John P. Fanning
- Published in print:
- 2005
- Published Online:
- September 2009
- ISBN:
- 9780195149289
- eISBN:
- 9780199865130
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195149289.003.0014
- Subject:
- Public Health and Epidemiology, Public Health, Epidemiology
This chapter discusses privacy principles that are valuable in making judgments about the use and disclosure of personal information, the legal requirements governing health statistical information, ...
More
This chapter discusses privacy principles that are valuable in making judgments about the use and disclosure of personal information, the legal requirements governing health statistical information, and some policy and practical problems encountered in managing this information. Public health practitioners need an ethical and conceptual framework for making decisions about the use and disclosure of identifiable information about individuals. Tradition and ethical commitment, often supported by legal protections, have provided that framework and resulted in careful stewardship of personal health information. Current developments in information and communications technology present new problems for that stewardship. They call for continuing attention to ensure that policy, legal, and technical measures to protect sensitive information keep pace with those developments.Less
This chapter discusses privacy principles that are valuable in making judgments about the use and disclosure of personal information, the legal requirements governing health statistical information, and some policy and practical problems encountered in managing this information. Public health practitioners need an ethical and conceptual framework for making decisions about the use and disclosure of identifiable information about individuals. Tradition and ethical commitment, often supported by legal protections, have provided that framework and resulted in careful stewardship of personal health information. Current developments in information and communications technology present new problems for that stewardship. They call for continuing attention to ensure that policy, legal, and technical measures to protect sensitive information keep pace with those developments.
Chris Clark and Janice McGhee (eds)
- Published in print:
- 2008
- Published Online:
- March 2012
- ISBN:
- 9781861349064
- eISBN:
- 9781447303077
- Item type:
- book
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861349064.001.0001
- Subject:
- Social Work, Health and Mental Health
Handling personal and often sensitive information is central to daily practice in social and health services. However, the increasing emphasis on multi-disciplinary and inter-agency working required ...
More
Handling personal and often sensitive information is central to daily practice in social and health services. However, the increasing emphasis on multi-disciplinary and inter-agency working required for effective, joined-up services presents new challenges and dilemmas in preserving citizens' rights to privacy. This book examines key philosophical, ethical, and legal issues in the area of privacy and confidentiality, and explores their implications for policy and practice. Offering a range of analytical frameworks, the book focuses on different practice areas, including health and social care, children's services, and criminal justice. The contributors–from disciplines including law, philosophy, anthropology, and the personal service professions–bring their direct personal experience of working to create new systems and practices in a turbulent policy environment. The book provides a synoptic multi-disciplinary view of this increasingly challenging area where technological development, civil liberties, surveillance, health, and welfare become inexorably intertwined.Less
Handling personal and often sensitive information is central to daily practice in social and health services. However, the increasing emphasis on multi-disciplinary and inter-agency working required for effective, joined-up services presents new challenges and dilemmas in preserving citizens' rights to privacy. This book examines key philosophical, ethical, and legal issues in the area of privacy and confidentiality, and explores their implications for policy and practice. Offering a range of analytical frameworks, the book focuses on different practice areas, including health and social care, children's services, and criminal justice. The contributors–from disciplines including law, philosophy, anthropology, and the personal service professions–bring their direct personal experience of working to create new systems and practices in a turbulent policy environment. The book provides a synoptic multi-disciplinary view of this increasingly challenging area where technological development, civil liberties, surveillance, health, and welfare become inexorably intertwined.
Susanne Lace
- Published in print:
- 2005
- Published Online:
- March 2012
- ISBN:
- 9781861347350
- eISBN:
- 9781447303831
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861347350.003.0009
- Subject:
- Sociology, Social Research and Statistics
This chapter sets out the NCC's agenda and recommendations. The NCC believes that the importance of the personal information economy must be appreciated more widely. This chapter sets out a series of ...
