Premium Essay

Comparison of Privacy Laws

In:

Submitted By srimonika88
Words 7265
Pages 30
[pic]

Data protection and privacy ethical guidelines

This document was produced on September the 18th 2009
The version of this document is: 5

Experts Working Group on data protection and privacy
Chaired by: Caroline Gans-Combe

Special thanks to the Panel Members: Andrew Bottomley, Duarte Carvalho-Oliveira, Costas A. Charitidis, Eva Del Hoyo-Barbolla, Anne Demoisy, Anna Giovanetti, Walter Hannak, James Houghton, David Morton, François Moutou , Jane Lamprill, Antony Lebeau, David Townend, and Mary Sharp. - Very special thanks to the Ethics Team : Isidoros Karatzas, Mihalis Kritikos, Yamina Cheikh, Paulette Matkovic Ramirez, Marie Cocquyt, Marco Michelini, Stefan de Vos and François Hirsch

General disclaimer: this document examines the major concepts of data protection and privacy from the point of view of research ethics. It aims at raising awareness about these concepts in the scientific community and at assisting applicants while preparing to submit their project proposals. It does not seek to discuss these concepts in-depth but provides a general overview of their main parameters and some basic suggestions regarding their handling for the purposes of the European Commission's Ethical Review procedure. This document represents an effort to reflect on the experience gained during the operation of the Ethics Review mechanism and to provide some practical guidance, thus it will be regularly updated.

The document contains three sections:

→ 1. The first section consists of an awareness list which contains the main questions that need to be taken into account by applicants when dealing with the data protection and privacy aspects of their project - All relevant definitions are provided within the glossary below

→2. The second section provides applicants with practical guidance for the identification of the privacy and data

Similar Documents

Free Essay

The Comparison of Large Websites Versus Small Websites

...CIS 324 | | Examples of Privacy Policies: The Comparison of Large Websites versus Small Websites | By | Arlene Mack | April 15, 2012 In this paper I will discuss and summarize the privacy policy for a large popular website, as well as summarize and discuss the privacy policy for a smaller website. I will discuss as a large website, is, money mutual or (moneymutual.com), a website that promotes same day, pay day loans by multiple financial lenders endorsed by Montel Williams. The privacy policy and practice of the websites that this privacy document links are reviewed and hosted by Trustee. This is in compliance with Trustee’s program requirements, including transparency. The parts of the Privacy Policy that are confusing to me, is the reference to the policy compliance being transparent to accountability and choice regarding the collection of people’s information; but it says the Trustee’s does not cover information that may be collected through downloadable software. Trustee, who defines itself as the independent party to accelerate online trust among consumers and organizations globally through its leading privacy Trustmark and innovative trust solutions; Trustee at the end of the privacy policy does say that it has the right to share, rent, sell or otherwise disclose your information with/ to third party in accordance with applicable laws; i.e. marketing services, and applications, email marketers, wireless services, or postal mailings. In my opinion that...

Words: 678 - Pages: 3

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Premium Essay

Student

...Institution: Course: Date: Employment and Labor Laws Employer employee relationship is governed by rules and regulations: The national labor laws, the employment laws and the individual contracts. Employees have a right to a conducive environment in the working place and in return the employers have a right to optimal performance from the employees. The employees are responsible for making good use of the employer’s property. Any malpractice such as breaking them or stealing them is chargeable in the court of law. Public employees expect privacy as the privacy act under the constitution guarantees them of their privacy and free from infringements, seizures or searches that are unreasoble.Thia is in accordance to the 4th amendments of the United States Constitution. The employer hence has to obtain warrant of search in the case of necessary searches (Walsh 3). Video camera from surveillance of the teacher in the locker room that was being shared by the teachers was totally unreasonable. The teachers had to prove that they expect protection of their privacy. It only a single teacher that war suspected of stealing but subjecting all of them to this infringement was unnecessary. Even though the school can prove that the videos and pictures were never looked at, the fact that they were recorded is still s subject that is unaceprtable.The plaintiffs in this case has cases to present to the courts on several counts: Invasion of their privacy, the plaintiffs can prove to the courts that...

