Identity in the Information Society 3 (2):247-251 (2010)
In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of technologies that could enhance privacy. Back then, privacy protection relied primarily upon legislation and regulatory frameworks—in an effort to offer remedies for data breaches, after they had occurred. As information technology became increasingly interconnected and the volume of personal information collected began to explode, it became clear that a new way of thinking about privacy was needed.Privacy-Enhancing Technologies paved the way for that new direction, highlighting how the universal pr ..
|Keywords||Privacy by design Privacy-enhancing technologies Positive-sum|
|Categories||categorize this paper)|
References found in this work BETA
No references found.
Citations of this work BETA
ISPs & Rowdy Web Sites Before the Law: Should We Change Today's Safe Harbour Clauses?Ugo Pagallo - 2011 - Philosophy and Technology 24 (4):419-436.
Cracking Down on Autonomy: Three Challenges to Design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.
Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
Similar books and articles
A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
Privacy by Design: Delivering the Promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW]Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
SmartPrivacy for the Smart Grid: Embedding Privacy Into the Design of Electricity Conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
Extending the Value Chain to Incorporate Privacy by Design Principles.Julie David & Marilyn Prosch - 2010 - Identity in the Information Society 3 (2):295-318.
PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Added to index2010-12-05
Total downloads29 ( #178,768 of 2,177,988 )
Recent downloads (6 months)1 ( #317,698 of 2,177,988 )
How can I increase my downloads?