Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
Disposal of Disk and Tape Data by Secure Sanitization
IEEE Security and Privacy
Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM
Proceedings of the ACM SIGCOMM 2010 conference
Hi-index | 0.00 |
Informational privacy consists of the ability to control how others use our personal information. Over the past several decades, we have lost a significant degree of control as a result of advances in information processing technology and the rise of the Internet. We pose two questions: (1) What legal concepts of privacy and privacy protection have developed in response to changing technology? (2) Are these responses adequate? To answer these questions, we provide a detailed survey and analysis of current US state privacy and security laws, which illustrate the limits of current practical legal concepts of privacy. Our analysis reveals that when evaluated against the background of relevant technological developments, the answer is that the response has clearly been inadequate. We offer the analysis here as a starting point toward a more adequate response.