Words: 413 - Pages: 2

Premium Essay

Privacy Protection

...Privacy Protections a. What are some of the Constitutional protections of privacy? The Fourth Amendments to the United States Constitution provides the “rights of people to be secure in their persons, their houses, families, papers, and effects against unreasonable searches and seizures by the federal government.” Courts have used this to imply a right to privacy. However, this privacy provision applies to government searches and is not applicable to private sector employees. According to Jacobsen, J.D, there are no explicit federal "privacy rights" beyond "reproduction, contraception, abortion, marriage and childrearing", and so the notion of a constitutional right to privacy has little bearing on employment law. b. What privacy rights are afforded to public and private sector employees? The restrictions on employer inquiries of applicants at hiring are based mainly on prohibitions against discrimination, rather than on privacy rights. Pre-employment privacy rights for both public and private sector employees are very limited beyond this. Post-employment privacy rights are also often the ancillary effect of discrimination laws. For example, the Americans with the Disabilities Act of 1990 (ADA) specifically prohibits the disclosure of medical information relating to disabled. In the public sector, two factors govern the permissible extent of intrusion into an individual's affairs, that is, the relation of the subject's job to the line of inquiry, and secondly, the subject's...

Words: 1163 - Pages: 5

Premium Essay

Unit 4 Lab 4 Analysis and Comparison of Glba and Hipaa

...Analysis and Comparison of GLBA and HIPAA 1. Which US government agency acts as the legal enforcement entity for businesses and organizations involved in commerce? a. The FTC Its principal mission is the promotion of consumer protection and the elimination and prevention of anticompetitive business practices, such as coercive monopoly 2. Which US government agency acts as the legal enforcement entity regarding HIPAA compliance and HIPAA violations? b. The “American Recovery and Reinvestment Act of 2009”(ARRA), established a tiered civil penalty structure for HIPAA violations 3. List three (3) similarities between GLBA and HIPAA. c. Both require technical safeguards to protect or guarantee the veracity of critical information. d. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health Information (PHI). e. Both have a requirement for specific IT controls. 4. List five (5) examples of privacy data elements for GLBA as defined in the privacy rule. f. Name, Address, City State Zip, Account Number, and Social Security Number are five examples of privacy data elements for GLBA as defined in the privacy rule. 5. List five (5) examples of privacy data elements for HIPAA as defined in the privacy rule. g. Name, Address, City State Zip, Ailments/Conditions, and Social Security Number are five examples of privacy data elements...

Words: 879 - Pages: 4

Premium Essay

Technology and Communication

...Technology and Communication Communication capabilities and technology work together in law enforcement allowing specialized databases to assist criminal justice personnel in any field access to information quickly and accurately. With many different ways of storing and accessing information, the best piece of technology will vary from agency to agency. Databases used for city police departments may not be as effective for use with federal agencies in airports or on the boarders. With the various types of technology to choose from it is safe to say that they all work together assisting law enforcement to better protect citizens. As with any new type of technology being used comes a risk of privacy concerns and private information becoming lost or stolen. AFIS, live scan, facial recognition, iris scan, and mobile data terminals are just a few of the technologies available to law enforcement personnel. Overtime these technologies have been improved in accuracy and dependability allowing them to become further accepted by police agencies and the public. There are a few similarities with live scan and iris scan technologies. One of the most common similarities is the use of these technologies in the correctional system. Prisons and jails use live scan and iris scan to process inmates into the facilities as well as out process inmates. Iris scan technology allows for quicker results than live scan, though live scan has been around a lot longer than iris scan. When inmates out process...

Words: 1177 - Pages: 5

Premium Essay

Analysis and Comparison of Glba and Hipaa

...Analysis and Comparison of GLBA and HIPAA 1. Which US government agency acts as the legal enforcement entity for businesses and organizations involved in commerce? The Federal Trade Commission. 2. Which US government agency acts as the legal enforcement entity regarding HIPPA compliance and HIPPA violations? Office of Civil Rights(OCR) under the Department of Health and Human Services 3. List three (3) similarities between GLBA and HIPAA. 1. Safeguards Rules to protect customer information and consumer personal information. Security Rules 2. Protection of Privacy Rules from third party data sharing. 3. Protection of Financial Privacy Rules 4. List five (5) examples of privacy data elements for GLBA as defined in the privacy rule. 1.Safeguard Rules- protect customer information 2. Pretexting- protect consumers from individuals and companies that obtain their personal financial information under false pretenses. 3. Financial Privacy rules-governs the collection and disclosure of customers personal financial information by financial institutions. 4. Protection against credit reporting agencies 5. Protection from financial institutions that collect information from their own customers. 5. List five (5) examples of privacy data elements for HIPAA as defined in the privacy rule. a. Protection of Electronic Protected Health Information b. Covered entities must put in place secure electronic protection of health information. c....

