Content Types

Stronger Protections for, and Encouraging the Use of, De-Identified (and “Anonymized”) Health Data

1) The Importance of De-Identified Health Data 2) De-Identification, Limited Data Set Requirements of the HIPAA Privacy Rule 3) Why a Re-Examination of De-Identification Policy is Needed 4) Some Recommendations for Reform 1) The Importance of De-Identified Health Data   The trend towards adoption of health information technology (health IT) offers substantial benefits not only to individuals in terms of improving health care…

Read More Read More

The Dawn of the Location Enabled Web

1) Location Privacy The ubiquity of increasingly high-powered mobile devices has already spawned the Internet’s first generation of location-based services and applications. As the accuracy of location data improves and the expense of calculating and obtaining it declines, location may well come to pervade the online experience. While the increasing availability of location information paves the way for exciting new applications and services, the increasingly easy availability of location information…

Read More Read More

Government Information, and Privacy Implications

1) Government Information, and Privacy Implications 2) De-identification ad Re-Identification of Data Sets 3) Key Principles for De-Identification and Use of Data Sets 1) Government Information, and Privacy Implications One of the first projects adopted under the Obama administration’s push for transparency was the Web site, currently adding data sets by the hundreds of thousands. will gather, bundle, and make publicly…

Read More Read More

CDT files brief urging privacy safeguards for Google Books

CDT has filed an amicus brief in the Google Books copyright lawsuit, asking for the judge to approve the proposed settlement in the case, but also to ensure that reader privacy is protected as Google implements the expanded services envisioned in the settlement. The settlement would dramatically transform Google Books from an index and finding aid into a resource for users to browse, preview, and purchase full-text access…

Read More Read More

Patriot Act Sunsets Should Prompt Re-Consideration of Anti-Terror Powers; Adjustments Needed To Protect Civil Liberties

1) Patriot Sunsets Should Prompt Broad Examination of Intelligence Authorities, with a Focus on Documented Abuses 2) Most Expiring Provisions Should Be Amended and Reauthorized 3) Reform Should Start with Powers That Have Been Abused: National Security Letters 4) What’s Next in Congress for the Patriot Act? 1) Patriot Sunsets Should Prompt Broad Examination of Intelligence Authorities, with a Focus on Documented…

Read More Read More

PASS ID Act Addresses Major Privacy Concerns in REAL ID

In recent years, the federal government has launched a variety of ID card programs, with the goal of making government-issued cards more reliable as identity credentials and to plug the security gaps identified by the 9/11 Commission. Alongside these initiatives, states have been redesigning their driver’s license systems to incorporate advanced technology features. 1) Government ID Card Programs Raise Privacy Concerns 2) REAL ID and Enhanced Driver’s…

Read More Read More

Personal Health Records Need a Comprehensive and Consistent Privacy and Security Framework

Personal health records (PHRs) – records that are managed, controlled, and shared by individuals rather than their healthcare providers-hold the potential to transform healthcare by empowering consumers and patients to become key, informed decision-makers in their own care. These records increase individual control over personal data and permit individuals to record, store, and share relevant health information, including data that may be missing from official medical records, such as…

Read More Read More

Updating the Privacy Act of 1974

The Privacy Act of 1974 passed as the result of a government-wide push toward the development of policies and practices to protect the information of citizens and other individuals. While the underlying framework of the law, rooted in the principles of Fair Information Practices (FIPs), is still sound, the thirty-five year-old wording of the Act renders it ill-equipped to meet many of the privacy challenges posed by…

Read More Read More