Legislation Protecting Privacy In The Essay

In general, the CDT urges the enactment of legislation organized around FIPs. Such practices are guided by certain principles: transparency; individual participation; purpose specification; data minimization; use limitation; data quality and integrity; security; accountability and auditing. (CDT Comments, 10-11). These principles have been at the heart of privacy legislation since the Privacy Act of 1974. (Dep't of Homeland Security).

For example, the CDT advocates for consumer privacy legislation that regulates both the online and offline data collection and management practices by advertisers and that authorizes the Federal Trade Commission to make regulations specifically targeted at these practices. (CDT Comments, 3). With respect to DPI, the CDT has asked Congress and the European Union to engage in fact-finding about how ISPs are using DPI, so that privacy legislation can be designed to distinguish between the legitimate and illegitimate uses of DPI. (CDT Comments, 5-6)

Conclusion

The only thing consistent about the Internet is its rapid change. Although existing privacy legislation in the United States and Europe has been adequate to protect the privacy of individual information up to now, new technological developments are threatening the effectiveness of those rules. New rules tailored around the...

...

Comments of the Center for Democracy and Technology to the European Commission on the Matter of the Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data. December 31, 2009. Accessed on June 1, 2010 at http://www.cdt.org/issue/baseline-privacy-legislation
Federal Trade Commission. Privacy Online: Fair Information Practices in the Electronic Marketplace. 2000.

Federal Trade Commission. 2010. Enforcing Privacy Promises: Section 5 of the FTC Act. Web. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/promises.html.

Federal Trade Commission. 2010. The Gramm-Leach-Bliley Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/glbact.html

Federal Trade Commission. 2010. The Fair Credit Reporting Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/credit.html

Teufel III, H. The Fair Information Practice Principles: Framework for Privacy Policy at the Department of Homeland Security. December 29, 2008. Accessed on June 2, 2010 at www.dhs.gov/xlibrary/.../privacy/privacy_policyguide_2008-01.pdf

Sources Used in Documents:

References

Center for Democracy and Technlogy. Comments of the Center for Democracy and Technology to the European Commission on the Matter of the Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data. December 31, 2009. Accessed on June 1, 2010 at http://www.cdt.org/issue/baseline-privacy-legislation

Federal Trade Commission. Privacy Online: Fair Information Practices in the Electronic Marketplace. 2000.

Federal Trade Commission. 2010. Enforcing Privacy Promises: Section 5 of the FTC Act. Web. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/promises.html.

Federal Trade Commission. 2010. The Gramm-Leach-Bliley Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/glbact.html
Federal Trade Commission. 2010. The Fair Credit Reporting Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/credit.html


Cite this Document:

"Legislation Protecting Privacy In The" (2010, June 02) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/legislation-protecting-privacy-in-the-10595

"Legislation Protecting Privacy In The" 02 June 2010. Web.25 April. 2024. <
https://www.paperdue.com/essay/legislation-protecting-privacy-in-the-10595>

"Legislation Protecting Privacy In The", 02 June 2010, Accessed.25 April. 2024,
https://www.paperdue.com/essay/legislation-protecting-privacy-in-the-10595

Related Documents

When the National Security Agency (NSA) of the United States is collection information in bulk with no rhyme or reason to it, that can become too might quite quickly. While it is wise to keep an eye on chatter and look for key words, phrases and patterns, there is indeed rules of evidence and the needs for warrants in many cases and that should be respected. The United States

Consumer's Privacy Bill Of Rights The Obama Administration proposed the Consumer's Privacy Bill of Rights in 2012 as a roadmap for future legislation. The legislation was put forth on the premise that a huge portion of personal information gathered by American-based businesses regarding their customers and probable customers was still mostly unregulated (Sanders, 2012). In the past few years, the privacy of consumer information that is collected by businesses has been

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Confab, however, is an architecture that is able to bypass these limitations and combine both approaches. It is limited, though, and a true pervasive environment calls for complex preferences that can be easily manipulated by the end user. Moreover, all these approaches are not completely sufficient in meeting the challenges mentioned in section 3.2. For instance, PETs and privacy models do not explicitly contribute in a reduction of data collection, nor

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

Privacy Security National Security vs. Individual Liberties A Long Standing Debate has Taken a New Turn in the Modern Digital Era WikiLeaks The Edward Snowden Leaks Liberty and National Security The debate between national security and individual liberties, especially privacy, has reached new proportions as technology has increased the ability for the state to create mass surveillance programs. The events that occurred on September 11th, 2001, definitely changed the political and social landscape within the United