Words: 842 - Pages: 4

Free Essay

Privacy

...journal homepage: www.elsevier.com/locate/comphumbeh My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns Young Min Baek a,⇑, Eun-mee Kim b, Young Bae c a Department of Communication, Yonsei University, Republic of Korea Department of Communication, Seoul National University, Republic of Korea c Department of Information Sociology, Soongsil University, Republic of Korea b a r t i c l e i n f o a b s t r a c t It is easy to trace and compile a record of individuals’ online activities, and cases of online privacy infringement (i.e., improper use of personal information) have been reported in advanced societies. Based on existing risk perception research, this study examines comparative optimism regarding online privacy infringement (i.e., users tend to believe privacy infringement is less likely to happen to oneself than to others) and its antecedents and consequences. Relying on large-scale online survey data in South Korea (N = 2028), this study finds: (1) comparative optimism is higher when the comparison targets are younger; (2) online knowledge and maternalistic personality traits increase comparative optimism mainly by influencing perceived risk to others, while prior experience of privacy infringement increases comparative optimism mainly by influencing perceived personal risk; and (3) comparative optimism is related to both greater adoption of privacy-protective behaviors and a higher level of support for government...

Words: 5399 - Pages: 22

Free Essay

Mobile Computing

...sector has demonstrated the efficiency of the use of technology to monitor patients’ status even while at home. This global integration of operations from different applications enables data sharing, via image, and voice outputs. According to Magal and Word (2011), patient monitoring is indispensable to any health facility. Several departments are equipped with electrical and computing devices that facilitate the monitoring of patient status. Not only are these facilities meant for use in the health centers, but also, technology has opened up other platforms through which patients can share their experiences with other patients of similar conditions, and monitor their health progress without the need of visiting health centers physically. Comparison of Inpatient Monitoring and the Use of Mobile Devices A survey carried out to determine the efficiency of the use of mobile devices to monitor patient’s health, revealed that; doctors were of the opinion that the use of health applications on mobile devices to monitor patient vital status, will cut down visits to health centers, and other medical facilities. Vital signs make up the most crucial...

Words: 1570 - Pages: 7

Free Essay

U06A1 - Researching and Reviewing Privacy Policies

...Since my organization is part of the educational sector of business, there is no direct page of department within the organization that sells products. There is however third party companies that work with the institution, and of our competitors, that offer academic transcript delivery services. Docufide, an affiliation of Parchment Inc., serves as the transcript delivery service for City Colleges of Chicago where I work as a Registrar. The college used for comparison is Kankakee Community College who uses National Clearing House as the delivery service of transcript requests. While researching the privacy policies of Docufide and National Clearing House as I target how they compare and how they use the customer (students’) information they collect, I found that both include four major issues that relate to the “Fair Information Principles”. Both policies give notice of the information practices before collecting data. The choice is given on how the information will be collected and if the information can be used. Both Docufide and National Clearing House give access to their consumers to contest accuracy and completeness of data collected about them and lastly both companies take “reasonable steps” to assure the customers that the information is secure from unauthorized use. Both policies are explicit to the fact that they will not “sell, rent, provide or otherwise share individual information generated…” from the use of the site or setting up an account with the companies’...

Words: 855 - Pages: 4

Premium Essay

Biometric Identification Advantages

...identifying criminal suspects are biometric identification systems. Biometric identification defined as the process for identifying a person by human physical characteristics. Because each human unique, various parts of the human body are analyzed for comparison, and identification. Some forms of biometric identification are hand geometry, palm vein authentication, retina scan, iris scan, and facial scan recognition. The advantages of biometric technology are the extreme accuracy, and secured access to information. Retinal scan technology offers the proof that this technology has a near zero failure rate, which means that fooling this technology almost impossibility. Identification is fast as well, providing a system that is almost foolproof. The main pro of iris reading technology accuracy and alternation near impossible. Iris patterns do not require direct contact, and some scanners can focus on the eye finding the streaking patterns. The advances made in this area of expertise makes the iris reader scanner an excellent choice for law enforcement, and military applications (Blumenthal, 2010). Biometric Identification Methods Facial Recognition Facial recognition surveillance used often in law enforcement. The technology in law enforcement has its advantages and disadvantages because technology does not completely replace humans. The advantages of facial recognition surveillance help to deter crime, and capture criminals. The imaging equipment controlled by remote, for...

