Privacy policy

Last updated

A privacy policy is a statement or legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. [1] Personal information can be anything that can be used to identify an individual, not limited to the person's name, address, date of birth, marital status, contact information, ID issue, and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. [2] In the case of a business, it is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information is collected, and whether it is kept confidential, shared with partners, or sold to other firms or enterprises. [3] [4] Privacy policies typically represent a broader, more generalized treatment, as opposed to data use statements, which tend to be more detailed and specific.

Contents

The exact contents of a certain privacy policy will depend upon the applicable law and may need to address requirements across geographical boundaries and legal jurisdictions. Most countries have own legislation and guidelines of who is covered, what information can be collected, and what it can be used for. In general, data protection laws in Europe cover the private sector, as well as the public sector. Their privacy laws apply not only to government operations but also to private enterprises and commercial transactions.

History

In 1968, the Council of Europe began to study the effects of technology on human rights, recognizing the new threats posed by computer technology that could link and transmit in ways not widely available before. In 1969 the Organisation for Economic Co-operation and Development (OECD) began to examine the implications of personal information leaving the country. All this led the council to recommend that policy be developed to protect personal data held by both the private and public sectors, leading to Convention 108. In 1981, Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Convention 108) was introduced. One of the first privacy laws ever enacted was the Swedish Data Act in 1973, followed by the West German Data Protection Act in 1977 and the French Law on Informatics, Data Banks and Freedoms in 1978. [5]

In the United States, concern over privacy policy starting around the late 1960s and 1970s led to the passage of the Fair Credit Reporting Act. Although this act was not designed to be a privacy law, the act gave consumers the opportunity to examine their credit files and correct errors. It also placed restrictions on the use of information in credit records. Several congressional study groups in the late 1960s examined the growing ease with which automated personal information could be gathered and matched with other information. One such group was an advisory committee of the United States Department of Health and Human Services, which in 1973 drafted a code of principles called the Fair Information Practices. The work of the advisory committee led to the Privacy Act in 1974. The United States signed the Organisation for Economic Co-operation and Development guidelines in 1980. [5]

In Canada, a Privacy Commissioner of Canada was established under the Canadian Human Rights Act in 1977. In 1982, the appointment of a Privacy Commissioner was part of the new Privacy Act. Canada signed the OECD guidelines in 1984. [5]

Fair information practice

There are significant differences between the EU data protection and US data privacy laws. These standards must be met not only by businesses operating in the EU but also by any organization that transfers personal information collected concerning citizens of the EU. In 2001 the United States Department of Commerce worked to ensure legal compliance for US organizations under an opt-in Safe Harbor Program. The FTC has approved eTRUST to certify streamlined compliance with the US-EU Safe Harbor.

Current enforcement

In 1995 the European Union (EU) introduced the Data Protection Directive [6] for its member states. As a result, many organizations doing business within the EU began to draft policies to comply with this Directive. In the same year, the U.S. Federal Trade Commission (FTC) published the Fair Information Principles [7] which provided a set of non-binding governing principles for the commercial use of personal information. While not mandating policy, these principles provided guidance of the developing concerns of how to draft privacy policies.

The United States does not have a specific federal regulation establishing universal implementation of privacy policies. Congress has, at times, considered comprehensive laws regulating the collection of information online, such as the Consumer Internet Privacy Enhancement Act [8] and the Online Privacy Protection Act of 2001, [9] but none have been enacted. In 2001, the FTC stated an express preference for "more law enforcement, not more laws" [10] and promoted continued focus on industry self-regulation.

In many cases, the FTC enforces the terms of privacy policies as promises made to consumers using the authority granted by Section 5 of the FTC Act which prohibits unfair or deceptive marketing practices. [11] The FTC's powers are statutorily restricted in some cases; for example, airlines are subject to the authority of the Federal Aviation Administration (FAA), [12] and cell phone carriers are subject to the authority of the Federal Communications Commission (FCC). [13]

In some cases, private parties enforce the terms of privacy policies by filing class action lawsuits, which may result in settlements or judgments. However, such lawsuits are often not an option, due to arbitration clauses in the privacy policies or other terms of service agreements. [ citation needed ]

Applicable law

United States

While no generally applicable law exists, some federal laws govern privacy policies in specific circumstances, such as:

