Many people are surprised to learn that data about their online habits, including the web sites and services they visit, are being collected and shared by marketers in order to target advertising. Almost every time we go online, using our computers or mobile devices, each of us produces data in some form. This data may contain only oblique information about who we are and what we are doing, but when enough of it is aggregated, facts about us which we believed were private has the potential to become known to and used by others.
Find information about location, design for trust, and application privacy.
Many countries have different approaches to data protection and information privacy. However, the increasing interconnectedness of people around the globe through online business, communications and social media has created a convergence of privacy law, prompting countries to approach data and information law in a common way.
- Smart Grid
Whether collected directly from consumers with devices or services they install or whether consumers authorize smart meters to provide energy data to third party service providers, it is essential that a flexible framework exists that ensures consumer privacy protections are in place and that responsible businesses can responsibly access the data needed to serve consumers. Regulatory efforts that create a bar to effectively serving consumers will limit the development of new services for consumers and limit the opportunities for smart grid innovations that will improve energy efficiency.
- Innovation & Data Use
In recent years, information gleaned from the analysis of large data sets has led to scientific innovation, critical research, and advances that benefit society. Commercially, data mining and analytics have become a key aspect of efficient marketing and production practices. In addition, data collection and processing have become an important part of protecting consumers against fraud and other digital dangers.
- Encryption/Lawful Access
The first goal is to provide intellectual leadership on encryption as that topic becomes a major area of controversy globally in countries including India and China.
As an alternative or complement to limitations on encryption, law enforcement and national security agencies can seek lawful access to communications and stored data. In the United States, the FBI has called for updates to CALEA, the 1994 statute that requires telecommunications providers to architect their systems to enable wiretaps.
- Privacy Papers
Each year, the Future of Privacy Forum (FPF) invites privacy scholars and authors with an interest in privacy issues to submit papers to be considered for FPF’s “Privacy Papers for Policy Makers.”