More
This chapter sets out the NCC's agenda and recommendations. The NCC believes that the importance of the personal information economy must be appreciated more widely. This chapter sets out a series of recommendations, which range from the reform of data protection legislation to the promotion of privacy impact assessments and privacy-enhancing technologies. It emphasises the significance of the personal information economy and how much remains to be done to tackle its challenges. It explains that the NCC is keen to promote change, to move beyond dogma by encouraging an enlightened personal information agenda.Less
This chapter sets out the NCC's agenda and recommendations. The NCC believes that the importance of the personal information economy must be appreciated more widely. This chapter sets out a series of recommendations, which range from the reform of data protection legislation to the promotion of privacy impact assessments and privacy-enhancing technologies. It emphasises the significance of the personal information economy and how much remains to be done to tackle its challenges. It explains that the NCC is keen to promote change, to move beyond dogma by encouraging an enlightened personal information agenda.
Ofer Bergman and Steve Whittaker
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780262035170
- eISBN:
- 9780262336291
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262035170.003.0001
- Subject:
- Society and Culture, Technology and Society
Curation is a critical information management problem that has often been overlooked by prior information science research. Curation is important because people are increasingly acquiring large, ...
More
Curation is a critical information management problem that has often been overlooked by prior information science research. Curation is important because people are increasingly acquiring large, heterogeneous archives of valuable personal data that they find difficult to manage and access. This chapter contrasts curation, where users are responsible for organizing their own personal information, with traditional information management models, which focus on consumption of public information organized by others. The chapter introduces the key curation lifecycle processes of keeping, management and exploitation, describing the interrelations between them. It argues that curation processes are deep-rooted and somewhat resistant to technology change.Less
Curation is a critical information management problem that has often been overlooked by prior information science research. Curation is important because people are increasingly acquiring large, heterogeneous archives of valuable personal data that they find difficult to manage and access. This chapter contrasts curation, where users are responsible for organizing their own personal information, with traditional information management models, which focus on consumption of public information organized by others. The chapter introduces the key curation lifecycle processes of keeping, management and exploitation, describing the interrelations between them. It argues that curation processes are deep-rooted and somewhat resistant to technology change.
Dr Susanne Lace (ed.)
- Published in print:
- 2005
- Published Online:
- March 2012
- ISBN:
- 9781861347350
- eISBN:
- 9781447303831
- Item type:
- book
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861347350.001.0001
- Subject:
- Sociology, Social Research and Statistics
We are all ‘glass consumers’. Organisations know so much about us they can almost see through us. Governments and businesses collect and process our personal information on a massive scale. ...
More
We are all ‘glass consumers’. Organisations know so much about us they can almost see through us. Governments and businesses collect and process our personal information on a massive scale. Everything we do, and everywhere we go, leaves a trail. But is this in our interests? This book appraises this relentless scrutiny of consumers' lives. It reviews what is known about how personal information is used and examines the benefits and risks to consumers. The book takes the debate beyond privacy issues, arguing that we are living in a world in which — more than ever before — our personal information defines our opportunities in life.Less
We are all ‘glass consumers’. Organisations know so much about us they can almost see through us. Governments and businesses collect and process our personal information on a massive scale. Everything we do, and everywhere we go, leaves a trail. But is this in our interests? This book appraises this relentless scrutiny of consumers' lives. It reviews what is known about how personal information is used and examines the benefits and risks to consumers. The book takes the debate beyond privacy issues, arguing that we are living in a world in which — more than ever before — our personal information defines our opportunities in life.
Ofer Bergman and Steve Whittaker
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780262035170
- eISBN:
- 9780262336291
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262035170.001.0001
- Subject:
- Society and Culture, Technology and Society
Each of us has an ever-growing collection of personal digital data: documents, emails, Web pages we visited, tasks, contacts, appointments and pictures we took. To use any of this, we have to find ...
More
Each of us has an ever-growing collection of personal digital data: documents, emails, Web pages we visited, tasks, contacts, appointments and pictures we took. To use any of this, we have to find it. The ease of finding something depends on how we organize our digital stuff. In this book, personal information management (PIM) experts Ofer Bergman and Steve Whittaker explain why we organize our personal digital data the way we do and how better design can help us manage our collections more efficiently.
Bergman and Whittaker report that many of us use hierarchical folders for our personal digital organizing. Critics of this method point out that information is hidden from sight in folders that are often within other folders; so that we have to remember the exact location of information to access it. They therefore suggest other methods: search, more flexible than navigating folders; tags, which allow multiple categorizations; and group information management. Yet Bergman and Whittaker have found that these other methods that work best for public information management don’t work as well for personal information management.
