Breach of Privacy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4371 Experts worldwide ranked by ideXlab platform

Kobbi Nissim - One of the best experts on this subject based on the ideXlab platform.

  • Privacy preserving datamining on vertically partitioned databases
    International Cryptology Conference, 2004
    Co-Authors: Cynthia Dwork, Kobbi Nissim
    Abstract:

    In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal of maintaining data Privacy [5]. Under a rigorous definition of Breach of Privacy, Dinur and Nissim proved that unless the total number of queries is sub-linear in the size of the database, a substantial amount of noise is required to avoid a Breach, rendering the database almost useless.

  • Privacy preserving datamining on vertically partitioned databases
    Lecture Notes in Computer Science, 2004
    Co-Authors: Cynthia Dwork, Kobbi Nissim
    Abstract:

    In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal of maintaining data Privacy [5]. Under a rigorous definition of Breach of Privacy, Dinur and Nissim proved that unless the total number of queries is sub-linear in the size of the database, a substantial amount of noise is required to avoid a Breach, rendering the database almost useless. As databases grow increasingly large, the possibility of being able to query only a sub-linear number of times becomes realistic. We further investigate this situation, generalizing the previous work in two important directions: multi-attribute databases (previous work dealt only with single-attribute databases) and vertically partitioned databases, in which different subsets of attributes are stored in different databases. In addition, we show how to use our techniques for datamining on published noisy statistics.

Cynthia Dwork - One of the best experts on this subject based on the ideXlab platform.

  • Privacy preserving datamining on vertically partitioned databases
    International Cryptology Conference, 2004
    Co-Authors: Cynthia Dwork, Kobbi Nissim
    Abstract:

    In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal of maintaining data Privacy [5]. Under a rigorous definition of Breach of Privacy, Dinur and Nissim proved that unless the total number of queries is sub-linear in the size of the database, a substantial amount of noise is required to avoid a Breach, rendering the database almost useless.

  • Privacy preserving datamining on vertically partitioned databases
    Lecture Notes in Computer Science, 2004
    Co-Authors: Cynthia Dwork, Kobbi Nissim
    Abstract:

    In a recent paper Dinur and Nissim considered a statistical database in which a trusted database administrator monitors queries and introduces noise to the responses with the goal of maintaining data Privacy [5]. Under a rigorous definition of Breach of Privacy, Dinur and Nissim proved that unless the total number of queries is sub-linear in the size of the database, a substantial amount of noise is required to avoid a Breach, rendering the database almost useless. As databases grow increasingly large, the possibility of being able to query only a sub-linear number of times becomes realistic. We further investigate this situation, generalizing the previous work in two important directions: multi-attribute databases (previous work dealt only with single-attribute databases) and vertically partitioned databases, in which different subsets of attributes are stored in different databases. In addition, we show how to use our techniques for datamining on published noisy statistics.

Scott D Lifchez - One of the best experts on this subject based on the ideXlab platform.

  • electronic communication of protected health information Privacy security and hipaa compliance
    Journal of Hand Surgery (European Volume), 2017
    Co-Authors: Brian C Drolet, Jayson S Marwaha, Brad T Hyatt, Phillip E Blazar, Scott D Lifchez
    Abstract:

    Purpose Technology has enhanced modern health care delivery, particularly through accessibility to health information and ease of communication with tools like mobile device messaging (texting). However, text messaging has created new risks for Breach of protected health information (PHI). In the current study, we sought to evaluate hand surgeons' knowledge and compliance with Privacy and security standards for electronic communication by text message. Methods A cross-sectional survey of the American Society for Surgery of the Hand membership was conducted in March and April 2016. Descriptive and inferential statistical analyses were performed of composite results as well as relevant subgroup analyses. Results A total of 409 responses were obtained (11% response rate). Although 63% of surgeons reported that they believe that text messaging does not meet Health Insurance Portability and Accountability Act of 1996 security standards, only 37% reported they do not use text messages to communicate PHI. Younger surgeons and respondents who believed that their texting was compliant were statistically significantly more like to report messaging of PHI (odds ratio, 1.59 and 1.22, respectively). Discussion A majority of hand surgeons in this study reported the use of text messaging to communicate PHI. of note, neither the Health Insurance Portability and Accountability Act of 1996 statute nor US Department of Health and Human Services specifically prohibits this form of electronic communication. To be compliant, surgeons, practices, and institutions need to take reasonable security precautions to prevent Breach of Privacy with electronic communication. Clinical relevance Communication of clinical information by text message is not prohibited under Health Insurance Portability and Accountability Act of 1996, but surgeons should use appropriate safeguards to prevent Breach when using this form of communication.