Some states have implemented more stringent regulations for privacy policies. The California Online Privacy Protection Act of 2003 – Business and Professions Code sections 22575-22579 requires "any commercial websites or online services that collect personal information on California residents through a web site to conspicuously post a privacy policy on the site". [25] Both Nebraska and Pennsylvania have laws treating misleading statements in privacy policies published on websites as deceptive or fraudulent business practices. [26]

Canada

Canada's federal Privacy Law applicable to the private sector is formally referred to as Personal Information Protection and Electronic Documents Act (PIPEDA). The purpose of the act is to establish rules to govern the collection, use, and disclosure of personal information by commercial organizations. The organization is allowed to collect, disclose and use the amount of information for the purposes that a reasonable person would consider appropriate in the circumstance. [27]

The Act establishes the Privacy Commissioner of Canada as the Ombudsman for addressing any complaints that are filed against organizations. The Commissioner works to resolve problems through voluntary compliance, rather than heavy-handed enforcement. The Commissioner investigates complaints, conducts audits, promotes awareness of and undertakes research about privacy matters. [28]

European Union

The right to privacy is a highly developed area of law in Europe. All the member states of the European Union (EU) are also signatories of the European Convention on Human Rights (ECHR). Article 8 of the ECHR provides a right to respect for one's "private and family life, his home and his correspondence", subject to certain restrictions. The European Court of Human Rights has given this article a very broad interpretation in its jurisprudence. [29]

In 1980, in an effort to create a comprehensive data protection system throughout Europe, the Organization for Economic Co-operation and Development (OECD) issued its "Recommendations of the Council Concerning Guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data". [30] The seven principles governing the OECD’s recommendations for protection of personal data were:

  1. Notice—data subjects should be given notice when their data is being collected;
  2. Purpose—data should only be used for the purpose stated and not for any other purposes;
  3. Consent—data should not be disclosed without the data subject's consent;
  4. Security—collected data should be kept secure from any potential abuses;
  5. Disclosure—data subjects should be informed as to who is collecting their data;
  6. Access—data subjects should be allowed to access their data and make corrections to any inaccurate data; and
  7. Accountability—data subjects should have a method available to them to hold data collectors accountable for not following the above principles. [31]

The OECD guidelines, however, were nonbinding, and data privacy laws still varied widely across Europe. The US, while endorsing the OECD’s recommendations, did nothing to implement them within the United States. [31] However, all seven principles were incorporated into the EU Directive. [31]

In 1995, the EU adopted the Data Protection Directive, which regulates the processing of personal data within the EU. There were significant differences between the EU data protection and equivalent U.S. data privacy laws. These standards must be met not only by businesses operating in the EU but also by any organization that transfers personal information collected concerning a citizen of the EU. In 2001 the United States Department of Commerce worked to ensure legal compliance for US organizations under an opt-in Safe Harbor Program. [32] The FTC has approved a number of US providers to certify compliance with the US-EU Safe Harbor. Since 2010 Safe Harbor is criticised especially by German publicly appointed privacy protectors because the FTC's will to assert the defined rules hadn't been implemented in a proper even after revealing disharmonies. [33]

Effective 25 May 2018, the Data Protection Directive is superseded by the General Data Protection Regulation (GDPR), which harmonizes privacy rules across all EU member states. GDPR imposes more stringent rules on the collection of personal information belonging to EU data subjects, including a requirement for privacy policies to be more concise, clearly-worded, and transparent in their disclosure of any collection, processing, storage, or transfer of personally identifiable information. Data controllers must also provide the opportunity for their data to be made portable in a common format, and for it to be erased under certain circumstances. [34] [35]

Australia

The Privacy Act 1988 provides the legal framework for privacy in Australia. [36] It includes a number of national privacy principles. [37] There are thirteen privacy principles under the Privacy Act. [38] It oversees and regulates the collection, use and disclosure of people's private information, makes sure who is responsible if there is a violation, and the rights of individuals to access their information. [38]

India

The Information Technology (Amendment) Act, 2008 made significant changes to the Information Technology Act, 2000, introducing Section 43A. This section provides compensation in the case where a corporate body is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person. This applies when a corporate body possesses, deals or handles any sensitive personal data or information in a computer resource that it owns, controls or operates.