Bergman and Whittaker describe personal information collection as curation: we preserve and organize this data to ensure our future access to it. Unlike other kinds of information management fields, in PIM the same user organizes and retrieves the information. After explaining the cognitive and psychological reasons that so many prefer folders, Bergman and Whittaker propose the user-subjective approach, which does not replace folder hierarchies but exploits the unique characteristics of PIM.Less
Each of us has an ever-growing collection of personal digital data: documents, emails, Web pages we visited, tasks, contacts, appointments and pictures we took. To use any of this, we have to find it. The ease of finding something depends on how we organize our digital stuff. In this book, personal information management (PIM) experts Ofer Bergman and Steve Whittaker explain why we organize our personal digital data the way we do and how better design can help us manage our collections more efficiently.
Bergman and Whittaker report that many of us use hierarchical folders for our personal digital organizing. Critics of this method point out that information is hidden from sight in folders that are often within other folders; so that we have to remember the exact location of information to access it. They therefore suggest other methods: search, more flexible than navigating folders; tags, which allow multiple categorizations; and group information management. Yet Bergman and Whittaker have found that these other methods that work best for public information management don’t work as well for personal information management.
Bergman and Whittaker describe personal information collection as curation: we preserve and organize this data to ensure our future access to it. Unlike other kinds of information management fields, in PIM the same user organizes and retrieves the information. After explaining the cognitive and psychological reasons that so many prefer folders, Bergman and Whittaker propose the user-subjective approach, which does not replace folder hierarchies but exploits the unique characteristics of PIM.
Susanne Lace
- Published in print:
- 2005
- Published Online:
- March 2012
- ISBN:
- 9781861347350
- eISBN:
- 9781447303831
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861347350.003.0001
- Subject:
- Sociology, Social Research and Statistics
This chapter discusses why the personal information economy is of fundamental and growing importance. It notes that the economy's operation increasingly will define our experience and choices as ...
More
This chapter discusses why the personal information economy is of fundamental and growing importance. It notes that the economy's operation increasingly will define our experience and choices as consumers, yet its impact is insufficiently understood and inadequately addressed. While debates such as those on identity cards capture extensive media coverage in the UK, it argues that the everyday, pervasive ways information use affects consumers lies largely unexplored. It outlines the personal information economy and some of the key issues it raises.Less
This chapter discusses why the personal information economy is of fundamental and growing importance. It notes that the economy's operation increasingly will define our experience and choices as consumers, yet its impact is insufficiently understood and inadequately addressed. While debates such as those on identity cards capture extensive media coverage in the UK, it argues that the everyday, pervasive ways information use affects consumers lies largely unexplored. It outlines the personal information economy and some of the key issues it raises.
Lisa S. Nelson
- Published in print:
- 2010
- Published Online:
- August 2013
- ISBN:
- 9780262014779
- eISBN:
- 9780262289689
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262014779.003.0004
- Subject:
- Society and Culture, Technology and Society
Privacy concerns play a significant part in the deployment and use of biometric systems of identification, and are central to the public policy debate over the use of biometric technology. Privacy is ...
More
Privacy concerns play a significant part in the deployment and use of biometric systems of identification, and are central to the public policy debate over the use of biometric technology. Privacy is considered an important factor in understanding societal acceptance of biometric technology. This chapter focuses on the relationship between privacy and biometric technology. There has been a wide concern over losing privacy in the context of using biometric systems of identification. Citizens get apprehensive about how the institutions deploying biometric technology use their personal information. In the current scenario of the information age and technological advancement, the protection of privacy is an important aspect that needs to be addressed sensibly to make people accept the biometric systems of identification. Biometric technology may protect privacy by serving as a tool of identity assurance in protecting the exchange of personal information.Less
Privacy concerns play a significant part in the deployment and use of biometric systems of identification, and are central to the public policy debate over the use of biometric technology. Privacy is considered an important factor in understanding societal acceptance of biometric technology. This chapter focuses on the relationship between privacy and biometric technology. There has been a wide concern over losing privacy in the context of using biometric systems of identification. Citizens get apprehensive about how the institutions deploying biometric technology use their personal information. In the current scenario of the information age and technological advancement, the protection of privacy is an important aspect that needs to be addressed sensibly to make people accept the biometric systems of identification. Biometric technology may protect privacy by serving as a tool of identity assurance in protecting the exchange of personal information.
