Data Privacy Day

Last updated

Data Privacy & Protection Day (Data Protection Day internationally)
Date 28 January
Next time28 January 2026 (2026-01)
Frequencyannual
First time2007

Data Privacy Day (known in Europe as Data Protection Day) [1] is an international event that occurs every year on 28 January. [2] The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. It is currently observed in the United States, Canada, Qatar, [3] Nigeria, Israel [4] and 47 European countries.

Contents

Data Privacy Days educational initiative originally focused on raising awareness among businesses as well as users about the importance of protecting the privacy of their personal information online, particularly in the context of social networking. [5] The educational focus has expanded over the years to include families, consumers and businesses. In addition to its educational initiative, Data Privacy Day promotes events and activities that stimulate the development of technology tools that promote individual control over personally identifiable information; encourage compliance with privacy laws and regulations; and create dialogues among stakeholders interested in advancing data protection and privacy. The international celebration offers many opportunities for collaboration among governments, industry, academia, nonprofits, privacy professionals and educators. [6]

The Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data was opened for signature by the Council of Europe on 28 January 1981. This convention is currently in the process of being updated in order to reflect new legal challenges caused by technological development. The Convention on Cybercrime is also protecting the integrity of data systems and thus of privacy in cyberspace. Privacy including data protection is also protected by Article 8 of the European Convention on Human Rights.

The day was initiated by the Council of Europe to be first held in 2007 as the European Data Protection Day. Two years later, on 26 January 2009, the United States House of Representatives passed House Resolution HR 31 by a vote of 402–0, declaring 28 January National Data Privacy Day. [7] On 28 January 2009, the Senate passed Senate Resolution 25 also recognizing 28 January 2009 as National Data Privacy Day. The United States Senate also recognized Data Privacy Day in 2010 and 2011.

Participating organizations

A few of the participating organizations for the 28 January 2016 Data Privacy and Protection day include: Anti-Phishing Working Group, Carnegie Mellon University, [8] Cyber Data-Risk Managers, EDUCAUSE, Georgetown University, Federal Trade Commission (FTC), Federal Communications Commission (FCC), Federal Bureau of Investigation (FBI), Identity Theft Council, the Privacy Commissioner of Canada, New York State Attorney General Office, the UK Information Commissioner, [9] [10] and Data Security Council of India. [11]

See also

Related Research Articles

<span class="mw-page-title-main">United States Department of Homeland Security</span> United States federal executive department

The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management.

A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a database of instructions on how to return messages to the real user. These instructions usually involve the anonymous remailer network itself, thus protecting the true identity of the user.

<span class="mw-page-title-main">Data Protection Directive</span> EU directive on the processing of personal data

The Data Protection Directive, officially Directive 95/46/EC, enacted in October 1995, was a European Union directive which regulated the processing of personal data within the European Union (EU) and the free movement of such data. The Data Protection Directive was an important component of EU privacy and human rights law.

The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. On 10 December 1948, the United Nations General Assembly adopted the Universal Declaration of Human Rights (UDHR); while the right to privacy does not appear in the document, many interpret this through Article 12, which states: "No one shall be subjected to arbitrary interference with their privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks."

<span class="mw-page-title-main">Freedom of information</span> Freedom of a person or people to publish and consume information

Freedom of information is freedom of a person or people to publish and have access to information. Access to information is the ability for an individual to seek, receive and impart information effectively. As articulated by UNESCO, it encompasses

"scientific, indigenous, and traditional knowledge; freedom of information, building of open knowledge resources, including open Internet and open standards, and open access and availability of data; preservation of digital heritage; respect for cultural and linguistic diversity, such as fostering access to local content in accessible languages; quality education for all, including lifelong and e-learning; diffusion of new media and information literacy and skills, and social inclusion online, including addressing inequalities based on skills, education, gender, age, race, ethnicity, and accessibility by those with disabilities; and the development of connectivity and affordable ICTs, including mobile, the Internet, and broadband infrastructures".

<span class="mw-page-title-main">Privacy International</span>

Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.

