Skip to main content

Currently Skimming:

II. LITERATURE REVIEW
Pages 6-10

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 6...
... Rather, the standard is set by the major credit card com- be let alone." panies through the Payment Card Industry Security Standards Warren and Brandeis argued that although privacy is as old ­Council. PCI DSS regulates the security of credit card informa- as common law, it is necessary from time to time to assess the tion and the systems used to process that information.
From page 7...
... occurrence and the purposes to which data collected will be ap Alan Westin's work, Privacy and Freedom, exploring individ- plied. Information available to the public should include idenual privacy at the dawn of the computer age was, perhaps one tity of the "entity collecting data," "uses to which the data will be of the most influential in shaping early privacy protections.17 put," identity of "any potential recipients of the data," nature of P rivacy and Freedom defines privacy as an individual's, group's, the data collected and means of doing so, whether compliance is or institution's control over how and to what extent information voluntary and the means of assuring confidentiality and quality about them will be communicated to others.
From page 8...
... . Unless specific tend to focus privacy concerns on narrowly defined personally statutory relief is provided, local governments may be compelled identifiable information (PII)
From page 9...
... Solove argues that privacy consists of many things and requires Daniel Solove and Woodrow Hartzog argue in their 2013 article, a mapping to account for full situational context.36 The FTC and the New Common Law of Privacy, that the FTC Solove's A Model of Privacy Protection addresses structural has created common law like regulatory regime because of its concerns over how the United States regulates privacy through consistent applications of rules in its complaints and o ­ rders.40 a sectoral rather than a comprehensive statutory approach.37 According to Solove and Hartzog, the FCC has sought to proContrasted with the EU's omnibus approach to privacy and tect privacy interests through enforcement actions related to dedata protection, concern exists that the United States' more ception, unfairness, statutory violations, or violations of inter­ piecemeal approach leaves significant gaps. For example, a more national agreements.41 balkanized approach to privacy and data protection requires a The fact that airports in the United States are governmental more diligent examination of several differing federal and state entities adds additional complexity and nuance in this context.
From page 10...
... Privacy Principles for Facial Recognition Technology in Com- Most importantly from a privacy perspective, the developmercial Applications establishes standards for privacy protec- ment and use of biometrics, an immutable digital identity attions where technology collects, creates, and maintains facial tribute, across the entire passenger experience, highlights the templates to identify individuals.46 This work argues that the importance of airport competency in privacy data collection, creation or storage of a photo or video on its own does not in- use, sharing, and protection. For example, beyond existing herently implicate facial recognition privacy concerns.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.