scispace - formally typeset
Search or ask a question

Showing papers on "Information privacy published in 1984"



Book ChapterDOI
01 Nov 1984
TL;DR: In the year 1890, a young matron of Boston, which is a large city in Massachusetts, held at her home a series of social entertainments on an elaborate scale as discussed by the authors, and the newspapers of Boston and in particular the Saturday Evening Gazette, which specialized in “blue blood” items, covered her parties in highly personal and embarrassing detail.
Abstract: In the year 1890 Mrs. Samuel D. Warren, a young matron of Boston, which is a large city in Massachusetts, held at her home a series of social entertainments on an elaborate scale. She was the daughter of Senator Bayard of Delaware, and her husband was a wealthy young paper manufacturer, who only the year before had given up the practice of law to devote himself to an inherited business. Socially Mrs. Warren was among the elite; and the newspapers of Boston, and in particular the Saturday Evening Gazette , which specialized in “blue blood” items, covered her parties in highly personal and embarrassing detail. It was the era of “yellow journalism,” when the press had begun to resort to excesses in the way of prying that have become more or less commonplace today; and Boston was perhaps, of all of the cities in the country, the one in which a lady and a gentleman kept their names and their personal affairs out of the papers. The matter came to a head when the newspapers had a field day on the occasion of the wedding of a daughter, and Mr. Warren became annoyed. It was an annoyance for which the press, the advertisers and the entertainment industry of America were to pay dearly over the next seventy years. Mr. Warren turned to his recent law partner, Louis D. Brandeis, who was destined not to be unknown to history.

36 citations



Journal ArticleDOI
TL;DR: The author clarifies the relationship between security and privacy in information systems and concludes that a comprehensive set of security safeguards within and around a computer-based information system is an essential prerequisite for assuring personal privacy.
Abstract: : The author clarifies the relationship between security and privacy in information systems. Record-keeping privacy concerns personal information kept in computer-based systems, and the essence of it is protecting such information and controlling its use for authorized purposes. In contrast, computer security is that body of technology, techniques, procedures, and practices that provides the protective mechanisms to assure the safety of both the computer systems themselves and the information and the information within them; and, in addition, limits access to such information solely to authorized users. Computer security is of importance whether the information to be protected is personal in nature and therefore relative to privacy; whether it is defense in nature and therefore related to the security of the country; or whether it is sensitive in nature and therefore relevant to corporate welfare in the private sector. The important point to be noted is that a comprehensive set of security safeguards within and around a computer-based information system is an essential prerequisite for assuring personal privacy. To operate such a system without relevant safeguards is a sham against privacy assurance. The computer security issue must be seen as analogous to the classical offense/defense situation. As computer security safeguards become stronger, the offenses against them will become more sophisticated and the cycle will repeat. Therefore, no organization or Congress can assume that the computer security issue is one that can be looked at and forgotten.

25 citations



Journal ArticleDOI
TL;DR: The revised Privacy Act should establish a permanent mechanism for the articulation of privacy interests at the federal level in the form of the kind of Privacy Protection Commission originally proposed in the Senate version of the Privacy Act of 1974.

9 citations


Journal ArticleDOI
01 Dec 1984-Nature
TL;DR: There are disturbing signs that the peer-review system for unpublished manuscripts is no longer as secure as it should be.
Abstract: There are disturbing signs that the peer-review system for unpublished manuscripts is no longer as secure as it should be. Commercial competition is not the most serious a cause of trouble.

9 citations



Journal ArticleDOI
TL;DR: To counter threats to this right, the author proposes action on several fronts, including legislation to regulate the collection, storage and distribution of information in government and business.
Abstract: Information privacy has emerged as a key international issue among information systems professionals and society in general. In tracing the development of this concern, the author first examines the four stages in which technology is absorbed by society, noting the trend toward increasing dependence on computer systems. Important privacy debates in the international arena will then be reviewed in order to illustrate that information privacy is a fundamental right in a democratic society. To counter threats to this right, the author proposes action on several fronts, including: • •legislation to regulate the collection,storage and distribution of information in government and business • •education to inform the public regarding the nature of the problem • •standards developed by the computer industry to safeguard computerized information • •centralization of resources at the federal level to study the problem and recommend solutions • •individual vigilance.

5 citations



Journal Article
TL;DR: In this article, the authors discuss past and present access practices at the Public Archives of Canada and focus on the recently enacted federal access and privacy legislation and on some of the consequences this new legislation will have for archivists.
Abstract: Dead file. Lifecycle. Collective memory. To help explain their activities both to themselves and to others, archivists are fond of employing organic concepts derived from life. No doubt such allusions are the consequence of archives being the product of individual and collective human experiences. If life provides a model for understanding archives, is there a place in such a theory of archives for that most interior of experiences, the secret, which some observers believe constitutes the inner authentic self?' Perhaps there is. Conditions of access are placed on both private and government collections, in part, because of thesecrets they contain. As with personal secrets, control over secrecy and openness gives power; it influences what others know. In government, and thus in the archives of government, secrecy is justified by the belief that the keeping of a secret is beneficial to those who d o not know and is ensured by such measures as the oath of office and the Official Secrets Act. One author has claimed that the Canadian bureaucracy is more secretive than most.2 If this is so, what about its archives and access to the secrets contained therein? In this paper I will address the issue of access by discussing past and present access practices at the Public Archives of Canada and by focusing, in particular, on the recently enacted federal access and privacy legislation and on some of the consequences this new legislation will have for archivists.

