logo
    Extending Layered Privacy Language to Support Privacy Icons for a Personal Privacy Policy User Interface
    9
    Citation
    3
    Reference
    10
    Related Paper
    Citation Trend
    Abstract:
    The LPL Personal Privacy Policy User Interface (LPL PPP UI) is designed to allow for informed and free consent. An extension for the Layered Privacy Language and the Privacy Icons Overview is introduced here. The capabilities of the LPL PPP UI consist of informing the Data Subject about the contents of a privacy policy in a structured way, personal privacy interactions, and giving the Data Subject an overview utilising privacy icons are presented. The impact of the Privacy Icons Overview is further evaluated, taking into consideration both speed and accuracy. Furthermore, additional challenges for the creation of a privacy policy user interface as well as privacy icons are presented.
    Keywords:
    Privacy software
    Interface (matter)
    The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy crisis with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world.
    Privacy software
    Right to privacy
    Privacy Protection
    Citations (7)
    This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.
    Privacy software
    Privacy Protection
    Mobile apps
    Information sensitivity
    Citations (0)
    As more information is collected, shared, and mined, the need to understand and manage information privacy has become a necessity for information professionals. Governments across the globe have enacted information privacy laws. These laws continue to evolve and the information privacy protections that have been established differ by country. A basic understanding of privacy law, information privacy approaches, and information security controls is essential for information professionals to properly manage private/personally identifiable information (PII) in differing capacities in libraries, academic institutions, corporations, hospitals, and state and federal agencies. Understanding and knowledge of applicable privacy laws and the ability to write privacy policies and procedures for the proper handling of PII are crucial skills for librarians and other information managers. Information Privacy Fundamentals for Librarians and Information Professionals is tailored to the needs of librarians and information professionals. It introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.
    Citations (7)
    This article dives into the contemporary debate surrounding information privacy in the twenty-first century e-commerce environment through the lens of consumers submitting personally identifying information into the vast abyss of cyberspace. I argue that this information must be better protected and that United States law should emphasize electronic privacy policies as privacy-protecting devices. Currently, the United States operates under primarily a self-regulatory environment where the federal and state governments allow industry to regulate the use and content of their privacy policies. This article details current state of the United States legal regime, addresses its inefficiencies in this area and proposes a new federal law designed to remedy this situation. This piece argues that with minimal governmental regulation, electronic privacy policies can become effective tools to protect consumers personally identifying information.
    Privacy software
    Consumer privacy
    Citations (1)
    This article surveys and evaluates the privacy law of web applications and cloud computing. Cloud services, and web applications in particular, are subject to many different privacy law requirements. While these requirements are often perceived as ill-fitting, they can be interpreted to provide a structurally sound and coherent privacy regime. The applicable body of law can be separated into two tiers: the primary privacy law and the secondary privacy law. The primary privacy law is created by the providers and users of cloud services through privacy contracts, especially, privacy policies. The secondary privacy law, contained, for example, in statutes and regulations, is for the most part only applicable where no valid privacy contracts exist. This supremacy of privacy contracts over statutory and other secondary privacy law enables individualized privacy protection levels and commercial use of privacy rights according to the contracting parties’ individual wishes.
    Privacy software
    Privacy Protection
    Citations (3)
    This chapter contains sections titled: Whose Privacy Is Protected? Constitutional Protections for Privacy Privacy Protection under Common Law Defenses to Invasion of Privacy Privacy Protection from Federal Statutes State Statutes Publishing Illegally Obtained Information Workplace Privacy Marketplace Privacy Privacy and Social Networking Anonymity Online
    Privacy software
    Privacy Protection
    This article examines the introduction of Google Street View in Australia, and the subsequent 'payload data' collection scandal. Through this case study we consider the privacy implications of Street View and the various regulatory discourses that have emerged around this Google service in Australia. We argue that, while privacy by design (PBD) is one of the most commonly advocated methods of privacy protection in Australia, its implementation carries a number of significant limitations. The March 2014 introduction of the Australian Privacy Principles holds some promise, but it still views privacy as a compliance issue rather than a rights issue. We suggest that the introduction of a broad statutory right to privacy could ensure fuller privacy protections for end-users of Street View and other location-based services.
    Privacy software
    Citations (7)
    In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy concerns. This combines consideration of individual differences as well as state level factors in predicting individuals’ Internet privacy concerns. Overall, the results provide support for the role of state level privacy regulations in mitigating individuals’ privacy concerns. We discuss the results, theoretical contributions, policy implications, and future research. Disciplines Information Security | Management Information Systems | Privacy Law
    Privacy software
    Citations (0)
    This is the full text of Chapter 6 (Online Privacy) from Federal Trade Commission Privacy Law and Policy (Cambridge University Press 2016). This chapter introduces the reader to the Federal Trade Commission's (FTC) historical and modern approaches to consumer privacy law.This chapter explains basic principles of privacy law, including fair information practices, which form the building blocks of most privacy protections. It describes the cases and the landscape of FTC law on online privacy. Then it shifts to present half a dozen controversies critical to the FTC’s privacy stance: the dominance of rational choice theory approaches and their deficits, the third party problem in privacy, self-regulation in consumer protection, default choices, the consumer protection problems implicated by the rise of internet platforms, and finally, privacy by design. Other chapters in the book focus on children's privacy, spam, telemarketing, malware, financial privacy, information security, and international privacy.
    Consumer privacy
    Privacy software
    Dominance (genetics)
    Citations (0)