Justin Rushbrooke QC and Adam Speker
- Published in print:
- 2016
- Published Online:
- March 2021
- ISBN:
- 9780199685745
- eISBN:
- 9780191932953
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780199685745.003.0006
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter is concerned with claims for what is commonly known as breach of confidence. Until quite recently, reliance on the cause of action for breach of confidence has been one of the two ...
More
This chapter is concerned with claims for what is commonly known as breach of confidence. Until quite recently, reliance on the cause of action for breach of confidence has been one of the two main ways in which claims to protect or vindicate privacy have been pursued in English law. The other, much less significant in practice, is reliance on statutory rights such as those afforded by the Data Protection Act 1998. Today, as a result of the House of Lords’ decisions in Campbell v MGN Ltd and Douglas v Hello! Ltd, it is possible to differentiate between two different kinds of claim: (i) traditional breach of confidence actions; and (ii) claims for misuse of private information. The first of these kinds of claim will be discussed in this chapter. The second, misuse of private information, is a cause of action which has developed in the present century originating in, becoming separate and distinct from, breach of confidence. It will be addressed separately in Chapter 5.
Less
This chapter is concerned with claims for what is commonly known as breach of confidence. Until quite recently, reliance on the cause of action for breach of confidence has been one of the two main ways in which claims to protect or vindicate privacy have been pursued in English law. The other, much less significant in practice, is reliance on statutory rights such as those afforded by the Data Protection Act 1998. Today, as a result of the House of Lords’ decisions in Campbell v MGN Ltd and Douglas v Hello! Ltd, it is possible to differentiate between two different kinds of claim: (i) traditional breach of confidence actions; and (ii) claims for misuse of private information. The first of these kinds of claim will be discussed in this chapter. The second, misuse of private information, is a cause of action which has developed in the present century originating in, becoming separate and distinct from, breach of confidence. It will be addressed separately in Chapter 5.
Perri 6
- Published in print:
- 2005
- Published Online:
- March 2012
- ISBN:
- 9781861347350
- eISBN:
- 9781447303831
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861347350.003.0002
- Subject:
- Sociology, Social Research and Statistics
This chapter presents an overview of the personal information economy, exploring its development and importance. It notes the difficulty of overestimating the importance of personal information — ...
More
This chapter presents an overview of the personal information economy, exploring its development and importance. It notes the difficulty of overestimating the importance of personal information — global retail organisations take investment decisions based on the most finely grained analysis of consumers's data. It also warns of the risks and builds a framework detailing the risks of the said economy. It notes that traditionally, much attention has been focused on risks of intrusion when considering consumers' information but less attention has been paid to risks to life chances that arise from the ways the economy works.Less
This chapter presents an overview of the personal information economy, exploring its development and importance. It notes the difficulty of overestimating the importance of personal information — global retail organisations take investment decisions based on the most finely grained analysis of consumers's data. It also warns of the risks and builds a framework detailing the risks of the said economy. It notes that traditionally, much attention has been focused on risks of intrusion when considering consumers' information but less attention has been paid to risks to life chances that arise from the ways the economy works.
Peter Ashe
- Published in print:
- 2008
- Published Online:
- March 2012
- ISBN:
- 9781861349064
- eISBN:
- 9781447303077
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861349064.003.0010
- Subject:
- Social Work, Health and Mental Health
This chapter explores conceptual frameworks for sharing information in the world of children's services. It first sketches the longstanding policy emphasis on person- or child-centred services and ...
More
This chapter explores conceptual frameworks for sharing information in the world of children's services. It first sketches the longstanding policy emphasis on person- or child-centred services and its recent critique. Next, some of the substantial volume of recent consultation with children and young people about the use of their personal information is briefly discussed. The chapter asks whether current approaches offer a sustainable framework for the near future. The ‘privacy pragmatism’ approach first propounded in the Cabinet Office report on information sharing is considered as a potential theoretical prop, together with ‘personal learning planning’ as a potential fulcrum, for the bridge-building that is necessary if information sharing practice is to take account of rapidly developing trends in the lived experiences of children and young people. Reframing our consideration of this issue provides an opportunity to build towards a sustainable set of social relationships between people, their personal data, and its public custodians.Less
This chapter explores conceptual frameworks for sharing information in the world of children's services. It first sketches the longstanding policy emphasis on person- or child-centred services and its recent critique. Next, some of the substantial volume of recent consultation with children and young people about the use of their personal information is briefly discussed. The chapter asks whether current approaches offer a sustainable framework for the near future. The ‘privacy pragmatism’ approach first propounded in the Cabinet Office report on information sharing is considered as a potential theoretical prop, together with ‘personal learning planning’ as a potential fulcrum, for the bridge-building that is necessary if information sharing practice is to take account of rapidly developing trends in the lived experiences of children and young people. Reframing our consideration of this issue provides an opportunity to build towards a sustainable set of social relationships between people, their personal data, and its public custodians.
Kevin Dunion
- Published in print:
- 2011
- Published Online:
- September 2015
- ISBN:
- 9781845861223
- eISBN:
- 9781474406178
- Item type:
- chapter
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781845861223.003.0006
- Subject:
- Law, Constitutional and Administrative Law
This chapter provides an overview of freedom of information as it is practiced in Scotland, with particular emphasis on issues concerning third-party data. One of the most common and contentious ...
More
This chapter provides an overview of freedom of information as it is practiced in Scotland, with particular emphasis on issues concerning third-party data. One of the most common and contentious disputes under the Freedom of Information (Scotland) Act 2002 (FOISA) has to do with third-party data and whether the exemption at s 38(1)(b) applies, an issue that pits the right to information against the right to privacy. The task is to reconcile the legal imperative to keep personal information safe and to prevent it being misused by those who have collected it. The courts have made it clear that the general presumption in favour of disclosure created by FOISA does not apply to personal data. Where disclosure of information would contravene the data protection principles, the exemption in FOISA is absolute, and the authority is not required to go on to consider where the balance of the public interest lies in relation to the information. In practice, the key issues to consider are whether the requested information constitutes personal data and, if so, whether disclosure would contravene any of the data protection principles.Less
This chapter provides an overview of freedom of information as it is practiced in Scotland, with particular emphasis on issues concerning third-party data. One of the most common and contentious disputes under the Freedom of Information (Scotland) Act 2002 (FOISA) has to do with third-party data and whether the exemption at s 38(1)(b) applies, an issue that pits the right to information against the right to privacy. The task is to reconcile the legal imperative to keep personal information safe and to prevent it being misused by those who have collected it. The courts have made it clear that the general presumption in favour of disclosure created by FOISA does not apply to personal data. Where disclosure of information would contravene the data protection principles, the exemption in FOISA is absolute, and the authority is not required to go on to consider where the balance of the public interest lies in relation to the information. In practice, the key issues to consider are whether the requested information constitutes personal data and, if so, whether disclosure would contravene any of the data protection principles.
Ian E. Thompson
- Published in print:
- 2008
- Published Online:
- March 2012
- ISBN:
- 9781861349064
- eISBN:
- 9781447303077
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861349064.003.0005
- Subject:
- Social Work, Health and Mental Health
This chapter focuses on the kind of policy and procedures that are needed to deal with issues of confidentiality and privacy in professional practice, and the practical requirements for responsible ...
More
This chapter focuses on the kind of policy and procedures that are needed to deal with issues of confidentiality and privacy in professional practice, and the practical requirements for responsible institutional management of personal information. It argues that workable and defensible practices for handling privacy and confidentiality should be developed in dialogue grounded in the real world of agencies and service practice. The chapter suggests that the mystification of ethics as an abstract discipline has hindered the development of practical ethics for agency policy and professional practice. It examines and compares two cases in which the author was directly involved as a research consultant. The first is from Western Australia, where inadvertent disclosure of personal health information in the press provoked calls for the Minister of Health to resign and necessitated the development of policy and procedures to deal with the ensuing crisis. The second relates to developing a youth justice strategy within the Integrated Children's Services Plan for the Outer Hebrides.Less
This chapter focuses on the kind of policy and procedures that are needed to deal with issues of confidentiality and privacy in professional practice, and the practical requirements for responsible institutional management of personal information. It argues that workable and defensible practices for handling privacy and confidentiality should be developed in dialogue grounded in the real world of agencies and service practice. The chapter suggests that the mystification of ethics as an abstract discipline has hindered the development of practical ethics for agency policy and professional practice. It examines and compares two cases in which the author was directly involved as a research consultant. The first is from Western Australia, where inadvertent disclosure of personal health information in the press provoked calls for the Minister of Health to resign and necessitated the development of policy and procedures to deal with the ensuing crisis. The second relates to developing a youth justice strategy within the Integrated Children's Services Plan for the Outer Hebrides.
Sang Jo Jong
- Published in print:
- 2017
- Published Online:
- October 2017
- ISBN:
- 9780190685515
- eISBN:
- 9780190685546
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190685515.003.0014
- Subject:
- Law, Company and Commercial Law, Constitutional and Administrative Law
This chapter examines the statutory grounds for governmental access to private-sector data in Korea. It focuses on issues such as the circumstances under which access is allowed without a warrant and ...
More
This chapter examines the statutory grounds for governmental access to private-sector data in Korea. It focuses on issues such as the circumstances under which access is allowed without a warrant and how unjustified government access can take place in practice. Systematic government access to private-sector data can take place through warrants issued by a court. Notably, due to the unique truce situation, under which the Republic of Korea is technically still at war with North Korea, Korean authorities are sometimes allowed to obtain private-sector data without warrants, for national security purposes. This chapter examines the statutory grounds for governmental access to private-sector data in Korea, focusing specifically on issues such as the circumstances under which access is allowed without a warrant and how unjustified government access can take place in practice.Less
This chapter examines the statutory grounds for governmental access to private-sector data in Korea. It focuses on issues such as the circumstances under which access is allowed without a warrant and how unjustified government access can take place in practice. Systematic government access to private-sector data can take place through warrants issued by a court. Notably, due to the unique truce situation, under which the Republic of Korea is technically still at war with North Korea, Korean authorities are sometimes allowed to obtain private-sector data without warrants, for national security purposes. This chapter examines the statutory grounds for governmental access to private-sector data in Korea, focusing specifically on issues such as the circumstances under which access is allowed without a warrant and how unjustified government access can take place in practice.
Gary T. Marx
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780226285887
- eISBN:
- 9780226286075
- Item type:
- chapter
- Publisher:
- University of Chicago Press
- DOI:
- 10.7208/chicago/9780226286075.003.0005
- Subject:
- Sociology, Law, Crime and Deviance
This chapter deals with types of surveillance data. Such data are honeycombed with attributes and tacit expectations that can be systematically compared. What are the major kinds of data that ...
More
This chapter deals with types of surveillance data. Such data are honeycombed with attributes and tacit expectations that can be systematically compared. What are the major kinds of data that surveillance may gather? How do the characteristics of these data affect explanation, evaluation, manners, policy and law? When we speak of surveillance, just what is “it” that is surveilled? What cultural expectations and attitudes accompany different kinds of data? A central argument of the book is that understanding and evaluating surveillance require attention to the setting but the kind of data (visual, auditory, text etc.) may be independent of this. The chapter identifies four basic types by combining dimensions of personal-impersonal and private-public. It also identifies ten types of information that can be connected to the person (e.g., temporal, behavioral, beliefs) and a series of analytic attributes that may cut through these such as intimate, personal, sensitive and unique and or core identification.Less
This chapter deals with types of surveillance data. Such data are honeycombed with attributes and tacit expectations that can be systematically compared. What are the major kinds of data that surveillance may gather? How do the characteristics of these data affect explanation, evaluation, manners, policy and law? When we speak of surveillance, just what is “it” that is surveilled? What cultural expectations and attitudes accompany different kinds of data? A central argument of the book is that understanding and evaluating surveillance require attention to the setting but the kind of data (visual, auditory, text etc.) may be independent of this. The chapter identifies four basic types by combining dimensions of personal-impersonal and private-public. It also identifies ten types of information that can be connected to the person (e.g., temporal, behavioral, beliefs) and a series of analytic attributes that may cut through these such as intimate, personal, sensitive and unique and or core identification.
