Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/332186.332200acmconferencesArticle/Chapter ViewAbstractPublication PagescfpConference Proceedingsconference-collections
Article
Free access

An international standard for privacy protection: objections to the objections

Published: 01 April 2000 Publication History
First page of PDF

Supplemental Material

MP3 File
Privacy Commissioners: Powermongers, Pragmatists or Patsies?: Colin Bennett (Moderator), Ann Cavoukian, Stephen Lau, Malcolm Crompton, Hansjuergen Garstka

References

[1]
For presentation at CFP'2000 (Workshop on "Freedom and Privacy by Design") An earlier draft of this article was published in December 1997 in the Open Standards Tracking Report at: www. di gi tal. c o m/i nfo/o s s tr/tr 1297.h tm#A 3 The objections are still being raised. The objections to the objections are still relevant.
[2]
Available at: http://www.cous.uvic.ca/poli/bennett/research/ISO.htm
[3]
Opinion 1/97 on Canadian initiatives relating to the standardisation in the field of privacy at: http://europa.eu.int/comm/dgl 5/en/media/dataprot/wpdocs/index.htm
[4]
Canadian Standards Association (CSA) Model Code for the Protection of Personal Information. CAN/CSA-Q830-96 (Rexdale: CSA, 1996) is at http://www.csa.ca. (Referred to as CSA Model Code)
[5]
Canadian Standards Association, Making the CSA Privacy Code Work for You: A Workbook on applying the CSA Model Code for the Protection of Personal Information to your organization. PLUS 8808 (Rexdale: CSA, 1997).
[6]
Colin J. Bennett, Implementing Privacy Codes of Practice: A Report to the Canadian Standards Association(Rexdale: CSA, 1995).
[7]
First Orientations on Transfers of Personal Data to Third Countries- Possible Ways Forward in Assessing Adequacy, at: http://europa.eu.int/comm/dgl5/en/media/dataprot/wpdocs/wp4en.htm
[8]
For some empirical evidence of the nature of international data transfers and the complexities of determining "adequacy" see: Application of a methodology designed to assess the adequacy of the level of protection of individuals with regard to processing personal data: test of the method of several categories of transfer-final report: (Luxembourg: Office for Official Publications of the European Communities, 1999 (ISBN 92-828-5638-0)) or www.europa.eu.int/comm/dgl5/en/media/dataprot/ studies/adequat.htm
[9]
See, Electronic Privacy information Center, "Suffer Beware" at: http://www.epic.org/reports/ surfer-beware3.html
[10]
See the latest opinion by the Article 29 Working Group: Opinion 7/99 on the Level of Data Protection provided by the "Safe Harbor" Principles at: http://eur~pa'eu'int/c~mm/dgl5/en/media/ dataprot/wpdocs/index.htm

Cited By

View all
  • (2016)Data mining: an ethical baseline for online privacy policiesJournal of Enterprise Information Management10.1108/JEIM-04-2014-004029:4(482-504)Online publication date: 11-Jul-2016
  • (2007)Implications of an ethic of privacy for human-centred systems engineeringAI & SOCIETY10.1007/s00146-007-0149-722:3(385-403)Online publication date: 3-Aug-2007
  • (2005)The role of trust in information science and technologyAnnual Review of Information Science and Technology10.1002/aris.144037011137:1(465-498)Online publication date: 31-Jan-2005

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CFP '00: Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
April 2000
351 pages
ISBN:1581132565
DOI:10.1145/332186
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2000

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

CFP00
Sponsor:
CFP00: The 10th Conference on Computers, Freedom and Privacy
April 4 - 7, 2000
Ontario, Toronto, Canada

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)9
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Data mining: an ethical baseline for online privacy policiesJournal of Enterprise Information Management10.1108/JEIM-04-2014-004029:4(482-504)Online publication date: 11-Jul-2016
  • (2007)Implications of an ethic of privacy for human-centred systems engineeringAI & SOCIETY10.1007/s00146-007-0149-722:3(385-403)Online publication date: 3-Aug-2007
  • (2005)The role of trust in information science and technologyAnnual Review of Information Science and Technology10.1002/aris.144037011137:1(465-498)Online publication date: 31-Jan-2005

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media