skip to main content
10.1145/332186.332255acmconferencesArticle/Chapter ViewAbstractPublication PagescfpConference Proceedingsconference-collections
Article
Free Access

Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information

Published:01 April 2000Publication History
First page image

References

  1. 1.We are using a broad definition of personal, meaning identifiable: the use of information relating to an individual that identifies that individual -- this may include linking information with personally identifiable information from other sources or combining information so as to infer a person's identity. That is: name, address, ID number, etc. as well as IP address, email address, psychographic information, etc.Google ScholarGoogle Scholar
  2. 2.In fact, Germany requires collection limitation as part of its data protection law. The Organization of Economic Cooperation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data principles < http://www.cdt.org/privacy/guide/basic/ oecdguidelines.html>, adopted by hundreds of countries and companies, includes "collection limitation" as its first principle. Roger Clarke of Xamax consulting Pry. Ltd. in Australia has done some excellent work in helping build guidelines to determine when the collection of personally identifiable information is needed for authentication purposes. Clarke's work on this subject is available at http:/ /www.anu.edu.au/people/Roger.Clarke/EC/.Google ScholarGoogle Scholar
  3. 3.CDT Senior Staff Counsel, James X. Dempsey, created this chart. Representatives of the Department of Justice agreed upon the accuracy of the chart, so it actually does represent the current state of the law, not just CDT's view. An online version is available at: http://www.cdt.org/privacy/govaccess/ accesschart.shtml.Google ScholarGoogle Scholar
  4. 4.Senator Leahy (D-VT) has a bill in Congress that could close some, if not many, of these holes (S. 854 or the E-RIGHTS Act of the }06th Congress).Google ScholarGoogle Scholar
  5. 5.Markoff, John. "An Online Extortion Plot Results in Release of Credit Card Data." New York Times. January 10, 2000. p. A}.Google ScholarGoogle Scholar
  6. 6.While companies are reluctant to share exact statistics on this subject, we have anecdotal evidence that legal departments have exploded at online companies specifically to deal with this issue.Google ScholarGoogle Scholar
  7. 7.Password technologies are clearly not the best authentication technique for such a system, but in reality they are currently the most often used. When password technologies are usedin such systemsnow, the companies have the ability to issue new passwords but no ability to see what the passwords are.Google ScholarGoogle Scholar
  8. 8.Business Week/Louis Harris, "3/16/98 BW/Harris Poll: Online Insecurity," http:// www.busine ssweek.eom/} 998/1 }/b3569 } 07.htmGoogle ScholarGoogle Scholar

Index Terms

  1. Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CFP '00: Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
          April 2000
          351 pages
          ISBN:1581132565
          DOI:10.1145/332186

          Copyright © 2000 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 April 2000

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader