首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 20 毫秒
1.

This article is an examination of electronic privacy, specifically as it relates to e‐mail and related communication issues in the computer environment. Since the passage of the Electronic Communications Privacy Act of 1986 (U.S. C. 18, §§ 2510–2711), there have been questions raised as to whether the Act goes far enough in protecting privacy.

The article attempts to clarify the status of e‐mail privacy under the ECPA. It examines current law and the paucity of definitive case law that until now has left the ECPA untested. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e‐mail, particularly in the workplace. “Electronic Mail, Privacy, and the Electronic Communications Privacy Act of 1986: Technology in Search of Law.”;  相似文献   

2.
信息资源公共获取的隐私权保护探析   总被引:1,自引:0,他引:1  
通过分析信息资源公共获取与隐私权保护的联系与冲突,从制定隐私权保护法、建立考量原则、倡导自律和完善配套法律措施四个方面探讨推进信息资源公共获取的隐私权保护策略.  相似文献   

3.
论《爱国者法案》对美国图书馆的影响   总被引:9,自引:0,他引:9  
罗曼 《图书情报工作》2005,49(2):134-136
美国图书馆界历来重视用户的隐私保护,通过一系列法律和政策限制政府机构获取用户信息,防止利用技术手段侵犯用户的隐私权。2001年出台的《爱国者法案》直接影响到图书馆用户的隐私权,弱化了图书馆用户的隐私保护。为此,美国图书馆界采取推动立法和充分发挥现有法律的作用等应对措施来确保用户的隐私权。  相似文献   

4.
This paper demonstrates the divergent requestor privacy policies of professional librarians and the administration of the Freedom of Information Act (FOIA), and urges the federal government to adhere to librarian ethics in order to protect FOIA requestors. Section 1 of the paper provides information about the origins and purpose of the FOIA. Section 2 offers an overview of the philosophical and historical origins of library patron privacy ethics, discussing both the ethical basis for patron privacy and actual instances where library records have been sought for government surveillance of private citizens. Section 3 describes the state library laws that protect library requestors, as well as federal laws that protect non-FOIA requestor privacy rights, including the Video Privacy Protection Act (VPPA), which protects video rental records. Section 4 of the paper warns that, in the digital era, it is more important than ever to safeguard personal information like that contained in FOIA requests to prevent the stifling of information seeking activities in the United States. By modifying laws tomeet the needs of the “information age,” the United States government can embrace and utilize the ethical standards that are at the foundation of librarianship, and protect the principle that information should be free and available to the American populace.  相似文献   

5.
This study examines the extent to which online marketers comply with the Children's Online Privacy Protection Act of 1998. COPPA requires online operators to seek parental permission before collecting personal information from children and to post links to their privacy policy on their homepage and every page where personal infor mation is collected. A majority of the 162 popular children's websites analyzed in this study collected personal information from children. Only four of those sites fully com plied with major components of the law. The difficulty associated with obtaining parental permission and the recency of the law may explain the lack of compliance observed. The authors conclude that parents and schools need to educate children to protect their privacy online. In the meantime, the Federal Trade Commission should continue dissem inating information about the law and actively enforce it.  相似文献   

6.
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does not need FERPA protections. However, the needs of the confidential student, who requests confidentiality of all information, including directory information, were identified as not having been addressed. Reed Library adjusted policy and procedures to meet the needs of the confidential student and fulfill FERPA requirements.  相似文献   

7.
新《保密法》对涉密档案工作的影响   总被引:1,自引:0,他引:1  
2010年10 B 1日我国修订的<保密法>正式实施,新法的相关规定对涉密档案工作提出了新的要求.文章以保守秘密与信息公开为契合点,从五个方面谈新<保密法>中定密、解密、新技术、涉密人员等相关规定对涉密档案工作的影响.  相似文献   

