Here’s a snippet from Part II of Daniel Barth-Jones thoughtful commentary on re-identification studies (Part I can be found here): In part 2 of this essay, I address the broader issues of how privacy law scholars and policy-makers should evaluate various scenarios being presented as motivators for the need for potential privacy regulations. Fortunately, Professor Ohm…
Category: Misc
Re-Identification Risks and Myths, Superusers and Super Stories (Part I: Risks and Myths)
Daniel Barth-Jones has a critique of re-identification studies that informs the conversation about risks: In a recent Health Affairs blog article, I provide a critical re-examination of the famous re-identification of Massachusetts Governor William Weld’s health information. This famous re-identification attack was popularized by recently appointed FTC Senior Privacy Adviser, Paul Ohm, in his 2010 paper “Broken Promises of…
New survey shows mobile users avoid or uninstall apps that risk privacy
Pew Internet has released a new survey that suggests that users are wising up about the privacy concerns with some apps: More than half of mobile application users have uninstalled or avoided certain apps due to concerns about the way personal information is shared or collected by the app, according to a nationally representative telephone…
2012 Democrat Platform Endorses Internet Privacy – While They Argue in Court Against It?
From EPIC.org: The 2012 Democratic National Platform supports the administration’s Internet Privacy Bill of Rights to protect consumer privacy. Separate provisions in the platform call for privacy protections for broadband deployment, intellectual property enforcement, and cybersecurity laws; the Democratic platform opposes voter identification laws. However, the platform is silent on the Fourth Amendment, and retreats from the 2008 Democratic platform that opposed surveillance of individuals that were…