Technologies | |
- Semantic Web
- Data Mining (person-specific patterns)
- Bio-Terrorism Surveillance
|
|
|
Benefits to Society | Privacy Concerns Voiced |
- Semantic Web provides summary information from large amounts of data, by making web content machine readable
- Counter terrorism surveillance may improve the safety of American citizens against terrorist attacks by detecting suspicious behavior early.
- Bio-Terrorism surveillance can save lives by early detection of a biological agent and identifying naturally occurring outbreaks.
|
- Erosion of civil liberty protection.
- Erosion of illegal search protections because law-enforcement can “mine” cases from collected data.
- Patient privacy is at risk by additional sharing of identified information with law enforcement, which may render healthcare less effective.
- Detect social interactions of people.
- Access to uncontrolled and unprecedented amounts of information on identified individuals.
- Collected data can be used for other government purposes
|
|
|
Solution | Description |
CertBox (“Privacy Appliance”) |
A CertBox provides a fast means for automatically de-identifying a flow of data
in accordance to HIPAA data sharing provisions, while the resulting data
remain useful for bio-terrorism surveillance
|
| |
Reasonable Cause (“Selective Revelation”) |
Reasonable cause is a protocol in which the level of de-identification
experienced by the data match a scientific and legally expressed need for the data. |
| |
Distributed Surveillance |
Rather than sharing specific person-specific values with a central authority, answers to surveillance questions are computed over a network of data holder machines. Overall answers are provided with scientific assurances of privacy protections for individual and institutional information.
|
| |
Semantic Web Technologies to Reconcile Privacy and Context Awareness
(“eWallet”) |
Extensions to eWallet allows "owners" and "guardians" of person-specific data to specify and enforce expressed policies related to collecting and sharing personal data.
|
| |
Data Valuation by Simulation |
Using publicly available data and information about social and behavioral networks
of individuals, synthetic data can be constructed to determing the usefulness and fitness of a potential data source prior to actually acquiring real data.
|
| |
Roster Collocation Networks |
Roster Collcation Networks is a set of algorithsm for determining collocations of people while protecting privacy.
[ref]
|
|
|
Privacy Impact | |
- A. Video, wiretapping and surveillance
- B. Civil liberties, illegal search
- F. Copyright law
|