Verified Document

Legislation Protecting Privacy In The Essay

In general, the CDT urges the enactment of legislation organized around FIPs. Such practices are guided by certain principles: transparency; individual participation; purpose specification; data minimization; use limitation; data quality and integrity; security; accountability and auditing. (CDT Comments, 10-11). These principles have been at the heart of privacy legislation since the Privacy Act of 1974. (Dep't of Homeland Security).

For example, the CDT advocates for consumer privacy legislation that regulates both the online and offline data collection and management practices by advertisers and that authorizes the Federal Trade Commission to make regulations specifically targeted at these practices. (CDT Comments, 3). With respect to DPI, the CDT has asked Congress and the European Union to engage in fact-finding about how ISPs are using DPI, so that privacy legislation can be designed to distinguish between the legitimate and illegitimate uses of DPI. (CDT Comments, 5-6)

Conclusion

The only thing consistent about the Internet is its rapid change. Although existing privacy legislation in the United States and Europe has been adequate to protect the privacy of individual information up to now, new technological developments are threatening the effectiveness of those rules. New rules tailored around the...

Comments of the Center for Democracy and Technology to the European Commission on the Matter of the Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data. December 31, 2009. Accessed on June 1, 2010 at http://www.cdt.org/issue/baseline-privacy-legislation
Federal Trade Commission. Privacy Online: Fair Information Practices in the Electronic Marketplace. 2000.

Federal Trade Commission. 2010. Enforcing Privacy Promises: Section 5 of the FTC Act. Web. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/promises.html.

Federal Trade Commission. 2010. The Gramm-Leach-Bliley Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/glbact.html

Federal Trade Commission. 2010. The Fair Credit Reporting Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/credit.html

Teufel III, H. The Fair Information Practice Principles: Framework for Privacy Policy at the Department of Homeland Security. December 29, 2008. Accessed on June 2, 2010 at www.dhs.gov/xlibrary/.../privacy/privacy_policyguide_2008-01.pdf

Sources used in this document:
References

Center for Democracy and Technlogy. Comments of the Center for Democracy and Technology to the European Commission on the Matter of the Consultation on the Legal Framework for the Fundamental Right to Protection of Personal Data. December 31, 2009. Accessed on June 1, 2010 at http://www.cdt.org/issue/baseline-privacy-legislation

Federal Trade Commission. Privacy Online: Fair Information Practices in the Electronic Marketplace. 2000.

Federal Trade Commission. 2010. Enforcing Privacy Promises: Section 5 of the FTC Act. Web. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/promises.html.

Federal Trade Commission. 2010. The Gramm-Leach-Bliley Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/glbact.html
Federal Trade Commission. 2010. The Fair Credit Reporting Act. Accessed on June 2, 2010 at http://www.ftc.gov/privacy/privacyinitiatives/credit.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Privacy the Author of This
Words: 630 Length: 2 Document Type: Essay

When the National Security Agency (NSA) of the United States is collection information in bulk with no rhyme or reason to it, that can become too might quite quickly. While it is wise to keep an eye on chatter and look for key words, phrases and patterns, there is indeed rules of evidence and the needs for warrants in many cases and that should be respected. The United States

Legislation on Consumer Privacy
Words: 917 Length: 2 Document Type: Research Paper

Consumer's Privacy Bill Of Rights The Obama Administration proposed the Consumer's Privacy Bill of Rights in 2012 as a roadmap for future legislation. The legislation was put forth on the premise that a huge portion of personal information gathered by American-based businesses regarding their customers and probable customers was still mostly unregulated (Sanders, 2012). In the past few years, the privacy of consumer information that is collected by businesses has been

Privacy for High School Students
Words: 12892 Length: 40 Document Type: Term Paper

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Privacy Protection Commenting on the
Words: 2121 Length: 5 Document Type: Research Proposal

Confab, however, is an architecture that is able to bypass these limitations and combine both approaches. It is limited, though, and a true pervasive environment calls for complex preferences that can be easily manipulated by the end user. Moreover, all these approaches are not completely sufficient in meeting the challenges mentioned in section 3.2. For instance, PETs and privacy models do not explicitly contribute in a reduction of data collection, nor

Privacy of an Individual in the Workplace
Words: 2222 Length: 8 Document Type: Essay

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

Privacy Security National Security Vs. Individual Liberties
Words: 2034 Length: 7 Document Type: Essay

Privacy Security National Security vs. Individual Liberties A Long Standing Debate has Taken a New Turn in the Modern Digital Era WikiLeaks The Edward Snowden Leaks Liberty and National Security The debate between national security and individual liberties, especially privacy, has reached new proportions as technology has increased the ability for the state to create mass surveillance programs. The events that occurred on September 11th, 2001, definitely changed the political and social landscape within the United

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now