Privacy, Right of
Label
Privacy, Right of
Name
Privacy, Right of
Focus
Actions
Incoming Resources
- Health information technology, efforts continue but comprehensive privacy approach needed for national strategy : testimony before the Subcommittee on Information Policy, Census, and National Archives, Committee on Oversight and Government Reform, U.S. House of Representatives, statement of Linda D. Koontz, Valerie C. Melvin
- Mobile privacy disclosures, building trust through transparency
- Report to Congress regarding the Terrorism Information Awareness Program, in response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, [Subsection] 111(b)
- World without secrets, business, crime, and privacy in the age of ubiquitous computing, Richard Hunter
- No place to hide, a PJ Productions presentation ; a co-production with the Center for Investigative Reporting ; producer, Peter Bull ; edited by Paula Heredia
- I know who you are and I saw what you did, social networks and the death of privacy, Lori Andrews
- Surveillance valley, the secret military history of the Internet, Yasha Levine
- Civic space legal framework, Brazil, Finland, Morocco, Tunisia
- Data retention laws and internet service providers
- Welcome to the machine, science, surveillance, and the culture of control, Derrick Jensen, George Draffan
- Email Privacy Act, report (to accompany H.R. 699) (including cost estimate of the Congressional Budget Office)
- Online privacy law (2017 update), Australia, Canada, France, Germany, Israel, Italy, Japan, Netherlands, Portugal, Spain, Sweden, and the United Kingdom
- Security over personally identifiable information
- NCHS staff manual on confidentiality
- The naked future, what happens in a world that anticipates your every move, Patrick Tucker
- The transparent society, will technology force us to choose between privacy and freedom?, David Brin
- Protection of online personal data, Indonesia, Japan, Malaysia, Philippines, South Korea, Association of Southeast Asian Nations, European Union
- The ultimate Internet terrorist, how hackers, geeks, and phreaks can ruin your trip on the information superhighway-- and what you can do to protect yourself, Robert Merkle
- Spying with maps, surveillance technologies and the future of privacy, Mark Monmonier
- Protecting Americans' sensitive data from foreign adversaries, communication from the President of the United States transmitting an executive order that elaborates upon the national emergency declared in Executive Order 13873 of May 15, 2019, pursuant to 50 U.S.C. 1703(b); Public Law 95-223, Sec. 204(b); (91 Stat. 1627) and 50 U.S.C. 1641(b); Public Law 94-412, Sec. 401(b); (90 Stat. 1257)
- A national ID card, big government at its worst or technological efficiency? : hearing before the Subcommittee on National Economic Growth, Natural Resources, and Regulatory Affairs of the Committee on Government Reform and Oversight, House of Representatives; One Hundred Fifth Congress, second session; September 17, 1998
- Protecting personal consumer information from cyber attacks and data breaches, hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014
- Mobile apps for kids, disclosures still not making the grade
- Online advertising and hidden hazards to consumer security and data privacy, hearing before the Permanent Subcommittee on Investigations of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, May 15, 2014
- Driver Privacy Act of 2015, report of the Committee on Commerce, Science and Transportation on S. 766
- Privacy of electronic communications
- The art of invisibility, the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data, Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen
- Privacy/confidentiality of medical records in selected foreign nations, editor, Thomas Blumer; coordinator, Daniel Hill Zafren; research assistant, Donald R. DeGlopper
- Unmanned aircraft systems, measuring progress and mitigating potential privacy concerns would facilitate integration into the National Airspace System : report to Congressional requesters
- Privacy lost, how technology is endangering your privacy, David H. Holtzman ; foreword by Evan Bayh
- The threat to Americans' personal information, a look into the security and reliability of the health exchange data hub : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, September 11, 2013
- Health information technology, early efforts initiated but comprehensive privacy approach needed for national strategy : report to congressional requesters
- Criminal justice information policy, privacy and the private employer, [prepared by Gary R. Cooper and Robert R. Belair
- Federal Trade Commission, 2006 identity theft survey report, prepared for Federal Trade Commission ; prepared by Synovate
- Industry perspectives on the President's cybersecurity information-sharing proposal, hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, March 4, 2015
- We have been harmonized, life in China's surveillance state, Kai Strittmatter
- Protecting health information, legislative options for medical privacy : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform and Oversight, House of Representatives, One Hundred Fifth Congress, second session, May 19, 1998
- Taking charge, what to do if your identity is stolen
- Your secrets are my business, a security expert reveals how your trash, license plate, credit cards, computer, and even your mail make you an easy target for today's information thieves, Kevin McKeown, with Dave Stern
- Invasion of privacy, big brother and the company hackers, Michael J. Weber
- Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015
- Laws governing disclosure of credit card information, Argentina, Brazil, Canada, France, Germany, Hong Kong, Italy, Japan, Republic of Korea, Malaysia, Mexico, Netherlands, Taiwan, United Kingdom, Venezuela
- Pegasus, how a spy in your pocket threatens the end of privacy, dignity, and democracy, Laurent Richard and Sandrine Rigaud
- Combating identity theft, a strategic plan, the President's Identity Theft Task Force
- Facebook, transparency and use of consumer data : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, April 11, 2018
- Code and other laws of cyberspace, Lawrence Lessig
- Twitter, transparency and accountability : hearing before the Committee On Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, September 5, 2018
- Employee Privacy Protection Act, report together with minority views (to accompany H.R. 4321) (including cost estimate of the Congressional Budget Office)
- Spyware
- The connected world, examining the Internet of Things : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 11, 2015
Outgoing Resources
- Focus1