A privacy policy is a statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify an individual, not limited to the person's name, address, date of birth, marital status, contact information, ID issue, and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. In the case of a business, it is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information is collected, and whether it is kept confidential, shared with partners, or sold to other firms or enterprises. Privacy policies typically represent a broader, more generalized treatment, as opposed to data use statements, which tend to be more detailed and specific.

Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.

Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using their data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore.

Privacy law is a set of regulations that govern the collection, storage, and utilization of personal information from healthcare, governments, companies, public or private entities, or individuals.

<span class="mw-page-title-main">Convention on Cybercrime</span> 2001 international treaty on cybercrime

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime (cybercrime) harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. It was drawn up by the Council of Europe in Strasbourg, France, with the active participation of the Council of Europe's observer states Canada, Japan, the Philippines, South Africa and the United States.

The Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data aka Convention 108 is a 1981 Council of Europe treaty that protects the right to privacy of individuals, taking account of the increasing flow across frontiers of personal data undergoing automatic processing.

Source protection, sometimes also referred to as source confidentiality or in the U.S. as the reporter's privilege, is a right accorded to journalists under the laws of many countries, as well as under international law. It prohibits authorities, including the courts, from compelling a journalist to reveal the identity of an anonymous source for a story. The right is based on a recognition that without a strong guarantee of anonymity, many would be deterred from coming forward and sharing information of public interests with journalists.

Extended Access Control (EAC) is a set of advanced security features for electronic passports that protects and restricts access to sensitive personal data contained in the RFID chip. In contrast to common personal data which can be protected by basic mechanisms, more sensitive data must be protected further for preventing unauthorized access and skimming. A chip protected by EAC will allow that this sensitive data is read only by an authorized passport inspection system.

<span class="mw-page-title-main">Computer security conference</span> Convention for individuals involved in computer security

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include:

<span class="mw-page-title-main">Digital privacy</span> Data collection practices on the Internet

Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy, a crucial aspect of modern online interactions and services, can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.

Location obfuscation is a technique used in location-based services or information systems to protect the location of the users by slightly altering, substituting or generalizing their location in order to avoid reflecting their real position.

k-anonymity is a property possessed by certain anonymized data. The term k-anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in a paper published in 1998, although the concept dates to a 1986 paper by Tore Dalenius.

Pierangela Samarati from the Università degli Studi di Milano, Italy, was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2012 for contributions to information security, data protection, and privacy. She was named a 2021 ACM Fellow "for contributions to data security and privacy".

Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.

References

  1. "Data Protection Day". Council of Europe. Archived from the original on 27 December 2013. Retrieved 29 December 2013.
  2. Peter Fleischer, Jane Horvath, Shuman Ghosemajumder (2008). "Celebrating data privacy". Google Blog . Retrieved 12 August 2011.{{cite web}}: CS1 maint: multiple names: authors list (link)
  3. "Qatar Celebrates Privacy Day 2023". National Data Privacy Office (NDPO). Retrieved 24 January 2024.
  4. "יום הגנת הפרטיות הבינלאומי-gov.il". The Israel Privacy Protection Authority. Retrieved 28 January 2019.
  5. De Capitani Di Vimercati, Sabrina; Foresti, Sara; Livraga, Giovanni; Samarati, Pierangela (December 2012). "DATA PRIVACY: DEFINITIONS AND TECHNIQUES". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 20 (06): 793–817. doi:10.1142/S0218488512400247. ISSN   0218-4885.
  6. De Capitani Di Vimercati, Sabrina; Foresti, Sara; Livraga, Giovanni; Samarati, Pierangela (December 2012). "DATA PRIVACY: DEFINITIONS AND TECHNIQUES". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 20 (06): 793–817. doi:10.1142/S0218488512400247. ISSN   0218-4885.
  7. H.Res.31 Expressing support for the designation of 28 January 2009 as "National Data Privacy Day"
  8. CMU Privacy Day website
  9. "Data Privacy Day 2012 website". Archived from the original on 4 January 2012. Retrieved 3 January 2012.
  10. "European Privacy Day 2012 website". Archived from the original on 29 January 2012. Retrieved 3 January 2012.
  11. Yahya, Faizal Bin (2016). "The Political Economy of Data Security in the BPO Industry in India". State, Society and Information Technology in Asia.