In 2011, the Government of India prescribed the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 [39] by publishing it in the Official Gazette. [40] These rules require a body corporate to provide a privacy policy for handling of or dealing in personal information including sensitive personal data or information. [41] Such a privacy policy should consist of the following information in accordance with the rules:

  1. Clear and easily accessible statements of its practices and policies;
  2. Type of personal or sensitive personal data or information collected;
  3. Purpose of collection and usage of such information;
  4. Disclosure of information including sensitive personal data or information;
  5. Reasonable security practices and procedures.

The privacy policy should be published on the website of the body corporate, and be made available for view by providers of information who have provided personal information under lawful contract.

Online privacy certification programs

Online certification or "seal" programs are an example of industry self-regulation of privacy policies. Seal programs usually require implementation of fair information practices as determined by the certification program and may require continued compliance monitoring. TRUSTArc (formerly TRUSTe), [42] the first online privacy seal program, included more than 1,800 members by 2007. [43] Other online seal programs include the Trust Guard Privacy Verified program, [44] eTrust, [45] and Webtrust. [46]

Technical implementation

Some websites also define their privacy policies using P3P or Internet Content Rating Association (ICRA), allowing browsers to automatically assess the level of privacy offered by the site, and allowing access only when the site's privacy practices are in line with the user's privacy settings. However, these technical solutions do not guarantee websites actually follows the claimed privacy policies. These implementations also require users to have a minimum level of technical knowledge to configure their own browser privacy settings. [47] These automated privacy policies have not been popular either with websites or their users. [48] To reduce the burden of interpreting individual privacy policies, re-usable, certified policies available from a policy server have been proposed by Jøsang, Fritsch and Mahler. [49]

Criticism

Many critics have attacked the efficacy and legitimacy of privacy policies found on the Internet. Concerns exist about the effectiveness of industry-regulated privacy policies. For example, a 2000 FTC report Privacy Online: Fair Information Practices in the Electronic Marketplace found that while the vast majority of websites surveyed had some manner of privacy disclosure, most did not meet the standard set in the FTC Principles. In addition, many organizations reserve the express right to unilaterally change the terms of their policies. In June 2009 the EFF website TOSback began tracking such changes on 56 popular internet services, including monitoring the privacy policies of Amazon, Google and Facebook. [50]

There are also questions about whether consumers understand privacy policies and whether they help consumers make more informed decisions. A 2002 report from the Stanford Persuasive Technology Lab contended that a website's visual designs had more influence than the website's privacy policy when consumers assessed the website's credibility. [51] A 2007 study by Carnegie Mellon University claimed "when not presented with prominent privacy information..." consumers were "…likely to make purchases from the vendor with the lowest price, regardless of that site's privacy policies". [52] However, the same study also showed that when information about privacy practices is clearly presented, consumers prefer retailers who better protect their privacy and some are willing to "pay a premium to purchase from more privacy protective websites". Furthermore, a 2007 study at the University of California, Berkeley found that "75% of consumers think as long as a site has a privacy policy it means it won't share data with third parties," confusing the existence of a privacy policy with extensive privacy protection. [53] Based on the common nature of this misunderstanding, researcher Joseph Turow argued to the U.S. Federal Trade Commission that the term "privacy policy" thus constitutes a deceptive trade practice and that alternative phrasing like "how we use your information" should be used instead. [54]

Privacy policies suffer generally from a lack of precision, especially when compared with the emerging form of the Data Use Statement. Where privacy statements provide a more general overview of data collection and use, data use statements represent a much more specific treatment. As a result, privacy policies may not meet the increased demand for transparency that data use statements provide.

Critics also question if consumers even read privacy policies or can understand what they read. A 2001 study by the Privacy Leadership Initiative claimed only 3% of consumers read privacy policies carefully, and 64% briefly glanced at, or never read privacy policies. [55] The average website user once having read a privacy statement may have more uncertainty about the trustworthiness of the website than before. [56] [57] One possible issue is length and complexity of policies. According to a 2008 Carnegie Mellon study, the average length of a privacy policy is 2,500 words and requires an average of 10 minutes to read. The study cited that "Privacy policies are hard to read" and, as a result, "read infrequently". [58] However, any efforts to make the information more presentable simplify the information to the point that it does not convey the extent to which users' data is being shared and sold. [59] This is known as the "transparency paradox".

There have been many studies carried out by researchers to evaluate the privacy policies of the websites of companies. One study uses natural language processing and deep learning as a proposed solution to automatically assess the efficiency of companies' privacy policies, in order to help the users become more aware. [60]

Related Research Articles

<span class="mw-page-title-main">Children's Online Privacy Protection Act</span> American federal cyber law in 2000

The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law, located at 15 U.S.C. §§ 65016506.

<span class="mw-page-title-main">Gramm–Leach–Bliley Act</span> Act of the 106th United States Congress (1999–2001)

The Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, is an act of the 106th United States Congress (1999–2001). It repealed part of the Glass–Steagall Act of 1933, removing barriers in the market among banking companies, securities companies, and insurance companies that prohibited any one institution from acting as any combination of an investment bank, a commercial bank, and an insurance company. With the passage of the Gramm–Leach–Bliley Act, commercial banks, investment banks, securities firms, and insurance companies were allowed to consolidate. Furthermore, it failed to give to the SEC or any other financial regulatory agency the authority to regulate large investment bank holding companies. The legislation was signed into law by President Bill Clinton.

Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection.

<span class="mw-page-title-main">Data Protection Directive</span> EU directive on the processing of personal data

The Data Protection Directive, officially Directive 95/46/EC, enacted in October 1995, was a European Union directive which regulated the processing of personal data within the European Union (EU) and the free movement of such data. The Data Protection Directive was an important component of EU privacy and human rights law.

Center for Democracy & Technology (CDT) is a Washington, D.C.-based 501(c)(3) nonprofit organisation that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.

Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.

Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore.

The International Safe Harbor Privacy Principles or Safe Harbour Privacy Principles were principles developed between 1998 and 2000 in order to prevent private organizations within the European Union or United States which store customer data from accidentally disclosing or losing personal information. They were overturned on October 6, 2015, by the European Court of Justice (ECJ), which enabled some US companies to comply with privacy laws protecting European Union and Swiss citizens. US companies storing customer data could self-certify that they adhered to 7 principles, to comply with the EU Data Protection Directive and with Swiss requirements. The US Department of Commerce developed privacy frameworks in conjunction with both the European Union and the Federal Data Protection and Information Commissioner of Switzerland.

TrustArc Inc. is a privacy compliance technology company based in Walnut Creek, California. The company provides software and services to help corporations update their privacy management processes so they comply with government laws and best practices. Their privacy seal or certification of compliance can be used as a marketing tool.  

BBB National Programs, an independent non-profit organization that oversees more than a dozen national industry self-regulation programs that provide third-party accountability and dispute resolution services to companies, including outside and in-house counsel, consumers, and others in arenas such as privacy, advertising, data collection, child-directed marketing, and more. The Center for Industry Self-Regulation (CISR) is BBB National Programs' 501(c)(3) non-profit foundation. CISR supports responsible business leaders in developing fair, future-proof best practices, and the education of the public on the conditions necessary for industry self-regulation.

The United States Commission's fair information practice principles (FIPPs) are guidelines that represent widely accepted concepts concerning fair information practice in an electronic marketplace.

Information governance, or IG, is the overall strategy for information at an organization. Information governance balances the risk that information presents with the value that information provides. Information governance helps with legal compliance, operational transparency, and reducing expenditures associated with legal discovery. An organization can establish a consistent and logical framework for employees to handle data through their information governance policies and procedures. These policies guide proper behavior regarding how organizations and their employees handle information whether it is physically or electronically created (ESI).

<span class="mw-page-title-main">FTC regulation of behavioral advertising</span> US Regulations on Advertising Targeted by Online Activity

The United States Federal Trade Commission (FTC) has been involved in oversight of the behavioral targeting techniques used by online advertisers since the mid-1990s. These techniques, initially called "online profiling", are now referred to as "behavioral targeting"; they are used to target online behavioral advertising (OBA) to consumers based on preferences inferred from their online behavior. During the period from the mid-1990s to the present, the FTC held a series of workshops, published a number of reports, and gave numerous recommendations regarding both industry self-regulation and Federal regulation of OBA. In late 2010, the FTC proposed a legislative framework for U.S. consumer data privacy including a proposal for a "Do Not Track" mechanism. In 2011, a number of bills were introduced into the United States Congress that would regulate OBA.

In re Gateway Learning Corp, 138 F.T.C. 443 File No. 042-3047, was an investigatory action by the Federal Trade Commission (FTC) of the Gateway Learning Corporation, distributor of Hooked on Phonics. In its complaint, the FTC alleged that Gateway had committed both unfair and deceptive trade practices by violating the terms of its own privacy policy and making retroactive changes to its privacy policy without notifying its customers. Gateway reached a settlement with the FTC, entering into a consent decree in July 2004, before formal charges were filed.

