Skip to main content

Currently Skimming:

4 Privacy Implications of Emerging Technologies Part II - Panel Summary
Pages 14-20

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 14...
... , and suggested that these two areas may be moving toward a disruptive convergence. Gunter described emerging capabilities in analysis of both structured and semi-structured data, including doctor's notes or even information from a Fitbit or an Apple watch, and noted that data mining of electronic health records (EHRs)
From page 15...
... She pointed out that the algorithms used to analyze online data can unintentionally lead to harmful, unintended, and/or unanticipated consequences, such as price discrimination. Her group has also created an infrastructure called FairTest to help programmers identify privacy bugs in their applications, enabling them to avoid discriminatory or other unintended effects.
From page 16...
... government collects biometric information about foreign visitors to the country, led other nations to collect biometric information from nonnational travelers. This, combined with the leak of fingerprint records from the recent OPM breach, could have significant consequences for those within the intelligence community.
From page 17...
... solution would be to make such exchange of data explicitly legal and then devise an infrastructure that would ensure rigorous compliance with a set of appropriate controls. Gunter added that there are similar issues around the architecture of advertising on mobile phones.
From page 18...
... She pointed out that setting data access controls with mainstream technologies such as Facebook is already difficult, and the management problem will likely increase significantly. Industry Practice as a Potential Model for the IC Geambasu suggested that companies such as Google have infrastructures for auditing access to data and maintaining data that are not in use, involving encryption, and minimization and compartmentalization of access.
From page 19...
... A panelist raised an example of advertising targeted at an individual whose online activities displayed characteristics associated with depression, pointing out that targeted advertisements could be helpful (for example, advertisements for a support group) or detrimental (for example, providing advertisements for alcohol)
From page 20...
... He suggested that the IC does a good job of protecting individual privacies of members of the public, but that the privacy risks for those within the IC may be substantially higher. Another participant noted that translating the FIPPs or other policies into concrete and substantive operational requirements is challenging across any industry, and suggested that technologies to help with this translation could be useful to those who design applications.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.