Seunghun Hong - One of the best experts on this subject based on the ideXlab platform.

  • louder bark with no bite Privacy protection through the regulation of mandatory data Breach notification in australia
    Future Generation Computer Systems, 2021
    Co-Authors: Mamoun Alazab, Seunghun Hong
    Abstract:

    Abstract The disruptive shift of technologies in the Internet age poses the challenge of securing our digital asset and cyberspace from large-scale, sophisticatedly targeted offenses and cybercrimes. As a response, many governments have introduced mandatory notification schemes in which an entity bears an obligation to notify the regulator and affected individuals if personal data it holds is compromised. Focusing on Australia’s Notifiable Data Breach (NDB) scheme introduced in 2018, this paper points out that the NDB scheme gives entities that should be responsible for data protection much leeway while holding individuals, only victims of a data Breach, responsible for dealing with consequences. This is problematic as redressing the grievances caused by a data Breach is difficult in the Australian context. It is difficult for a victim of a Breach of Privacy to bring an action in court mainly because there is no established tort of Privacy in Australia. Further, bringing a class action for data Breaches is a difficult process. We suggest that the real effect of the NDB scheme requires an understanding in a broader context of Australian Privacy Principles (APPs). Regulated in a broader APPs context, the NDB scheme could become a part of a Privacy protection regime that requires public agencies and businesses to have better accountability and responsibility mechanisms.

Jason N E Varuhas - One of the best experts on this subject based on the ideXlab platform.

  • remedies for Breach of Privacy
    2018
    Co-Authors: Jason N E Varuhas, N A Moreham
    Abstract:

    Since the turn of the century, Privacy actions have been recognised at common law and in equity across the common law world, while statutory Privacy protections have simultaneously proliferated. With the emergence of these actions courts are being called upon to determine which civil remedies are available for Breaches of Privacy and to enunciated the rules and principles that govern their award, often in the context of high-profile litigation concerning phone hacking, revenge pron, covert filming or the disclosure of sensitive medical, relationship or financial information.

  • varieties of damages for Breach of Privacy
    2018
    Co-Authors: Jason N E Varuhas
    Abstract:

    This paper offers a comprehensive account of the law of damages within the action for misuse of private information in English law. The paper interrogates which types of damages are and ought to be available for Breach of Privacy, and the legal rules and principles governing each form of damages including the approach to quantification. In examining the law of damages the paper considers the nature of the emergent Privacy action, arguing that it has shed its equitable origins in Breach of confidence and now closely resembles 'vindicatory' actions such as false imprisonment, battery and trespass to land. In turn the remedial approach for Breach of Privacy increasingly follows that adopted within these torts. The paper first considers compensatory damages, arguing that a 'vindicatory' model ought to characterise the approach to compensatory damages, and is the prevailing approach in English law following the High Court and Court of Appeal's important decisions in Gulati v MGN Ltd. According to this approach, damages are available for the wrongful invasion of Privacy in itself, irrespective of the suffering of material loss. In addition consequential losses are recoverable, including distress, recognised psychiatric illness and financial loss. Damages are available as of right and are not to be analogised with awards of 'just satisfaction' made by the European Court of Human Rights. The paper then examines non-compensatory damages. The courts are yet to authoritatively determine the availability of such damages for Breach of Privacy, and the principles governing their award. The paper argues that exemplary damages ought to be available, but quantum should not be so high as to constitute disproportionate interference with free expression. An account of profits should not be available. But if such remedy were to be recognised it ought to be awarded only exceptionally and the criteria for granting an account should follow the normative concerns that underpin the Privacy action. Reasonable fee or user damages are one means of measuring loss in property torts; they are not restitutionary. They ought not to be available for Breach of Privacy as it would be inapt to treat dignitary interests as if they were interests in tradeable commodities. The novel head of 'vindicatory' damages, recognised in a series of Privy Council appeals, should not be available as they would add nothing to existing remedies. Lastly, the paper considers damages in lieu of an injunction, arguing that these damages compensate for the loss of a legal liberty to enforce primary rights; they are not restitutionary. Such damages ought very rarely to be awarded in the place of an injunction in a case of ongoing, unjustified invasion of Privacy.