<span class="mw-page-title-main">Julie Brill</span> American lawyer

Julie Simone Brill is an American lawyer who serves as Chief Privacy Officer and Corporate Vice President for Global Privacy, Safety and Regulatory Affairs at Microsoft. Prior to her role at Microsoft, Brill was nominated by President Barack Obama on November 16, 2009, and confirmed unanimously by the US Senate to serve as Commissioner of the US Federal Trade Commission on March 3, 2010. Brill served as a Commissioner of the Federal Trade Commission (FTC) from 2010 to 2016.

Privacy by design is an approach to systems engineering initially developed by Ann Cavoukian and formalized in a joint report on privacy-enhancing technologies by a joint team of the Information and Privacy Commissioner of Ontario (Canada), the Dutch Data Protection Authority, and the Netherlands Organisation for Applied Scientific Research in 1995. The privacy by design framework was published in 2009 and adopted by the International Assembly of Privacy Commissioners and Data Protection Authorities in 2010. Privacy by design calls for privacy to be taken into account throughout the whole engineering process. The concept is an example of value sensitive design, i.e., taking human values into account in a well-defined manner throughout the process.

Do Not Track legislation protects Internet users' right to choose whether or not they want to be tracked by third-party websites. It has been called the online version of "Do Not Call". This type of legislation is supported by privacy advocates and opposed by advertisers and services that use tracking information to personalize web content. Do Not Track (DNT) is a formerly official HTTP header field, designed to allow internet users to opt-out of tracking by websites—which includes the collection of data regarding a user's activity across multiple distinct contexts, and the retention, use, or sharing of that data outside its context. Efforts to standardize Do Not Track by the World Wide Web Consortium did not reach their goal and ended in September 2018 due to insufficient deployment and support.

The gathering of personally identifiable information (PII) is the practice of collecting public and private personal data that can be used to identify an individual for both legal and illegal applications. PII owners often view PII gathering as a threat and violation of their privacy. Meanwhile, entities such as information technology companies, governments, and organizations use PII for data analysis of consumer shopping behaviors, political preference, and personal interests.

Financial privacy laws regulate the manner in which financial institutions handle the nonpublic financial information of consumers. In the United States, financial privacy is regulated through laws enacted at the federal and state level. Federal regulations are primarily represented by the Bank Secrecy Act, Right to Financial Privacy Act, the Gramm-Leach-Bliley Act, and the Fair Credit Reporting Act. Provisions within other laws like the Credit and Debit Card Receipt Clarification Act of 2007 as well as the Electronic Funds Transfer Act also contribute to financial privacy in the United States. State regulations vary from state to state. While each state approaches financial privacy differently, they mostly draw from federal laws and provide more stringent outlines and definitions. Government agencies like the Consumer Financial Protection Bureau and the Federal Trade Commission provide enforcement for financial privacy regulations.

Privacy laws vary from state to state within the United States of America. Several states have recently passed new legislation that adapt to changes in cyber security laws, medical privacy laws, and other privacy related laws. State laws are typically extensions of existing United States federal laws, expanding them or changing the implementation of the law.