8.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

9.
This article is a preliminary analysis of the first few years of the Computer Matching and Privacy Protection Act of 1988 (CMPPA). The act requires Federal agencies to establish Data Integrity Boards (DIBs) with responsibility to approve written agreements for computer matches in which their agencies are involved. Information for this analysis was collected from the annual reports on computer matching submitted by agencies to the Office of Management and Budget (OMB) for 1990 and 1991 and from 108 matching agreements. The secretaries of several DIBs were also interviewed. The effectiveness of DIBs and matching agreements are analyzed using McCubbins and Schwartz's distinction between “police-patrol” and “fire- alarm” oversight. The article concludes that more active and direct oversight, which would occur through an independent data protection or privacy board, is necessary.  相似文献   

10.
[目的/意义] 针对我国当前科学数据共享中的隐私问题,探索隐私治理方法和对策以便更好地实现科学数据共享。[方法/过程] 运用文献调查法和建模法,在厘清科学数据共享隐私问题的基础上,提出4项隐私治理原则,构建隐私治理模型,探索科学数据共享中的隐私治理对策。[结果/结论] 可以采用完善隐私保护法律体系、加强隐私保护配套制度建设、采用隐私增强技术、提升利益相关者隐私素养、构建隐私伦理保护规制、加强科学数据流程管理等措施来实施隐私治理,从而有效促进科学数据共享。  相似文献   

11.
[目的/意义] 针对我国当前科学数据共享中的隐私问题,探索隐私治理方法和对策以便更好地实现科学数据共享。[方法/过程] 运用文献调查法和建模法,在厘清科学数据共享隐私问题的基础上,提出4项隐私治理原则,构建隐私治理模型,探索科学数据共享中的隐私治理对策。[结果/结论] 可以采用完善隐私保护法律体系、加强隐私保护配套制度建设、采用隐私增强技术、提升利益相关者隐私素养、构建隐私伦理保护规制、加强科学数据流程管理等措施来实施隐私治理,从而有效促进科学数据共享。  相似文献   

12.
ALA关于RFID技术的隐私保护政策研究   总被引:1,自引:0,他引:1  
本文介绍了美国图书馆协会中关于图书馆实施RFID技术的指导性文件,即《关于RFID技术和隐私权原则的决定》和《图书馆中的RFID技术:隐私保护指南》。从隐私政策制定原则、政策制定的技术因素、对图书馆员的要求以及技术供应商四个方面,介绍了该指导性文件。并以旧金山公共图书馆为例,分析了在图书馆引进RFID技术过程中保护用户隐私的重要性。最后对我国的图书馆提出了建议:充分发挥图书馆学会的作用;加快隐私保护的立法进程;完善RFID的技术标准。  相似文献   

13.
我国移动社会化媒体隐私保护功能的可用性研究   总被引:1,自引:0,他引:1  
[目的/意义] 对我国移动社会化媒体的隐私保护功能的可用性进行对比研究,并针对移动社会化媒体隐私保护功能的可用性提出改进建议。[方法/过程] 基于我国主流的3种移动社会化媒体(手机QQ、微信和手机微博)的隐私保护功能,通过用户实验和访谈调查收集可用性数据,并运用多独立样本检验等统计方法进行对比研究。[结果/结论] 微信的隐私保护功能在有效性、效率和用户满意程度这3个可用性标准上均具有较为明显的优势。移动社会化媒体的隐私保护功能应从功能设计、功能引导、菜单层级、文字表述和默认值设置等方面提升可用性。  相似文献   

14.
隐私权是信息时代的一项基本人权.文章在简要阐释欧盟隐私管理政策与体制的基础上,分别介绍了英、法、德、意等欧盟成员国各自关于隐私权问题的法律规定,并通过对比分析从中挖掘对我国档案隐私权问题的有益启示.  相似文献   

15.
Privacy information transparency is generally considered desirable and should be enabled and upheld. It has gained increasing attention giving the emergence of new information technologies and their affordances for e-governance and governments. This study examines the proposition that privacy information transparency is amiable to mitigating privacy fatigue in e-government. The study identifies the antecedents of privacy information transparency of an e-government website, and its influence on privacy fatigue manifested in emotional exhaustion and cynicism. A survey conducted in Cyprus harnessed user responses, and the data analyzed using a partial least square structural equation analysis method. Findings reveal that; (1) user data collection and data use information aspects of online privacy significantly impact privacy information transparency; and (2) privacy information transparency positively impacts both cynicism behaviour and emotional exhaustion. This study extends the concept of privacy fatigue into e-government and contributes to an empirical evaluation of its relationship with privacy information transparency.  相似文献   

