7 found
  1.  15
    Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
    Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. The home is, in fact, becoming a locus for health care innovation that may in the future compete with the hospital. However, along with these advances come (...)
    Direct download (7 more)  
    Export citation  
    Bookmark   10 citations  
  2.  3
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the user—the data (...)
    Direct download (5 more)  
    Export citation  
    Bookmark   2 citations  
  3.  6
    Research ethics by design: A collaborative research design proposal.Donald S. Borrett, Heather Sampson & Ann Cavoukian - 2017 - Research Ethics 13 (2):84-91.
    Privacy by Design, a globally accepted framework for personal data management and privacy protection, advances the view that privacy cannot be assured solely by compliance with regulatory frameworks but must become an organisation’s default mode of operation. We are proposing a similar template for the research ethics review process. The Research Ethics by Design framework involves research ethics committees engaging researchers during the design phase of the proposal so that ethical considerations may be directly embedded in the science as opposed (...)
    Direct download  
    Export citation  
  4.  12
    Privacy by Design: essential for organizational accountability and strong business practices. [REVIEW]Ann Cavoukian, Scott Taylor & Martin E. Abrams - 2010 - Identity in the Information Society 3 (2):405-413.
    An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual _Privacy by Design_ principles (...)
    Direct download (7 more)  
    Export citation  
    Bookmark   6 citations  
  5.  18
    Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
    In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of technologies that could (...)
    Direct download (8 more)  
    Export citation  
    Bookmark   5 citations  
  6.  8
    SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
    The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being made (...)
    Direct download (6 more)  
    Export citation  
    Bookmark   1 citation  
  7.  22
    A pragmatic approach to privacy risk optimization: privacy by design for business practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
    This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk Optimization as a process whereby organizations strive to maximize positive risks and mitigate negative ones. The PROP uses these concepts to implement privacy into operational policies and (...)
    Direct download (6 more)  
    Export citation