September 19, 2006

EPIC & Privacy International release the 8th Privacy Report

Source EPIC Press Release


On Friday, September 8, EPIC and Privacy International release the 8th Privacy and Human Rights Report, which covers privacy laws and developments around the world. This annual report provides an overview of key privacy topics and reviews the state of privacy in over 70 countries around the world. It singles out a number of trends, including new anti-terrorism laws that provide for increased search capabilities and sharing of information among law enforcement authorities; and new traveler pre-screening and profiling systems.


PHR 2005 at the EPIC Bookstore:
http://www.epic.org/bookstore/phr2005/phr2005.html

PHR 2005 Executive Summary in Spanish:
http://www.epic.org/bookstore/phr2005/phr05_execsum_sp.pdf

PHR 2005 Executive Summary in Russian:
http://www.epic.org/bookstore/phr2005/phr05_execsum_ru.pdf

PHR 2005 Executive Summary in Arabic:
http://www.epic.org/bookstore/phr2005/phr05_execsum_AR.pdf

The Eminent Jurists Panel, U.S. Hearings:
http://ejp.icj.org/hearing.php3?id_rubrique=10

September 18, 2006

Customer Loyalty Programs


Knowledge Wharton publishes this week an article about loyalty programs:

The Lowdown on Customer Loyalty Programs: Which Are the Most Effective and Why

When making a purchase, a consumer has a choice between using frequent-flier miles, cash, or some combination thereof. Which will he or she choose?...

Wharton marketing professor Xavier Drèze and Joseph C. Nunes of the University of California's Marshall School of Business have spent several years studying how these programs can be structured to generate the most revenue for companies offering them.


Links:

"Using Combined-Currency Prices to Lower Consumers' Perceived Cost" a paper by Dreze and Nunes.

The customer loyalty costs of data breaches

The Value of Privacy on Loyalty Retailing (by Melody Vargas)

September 05, 2006

Chief Privacy Officer


In 2003 Edward Hurley wrote at SearchSecurity.com an article about the Chief Privacy Officer position, Companies creating more chief privacy officer jobs.


The chief security officer (CSO) position has matured to the point where the title isn't particularly jarring when you see it on a business card. However, the same probably cannot be said for the chief privacy officer (CPO) job.

CPOs are the public point people for a company's privacy initiatives. In other words, they function as the human face that is responsible for protecting the customer data that's collected and stored by companies.

Courier-Post Online has just published this article by Katie Grasso, Network of ideas available as privacy officers emerge.

A chief privacy officer's daily responsibilities include:


* Maintaining compliance and self-assessment documentation for new privacy and information security laws and regulations.

* Performing privacy compliance assessments by testing key privacy controls, systems and procedures.

* Determining the impact of current and pending privacy-related legislation and regulations.

* Responding to actual or potential breaches of stored information on customers and employees.

* Creating a privacy policy and training employees.

* But what if you're a small-business owner who can't afford a CPO?


Read the entire article on Courier Post Online

September 04, 2006

Privacy tool bar is adware claim


According to BBC News the application Browzar has been branded "adware" by many because it directs web searches to online adverts.

Some technical experts also say Browzar, which claims to leave no trail of webpages visited, does not work.

Browzar's developers say they are examining the feedback but strongly deny that it is adware.

Read the entire article on bbc.news.

September 01, 2006

ETRICS 2006 (slides available)

Image source ETRICS website

ETRICS 2006 took place from June 6th to 9th in Freiburg.

ETRICS is an International Conference on Emerging Trends in Information and Communication Security. Protecting information and communication systems and services from malicious use is essential for their deployment and acceptance. In addition to applying techniques from traditional security research and security engineering, it is necessary to take into account the vulnerabilities originating from increased mobility at application level and the integration of security requirements into business processes.

Workshops

1: UC and RFID today – Breakthrough or still on hold?
2: Security and Privacy in Future Business Services
3: Security in Autonomous Systems
4: Long-lasting Security

Workshop 2: Security and Privacy in Future Business Services

Part 1: Importance of Privacy for Individuals, Society and Economy

Ursula Sury
Rechtsanwältin in Luzern und Zug, Prof. an der Hochschule für Wirtschaft, Technik und Architektur in Luzern
Privacy: Ausgewählte Aspekte von Rechtsverletzungen durch Computing

Alessandro Acquisti
Carnegie Mellon University, Pittsburgh
Is There a Cost to Privacy Breaches? - An Event Study

Alfred Kobsa
University of California, Humboldt University, Berlin
Convincing Users to Disclose Personal Data

Sarah Spiekermann
University of Berlin
Privacy in the Germans' Mind

Part 2: Technical Approaches for Protecting Privacy

Sebastian Gajek
University of Bochum
A Case Study on Online-Banking Security

Marit Hansen
Independent Centre for Privacy Protection Schleswig-Holstein
Using Legally Compliant Reputation Systems to Filter SPIT (Spam over Internet Telephony)

Matthew Smith
University of Marburg
Future Internet Security Services Enabled by Sharing of Anonymized Logs

Stefan Sackmann
University of Freiburg
Privacy Evidence for Protecting Customer's Privacy in Ubiquitous Computing

Sören Preibusch
DIW Berlin
Designing Incentive-Compatible Privacy Negotiations

Boursas Latifa
Munich University of Technology
Integration and Propagation of Trust in Federated Identity Management Scenarios

Privacy saved my life

Labels

Contact Me

Creative Commons License
Esta obra está bajo una licencia de Creative Commons.