16.
Alcohol-related posts on social-networking sites (SNS) can damage college students’ reputations and relationships and contribute to risky behavior. However, little is known about how college drinkers engage in privacy management involving alcohol content. Through 48 interviews and a Communication Privacy Management lens, this study uncovered criteria on which students relied to develop relatively impermeable boundaries around alcohol posts, the ways they collectively negotiated privacy with peers, and how participants implicitly and explicitly communicatively negotiated privacy turbulence. Findings suggest important connections between the co-occurrence of online privacy management and identity management, including how facework is involved in remediating privacy breaches and the co-opting of privacy. Findings also inform efforts to educate college drinkers about on-and-offline strategies to manage alcohol-related SNS content.  相似文献   

17.
《Communication monographs》2012,79(3):344-365
This three-part study examines how privacy rules function to protect shared information from further revelation. Communication Privacy Management served as a theoretical framework to investigate issues related to boundary management. In the pilot study, college students (N = 409) described privacy rules and their use, and participants reported not further revealing the information when privacy rules were expressed by disclosers. In Study 1, participants (N = 167) reported on disclosing health-related information, and participants did not anticipate that recipients would further reveal especially when they used a privacy rule. In Study 2, dyads (dyad N = 257) reported on shared disclosure experiences, including both anticipated and actual boundary management. Study 2 findings include that privacy rules have limited effectiveness. The article discusses implications of privacy rule use when sharing private information.  相似文献   

18.
张晓辉 《国际新闻界》2005,(3):55-58,64
隐私领域和公共领域的媒介原本是矛盾的,而今却走向了融合。不仅仅是公众明星人物在媒介上公开隐私,而且普通个体也会在不同的媒介上述说自己的情感世界。这些主动公开隐私的行为是一个值得探讨的文化现象和传播问题。本文就今天活跃于大众媒介舞台上的隐私领域,主要从它与公共领域由对立到融合,如何实现融合,有哪些具体表现及其相关意义等几方面加以阐述。  相似文献   

19.
ABSTRACT

In October 2001, Congress passed the USA PATRIOT Act to strengthen the ability of the U.S. government to combat terrorism. Unfortunately, some sections of the Act strike at core values and practices of libraries and archives, especially in the areas of record keeping, privacy, confidentiality, security, and access to the collections. This article addresses several crucial issues with focus especially on Section 215 of the Act, privacy and confidentiality concerns, record keeping practices, and the development of policies and procedures to prepare archivists for a request from the Federal Bureau of Investigation for researcher records.  相似文献   

20.
With today's big data and analytics capability, access to consumer data provides competitive advantage. Analysis of consumers' transactional data helps organizations to understand customer behaviors and preferences. However, prior to capitalizing on the data, organizations ought to have effective plans for addressing consumers' privacy concerns because violation of consumer privacy brings long-term reputational damage. This paper proposes and tests a Privacy Boundary Management Model, explaining how consumers formulate and manage their privacy boundary. It also analyzes the effect of the five dimensions of privacy policy (Fair Information Practices) on privacy boundary formation to assess how customers link these dimensions to the effectiveness of privacy policy. Survey data was collected from 363 customers who have used online banking websites for a minimum of six months. Partial Least Square results showed that the validated research model accounts for high variance in perceived privacy. Four elements of the Fair Information Practice Principles (access, notice, security, and enforcement) have significant impact on perceived effectiveness of privacy policy. Perceived effectiveness in turn significantly influences perceived privacy control and perceived privacy risk. Perceived privacy control significantly influences trust and perceived privacy. Perceived privacy concern and trust also significantly influence perceived privacy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号