Jonathan Montgomery
- Published in print:
- 2005
- Published Online:
- March 2012
- ISBN:
- 9781861347350
- eISBN:
- 9781447303831
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781861347350.003.0008
- Subject:
- Sociology, Social Research and Statistics
This chapter explores how personal information is now handled in the National Health Service (NHS) and examines its future plans. It argues that shifts in the structure of health services and the ...
More
This chapter explores how personal information is now handled in the National Health Service (NHS) and examines its future plans. It argues that shifts in the structure of health services and the replacement within the NHS of the paradigm of confidentiality with that of data protection should not be seen as damaging. It notes that health service organisations have greater power to protect patient confidentiality than individual professionals could have done.Less
This chapter explores how personal information is now handled in the National Health Service (NHS) and examines its future plans. It argues that shifts in the structure of health services and the replacement within the NHS of the paradigm of confidentiality with that of data protection should not be seen as damaging. It notes that health service organisations have greater power to protect patient confidentiality than individual professionals could have done.
Kevin Dunion
- Published in print:
- 2011
- Published Online:
- September 2015
- ISBN:
- 9781845861223
- eISBN:
- 9781474406178
- Item type:
- book
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781845861223.001.0001
- Subject:
- Law, Constitutional and Administrative Law
This book is the only in-depth guide to Scotland’s freedom of information (FOI) regime. Written by Kevin Dunion, the first Scottish Information Commissioner, it provides detailed commentary on the ...
More
This book is the only in-depth guide to Scotland’s freedom of information (FOI) regime. Written by Kevin Dunion, the first Scottish Information Commissioner, it provides detailed commentary on the provisions of the Freedom of Information (Scotland) Regulations 2004. It is fully referenced, using the Commissioner’s own decisions and court judgements and provides a unique insight into the Commissioner’s role in determining appeals and ensuring adherence to the Code of Practice. It considers key issues of interpretation that have arisen since the law came into effect, including those exemptions concerning personal information, official advice, and the formulation of policy. It also covers the application of the ‘harm’ and ‘public interest’ tests. It includes a fully annotated version of the Freedom of Information (Scotland) Act 2002, along with case studies that illustrate the practical application of the legislation. It also includes a detailed interpretation of the Environmental Information Regulations, and highlights important differences between these regulations and general FOI law. It considers the state of FOI in Scotland by comparing it to provisions and developments in the rest of the UK and internationally.Less
This book is the only in-depth guide to Scotland’s freedom of information (FOI) regime. Written by Kevin Dunion, the first Scottish Information Commissioner, it provides detailed commentary on the provisions of the Freedom of Information (Scotland) Regulations 2004. It is fully referenced, using the Commissioner’s own decisions and court judgements and provides a unique insight into the Commissioner’s role in determining appeals and ensuring adherence to the Code of Practice. It considers key issues of interpretation that have arisen since the law came into effect, including those exemptions concerning personal information, official advice, and the formulation of policy. It also covers the application of the ‘harm’ and ‘public interest’ tests. It includes a fully annotated version of the Freedom of Information (Scotland) Act 2002, along with case studies that illustrate the practical application of the legislation. It also includes a detailed interpretation of the Environmental Information Regulations, and highlights important differences between these regulations and general FOI law. It considers the state of FOI in Scotland by comparing it to provisions and developments in the rest of the UK and internationally.
Joel T. Dudley and Konrad J. Karczewski
- Published in print:
- 2013
- Published Online:
- December 2013
- ISBN:
- 9780199644483
- eISBN:
- 9780191774577
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199644483.001.0001
- Subject:
- Biology, Evolutionary Biology / Genetics
This book provides a novel, inquiry-based approach to the understanding and interpretation of the practical, medical, physiological, and societal aspects of personal genomic information. The material ...
