International Data Flow

International Data Flow
Author: United States. Congress. House. Committee on Government Operations. Subcommittee on Government Information and Individual Rights
Publisher:
Total Pages: 852
Release: 1980
Genre: Communication, International
ISBN:

Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
Total Pages: 59
Release: 2010-09
Genre: Computers
ISBN: 1437934889

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

Working Documents

Working Documents
Author: European Parliament
Publisher:
Total Pages: 712
Release: 1981
Genre: European communities
ISBN:

Governing Cross-Border Data Flows

Governing Cross-Border Data Flows
Author: Svetlana Yakovleva
Publisher: Oxford University Press
Total Pages: 433
Release: 2024-02-27
Genre: Law
ISBN: 0192899260

Governing Cross-Border Data Flows explores how the European Union can simultaneously reconcile and pursue two important legal and policy objectives, namely: protecting fundamental rights guaranteed under the EU Charter of Fundamental Rights (EU Charter) concerning privacy and personal data, while also maintaining and developing a binding, rules-based global trading system to ensure appropriate access to foreign digital markets for EU businesses. The book demonstrates a significant conflict between international trade law and European data privacy law when it comes to the governance of cross-border flows of personal data. To resolve the tensions caused by this clash, the book proposes concrete and detailed ways to ameliorate the situation from both ends (international trade and personal data protection), specifically through reforms of both international trade and chapter V of the General Data Protection Regulation (GDPR). To explain how such reforms could be effectuated, Yakovleva examines the role of discourse in the evolution of trade law in the last two decades. The book also paves the way for the further research necessary to design a fully-fledged reform proposal of the EU framework for the transfer of personal data outside the European Economic Area.

Regulating Online Behavioural Advertising Through Data Protection Law

Regulating Online Behavioural Advertising Through Data Protection Law
Author: Jiahong Chen
Publisher: Edward Elgar Publishing
Total Pages: 232
Release: 2021-05-28
Genre: Law
ISBN: 1839108304

This insightful book provides a timely review of the potential threats of advertising technologies, or adtech. It highlights the need to protect internet users not only from privacy risks, but also as consumers and citizens online dealing with a highly complex technological setting.

Protecting Data Privacy in Health Services Research

Protecting Data Privacy in Health Services Research
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 208
Release: 2001-01-13
Genre: Computers
ISBN: 0309071879

The need for quality improvement and for cost saving are driving both individual choices and health system dynamics. The health services research that we need to support informed choices depends on access to data, but at the same time, individual privacy and patient-health care provider confidentiality must be protected.

Information Security and Privacy in Network Environments

Information Security and Privacy in Network Environments
Author:
Publisher: United States Congress
Total Pages: 252
Release: 1994
Genre: Computer networks
ISBN:

The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This Office of Technology Assessment (OTA) report was requested by the Senate Committee on Governmental Affairs and the House Subcommittee on Telecommunications and Finance. The report begins with background information and an overview of the current situation, a statement of the problems involved in safeguarding unclassified networked information, and a summary of policy issues and options. The major part of the report is then devoted to detailed discussions of policy issues in three areas: (1) cryptography policy, including federal information processing standards and export controls; (2) guidance on safeguarding unclassified information in federal agencies; and (3) legal issues and information security, including electronic commerce, privacy, and intellectual property. Appendices include Congressional letters of request; the Computer Security Act and related documents; evolution of the digital signature standard; and lists of workshop participants, reviews, and other contributors. An index is provided. A separately published eight-page OTA Report Summary is included. (JLB).