Words: 2287 - Pages: 10

Premium Essay

Legislative and Legal Systems in Healthcare

...confidentiality, privacy, accuracy, and accountability. These aspects are highlighted in this exercise, referencing the needed addendum of a shadow chart policy along with staffing educational requirements in regard to information security. Likewise, the address will recognize the laws and how they shape policy in healthcare. Legislative and Legal Systems As a rule, shadow charts should contain copies of information from a patient’s primary chart. In some cases, the shadow chart may contain original information meant for the patient’s primary records. This causes the patient health record to be incomplete or at least not up to date. The need for seamless and routine reconciliation is clearly present. As with all patient health records, appropriate authorization is critical with shadow charts. Authorizations should be granted to appropriate staff, as well as identical release of information procedure followed by the H.I.M. Department. IT Staff and Security The Information Technology staff is to have entry orientation on information security, followed by documented annual reeducation. Along with all education should be the reminder of the legal and facility ramification of policy violation. Standard security work place practices should be in place to help safeguard patient information. IT security Practices Firewall | Encryption of data | Appropriate staff access | Anti-spyware | Secured workstations | No sharing of passwords | Legal Issues of Privacy In discussion...

Words: 1170 - Pages: 5

Premium Essay

Indian Human Rights

...derived from other expressed rights. The right to privacy presents itself as a demonstration of an elucidatory proficiency of the Indian judiciary as well as a right derived as a corollary of the process of widenening the scope of specifically established fundamental rights. This right lacked the stamp of the Indian judiciary from the honorable Supreme Court of India, the right has been afforded legal recognition following a series of judicial ruling starting from the kharak singh case ....

Words: 2395 - Pages: 10

Premium Essay

International Business Ethics

...Prescription medication is expensive enough without pharmaceutical companies hindering the market entry of its generic counterparts. Generic medication gives consumers a choice to spend more or to spend less for their health care, and in the long-run gives them a choice for a more cost-effective livelihood. Without the options of choosing a cheaper form of medication, consumers are being taken advantage of. This leaves no room for choice and thwarts fair market competition. With a 22% increase of profits in comparison to the previous year, it is quite obvious that this brand- name manufacturer and generic companies have disobeyed federal antitrust laws. Therefore the Federal Trade Commission is performing an investigation to ascertain if brand name companies and generic drug makers have acquiesced the stymie of generic competition, which leads us to our first question. Why would the drug maker want to stymie generic competition? Antitrust Laws such as the Sherman Act, Federal Trade Commission Act, and the Clayton Act have been created in order to diminish...

Words: 2007 - Pages: 9

Premium Essay

Final Project

...shoulder when they are using their computer. In this day and age the monitoring of computer usage has become more prevalent than it was in the past. As a computer user you have access to more resources on many computers that are just a few mouse clicks away. With your computer at work you can send emails to the four corners of the earth. Today, you can use the World Wide Web to get look at just about anything you can imagine. This includes pictures, sounds, and video. The desktop computer has become a very powerful tool in today’s workplace. There are downsides to this power too. Because of these downsides employers are finding it necessary to monitor what you are doing on your computer. Does this infringe on your privacy right in the workplace? Do you know what your privacy rights in the workplace are? When you are using your computer at the workplace to access you email your activities may be monitored without your knowledge. Companies are not monitoring what computer users are doing with their email. Do you send email to users on the Internet? Most if not all company Internet activity passes through a firewall. One of the functions of a firewall is to monitor Internet traffic coming into and out of the company’s computer network. If you are sending emails to Internet users your company firewall is monitoring whom it is being sent too and if they respond too you. Employers watch company email because of the possibility to transmit company confidential information (Everett, Wong...

Words: 1101 - Pages: 5