Best Practices for Data Protection and Privacy: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
Line 9: Line 9:
[http://www.aspatore.com/store/bookdetails.asp?id=954 ''Buy Book'']
[http://www.aspatore.com/store/bookdetails.asp?id=954 ''Buy Book'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Besunder:2009&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Besunder:2009 ''BibTeX'']


==Categorization==
==Categorization==


Issues: [[Information Sharing/Disclosure]], [[Regulation/Liability]], [[Privacy]]
*Issues: [[Information Sharing/Disclosure]]
*Issues: [[Regulation/Liability]], [[Privacy]]


==Key Words==  
==Key Words==  


[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Data_Mining Data Mining]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Data_Mining Data Mining], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Privacy_Law Privacy Law]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Privacy_Law Privacy Law]


==Synopsis==
==Synopsis==

Revision as of 14:23, 16 June 2010

Full Title of Reference

Best Practices for Data Protection and Privacy

Full Citation

Alison A. Besunder, "Assisting Business Clients with Key Data Protection and Privacy Considerations" (2009) in Best Practices for Data Protection and Privacy: Leading Lawyers on Creating a Data Protection Strategy, Dealing with Security Breaches, and Analyzing Recent Trends in Legislation(Aspatore Books, 2009).

Buy Book

BibTeX

Categorization

Key Words

Data Mining, Privacy Law

Synopsis

What is “privacy”? Americans tend to think of the concept as “fundamental,” but few could appropriately define it if asked. A current discussion of “privacy” really focuses on the area of “information privacy”--in short, the right to control information about one's self. The irony inherent in the concept of this definition is that, as a legal matter, individuals do not “own” their personal information. Rather, the “ownership” interest (if any) in the intangible property of an individual's information itself resides in the individual or entity that is collecting, disseminating, and using that information. “Privacy” in the commercial context is less about confidentiality or secrecy than it is about fair information practices and how an organization is using information to make decisions about and transacting with other people. The following chapter provides an overview of the existing laws that address privacy considerations af- fecting businesses, particularly those laws that concern the collection, use, access, distribution, and sharing of certain personal information of individuals.

Additional Notes and Highlights

* Outline key points of interest