References

  1. Costante, Elisa; Sun, Yuanhao; Petković, Milan; den,236 Hartog, Jerry (October 2012). "A machine learning solution to assess privacy policy completeness". Proceedings of the 2012 ACM workshop on Privacy in the electronic society. pp. 91–96. doi:10.1145/2381966.2381979. ISBN   9781450316637. S2CID   207198681.{{cite book}}: CS1 maint: numeric names: authors list (link)
  2. McCormick, Michelle. "New Privacy Legislation." Beyond Numbers 427 (2003): 10-. ProQuest. Web. 27 Oct. 2011
  3. Gondhalekar, Vijay; Narayanaswamy, C.R.; Sundaram, Sridhar (2007), The Long-Term Risk Effects of the Gramm-Leach-Bliley Act (GLBA) on the Financial Services Industry, Advances in Financial Economics, vol. 12, Bingley: Emerald (MCB UP ), pp. 361–377, doi:10.1016/s1569-3732(07)12014-4, ISBN   978-0-7623-1373-0 , retrieved 3 September 2021
  4. Web finance, Inc (2011). "Privacy Policy". Archived from the original on 22 August 2013. Retrieved 23 October 2011.
  5. 1 2 3 Cavoukian, Ann (1995). Who Knows: Safeguarding Your Privacy in A Networked World (paperback). Random House of Canada: Random House of Canada. ISBN   0-394-22472-8.
  6. Overview of the Data Protection Directive, EC.europa.eu
  7. U.S. Federal Trade Commission Fair Information Practice Principles, FTC.gov Archived 2009-03-31 at the Wayback Machine
  8. HR 237 IH, The Consumer Internet Privacy Enhancement Act, as Introduced in House, 107th Congress Loc.gov. [ permanent dead link ]
  9. HR 89 IH, Online Privacy Protection Act of 2001, as Introduced in House, 107th Congress Loc.gov Archived 2015-05-11 at the Wayback Machine
  10. Kirby, Carrie "FTC drops the Call for New Internet Privacy Laws," SFGate, October 5, 2001. SFgate.com
  11. Implementation of 15 U.S.C. §§ 41-58, FTC.gov
  12. Electronic Privacy Information Center, Air Travel Privacy, Epic.org. Also, see FAA Enforcement Database at FAA.gov.
  13. Helmer, Gabriel M. "Cracking Down: FCC Initiates Enforcement Action Against Hundreds of Telecommunications Carriers For Failing to Certify Compliance With Customer Privacy Rules Security, Privacy and the Law, Foley Hoag, LLP, May 2009. Securityprivacyandthelaw.com. Also see FCC Enforcement Center at FCC.gov
  14. The Children's Online Privacy Protection Act, FTC.gov
  15. COPPA Safe Harbors discussed, Cybertelecom Federal Internet Law & Policy – an Educational Project. Krohn & Moss Consumer Law Center, Cybertelecom.org
  16. Discussion of compliance with the Children's Online Privacy Protection Act, FTC Privacy Initiatives, FTC.gov
  17. Data Privacy, A Safe Harbor Approach To Privacy: TRUSTe Recommendations, Center for Democracy and Technology, CDT.org Archived 2008-11-28 at the Wayback Machine
  18. Gramm-Leach-Bliley Act, Loc.gov Archived 2015-05-11 at the Wayback Machine
  19. "The Financial Privacy Requirements of the Gramm-Leach-Bliley Act", FTC Facts for Business", FTC.gov
  20. Information Regarding the Gramm-Leach-Bliley Act of 1999, US. Senate Committee on Banking, Housing, and Urban Affairs. Senate.gov
  21. Understanding HIPAA Privacy, HHS.gov Health information privacy, HHS.gov
  22. Notice of HIPAA Privacy Practices. Privacy/ Data Protection Project, Miller School of Medicine Miami University, Miami.edu
  23. "California Consumer Privacy Act (CCPA)". State of California Department of Justice. 15 October 2018.
  24. "The California Privacy Rights Act of 2020". IAPP.
  25. Privacy Laws, State of California Department of Justice Office of the Attorney General
  26. Deceptive Trade Practices, Enotes.com
  27. Branch, Legislative Services (21 June 2019). "Consolidated federal laws of Canada, Personal Information Protection and Electronic Documents Act". laws-lois.justice.gc.ca.
  28. "Nous ne pouvons trouver cette page Web (Erreur 404) – Thème de la facilité d'emploi Web du gouvernement du Canada / We couldn't find that Web page (Error 404) – Government of Canada Web Usability theme". www.priv.gc.ca.
  29. "Guide on Article 8 of the European Convention on Human Rights: Right to respect for private and family life". Global Freedom of Expression. Retrieved 25 October 2020.
  30. "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data – OECD". www.oecd.org.