Journal ArticleDOI
TL;DR: It is shown that proper safeguards are provided through a variety of interrelated efforts, resulting in privacy laws and programs that share a common dedication to the underlying “fair information” principles found in such international expressions of resolve as the OECD Guidelines and the Convention of the Council of Europe.
Abstract: This paper challenges the assertion that lacking omnibus privacy legislation and a centralized administrative body, the United States is deficient in legal protection accorded to personal data. On the contrary, it is shown that proper safeguards are provided through a variety of interrelated efforts, resulting in privacy laws and programs that share a common dedication to the underlying “fair information” principles found in such international expressions of resolve as the OECD Guidelines and the Convention of the Council of Europe. It is also demonstrated that U.S. privacy laws are strengthened by their diversity of sources, content, and enforcement mechanisms. Voluntary compliance by the U.S. private sector with “fair information” principles is endorsed, and AT&T's privacy program is discussed as a representative of many such undertakings. In conclusion, it is emphasized that development of a properly balanced international comity on information transmission and storage could and must be advanced.


Journal ArticleDOI
TL;DR: The purpose behind the Freedom of Information Act was to permit greater access by the public to information held by the federal government, but little attention was focused on a potential problem that access to government-held information might cause: violation of another individual's right to privacy.
Abstract: The purpose behind the Freedom of Information Act was to permit greater access by the public to information held by the federal government. In promoting this democratic ideal, little attention was focused on a potential problem that this access to government-held information might cause: violation of another individual's right to privacy. This article examines a recent case in which these two goals came into conflict.

Book ChapterDOI
Dennis M. Maloney1
01 Jan 1984
TL;DR: This chapter will contain brief overviews of areas related to information access and privacy, and the interested reader may consult the references for more detail.
Abstract: Again, we have a topic that could fill an entire volume by itself. In keeping with the spirit of this book, however, this chapter will contain brief overviews of areas related to information access and privacy, and the interested reader may consult the references for more detail. As we will see later in this chapter, the area of privacy contains rules affecting who may obtain data gathered by a researcher and rules for how scientists may obtain data gathered by the government.

Journal ArticleDOI
TL;DR: New dimensions of personal privacy are identified and illustrated with electronic mail and are discussed in terms of access‐without‐action, information representation, information protection, exploitation of information such as computer matching, the large‐scale availability of personal information to many people, and the widespread appearance of systems that deal with information about people but for other than record‐keeping purposes.
Abstract: This paper first reviews the development of record‐keeping privacy, together with its legislative attention and major studies of it. It then identifies new dimensions of personal privacy and illustrates them with electronic mail. It notes the intricacy of policy issues arising from large‐scale use of computers and communications for systems that provide a variety of services, many of them oriented toward the individual. The legislative awkwardness of providing protection to the individual and the role of the federal government in the entire issue is described. Other systems that will create new privacy issues are touched on. The “privacy future” is discussed in terms of access‐without‐action, information representation, information protection, exploitation of information such as computer matching, the large‐scale availability of personal information to many people, and the widespread appearance of systems that deal with information about people but for other than record‐keeping purposes. Finally,...

Journal ArticleDOI
TL;DR: A consumer protection approach rather than a right-to-privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the United States as mentioned in this paper.
Abstract: In the United States, a “constitutional analysis” of medical data privacy has been so far unsuccessful in obtaining significant protection. Statutory protection has evolved primarily to protect the citizen against the state, not to vindicate the privacy interest of the individual. A “consumer protection” approach rather than a right-to-privacy approach can be used to develop a coherent, practical approach to the needs of various parties in the health care system in the United States.






Book ChapterDOI
TL;DR: This chapter discusses the recent international developments in information privacy or data protection, and discusses the general principles for the protection of information privacy in detail.
Abstract: Publisher Summary This chapter discusses the recent international developments in information privacy or data protection. These terms will be used in preference to several other currently in use, to describe the same concepts, for example, “data banks and privacy,” “computer privacy,” “computers and privacy,” and “privacy protection in information systems.” Several definitions of information privacy are available. These developments, according to Westin, have consisted of three phases: the early-warning phase, the study phase, and the regulatory phase. The chapter briefly looks at developments in this field during 1970-1975. This is then followed by a detailed discussion of recent international developments to protect information privacy. Some of the international legislations are discussed that have been enacted during the last few years. The general principles for the protection of information privacy are given. The ten general principles are based on the work of the Organization for Economic Cooperation and Development (OECD) and other earlier studies. The chapter discusses the principles and their implementation aspects in detail.