More
This book provides a novel, inquiry-based approach to the understanding and interpretation of the practical, medical, physiological, and societal aspects of personal genomic information. The material is presented in two parts: the first provides readers of all backgrounds with a fundamental understanding of the biology of human genomes, information on how to obtain and understand digital representations of personal genomic data, tools and techniques for exploring the personal genomics of ancestry and genealogy, discovery and interpretation of genetic trait associations, and the role of personal genomics in drug response. The second part offers more advanced readers an understanding of the science, tools, and techniques for investigating interactions between a personal genome and the environment, connecting DNA to physiology, and assessing rare variants and structural variation.Less
This book provides a novel, inquiry-based approach to the understanding and interpretation of the practical, medical, physiological, and societal aspects of personal genomic information. The material is presented in two parts: the first provides readers of all backgrounds with a fundamental understanding of the biology of human genomes, information on how to obtain and understand digital representations of personal genomic data, tools and techniques for exploring the personal genomics of ancestry and genealogy, discovery and interpretation of genetic trait associations, and the role of personal genomics in drug response. The second part offers more advanced readers an understanding of the science, tools, and techniques for investigating interactions between a personal genome and the environment, connecting DNA to physiology, and assessing rare variants and structural variation.
Norbert Gilmore
- Published in print:
- 2007
- Published Online:
- September 2009
- ISBN:
- 9780199237401
- eISBN:
- 9780191723957
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199237401.003.0008
- Subject:
- Public Health and Epidemiology, Public Health, Epidemiology
Ethical concerns have been a prominent feature of the debate about the HIV pandemic. Most ethical issues had already been analyzed by 1996, when HAART became available, but few of those issues have ...
More
Ethical concerns have been a prominent feature of the debate about the HIV pandemic. Most ethical issues had already been analyzed by 1996, when HAART became available, but few of those issues have been re-analyzed since then. Also, few of the newer issues raised by HAART itself have been analyzed exhaustively. These issues include concerns about the generation and communication of personal information, rights to, care of people infected with HIV, as well as rights in relation to prevention and vaccine research. The capacity of HAART to prevent infection following a variety of HIV exposures raises concerns about HIV testing and disclosure of personal information. Some issues arise from availability of HAART, whereas others arise from its lack of availability, especially in developing countries. This chapter briefly examines the principle ethical issues that HAART highlights as a basis for encouraging future investigations and discussion.Less
Ethical concerns have been a prominent feature of the debate about the HIV pandemic. Most ethical issues had already been analyzed by 1996, when HAART became available, but few of those issues have been re-analyzed since then. Also, few of the newer issues raised by HAART itself have been analyzed exhaustively. These issues include concerns about the generation and communication of personal information, rights to, care of people infected with HIV, as well as rights in relation to prevention and vaccine research. The capacity of HAART to prevent infection following a variety of HIV exposures raises concerns about HIV testing and disclosure of personal information. Some issues arise from availability of HAART, whereas others arise from its lack of availability, especially in developing countries. This chapter briefly examines the principle ethical issues that HAART highlights as a basis for encouraging future investigations and discussion.
Joel T. Dudley and Konrad J. Karczewski
- Published in print:
- 2013
- Published Online:
- December 2013
- ISBN:
- 9780199644483
- eISBN:
- 9780191774577
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199644483.003.0009
- Subject:
- Biology, Evolutionary Biology / Genetics
This chapter provides a discussion on how to connect personal genomic information with other forms of molecular data, also exploring how to analyze these connections to draw out conclusions about the ...
More
This chapter provides a discussion on how to connect personal genomic information with other forms of molecular data, also exploring how to analyze these connections to draw out conclusions about the likely effects that personal genome composition have on an individual's physiology. The chapter provides several cases and analyses for study and review, but also warns that these particular analyses detailed within the chapter are of an advanced level and are still the subject of intense research. Despite that complication, however, the chapter offers critical insights into the future directions of personal genome exploration. In addition, the approaches detailed in the chapter also have the capacity to yield interesting and valuable insights into the relationship between personal genotype and personal physiology.Less
This chapter provides a discussion on how to connect personal genomic information with other forms of molecular data, also exploring how to analyze these connections to draw out conclusions about the likely effects that personal genome composition have on an individual's physiology. The chapter provides several cases and analyses for study and review, but also warns that these particular analyses detailed within the chapter are of an advanced level and are still the subject of intense research. Despite that complication, however, the chapter offers critical insights into the future directions of personal genome exploration. In addition, the approaches detailed in the chapter also have the capacity to yield interesting and valuable insights into the relationship between personal genotype and personal physiology.