  31. 1 2 3 Shimanek, Anna E. (2001). "Do you Want Milk with those Cookies?: Complying with Safe Harbor Privacy Principles". Journal of Corporation Law. 26 (2): 455, 462–463.
  32. Safe Harbor Compliance, Export.gov
  33. "10 Jahre Safe Harbor – viele Gründe zum Handeln, kein Grund zum Feiern". www.datenschutzzentrum.de. Archived from the original on 14 October 2015. Retrieved 7 May 2015.
  34. "Guide to the General Data Protection Regulation: Right to be informed". ico.org.uk. 19 January 2018. Retrieved 22 May 2018.
  35. "How Europe's new privacy rule is reshaping the internet". The Verge. Retrieved 22 May 2018.
  36. "Privacy Act 1988". AustLII. Retrieved 25 June 2013.
  37. "National Privacy Principles". Office of the Australian Information Commissioner. Retrieved 25 June 2013.
  38. 1 2 "Australian Privacy Principles". OAIC. Retrieved 26 October 2020.
  39. "Archived copy" (PDF). Archived from the original (PDF) on 18 May 2015. Retrieved 3 June 2014.{{cite web}}: CS1 maint: archived copy as title (link)
  40. G.S.R. 313(E) dated 11 April 2011
  41. Rule 4 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011
  42. "TRUSTe". Archived from the original on 26 September 2009. Retrieved 2 December 2009.
  43. "Testimony of Deirdre Mulligan before the Senate Committee on Commerce, Science and Transportation Subcommittee on Communications – Center for Democracy & Technology". www.cdt.org. 23 September 1998.
  44. "Privacy Seals & Services by Trust Guard". www.trust-guard.com.
  45. "Privacy Certification". www.etrust.org.
  46. "WebTrust seal program". www.cpacanada.ca. Retrieved 20 August 2019.
  47. Softsteel Solutions "The Platform for Privacy Preferences Project (P3P)", Softsteel.co.uk Archived 2012-09-10 at archive.today
  48. CyLab Privacy Interest Group, 2006 Privacy Policy Trends Report. January, 2007 Chariotsfire.com Archived 2009-03-26 at the Wayback Machine
  49. Jøsang, Audun; Fritsch, Lothar; Mahler, Tobias (2010). "Privacy Policy Referencing". In Katsikas, Sokratis; Lopez, Javier; Soriano, Miguel (eds.). Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science. Vol. 6264. Springer Berlin Heidelberg. pp. 129–140. doi:10.1007/978-3-642-15152-1_12. ISBN   978-3-642-15152-1.
  50. Millis, Elinor, "EFF tracking policy changes at Google, Facebook and others," Cnet Digital News, June 2009. Cnet.com
  51. Fogg, B. J. "How Do People Evaluate a Web Site's Credibility? (abstract)" BJ, Stanford Persuasive Technology Lab, November 2002, Consumerwebwatch.org. Stanford Web Credibility Project found at Stanford.edu.
  52. Acquisti, Alessandro and Janice Tsai, Serge Egelman, Lorrie Cranor, "The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study" Carnegie Mellon University, 2007. Econinfosec.org
  53. Gorell, Robert. "Do Consumers Care About Online Privacy?" October 2007. Grokdotcom.com citing a study by Chris Hoofnagle, UC-Berkeley's Bolt School of Law. Samuelson Law, Technology & Public Policy Clinic, Berkeley.edu Archived 2009-11-28 at the Wayback Machine
  54. How Retailers Track Us (around 19:30)
  55. Goldman, Eric. "On My Mind: The Privacy Hoax," October 2002, EricGoldman.org
  56. Gazaleh, Mark (August 2008). "Online trust and perceived utility for consumers of web privacy statements". wbsarchive.files.wordpress.com.
  57. Gazaleh, Mark (May 2008). "Online trust and perceived utility for consumers of web privacy statements".{{cite journal}}: Cite journal requires |journal= (help)
  58. "The Cost of Reading Privacy Policies," Aleecia M. McDonald & Lorrie Faith Cranor," , July 2008.
  59. Barocas, Solon, and Helen Nissenbaum. “Big Data’s End Run around Anonymity and Consent.” Privacy, Big Data, and the Public Good, Cambridge University Press, 2014, pp. 44–75. Cambridge Core, doi.org/10.1017/CBO9781107590205.
  60. John, Saka; Ajayi, Binyamin Adeniyi; Marafa, Samaila Musa (2022), Gervasi, Osvaldo; Murgante, Beniamino; Misra, Sanjay; Rocha, Ana Maria A. C. (eds.), "Natural Language Processing and Deep Learning Based Techniques for Evaluation of Companies' Privacy Policies", Computational Science and Its Applications – ICCSA 2022 Workshops, Lecture Notes in Computer Science, vol. 13377, Cham: Springer International Publishing, pp. 15–32, doi:10.1007/978-3-031-10536-4_2, ISBN   978-3-031-10535-7 , retrieved 22 September 2023

Further reading