norm is a sanction-supported regularity that exists in part because people think they ought to conform to the regularity. There are very few relevant regularities to which we think we ought to conform.